• Home
  • Courses
  • About Us
  • Contact
  • Mores
    • Tech Services
    • Store
    • Tech Blog
    • FAQs
    Have any question?
    +91-9460053140
    [email protected]
    RegisterLogin
    THCBin LearningTHCBin Learning
    • Home
    • Courses
    • About Us
    • Contact
    • Mores
      • Tech Services
      • Store
      • Tech Blog
      • FAQs

      IT & Security

      • Home
      • All courses
      • IT & Security
      • Ethical Hacking / Penetration Testing Course

      Ethical Hacking / Penetration Testing Course

      User Avatar
      Luka Sikic
      IT & Security, Technology
      (0 review)
      $8.99 Free
      Ethical Hacking / Penetration Testing Course
      • Overview
      • Curriculum
      • Instructor
      • Reviews

      This is full course including all necessary information to start your carrier in Cyber Security domain. This course aims to teach you how to perform full penetration testing on local/remote network and web applications.

      Content:

      • Introduction
        • Introduction lesson
        • Kali Linux preparation and Installation
      • Kali Linux Basics
        • Tools
        • Services
        • Files
      • Information Gathering
        • Passive Information Gathering
        • Active Information Gathering
      • Enumeration
        • System Services Enumeration
        • Web Application/Server Enumeration
      • Vulnerability Scanning
        • Web Server
        • Web Applications
        • System Services
      • Exploitation
        • Client side
        • Server Side
          • Metasploit
          • Web Application Vulnerabilities (manual exploitation)
      • Tunneling
      • Post Exploitation
      • Privilege Escalation
        • Linux
        • Windows

      Course Features

      • Lectures 26
      • Quizzes 0
      • Language English
      • Students 1
      • Assessments Yes
      CoursesTechnologyIT & SecurityEthical Hacking / Penetration Testing Course
      • Course 26

        • Lecture1.1
          1. Introduction 01 min
        • Lecture1.2
          2. Preparing Kali Linux on VMware 03 min
        • Lecture1.3
          3. Kali Linux Basics (Tools, Services, Files) 03 min
        • Lecture1.4
          4. Passive Information Gathering – Subdomains 01 min
        • Lecture1.5
          5. Passive Information Gathering – Emails 01 min
        • Lecture1.6
          6. Active Information Gathering – Network Scan 02 min
        • Lecture1.7
          7. Active Information Gathering – OS Detection 01 min
        • Lecture1.8
          8. Active Information Gathering – Service Enumeration 02 min
        • Lecture1.9
          9. Active Information Gathering – Dirbuster 03 min
        • Lecture1.10
          10. Active Information Gathering – Netcat Banner Grabbing 01 min
        • Lecture1.11
          11. Active Information Gathering – Subdomains 01 min
        • Lecture1.12
          12. Vulnerability Scanning – NSE Scripts 01 min
        • Lecture1.13
          13. Vulnerability Scanning – WordPress 02 min
        • Lecture1.14
          14. Vulnerability Scanning – Joomla 01 min
        • Lecture1.15
          15. Vulnerability Scanning – Web Server 01 min
        • Lecture1.16
          16. Exploitation – Windows Metasploit Backdoor 04 min
        • Lecture1.17
          17. Exploitation – Metasploit Exploits 02 min
        • Lecture1.18
          18. Exploitation – SQL Injection 03 min
        • Lecture1.19
          19. Exploitation – Local File Inclusion 02 min
        • Lecture1.20
          20. Exploitation – Remote File Inclusion 03 min
        • Lecture1.21
          21. Exploitation – Command Injection 01 min
        • Lecture1.22
          22. Tunneling – Metasploit Route Pivoting 03 min
        • Lecture1.23
          23. Post Exploitation – Metasploit Modules 03 min
        • Lecture1.24
          24. Post Exploitation – User Account Control Ask Exploit 02 min
        • Lecture1.25
          25. Privilege Escalation – Windows 03 min
        • Lecture1.26
          26. Privilege Escalation – Linux 02 min
      author avatar
      Luka Sikic

      Cyber Security is just a myth

      Reviews

      Average Rating

      0
      0 rating

      Detailed Rating

      5
      0%
      4
      0%
      3
      0%
      2
      0%
      1
      0%
      • Overview
      • Curriculum
      • Instructor
      • Reviews
      $8.99 Free
      • Share:

      You May Like

      Web hacking and Security: Basic to advance level course Read More
      THCBin

      Web hacking and Security: Basic to advance level course

      3
      0
      Free
      Wireless hacking and security Read More
      THCBin

      Wireless hacking and security

      3
      0
      Free
      The Complete Cyber Security Course! Volume 1 : Hackers Exposed Read More
      THCBin

      The Complete Cyber Security Course! Volume 1 : Hackers Exposed

      2
      0
      Free
      Learn Ethical Hacking With Kali, Nmap and Metasploit! Read More
      FeltSecure Labs

      Learn Ethical Hacking With Kali, Nmap and Metasploit!

      4
      0
      Free
      IT Security in 10 Steps Read More
      Mohammad Adly

      IT Security in 10 Steps

      0
      0
      Free

      Popular Courses

      Facebook Page Masterclass: Use It to Grow Your Business

      Facebook Page Masterclass: Use It to Grow Your Business

      $5.99 Free
      Learn Man In The Middle Attacks From Scratch

      Learn Man In The Middle Attacks From Scratch

      $8.99 Free
      Typographic Logos: Typography and Lettering for Logo Design

      Typographic Logos: Typography and Lettering for Logo Design

      $4.99 Free

      Follow Us

      Advertisement

      logo-eduma-the-best-lms-wordpress-theme

      +91-9460053140

      [email protected]

      Company

      • Tech Services
      • Tech Blog
      • Store
      • Become a Teacher

      Links

      • About Us
      • Profile
      • Courses

      Support

      • Become a Teacher
      • Contact
      • DMCA
      • FAQs

      Recommend

      • QR Code Generator
      • URL Shortener
      • Resume Builder
      • Android SVG to Vector Drawable

      © THCBin Learning 2018 - 20. Powered By THCBin

      • Privacy Policy
      • Terms And Conditions
      • Sitemap

      Become An Instructor?

      Join with us as an instructors and earn money hassle free!

      Get Started Now

      Connect with

      Login with Google Login with Facebook Login with LinkedIn

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Modal title

      Message modal