Ethical hacking and pentesting guide
Ethical hacking and pentesting guide, available at $59.99, has an average rating of 4.65, with 247 lectures, 16 quizzes, based on 102 reviews, and has 6360 subscribers.
You will learn about The basics of the web and networking Portscanning and network hacking Getting a foothold Privilege escalations Web hacking API hacking Mobile hacking Pentesting This course is ideal for individuals who are OSCP students or IT engineers or QA Engineers or Pentesters It is particularly useful for OSCP students or IT engineers or QA Engineers or Pentesters.
Enroll now: Ethical hacking and pentesting guide
Summary
Title: Ethical hacking and pentesting guide
Price: $59.99
Average Rating: 4.65
Number of Lectures: 247
Number of Quizzes: 16
Number of Published Lectures: 247
Number of Published Quizzes: 16
Number of Curriculum Items: 268
Number of Published Curriculum Objects: 267
Original Price: $59.99
Quality Status: approved
Status: Live
What You Will Learn
- The basics of the web and networking
- Portscanning and network hacking
- Getting a foothold
- Privilege escalations
- Web hacking
- API hacking
- Mobile hacking
- Pentesting
Who Should Attend
- OSCP students
- IT engineers
- QA Engineers
- Pentesters
Target Audiences
- OSCP students
- IT engineers
- QA Engineers
- Pentesters
SUDO
I can not promise this course will find you bugs. I can promise i will leave you with a solid methodology that’s netted me a few nice extra monthly salaries. This method is not guaranteed to work for you. You will need to adept. You will need to work.
If any course promises you that they WILL find you bugs, run as fast as you can.
WHOAMI
My name is uncle rat and i am here to help you take the next step. I am not here to hold your hand, i am here to push you over the edge. You’ve been practicing on pratice platforms for long enough now, don’t you think? It’s time.
I will provide you with a solid methodology to build upon. I don’t want you to follow in my footsteps, i want you write your own legend. This is after all the place where legends are born.
Every chapter has at least a video file with slides to download and where applicable a full text PDF with extra information. All extra’s like cheat sheets are seperatly downloadeable for your comfort.
– The XSS Rat
CAT ‘goals.txt’
I can hack, but i can only hack one target at a time. My passion is teaching so why not hit two birds with one stone?
I created this course because i strongly believe that if i hack 1 target i am just me but if i train 1000 hackers, we are an army.
This is my goal, i want to make the internet a safer place but i can’t do it alone.
Who this course is for:
-
Beginner bug bounty hunters who are looking for a solid methodology and mindset
-
Experienced pen-testers looking to get into bug bounties
-
Companies training their cybersecurity staff to withstand even the toughest of logic attacks
The course Contains :
-
The basics of networking, the web, and hacking
-
OSCP based enumeration techniques and an attack plan for foothold and priv esc
-
API testing
-
Mobile testing
-
Web application testing
-
And much more…
Course Curriculum
Chapter 1: 00×00 Syllabus
Lecture 1: Syllabus
Chapter 2: 0x01 – Introduction
Lecture 1: introduction
Lecture 2: intro video
Lecture 3: What is "Ethical" hacking"
Lecture 4: How to engage a target
Lecture 5: How to engage a target.mp4
Lecture 6: @Ch1R0n1n: What it means to be an Ethical Hacker.pdf
Lecture 7: @Ch1R0n1n: What it means to be an Ethical Hacker.pptx
Lecture 8: @Ch1R0n1n: What is an Ethical Hacker.mp4
Lecture 9: Assignment: Let's fuzz hackxpert.com
Chapter 3: 0x02 -Networking And Web Application basics
Lecture 1: Web fundamentals Video
Lecture 2: Web fundamentals
Lecture 3: Networking fundamentals
Lecture 4: Assignment: Networking
Lecture 5: Transferring files.mp4
Lecture 6: Downloading files
Lecture 7: Fuzzing
Chapter 4: 0x03 – Tools
Lecture 1: Assignment: Using OWASP ZAP
Lecture 2: Linux CLI
Lecture 3: Netcat
Lecture 4: Netcat In depth Article
Lecture 5: Owasp ZAP
Lecture 6: DNS in depth
Lecture 7: DNS
Lecture 8: Assignment: 00×03 DNS
Chapter 5: 0x04 Passive information gathering
Lecture 1: Passive information gathering
Lecture 2: Passive information gathering.mp4
Chapter 6: 00×05 Getting a foothold
Lecture 1: Getting a foothold
Lecture 2: Directory Busting Video Part
Lecture 3: Directory Busting PPTX
Lecture 4: Directory Brute forcing by Uncle rat PDF
Lecture 5: Working with Exploits
Lecture 6: Working with Exploits.pptx
Lecture 7: SMB enum
Lecture 8: SMB Enumeration.mp4
Lecture 9: SMB Enumeration slides
Lecture 10: SNMP enum
Lecture 11: NFS enum
Lecture 12: Telnet enum
Lecture 13: SSH enum
Lecture 14: FTP Enum
Lecture 15: FTP Enum
Lecture 16: FTP Enumeration
Chapter 7: 00×06 Priviledge escalation
Lecture 1: Linux priv-esc
Lecture 2: Linux priv esc PPTX
Lecture 3: Linux priv esc Article
Lecture 4: Linux priv esc Ex 1
Lecture 5: Linux priv esc Ex 2
Lecture 6: Windows Priv Esc
Lecture 7: Windows priv esc Article
Chapter 8: 0x07 Vulnerability scanning
Lecture 1: Vulnerability scanning
Lecture 2: Nmap NSE
Lecture 3: OpenVas
Lecture 4: Vulnerability scanning 02
Chapter 9: 0x08 -Buffer overflows
Lecture 1: Buffer overflows Walkthrough
Lecture 2: Buffer Overflows PPTX
Chapter 10: 0x09 Burp suite (Large section)
Lecture 1: Intro
Lecture 2: Dashboard + live and passive scans
Lecture 3: Target tab
Lecture 4: Proxy tab
Lecture 5: Intruder
Lecture 6: Repeater.
Lecture 7: Sequencer
Lecture 8: Decoder.
Lecture 9: Comparer
Lecture 10: 10 Market place (Plugins)
Lecture 11: Burp Suite Extender
Lecture 12: Burp collaborator
Lecture 13: Burp Authorize
Lecture 14: Burp Match and replace
Lecture 15: Burp Suite Content discovery
Lecture 16: Burp suite Top 5 Proffesional extensions
Lecture 17: Testing mobile applications with burp suite
Lecture 18: Burp suite How to use burp to look for SQLi
Chapter 11: 00×10-00 Introduction to JWT hacking
Lecture 1: JWT hacking
Lecture 2: Lab: JWT hacking
Chapter 12: 00×10-01 Open redirects
Instructors
-
Wesley Thijs
I am the XSS Rat -
Brian McGee
Ch1R0n1n
Rating Distribution
- 1 stars: 2 votes
- 2 stars: 4 votes
- 3 stars: 13 votes
- 4 stars: 36 votes
- 5 stars: 47 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024