Whitehat Hacking and Penetration Testing Advanced Video Tutorial Course

CareerVision Training

£ 75 - (88 )
IVA inc.

Informazione importanti

  • Training
  • Advanced
  • A distanza
  • Durata:
  • Quando:
    Da definire
  • Invio di materiale didattico

• Format: DVD-ROM
• Duration: 5.25 Hours (78 lessons)
• Instructor: Ric Messier
• Platform: Windows PC or Mac

In this Advanced White Hat Hacking And Penetration Testing training course, expert author Ric Messier takes you beyond the basics of Ethical Hacking and shows you advanced techniques for discovering potential security problems with your websites and networks. This course requires that you already have familiarity with the basics of penetration testing, and assumes that you have already completed the Learning White Hat Hacking And Penetration Testing course from Infinite Skills.

Ric jumps right into the nitty gritty with a chapter about using Dradis. You will learn about scanning, including stealth scanning, data acquisition using various methods, and advanced ways to utilize Metasploit.

Informazione importanti

Requisiti: This is a DVD Video Tutorial Course which is shipped to you. Work through the video tutorials at your own pace. If you have the software you can practice along with the instructor using the same exercise files as the instructor which are included on the DVD. The narrated training videos demonstrate the key tools and professional techniques helping you to work faster and smarter. All the concepts of each application are explained clearly and precisely. The DVD works on PC and Mac. You can jump to and from lessons and work at your own pace.


Dove e quando

Inizio Luogo
Da definire
Distance Learning

Cosa impari in questo corso?

Penetration Testing
Web Testing


01. Introduction
0101 What You Should Expect
0102 What You Should Know
0103 What You Will Learn
0104 System Requirements
02. Getting Organized
0201 Ethical Hacking
0202 Dradis Framework
0203 Using Notes With Dradis
0204 Importing Data With Dradis
0205 Installing Plugins In Google Chrome
0206 Installing Plugins In Mozilla Firefox
0207 Raspberry PI
0208 SSH Forwarding
03. Scanning
0301 Refresher On NMAP
0302 Scan Types
0303 Stealth Scanning
0304 Application Scans Using AMAP
0305 Web Testing With NMAP
0306 Scanning And Scripting With NMAP And UDP
0307 Scanning With Hping
0308 Payload-Based Scanning With Unicorn Scan
0309 TCP Scanning With Unicorn Scan
04. Data Acquisition
0401 Using Wappalyzer
0402 Using Passive Recon
0403 Using Firebug
0404 Using Groundspeed
0405 Converting With Hackbar
0406 Managing Cookies
05. Metasploit
0501 Starting Up Metasploit
0502 Scanning With Metasploit
0503 Service Scanning With Metasploit
0504 SMB Scanning With Metasploit
0505 Importing Nessus Results
0506 Creating Payloads
0507 Creating Standalone Exploits
0508 Encoding And Packing
0509 Writing Fuzzers Using Metasploit
0510 Exploits
0511 Using Meterpreter
0512 Post-Exploitation
0513 Pivoting
0514 Manipulating Windows API
0515 Client Side Attacks
0516 Social Engineering Toolkit
0517 Spear Phishing
0518 Web Attacks
0519 Automating Metasploit
0520 SQL Server Logins
0521 Token Stealing
0522 Extending Metasploit
06. Web Testing
0601 Running Burp Suite
0602 Passive Scanning
0603 Active Scanning
0604 Using The Intruder
0605 Brute Forcing Passwords
0606 SQL Injection Testing With Burp Suite
0607 Cross Site Scripting With Burp Suite
0608 Using The Burp Suite Repeater
0609 Using The Burp Suite Sequencer
0610 XSS-Me
0611 SQL-Inject Me
0612 TamperData
0613 Injection Attacks With TamperData
0614 Hidden Form Fields
0615 ZED Attack Proxy
0616 Fuzzing With ZED Attack Proxy
0617 Hackbar
07. Reverse Engineering
0701 Assembly Basics
0702 Buffer Overflows
0703 Format String Attacks
0704 Debugging - Linux
08. Fuzzing
0801 Peach Fuzzer
0802 HTTP Fuzzing With Peach
0803 E-Mail Fuzzing With Peach
0804 File And Network Fuzzing With Peach
0805 Sulley
0806 Spike Proxy
09. Wrapping Up
0901 Extending Your Learning
10. About The Author
1001 About Ric Messier