Cybrary
Cybrary Logo

Advanced Penetration Testing 

  • Offered byCybrary

Advanced Penetration Testing
 at 
Cybrary 
Overview

Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection

Duration

14 hours

Mode of learning

Online

Official Website

Go to Website External Link Icon

Credential

Certificate

Advanced Penetration Testing
 at 
Cybrary 
Highlights

  • Earn a certificate from Cybrary
Details Icon

Advanced Penetration Testing
 at 
Cybrary 
Course details

More about this course
  • This course is a deep-dive into the world of advanced pen-testing, and there are no life jackets - only binaries. Real-world unethical hackers are becoming increasingly more devious and cunning when it comes to technology
  • That means that more advanced level ethical hackers are needed to penetration test and help create more secure networks and systems for our modern, high-security environments
  • Georgia Weidman, penetration testing and hacking subject matter expert, author, and well-known industry event speaker will teach you everything you need to know!

Advanced Penetration Testing
 at 
Cybrary 
Curriculum

Module 1 - Linux

Linux (part 6) Copy Commands and crontab

Linux (part 5) IP Addressing and netcat

Linux (part 4) chmod, manipulation and packages

Linux (part 3) - Directories, myfile and Nano

Linux (part 2) Kali Linux Commands

Linux (part 1)

Module 2 - Programming

Programming (part 5) Python Import Command

Programming (part 4) Python for Port Scanning

Programming (part 3) Network Pings

Programming (part 2) Bash Scripting and If/Then Command

Programming (part 1) Fundamentals for Pen Testers

Module 3 - Metasploit

Metasploit (part 6) msfvenom

Metasploit (part 5) msfcli

Metasploit (part 4) Auxiliary Module

Metasploit (part 3) Operation

Module 4 - Information Gathering

Information Gathering (part 5) NMAP and PortScanning

Information Gathering (part 4) recon-ng and google operators

Information Gathering (part 3) Targeting Email and Maltego

Information Gathering (part 2) Domain Name Services

Module 5 - Vulnerability Discovery/Scanning

Vulnerability Scanning (part 6) Directory Transversals

Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto

Vulnerability Scanning (part 4) Metasploit

Vulnerability Scanning (part 3) Nmap Scripting Engine

Module 6 - Traffic Capture

Traffic Capture (part 6) SSL Stripping

Traffic Capture (part 5) ettercap

Traffic Capture (part 4) DNS

Traffic Capture (part 3) Address Resolution Protocol ARP

Module 7 - Exploitation

Exploitation (part 6) Attaching to an IP Address

Exploitation (part 5) Using Backdoor to Access an FTP Server

Exploitation (part 4) Open Source Vulnerability

Exploitation (part 3) Directory Traversal

Module 8 - Passwords

Passwords (part 4) Using oclhashcat

Passwords (part 3) Offline Password Attacks

Passwords (part 2) Online Password Cracking

Passwords (part 1) Password Attacks

Module 9 - Advanced Exploitation

Advanced Exploitation (part 5) Bypassing Antivirus Software

Advanced Exploitation (part 4) Social Engineering

Advanced Exploitation (part 3) Exploiting Java

Advanced Exploitation (part 2) Client Side Attacks

Module 10 - Post Exploitation

Post Exploitation (part 4) Setting Up a Domain Controller

Post Exploitation (part 3) Pivoting

Post Exploitation (part 2) Exploit Development

Post Exploitation (part 1) File Transfer without and Interactive Shell

Advanced Penetration Testing
 at 
Cybrary 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Cybrary

– / –
1 hours
Beginner
– / –
3 hours
Intermediate
– / –
1 day
Intermediate
– / –
15 hours
Advanced
View Other 10 CoursesRight Arrow Icon
qna

Advanced Penetration Testing
 at 
Cybrary 

Student Forum

chatAnything you would want to ask experts?
Write here...