What you’ll learn
Penetration Test Types
Penetration Test Approaches
Planning Penetration Test Phases
Penetration Test Phases
Legal Issues Testing Standarts
Network Scan Types
Passive Scan With Wireshark
Passive Scan with ARP Tables
Active Scan with Hping
Hping for Another Purpose: DDos
Ping Scan to Enumerate Network Hosts
TCP/IP Basics on OSI Reference Model
TCP/IP Model on Example
TCP/UP Protocol Basics
Port Scan with Nmap
Nmap Port Scan Details
Operating System Detection
Input & Output Management in Nmap
Nmap Scripting Engine: Some Handy Scripts
How to Bypass Security Measures in Nmap Scans
Timing of the Scans
Some Other Types of Scans: XMAS, ACK, etc.
Idle (Stealth) Scan
Nessus: First Scan
An Aggressive Scan
Results of an Aggressive Scan
Nessus: Report Function
Password Hashes of Windows Systems
Password Hashes of Linux Systems
Password Cracking Tools
Brute Force Attack
Maltego – Visual Link Analysis Tool
An Automated Tool: Zed Attack Proxy (ZAP)
Cross Site Scripting
BeEF – The Browser Exploitation Framework
Embedding Malware in PDF Files
Embedding Malware in Word Documents
Embedding Malware in Firefox Add-ons
Sending Fake Emails for Phishing
Password Creation Methods of Cisco Routers
- Attaching Kali to GNS3 Network
- Active Network Devices
- Network Sniffing
- Sniffing Data & Analysing HTTP Traffic via Wireshark
- Using MITMf Against Real Networks
- Weakness of Network Devices
- How to prepare the lab environment for hands-on experiments
- Penetration Testing tools such as Ettercap, Wireshark and etc.
- MAC Flooding
- DHCP Starvation & DHCP Spoof
- VLAN Hopping
- Penetration Testing of Network Devices
- Network Device Audits
A computer for installing all the free software and tools needed to practice
Be able to download and install all the free software and tools
Ethical hackers are in massive demand around the world. What need is: Desire to learn
The average payout to a Ethical Hackers is $70,000. You can be Ethical Hacker,too!
Nothing else! It’s just you, your computer and your ambition to get started today
Welcome to my “Complete Penetration Testing and Ethical Hacking: Hands-on” course.
My name is Muharrem Aydin (White-Hat Hacker), creator of the three best-selling Ethical Hacking and Penetration Testing courses on Udemy.
This time I’ve designed The Complete Penetration Testing and Ethical Hacking Course: Hands-On, for YOU!
My Complete Penetration Testing and Ethical Hacking Course is for everyone! If you don’t have any previous experience, not a problem! This course is expertly designed to teach everyone from complete beginners, right through to pro hackers. You’ll go from beginner to extremely high-level and I will take you through each step with hands-on examples.
And if you are a pro Ethical Hacker, then take this course to quickly absorb the latest skills, while refreshing existing ones.