Home / Course catalog / Become Network Hacker and Pentester. From zero to ...


Become Network Hacker and Pentester. From zero to advanced

In order to protect yourself from hackers, you must think as one.
In order to protect yourself from hackers, you must think as one.

You will learn hacking tools, methodologies and techniques. This is a both practical and theoretical step-by-step course.

This training is based on a practical approach of day-by-day situations and it contain labs based on real environments. For the labs, target virtual machines are provided.

The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.

Below are the main topics, both theoretical and practical, of this course:

Chapter 1: Introduction to Ethical Hacking, Footprinting and Reconnaissance

Chapter 2: Scanning Networks, Enumeration and Vulnerabilities

Chapter 3: System Hacking

Chapter 4: Sniffing

Chapter 5: Metasploit

Chapter 6: Trojans, Backdoors, Viruses and Worms

Chapter 7: Cryptography

Chapter 8: Penetration testing on Wireless Networks

Chapter 9: Penetration Testing

Continue To Order: https://ethicalhackersacademy.com/produc...

  • Introduction to Ethical Hacking. Footprinting and Reconnaissance
  • Introduction
  • Ethical Hacking Foot-printing and Reconnaissance (24:55)
  • Information Gathering using Google Dorks and DNS Queris
  • Lab 1 - Information Gathering - Do it Yourself
  • Scanning Networks, Enumeration and Discovering Vulnerabilities
  • Scanning and Enumeration (8:58)
  • Vulnerabilties Identification (8:28)
  • Installing Nessus (3:31)
  • Use Nessus to Discover Vulnerabilities (4:42)
  • Using Nikto to discover Web Vulnerabilities (4:51)
  • Using Paros for Vulnerability Discovery
  • Use Dirbuster to brute force sub-directories and filenames
  • Do it yourself - Scanning and enumeration, Vulnerability Discovery Exercise
  • System Hacking and Vulnerability Exploitation
  • System hacking - vulnerability exploitation (5:59)
  • Passwords (11:56)
  • Authentication (6:55)
  • Sniffing
  • Sniffing (15:00)
  • Man in the Middle over Wireless or Wired Networks
  • Capturing HTTPS traffic over MITM). Get Gmail and Facebook passwords
  • Metasploit
  • Metasploit (17:08)
  • Demo - Exploiting FTP Server Vulnerability using Metasploit (11:48)
  • Post Exploitation Example (1:07)
  • Demo - Exploiting NFS Vulnerability and exporting SSH Keys (10:07)
  • Demo - Eploiting Samba Service on Linux using Metasploit (3:09)
  • Do it yourself - Vulnerability Exploitation using Metasploit Exercise
  • Trojans, Backdoors, Viruses and Worms
  • Trojans and Backdoors
  • Computer viruses and worms
  • Cryptography
  • Cryptography concepts
  • Cryptographic Algorithms
  • Cryptography and cryptanalysis tools. Cryptography attacks
  • Demo - Hack SSH passwords using Medusa
  • Hack the SSH Password using Hydra
  • Hack Linux Passwords using John the Ripper
  • Do it yourself - Passwords Protection Exercise
  • Penetration Testing on Wireless Networks
  • Penetration Testing on Wireless Networks
  • Case Study – Windows Hosted Network Bug or Feature
  • Do it yourself - WiFi Networks Security - practical approach
  • Penetration Testing Overview. Final words
  • Penetration Testing Overview. Final Words sample
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: Forever