YoVDO

Zero to Hero Pentesting - Scanning Tools and Tactics

Offered By: Cyber Mentor via YouTube

Tags

Penetration Testing Courses Cybersecurity Courses Ethical Hacking Courses Metasploit Courses Nmap Courses Nessus Courses Vulnerability Scanning Courses Nikto Courses

Course Description

Overview

Dive into an extensive 3-hour video tutorial on penetration testing tools and techniques. Learn about TCP vs UDP, the 3-Way Handshake, and how to use Wireshark for network analysis. Master scanning techniques with popular tools like Nmap, Nessus, Metasploit, Nikto, and BurpSuite. Explore real-world scenarios, analyze port scans, and understand the intricacies of cybersecurity. Gain insights on career development, industry trends, and ethical considerations in penetration testing. Engage with a Q&A session covering topics from technical queries to personal experiences in the field, providing a comprehensive look at the world of ethical hacking and information security.

Syllabus

- Introduction and TCP vs UDP.
- 3-Way Handshake & Wireshark.
- Scanning with Nmap.
- Downloading and Installing Nessus.
- Scanning with Metasploit.
- Scanning with Nessus.
- Scanning with Nikto.
- Scanning with BurpSuite.
- Can you fall asleep drinking a Monster so late?.
- Proxy settings.
- Reviewing viewer's port scan script.
- Do you build or tweak your Kali box or just use it straight from the site?.
- Reviewing viewer's port scan script (continued).
- Running viewer's port scan script.
- Checking in on Burp scan.
- Do you use KeepNote?.
- How many sodas do you drink in a day?.
- Tesla on bugbounty.
- Checking in on nmap scans.
- Will you be covering enumeration in the series?.
- Where can I find the homeworks?.
- "You need to put more stuff on your site".
- Checking in on nmap scans.
- Checking in on Burp scan.
- Why are the majority of the people that work in InfoSec so threatened by people who they perceive could be more skilled than they are?.
- They want a battle? Then they shall have one!.
- Do you ever fear for your safety, like you're going to discover the wrong thing and have retribution taken against you?.
- Finished portscan.
- Story of the house-picture.
- Checking the TCP dump file.
- Keyboard warriors.
- Router/network discussion.
- Hackerboxes.
- What does your desk setup look like?.
- Analyzing finished nmap scan.
- Going full Sherlock mode on port 10999.
- Advanced Sherlock mode on port 10999.
- How much HTML do I need to know?.
- How soon do you upload?.
- Creating a commodity by teaching pentesting and the glamour of "hacking as a job".
- Reports.
- The pentesting mentality and Heath's backup career in music.
- What percentage of your job is pentesting and what percentage is writing reports?.
- Have you seen any newbies that impressed you? What kind of skill level did they have? + Hiring tips.
- "The struggle with this field is that you always feel stupid".
- Comparing yourself to Twitter and Twitch All-Stars, Personal goals.
- Is online college suitable for these degrees? ROI and Opportunity Costs.
- Is there a way to get an internship for a Computer Science if I'm not really good at programming?.
- What's the funniest thing you've found in pentesting? + Password cracking stories.
- What do you think about WGU?.
- Military Cyber training, Air Force vs Army.
- Recommendations to learn bug bounties.
- Army Cyber program.
- CBD, Melatonin, Weed and sleep.
- Checking in on Burp scan.
- Do companies hire people to [?] others to infiltrate the servers?.
- The line between "just looking" and pentesting without permission.
- New GoT Episode (No Spoilers).
- What LED case fans do you use? + PC case discussion.


Taught by

The Cyber Mentor

Related Courses

Certified Ethical Hacking (v12)
LearnKartS via Coursera
An Introduction to Ethical Hacking with Kali Linux
Packt via Coursera
Getting Started in Port Scanning Using Nmap and Kali Linux
Packt via Coursera
Intermediate Ethical Hacking Hands-on Training
Packt via Coursera
Intermediate Ethical Hacking Techniques
Packt via Coursera