Course Overview

In order to protect yourself from hackers, you must think as one. In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking. You will learn hacking tools, methodologies, and techniques. This is a both practical and theoretical step-by-step course. 

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install the needed software to practice penetration testing on your own machine. In the section, “Introduction to Ethical Hacking, Footprinting and Reconnaissance”, you will learn how to gather information about your target server, you will learn how to discover the DNS server used, open ports and services, unpublished directories, and sensitive files. This information is very important as it increases the chances of being able to successfully gain access to the target website. In the Section, “Scanning Networks, Enumeration and Vulnerabilities and System Hacking”, you will learn how to discover and exploit a large number of vulnerabilities, this section is divided into a number of sub-sections, each covering a specific vulnerability, firstly you will learn what is the vulnerability, then you will learn how to exploit this vulnerability. Then you will learn how to capture encrypted and unencrypted data, passwords, and such (HTTP, telnet, HTTPS, etc) Moving further in this course, you will understand how to use Metasploit to exploit numerous vulnerabilities and create backdoors. Lastly, you will get into Trojans, Backdoors, Viruses and Worms, Cryptography, Penetration testing on Wireless Networks, and Penetration Testing. 

By the end of the course, you will be able to hack a network or a web application. 

Disclaimer: This course is created only for educational purposes and all the attacks are launched in an isolated lab environment. 

What You Will Learn

  • Understand and perform the basic steps in order to perform a penetration testing of an infrastructure or other computers in the network
  • Be able to gather information about your target
  • You will learn how to find open ports your target
  • You will learn how to find vulnerabilities in your target infrastructure
  • You will learn how to exploit Windows and Linux Systems
  • Understand and perform attacks using Metasploit
  • Understand the penetration testing process

Program Curriculum

  • Demo - Information Gathering using Google DOrks and DNS Queries
  • Demo - Scanning and Enumeration
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Scanning and Enumeration
  • Vulnerability Identification
  • Demo - Installing Nessus Scanner
  • Demo - Use Nessus to Discover Vulnerabilities
  • Demo - Using Nikto to Discover Web Vulnerabiltiies
  • Demo - Using Paros for Vulnerability Discovery
  • Demo - Use Dirbuster to Brute Force Sub-directories and Filenames
  • Chapter 2 Quiz

  • System Hacking - Vulnerability Exploitation
  • Passwords
  • Authentication
  • Chapter 3 Quiz

  • Sniffing
  • Chapter 4 Quiz

  • Metasploit
  • Demo - Exploiting FTP Server Vulnerability using Metasploit
  • Demo - Post Exploitation Example
  • Demo - Exploiting NFS Vulnerability and Exporting SSH Keys to the Victim PC
  • Demo - Exploiting Samba Service on Linux using Metasploit
  • Chapter 5 Quiz

  • Trojans and Backdoors
  • Computer Viruses and Worms
  • Chapter 6 Quiz

  • Cryptography Concepts
  • Cryptographic Algorithms
  • Cryptography and Cryptanalysis Tools. Cryptography attacks
  • Demo - Hack SSH Passwords using Medusa
  • Hack the SSH Password using Hydra
  • Hack Linux Passwords using John the Ripper
  • Chapter 7 Quiz

  • Penetration Testing on Wireless Networks
  • Case Study - Windows Hosted Network Bug or Feature
  • Chapter 8 Quiz

Penetration Testing Overview. Final Words

Load more modules

Instructor

Gabriel Avramescu

Gabriel Avramescu is a Senior Information Security Consultant and an IT Trainer with certifications like OSWE (Offensive Security Web Expert), CREST Registered Penetration Tester (CRT), ECIH (EC-Council Incident Handling), Ec-Council ICS-SCADA Cybersecurity, OSCE (Offensive Security Certified Expert), OSWP (Offensive Security Wireless Professional), OSCP (Offensive Security Certified Professional), CHFI (Computer Hacking Forensic Investigator), ISO 270001 Lead Auditor, ECSA (EC-Council Security Analyst), CEH (Certified Ethical Hacker), CCNA and CCNA Security, CCNP Routing and CCNP Switching, Advanced Linux&InfoSEC, VMWare vSphere Install, Configure, Manage, and Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8