Ethical Hacking / Penetration Testing Course

This is full course including all necessary information to start your carrier in Cyber Security domain. This course aims to teach you how to perform full penetration testing on local/remote network and web applications.

Content:

  • Introduction
    • Introduction lesson
    • Kali Linux preparation and Installation
  • Kali Linux Basics
    • Tools
    • Services
    • Files
  • Information Gathering
    • Passive Information Gathering
    • Active Information Gathering
  • Enumeration
    • System Services Enumeration
    • Web Application/Server Enumeration
  • Vulnerability Scanning
    • Web Server
    • Web Applications
    • System Services
  • Exploitation
    • Client side
    • Server Side
      • Metasploit
      • Web Application Vulnerabilities (manual exploitation)
  • Tunneling
  • Post Exploitation
  • Privilege Escalation
    • Linux
    • Windows

Instructors

Luka Sikic

Cyber Security is just a myth

Reviews

0
0 rating
5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 star
0
No comments yet! You be the first to comment.

Leave a Reply