Course Overview

It is crucial for red teams, ethical hackers, and cybersecurity experts to have a wide range of open-source as well as commercial tools in their penetration testing toolkit to perform required penetration testing activities. While there are several penetration testing tools available to choose from, with so many performing similar functions, it can become confusing for ethical hackers to select the tools that provide the best value for their time. Novice penetration testers starting their journey must also be trained in using popular tools to improve their skillset. Penetration testers must also gain familiarity with the lesser-known features of some popular tools to help build confidence in using these instruments. Knowing how to use automated penetration testing tools helps security professionals integrate penetration testing into the software development or DevSecOps lifecycle more effectively.

The course will start with an overview of penetration testing and why is it important to learn multiple penetration testing tools. The course will then demonstrate how to perform web vulnerability scanning and testing using Vega, how to perform web application scanners with Grabber, and how to work with the Samurai Web Testing Framework. You’ll also learn how to carry out web application scanning with Indusface WAS and W3af, how to work with OpenSCAP, and how to carry out web scanning with Nikto. Moving ahead, you’ll learn how to recover passwords using Cain & Abel, how to crack passwords with John the Ripper, and how to work with the Scapy penetration testing tool. The course will also explain how to perform web browser penetration testing with BeEF (Browser Exploitation Framework), how to carry out social engineering using Social-Engineer Toolkit (SET), and how to recover passwords with Hashcat, and how to carry out brute-force attacks with Wfuzz. The course will end with a look at how to use Aircrack-ng for assessing WiFi network security.

By the end of the course, you’ll be thoroughly trained in using these tools confidently and effectively to perform penetration testing across various environments.

What You Will Learn

  • Configure
  • execute and assess results of vulnerability scans resembling your environment
  • Approaches to perform user account and password recovery
  • Methods useful for cracking available password hashes
  • Assess and locate vulnerabilities impacting your end users web browser security
  • Perform brute force attacks and fuzzing to locate exploitation vectors in your enterprise applications
  • Evaluate wireless network security via signal analysis and brute forcing

Program Curriculum

  • Getting Acquainted with the Vega Vulnerability Scanner
  • Installing and Configuring Vega
  • Scanning Targets with Vega
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Quiz

  • Introducing OpenVAS – A Basic Open-source Vulnerability Scanner
  • Installing OpenVAS
  • Active Scanning Using OpenVAS
  • Quiz

  • Overview of the Nikto Web Application Scanner
  • Installation and Maintaining Nikto
  • Performing Simple and Advanced Web Application Scans with Nikto
  • Quiz

  • A Specialized Tool for Attacking Web Application – Samurai WTF
  • Installing and Configuring Samurai
  • Using ZAP and SQLMap
  • Quiz

  • Introduction to Contrast Security
  • Installing and Configuring Contrast Security
  • Performing Application Assessments and Managing Protections
  • Quiz

  • Introduction to OpenSCAP
  • Installing and Configuring OpenSCAP
  • Scanning Targets, Reviewing Reports, and Attempting Auto Remediation
  • Quiz

  • Introduction to Hydra
  • Installing and Configuring Hydra
  • Username and Password Brute-forcing with Hydra
  • Quiz

  • Getting to Know John
  • Installing John and Reviewing Password Cracking Features
  • Detecting and Cracking Password Hashes with John
  • Quiz

  • Demystifying Hashcat
  • Installing and Configuring Hashcat
  • Revealing the Password Behind the Hash
  • Quiz

  • Introduction to Scapy
  • Installing and Configuring Scapy
  • Creating Packet Spoofing and Analysis Tools with Scapy
  • Quiz

  • Presenting SET for Technological-based Social Engineering
  • Installing and Maintaining SET
  • Test Driving the Tool and Exploring SET Features
  • Quiz

  • Introduction to Wfuzz
  • Installing and Maintaining Wfuzz
  • Reviewing Results of Fuzzed Websites Using Wfuzz
  • Quiz

  • Introduction to Shodan
  • Registering for Shodan Accounts
  • Discovering Insecure Assets with Basic Searches Using Shodan
  • Quiz

  • Introduction to BeEF
  • Installing and Configuring BeEF
  • Hook Web Browsers and Exploit Target Systems with BeEF
  • Quiz

  • Understanding the Aircrack-ng Suite of Tools
  • Installing and Maintaining Aircrack-ng
  • Executing Wireless Network Attacks
  • Quiz
Load more modules

Instructor

Adam Kohnke

Adam Kohnke currently serves as a Cybersecurity Architect for a leading and sustainable plastics manufacturer in Southern WI, USA. With 15 years of experience in Information Technology and Cybersecurity, Adam has led large security teams and conducted numerous internal and external penetration testing engagements during his career. Adam holds the GIAC GPEN, Pentest+, eLearn Security eJPT certifications and is actively pursuing the Practical Network Penetration Tester (PNPT) certification from TCM Security. Adam is a regular contributor to the ISACA Journal and Infosecurity magazine publications authoring several articles spanning IT Audit and Cybersecurity subjects. When not architecting cybersecurity solutions, Adam enjoys traveling with his family, camping outdoors, gardening, and catching an in-person game of Dungeons and Dragons.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8