Penetration Test Skills : Ethical Hacking
Offered By: Udemy
Course Description
Overview
What you'll learn:
- Web Application Scan & Attacks
- Webserver Scan & Attacks
- MITM Theory & Attack
- Network Scanning
- Exploit
- WAF
- sql methods
- Logs & LostTrack
- Honeypot
- python tools
- Nmap tips
- CCTV penetration testing
This course is designed and built for improve your knowledge & skills in penetration testing and Ethical Hacking !
•This course is Suitable for people who are familiar with the world of security and penetration testing and Ethical hackers , or at least know the basics . This specialized course can show you different ways to increase your abilities and knowledge in the field of penetration testing and teach you important points.
*******************************************************************************************************************
•A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF).
•Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually. Either way, the process involves gathering information about the target before the test, identifying possible entry points, attempting to break in — either virtually or for real — and reporting back the findings.
You will learn
✓ Web Application Scan & Attacks
✓ Webserver Scan & Attacks
✓ MITM Theory & Attack
✓ Network Scanning
✓ Exploit
✓ WAF
✓ sql methods
✓ Logs & LostTrack
✓ Honeypot
✓ Port Scanning With Python & etc.
✓ CCTV penetration testing
✓ Nmap tips
Taught by
Nima Shahmoradi
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent