Learn all about ethical hacking and penetration testing
https://www.udemy.com/course/full-ethical-hacking-course/
Introduction to cyber-security
Information gathering
Assess security vulnerabilities
Scanning engines
Internet scanners
Center for Internet Security (CIS)
Hardening checks for systems
Exploitation
Metasploit framework for ethical hacking
Social engineering
Open Web Application Security Project (OWASP) top 10
BurpSuite tutorial for manual injection on web penetration testing
Payload testing with custom load
Creation of payload
https://www.udemy.com/course/full-ethical-hacking-course/
What you'll learn
- Ethical hacking and cybersecurity
- Penetration testing
Requirements
- Basic computer knowledge
Description
Introduction to cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.Introduction to cyber-security
- Cyber-attack chain
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions on Objective
- Kali Linux
- Install, deploy and run Kali Linux
- Installation and deployment of vulnerable server for testing
Information gathering
Assess security vulnerabilities
Scanning engines
- Nmap scanning
Internet scanners
- Google search engine
- Recon-ng scanning
Center for Internet Security (CIS)
Hardening checks for systems
Exploitation
Metasploit framework for ethical hacking
- Basic commands and usage
- Module exploration
- Search for vulnerabilities from scanning results
- Exploitation of systems
- Post-exploitation for privilege escalation and scanning
Social engineering
- Dark Web with Tor
- Hacking groups and forums
- Wireless security assessment with WiFi PineApple
- Wireless vulnerabilities
- Social Engineering Toolkit (SET) attacks
- Direct attacks into Windows 10 with Macros and Powershell
Open Web Application Security Project (OWASP) top 10
- Injection
- Broken authentication
- Sensitive data exposure
- XML External Entities
- Broken access control
- Security misconfiguration
- Cross-Site Scripting
- Insecure Deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
BurpSuite tutorial for manual injection on web penetration testing
Payload testing with custom load
Creation of payload
- Payloads package on injection
- Fully undetected payloads
- Buffer overflow for shell