Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Hacking Phases via Hand-on Examples - Part 1

Posted By: ELK1nG
Hacking Phases via Hand-on Examples - Part 1

Hacking Phases via Hand-on Examples - Part 1
MP4 | Video: h264, 1280x720 | Audio: AAC, 44100 Hz
Language: English | Size: 424 MB | Duration: 42m

Scanning and Gaining Access

What you'll learn
Hacking Phases via Hand-on Examples: Scanning and Gaining Access
Requirements
No any requirement
Description
Welcome to this course: Hacking Phases via hand-on examples. As you may know, hacking includes 5 stages: Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Track. In this course, you will learn 2 phases: Scanning and Gaining Access, as they are really important and fancy, via hand-on examples. This course is about Ethical Hacking, so we will learn from both sides: Attackers and Defenders. We will use VMWare technology to simulate the hacker and victim's machines; so that you will see how the real hacking is. The victim's virtual machine is made with intentional vulnerabilities to serve the content of this course.

About the course’s content, first of all, the brief overview of this course and demo's environment is introduced. Secondly, we will put it all together, showing the demonstration sessions. After that, we will study the main concepts of this course: Scanning and Gaining Access phases through the examples' explanations. Last but not least, several ideas will be suggested to mitigate the vulnerabilities that were noted in our examples.

Regarding the course’s requirements, to enjoy it you will need some basic knowledge of Networking and Linux, but beginners should not worry since everything will be explained carefully from the first slide.

After completed the course, students will be able to understand and demonstrate the scanning, enumeration, exploitation and even privilege escalation processes, which are very important in Scanning and Gaining Access phases. As the Ethical Hackers / Penetration Testers, students will also can describe and implement the techniques to secure the system from the view of Defender side.

Who this course is for:
Security students
System/Network Administrators