Advanced Penetration Testing
- Offered byCybrary
Advanced Penetration Testing at Cybrary Overview
Duration | 14 hours |
Mode of learning | Online |
Official Website | Go to Website |
Credential | Certificate |
Advanced Penetration Testing at Cybrary Highlights
- Earn a certificate from Cybrary
Advanced Penetration Testing at Cybrary Course details
- This course is a deep-dive into the world of advanced pen-testing, and there are no life jackets - only binaries. Real-world unethical hackers are becoming increasingly more devious and cunning when it comes to technology
- That means that more advanced level ethical hackers are needed to penetration test and help create more secure networks and systems for our modern, high-security environments
- Georgia Weidman, penetration testing and hacking subject matter expert, author, and well-known industry event speaker will teach you everything you need to know!
Advanced Penetration Testing at Cybrary Curriculum
Module 1 - Linux
Linux (part 6) Copy Commands and crontab
Linux (part 5) IP Addressing and netcat
Linux (part 4) chmod, manipulation and packages
Linux (part 3) - Directories, myfile and Nano
Linux (part 2) Kali Linux Commands
Linux (part 1)
Module 2 - Programming
Programming (part 5) Python Import Command
Programming (part 4) Python for Port Scanning
Programming (part 3) Network Pings
Programming (part 2) Bash Scripting and If/Then Command
Programming (part 1) Fundamentals for Pen Testers
Module 3 - Metasploit
Metasploit (part 6) msfvenom
Metasploit (part 5) msfcli
Metasploit (part 4) Auxiliary Module
Metasploit (part 3) Operation
Module 4 - Information Gathering
Information Gathering (part 5) NMAP and PortScanning
Information Gathering (part 4) recon-ng and google operators
Information Gathering (part 3) Targeting Email and Maltego
Information Gathering (part 2) Domain Name Services
Module 5 - Vulnerability Discovery/Scanning
Vulnerability Scanning (part 6) Directory Transversals
Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto
Vulnerability Scanning (part 4) Metasploit
Vulnerability Scanning (part 3) Nmap Scripting Engine
Module 6 - Traffic Capture
Traffic Capture (part 6) SSL Stripping
Traffic Capture (part 5) ettercap
Traffic Capture (part 4) DNS
Traffic Capture (part 3) Address Resolution Protocol ARP
Module 7 - Exploitation
Exploitation (part 6) Attaching to an IP Address
Exploitation (part 5) Using Backdoor to Access an FTP Server
Exploitation (part 4) Open Source Vulnerability
Exploitation (part 3) Directory Traversal
Module 8 - Passwords
Passwords (part 4) Using oclhashcat
Passwords (part 3) Offline Password Attacks
Passwords (part 2) Online Password Cracking
Passwords (part 1) Password Attacks
Module 9 - Advanced Exploitation
Advanced Exploitation (part 5) Bypassing Antivirus Software
Advanced Exploitation (part 4) Social Engineering
Advanced Exploitation (part 3) Exploiting Java
Advanced Exploitation (part 2) Client Side Attacks
Module 10 - Post Exploitation
Post Exploitation (part 4) Setting Up a Domain Controller
Post Exploitation (part 3) Pivoting
Post Exploitation (part 2) Exploit Development
Post Exploitation (part 1) File Transfer without and Interactive Shell