Hands-on Penetration Testing Labs 2.0
Hands-on Penetration Testing Labs 2.0, available at $49.99, has an average rating of 4.35, with 17 lectures, based on 515 reviews, and has 5832 subscribers.
You will learn about Enumeration Remote and Local Exploitation Vulnerability Scanning SQL injection Cross-site Scripting Reverse shells Nmap Metasploit Nikto Dirb Burp Suite Penetration Testing Kali Linux Remote and local buffer overflows Privilege escalation Custom exploit development This course is ideal for individuals who are Penetration Testers or Cyber Security Students or Cyber Security Analysts or Aspiring Penetration Testers or Aspiring Cyber Security Analysts or Technology Enthusiasts or OSCP Candidates or CEH Candidates or Pentest+ Candidates It is particularly useful for Penetration Testers or Cyber Security Students or Cyber Security Analysts or Aspiring Penetration Testers or Aspiring Cyber Security Analysts or Technology Enthusiasts or OSCP Candidates or CEH Candidates or Pentest+ Candidates.
Enroll now: Hands-on Penetration Testing Labs 2.0
Summary
Title: Hands-on Penetration Testing Labs 2.0
Price: $49.99
Average Rating: 4.35
Number of Lectures: 17
Number of Published Lectures: 17
Number of Curriculum Items: 17
Number of Published Curriculum Objects: 17
Original Price: $19.99
Quality Status: approved
Status: Live
What You Will Learn
- Enumeration
- Remote and Local Exploitation
- Vulnerability Scanning
- SQL injection
- Cross-site Scripting
- Reverse shells
- Nmap
- Metasploit
- Nikto
- Dirb
- Burp Suite
- Penetration Testing
- Kali Linux
- Remote and local buffer overflows
- Privilege escalation
- Custom exploit development
Who Should Attend
- Penetration Testers
- Cyber Security Students
- Cyber Security Analysts
- Aspiring Penetration Testers
- Aspiring Cyber Security Analysts
- Technology Enthusiasts
- OSCP Candidates
- CEH Candidates
- Pentest+ Candidates
Target Audiences
- Penetration Testers
- Cyber Security Students
- Cyber Security Analysts
- Aspiring Penetration Testers
- Aspiring Cyber Security Analysts
- Technology Enthusiasts
- OSCP Candidates
- CEH Candidates
- Pentest+ Candidates
NOTE: This is independent from my other course, Hands-on Pentration Labs 1.0 – they both have original content and you’re not required to buy one or the other by itself.
Welcome to my Hands-on Penetration Testing Labs 2.0 course. You can think of this as part 2 of my other course which has a similar name. This lecture will provide an overview of what you can expect for the remainder of this course.
First of all, this course is extremely hands-on. This means we’re not going to be doing much talking about the theory of penetration testing, we’re going to be diving into hands on technical application right away. We’ll be using VirtualBox as a software hypervisor to build a host-only lab environment. Not only will this help you gain insight into penetration testing, but will give you the skills and resources to create your own environment to test and research beyond what you learn in this course.
The lab is going to consist of Kali Linux, and a variety of intentionally vulnerable Linux and Windows VMs. Some of the things we’ll be covering are enumeration and vulnerability scanning and local and remote exploitation with industry standard penetration testing tools such as nmap, dirb, and nikto, Metasploit and standalone exploits. We’re also going to focus upon exploit development, covering in detail how to craft a buffer overflow exploit for a custom Linux and Windows binary.
In order to accomplish this goal of buffer over flow exploit development and debugging, we’re going to be creating a Windows 7 analysis and attack machine. This will have industry standard tools for exploit dev such as Immunity Debugger. We’re also going to learn how to use Kali Linux’s built in gnu debugger for this purpose.
The technology and methodology used is in this course is current at the time of this recording, which is January 2019. If you’re watching this after the stated date, don’t be worried too much, as this content should still be highly relevant for aspiring penetration testers.
I will also be introducing you to several free training platforms which I’ve found to be extremely helpful prior to earning my many hands-on penetration testing certs including OSCP and eWPT. This training has also helped sky rocket my progress as a skilled senior penetration tester and subject matter expert.
I truly hope that you enjoy my course and I’m very excited to be working with all of you. If you have any trouble, please don’t hesitate to reach out to me via the Q&A system or by direct message. However, please make sure you include a detailed and specific question, not something like “I can’t get it to work”.
Also, I highly encourage independent research and attempting to find answers on your own. This is the single most important skill as a penetration tester, the ability to find solutions to problems you haven’t yet encountered.
I ask you to please go through the majority of this course prior to leaving a review so that you can accurately measure the course’s quality in entirety. I always appreciate constructive feedback, and encourage students to reach out to me if they think anything valuable could be added to the coursework.
Thanks, and have fun!
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Lecture 2: Overview of Lab Commands and Tools
Lecture 3: Bonus Lab – Kali Linux 2020
Lecture 4: Download and Configure Kali Linux VM on VirtualBox
Lecture 5: Download and Configure Window 7 Analysis VM
Lecture 6: Download Vulnerable Lab VMs
Lecture 7: PwnLab VM Enumeration and Exploitation
Lecture 8: Brainpan 1 VM Enumeration and Exploitation
Lecture 9: Mr Robot 1 VM Enumeration and Exploiotation
Lecture 10: SickOS VM Enumeration and Exploitation
Lecture 11: SkyTower 1 VM Enumeration and Exploitation
Lecture 12: Introduction to Hackthebox
Lecture 13: Active VM Enumeration and Exploitation
Lecture 14: Windows 2008 Setup, Enumeration and Exploitation (Metasploitable 3)
Lecture 15: Apache Struts Setup and Exploitation
Lecture 16: Introduction to Hack.me
Lecture 17: WordPress Enumeration and Exploitation
Instructors
-
Jesse K, M.S., OSCP, CEH, Security+, Linux+, Network+, CISSP
Senior Penetration Tester and Technical Trainer
Rating Distribution
- 1 stars: 6 votes
- 2 stars: 7 votes
- 3 stars: 24 votes
- 4 stars: 163 votes
- 5 stars: 315 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024