/> Penetration Testing / Ethical Hacking Project from A to Z | WeGeek

Penetration Testing / Ethical Hacking Project from A to Z

Get How to manage Penetration Testing /Ethical Hacking project from scratch.

 

 

What you’ll learn?

 

  • Answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional!
  • Tips for remaining anonymous in hacking and penetration testing activities.
  • A guide to using these skills to get a better job and make money online as a freelancer.
  • The ability to secure and protect any network from hackers and loss of data.
  • (496 Reviews)

Curiculum

Introduction to the course

Get your course goals

Instructors

Admin bar avatar
HQ Traing

Developer

He has a Master of Science in Network Systems and a Bachelor of Science in Software Engineering. He is also a Microsoft Certified Application Developer, Technology Specialist (Web Applications) and Professional. Outside the software world, he is a photographer, a pianist and a passionate Latin dancer.
User Rating

4.1 average based on 254 reviews.


5 star
150
4 star
63
3 star
15
2 star
6
1 star
20

Benefits

Industry-Recognized Certification

After completion of each course, you will be entitled with valid certification that will recognize your efforts of particular field. Share your achievement with your friends, family and organization for your career growth.

certificate.1

Description

Learn how to conduct a professional Penetration Testing Project– How to write a professional Penetration Testing Reports– Professional Penetration Testing Project phases– Learn how to write a professional Penetration Testing Reports–
There is a lot of Ethical Hacking/Penetration Testing courses online today which made learning Ethical Hacking/Penetration testing simple BUT how might we use this information and abilities into a genuine business or project, this course join both specialized and business skills you have to act as an expert Ethical Hacker/Penetration Tester together.

Target Audience:

  • Ethical Hackers
  • Penetration Tester
  • Security Administrator
  • Network Administrators
  • Candidate who want to work as professional EH / PT

Class Curriculum

    Introduction

  • 1. Introduction (14:35)
  • is there a real Ethical Hacking Jobs? (4:04)
  • Penetration Testing Standard (7:13)
  • Report and Documentation (6:49)
  • Instructor Support (1:49)
  • Course Flow (6:03)
  • Setup your lab

  • Install VMWARE Player (8:11)
  • Download ISO Images (9:52)
  • Download Kali Linux (5:23)
  • 6 Download OWASP and Metasploit (4:57)
  • Bad Store (5:40)
  • 9. Configure Windows VM (13:37)
  • 8.Update Kali Linux (4:33)
  • 7. Configure Linux VM (8:35)
  • Configure Legacy OS VM (9:33)
  • Penetration Testing Project

  • Penetration Testing Project (5:22)
  • Compliance (5:11)
  • VA and PT (7:27)
  • RFP (Request for Proposal)
  • (11:36)
  • Social Engineering PT (3:30)
  • Tools and Utility

  • PT VA Tols (4:43)
  • Nesus (13:24)
  • Nexpose 1 (11:22)
  • Nexpose 2 (5:07)
  • OWASP- ZAP (5:06)
  • MetaSploit Pro (14:09)
  • Metasploit Community (5:11)
  • Let's Start the project

  • Start your project (9:55)
  • Identify your scope (2:51)
  • Identification of the Target

  • Who is Information (11:43)
  • Email Harvesting (9:03)
  • GHDB 2 (2:33)
  • Introduction to Maltego (1:40)
  • Maltego (8:12)
  • People Search Engine (2:46)
  • Port Scaning

  • NMAP (9:42)
  • Zenmap (5:48)
  • Enumeration

  • Enumeration (2:19)
  • DNS Enumeration (4:31)
  • DNS Zone Transfer (6:19)
  • SMB Enumeration (6:19)
  • Enum4Linux (3:06)
  • Windows Enumeration (15:11)
  • Vulnerability Management

  • Vulnerability asessment (3:16)
  • Nessus VA Report (14:05)
  • Nessus Report 2 (5:20)
  • OWASP ZAP VA (14:42)
  • Nexpose VA (11:56)
  • Penetration Testing Project initiation

  • MetaSploit Pro 1 (14:33)
  • Penetration Testing (5:22)
  • Metasploit Pro 2 (7:18)
  • Metasploit Pro 3 (8:22)
  • MetaSploit Community (7:34)
  • Armitage (7:48)
  • SQL Injection

  • SQL Injection Introduction (2:28)
  • What is SQL Injection (9:53)
  • Is the site infected with SQLI ? (4:47)
  • The amazing SQLMAP (10:27)
  • Live Example (7:04)
  • Social Engineering Campaign

  • Social Engineering Campaign (4:16)
  • SE Using MetaSploit Pro (8:34)
  • Credential Harvest (11:15)
  • SET (5:08)
  • Managing the finding

  • Finding and Solutions (4:07)
  • Patches (1:40)
  • Writing a report (2:35)
  • Services Fees

  • Service Fees (3:51)
User Rating

4.7 average based on 261 reviews.


5 star
150
4 star
63
3 star
15
2 star
6
1 star
20

Student Reviews

Dont Miss Out Offer Ends In

  • Days
  • Hours
  • Minutes
  • Seconds
$12

Course Features

  • 30-Day Money-Back Guarantee
  • Lessons With Examples
  • 8 Hours of Learning
  • Lifetime 24/7 Access
  • Completion Certificate