YoVDO

License To Pentest: Ethical Hacking Course For Beginners

Offered By: freeCodeCamp

Tags

Ethical Hacking Courses Cybersecurity Courses Penetration Testing Courses Enterprise Security Courses Vulnerability Assessment Courses Privilege Escalation Courses Reconnaissance Courses

Course Description

Overview

Embark on a comprehensive 9-hour ethical hacking course designed for beginners. Learn the fundamentals of penetration testing, including common tools and methods used by ethical hackers. Set up an enterprise-level pentest lab, explore reconnaissance techniques, and master tools like WhatWeb, WPScan, and Cewl. Dive into the Metasploit Framework, create custom payloads, and practice manual WordPress exploitation. Advance to routing and pivoting techniques, including port forwarding and using proxy servers. Study web hacking resources, set up an OSCP-inspired web app, and perform both manual and automated SQL injections. Explore directory bursting, web server pentesting, and utilize Nmap Scripting Engine. Gain insights into professional pentesting methodologies, vulnerability assessments, and privilege escalation techniques. Access downloadable lab files, participate in hands-on exercises, and earn a Certificate of Graduation upon completion of the final test.

Syllabus

) Custom Lab Files For The Course.
) How Enterprise Security Works.
) Enterprise Networking Explained.
) Setup The Enterprise Level Pentest Lab.
) Hacking The Beta Server In DMZ Area.
) Reconnaissance Explained.
) Using WhatWeb To Study Technology Profile.
) Using WPScan For Hacking/Pen-Testing WordPres.
) Using Cewl To Create A Custom Password WordList .
) Transmutation Of Passwords With A Python Script.
) Boom! We Cracked The Password.
) Common Student Questions - FAQs.
) Recap - Lab Setup On Student PC - Live.
) Metasploit Framework Explained.
) Search, Rank & Check To Find What You Need.
) Use, Info & Show Options To Tune The Exploit.
) Boom! We Got The Reverse Shell.
) Multi Handler Explained.
) Creating Payloads Using MSFvenom.
) Manual Exploitation Of WordPress.
) Common Student Questions - FAQs.
) Setup For Routing & Pivoting.
) Ping Sweep While Routing The Traffic.
) Adding A Manual Route To Another Network.
) Scanning On Other Network Ranges Via The Route.
) SMB Enumeration On Windows Machine.
) Exploiting Windows Machine Over The Pivot.
) Boom! We Hacked The Windows Machines Too.
) Beauty Of Meterpreter Payload.
) Persistence Post Exploitation Module.
) Auto Route Post Exploitation Module.
) Common Student Questions - FAQs.
) Setup For Advance Routing & Pivoting.
) Portforwarding Over A Pivot.
) Nmap Through Portforwarding.
) Pivoting Through Socks4 Proxy Server.
) Proxchains To Use Other Tools Over Pivot.
) Exploiting Media Server.
) Boom! Dummy Shell Uploaded.
) Setting Pivoted Environment With New Class.
) Metasploit Version Of ClipBucket Exploit.
) My Partial Access Method With Respect To Limited Time.
) Common Student Questions - FAQs.
) Web Hacking Learning Resources.
) Setup SBVA - My OSCP Inspired Web App.
) Manual SQL Injection In Detail - OSCP Level.
) Automated SQL Injection - LPT Level.
) Directory Bursting With DirBuster.
`) Directory Bursting With Dirb.
) Pen Testing Web Server With Nikto.
) NMap Scripting Engine For Remaining Auxiliaries.
) My Experience On OpenVas In The LPT Exam.
) HTTP Methods Using NSE.
) Common Student Questions - FAQs.
) KnowledgeBase Server Lab Explained.
) LPT Methodology For Scanning.
) Real Project We Did - Inside Look.
) Maintain A Target Database Manually.
) Dividing Work For A Team In Real Project.
) Managing Professional Test In MetaSploit Framework.
) Vulnerability Assessment.
) Tuning An Exploit.
) Boom! We Got The Command Shell.
) Upgrading From A Command Shell To Meterpreter Shell.
) Public Vs Commercial Exploits In Professional Test.
) Million Dollar Advice For Pentesting Students.
) Privilege Escalation - Resources To Learn.
) Privilege Escalation Using Manual Exploits.
) Privilege Escalation Using MetaSploit Framework.


Taught by

freeCodeCamp.org

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera