4.9 out of 5
4.9
11 reviews on Udemy

Penetration Test Skills : Ethical Hacking

Improve your skills in penetration test & learn methods for Ethical Hacking !
Instructor:
Nima Shahmoradi
2,317 students enrolled
English [Auto]
WebAppliction Scan & Attacks
Webserver Scan & Attacks
MITM Theory & Attack
Network Scanning
Exploit
WAF
sql methods
Logs & LostTrack
Honeypot
Port Scanning With Python

This course is designed and built for improve your knowledge & skills in penetration testing and  Ethical Hacking !

  • This course is Suitable for people who are familiar with the world of security and penetration testing and  Ethical hackers , or at least know the basics . This specialized course can show you different ways to increase your abilities and knowledge in the field of penetration testing and teach you important points.

*******************************************************************************************************************

  • A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF).
  • Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually. Either way, the process involves gathering information about the target before the test, identifying possible entry points, attempting to break in — either virtually or for real — and reporting back the findings.

Introduction

1
Introduction

MITM Attack

1
MITM theory
2
Ettercap
3
Image Spoofing
4
DHCP spoofing

WAF

1
WAF
2
WAF identy & dirb

admin finder

1
admin finder

Network Scanning in Ethical Scanning

1
Network sweeping
2
Nmap Commands

WebServer in Ethical Hacking

1
Webserver Scan

Owasp-zap Scanner

1
Owasp-zap Scanener

Exploit

1
Exploit with PDF format

SQL methods in Ethical hacking

1
SQL dork & Tool

Make a python tool

1
Port scanning with python

Tricks

1
Cutycapt

Logs & lost track

1
Logs & lost track

Honeypot

1
HoneyPot
2
HoneyPI
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.9
4.9 out of 5
11 Ratings

Detailed Rating

Stars 5
9
Stars 4
2
Stars 3
0
Stars 2
0
Stars 1
0
e46d6f21cec8f67f9dc9a8021c7b7b4b
Course available for 2 days
30-Day Money-Back Guarantee

Includes

3 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion

External Links May Contain Affiliate Links read more

Join our Telegram Channel To Get Latest Notification & Course Updates!
Join Our Telegram For FREE Courses & Canva PremiumJOIN NOW