Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Ethical Hacking - Intermediate Hands-on Training

Posted By: lucky_aut
Ethical Hacking - Intermediate Hands-on Training

Ethical Hacking - Intermediate Hands-on Training
Duration: 8h 12m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 3.35 GB
Genre: eLearning | Language: English

Ethical Hacking - Intermediate Hands-on Training is an intermediate hands-on course for learning ethical hacking.

What you'll learn
Web Application Attacks
Wireless Network Attacks
Python scripting for pentesters

Requirements
Completion of an introuction course to ethical hacking or pentesting.
Or completing of Ethical Hacking - Hands-On Training Part I.
Above average use of the Kali CLI
Good troubleshooting skills
Description
Alert -

Ethical Hacking - Intermediate Hands-on Training is a continuation of Ethical Hacking - Hands-on Training Part I. Before taking this course, students should have completed an introduction to an ethical hacking or pentesting course. For best results, students should have completed Ethical Hacking - Hands-on Training Part I before signing up for the intermediate course.

Ethical Hacking - Intermediate Hands-on Training picks up where Part I leaves off. In Part I, students were taught the fundamentals of pentesting while being introduced to some basic skills.

Ethical Hacking - Intermediate Hands-On Training provides an intermediate level of white, grey, and black hat skills every cybersecurity professional needs to know. Advanced reconnaissance techniques are taught using the NMap scripting engine and various hacking tools used by pentesters.

Sections include Web Application Attacks, Wireless Network Attacks, PowerShell Empire, Netcat, and Wireshark Fundamentals.

For the best experience in learning to be an ethical hacker or pentester, students should complete the instructor's complete series on ethical hacking, starting with Ethical Hacking - Hands-On Training Part I and proceed on to the intermediate course.

The capstone for this series is the three Ethical Hacking Capture the Flag Courses, where the student will learn to apply and use all the techniques taught in the series.

Who this course is for:
Those wanting to learning the intermediate skills of pentesting.

More Info