Pentesting 101: The Ultimate Hacking Guide Start To Finish
- Description
- Curriculum
- FAQ
- Reviews
Why you want to take this course
I am not one to keep my company secrets a secret, which kind of defeats the point of the word, but I strongly believe in sharing knowledge. That’s why I have created a guide that I think comprehensively covers this whole process. Pentesting is an art form and I’d like to teach how to do it.
What is this course?
This course takes you through 10 modules, each having it’s own objective with a capstone assignment that will guide you through network pen-testing, web, and even API pen-testing. I’ve created practical labs to guide you through the process so you are not just theoretically richer after completing this course.
Who am I?
Let’s start with the obligated section about who I am first. My name is Wesley Thijs and i have been an instructor and public figure for about 4 years, garnering 100 000+ students in my time doing it. Recently, however, I wanted to expand my business and I included pen testing as a service we offer. This means we also sometimes get requests for hundreds of hours of testing and this is impossible to do alone. I manage a team of several highly skilled cybersecurity professionals I have been able to pick out over the years I have been training.
My team needed a standard way of testing and a standard education however so I created this plan to teach them how to pentest, how to handle clients, and everything involved in successfully completing an assignment from start to finish.
-
1900x.1 The parts of a test plan.mp4Video lesson
-
2000x.1 The parts of a test plan.pptxText lesson
-
21001 - 4 The pentest plan PDFText lesson
-
22001 - 4 Going over an example test planVideo lesson
-
2300x.3 Test plan - example - hackxpert org.docxText lesson
-
24Test Plan Template.doc - Podia-training.docxText lesson
-
32001 - XTRA1 The methodologies of a pentest.mp4Video lesson
-
33001 - XTRA2 - Letter of pen test commencing.rtfText lesson
-
34001 - XTRA3 - SHORT TEST PLAN - UNCLE RAT'S EXAMPLE.rtfText lesson
-
35001 - XTRA4 - The NDA.mp4Video lesson
-
36003.1 BIS - How we do a pentest.mp4Video lesson
-
37003.1 BIS - How we do a pentest.pptxText lesson
-
38002.1 Pentesting methodologies.mkvVideo lesson
-
39002.1 Pentesting methodolgies.pptxText lesson
-
40002.1_pentesting_methodologies.pdfText lesson
-
41002.2 Assignment methodologies MP4Video lesson
-
42002.2 Assignment - describe the methodologies in your own words.pdfText lesson
-
43002.3 OSSTMM MP4Video lesson
-
44002.3 OSSTMM.pptxText lesson
-
45002.5 OSSTMM assignment MP4Video lesson
-
46002.5 OSSTMM assignment PPTText lesson
-
47002.5 OSSTMM assignment.pdfText lesson
-
48002.3 - 006 RAV Calc MP4Video lesson
-
49002.4 OWASP methodology MP4Video lesson
-
50002.4 OWASP.pptxText lesson
-
51002.6 OWASP assignment.pdfText lesson
-
52002.6 OWASP assignment PPTText lesson
-
53002.8 PTES Pre-assignment.mp4Video lesson
-
54002.8 PTES - Pre-engagement.pptxText lesson
-
55002.9 PTES Information gathering MP4Video lesson
-
56002.8 PTES Questionnaires for pentests.rtfText lesson
-
57002.9 PTES Information gathering PPTText lesson
-
58003.2 Nmap MP4Video lesson
-
59003.2 Nmap PDFText lesson
-
60003.2 port scanning PPTText lesson
-
61003.3 portscanning assignment MP4Video lesson
-
62003.3 portscanning assignment PPTText lesson
-
63003.4 FTP MP4Video lesson
-
64003.4 FTP PPTText lesson
-
65003.5 FTP assignment MP4Video lesson
-
66003.5 FTP assignment PPTText lesson
-
67003.6 SMB MP4Video lesson
-
68003.6 SMB PPTText lesson
-
69003.7 network hacking tools MP4Video lesson
-
70003.7 network hacking tools PPTText lesson
-
71003.7 WIRESHARK network hacking tools...Video lesson
-
72003.7 ZENMAP network hacking toolsVideo lesson
-
73003.7 EXPLOIT-DB network hacking tool...Video lesson
-
74003.8 network hacking tools assignment MP4Video lesson
-
75003.8 network hacking tools assignment PPTText lesson
-
76003.8 DEMO Nikto Nmap network hackingVideo lesson

External Links May Contain Affiliate Links read more