YoVDO

Infrastructure & Network: Bug Bounty and Penetration Testing

Offered By: Udemy

Tags

Penetration Testing Courses Network Security Courses Metasploit Courses Information Gathering Courses Network Traffic Analysis Courses Web Application Security Courses Linux Security Courses Vulnerability Assessment Courses Windows Security Courses

Course Description

Overview

Learn how to hack networks and web applications like black hat hackers, and learn how to secure them from these hackers.

What you'll learn:
  • Understand and perform the basic steps in order to performa penetration testing of an infrastructure or other computers in the network
  • Be able to gather information about your target
  • You will learn how to find open ports your target
  • You will learn how to find vulnerabilities in your target infrastructure
  • Exploit found vulnerabilities
  • Sniff and analyze network traffic
  • You will learn how to exploit Windows and Linux Systems
  • Understand and perform attacks using Metasploit
  • Understand cryptography
  • Understand the difference between backdoors, viruses and worms. Learn the basics of how to analyse them
  • Hack wireless networks
  • Understand the penetration testing process
  • As a network administrator you will learn how to secure your network

In order to protect yourself from hackers, you must think as one.

In this course, you will start as abeginnerwith no previous knowledge about penetration testing orhacking.

You will learn hacking tools, methodologies and techniques. This is a both practical and theoretical step-by-step course.

This course is focused on thepractical side ofpenetrationtesting without neglecting the theory behind each attack. Before jumping into penetration testing, youwill first learn how toset up a lab and install needed softwareto practice penetration testing on your own machine.

Below are the main topics, both theoretical and practical, of this course:

  • Introduction to Ethical Hacking, Footprinting and Reconnaissance

    • This section will teach you how to gather information about your target server, you will learn how to discover the DNS server used, open ports and services, un-published directories, sensitive files. This information is very important asit increases the chances of being able to successfully gain access to the target website.

  • Scanning Networks, Enumeration and Vulnerabilities and System Hacking

    • In this section you will learn how todiscover and exploita large number of vulnerabilities, this section is divided into a number of sub-sections, each covering a specific vulnerability, firstly you will learnwhat is that vulnerability, then you will learn how toexploit this vulnerability.

  • Sniffing

    • Learn how to capture encrypted and unencrypted data, passwords and such (HTTP, telnet, HTTPS, etc)

  • Metasploit

    • Use This framework to exploit numerous vulnerabilities and crate backdoors

  • Trojans, Backdoors, Viruses and Worms

  • Cryptography

  • Penetration testing on Wireless Networks

  • Penetration Testing

NOTE: This course is created only for educational purposes andall the attacks are launched in an isolated lab environment.


Taught by

Gabriel Avramescu

Related Courses

Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Metasploit Training Course by Cybrary
Cybrary
Penetration Testing: Advanced Tunneling and Exfiltration
LinkedIn Learning
Credential Access with John the Ripper
Pluralsight
People Information Gathering with the Social Engineering Toolkit (SET)
Pluralsight