Sorry, your browser is not supported
To have the best experience using Skillshare, we recommend that you use one of these supported browsers.

Ethical Hacking / Penetration Testing Course

Luka Sikic, Cyber Security is just a myth

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
26 Videos (52m)
    • Introduction

      0:41
    • Preparing Kali Linux on VMware

      2:53
    • Kali Linux Basics (Tools, Services, Files)

      2:33
    • Passive Information Gathering - Subdomains

      1:00
    • Passive Information Gathering - Emails

      1:25
    • Active Information Gathering - Network Scan

      1:47
    • Active Information Gathering - OS Detection

      1:23
    • Active Information Gathering - Service Enumeration

      1:38
    • Active Information Gathering - Dirbuster

      2:50
    • Active Information Gathering - Netcat Banner Grabbing

      1:18
    • Active Information Gathering - Subdomains

      1:01
    • Vulnerability Scanning - NSE Scripts

      1:18
    • Vulnerability Scanning - Wordpress

      2:20
    • Vulnerability Scanning - Joomla

      1:31
    • Vulnerability Scanning - Web Server

      1:02
    • Exploitation - Windows Metasploit Backdoor

      3:36
    • Exploitation - Metasploit Exploits

      1:53
    • Exploitation - SQL Injection

      2:58
    • Exploitation - Local File Inclusion

      2:18
    • Exploitation - Remote File Inclusion

      2:55
    • Exploitation - Command Injection

      1:32
    • Tunneling - Metasploit Route Pivoting

      3:20
    • Post Exploitation - Metasploit Modules

      2:46
    • Post Exploitation - User Account Control Ask Exploit

      1:39
    • Privilege Escalation - Windows

      2:40
    • Privilege Escalation - Linux

      1:59

About This Class

This is full course including all necessary information to start your carrier in Cyber Security domain. This course aims to teach you how to perform full penetration testing on local/remote network and web applications.

Content:

  • Introduction
    • Introduction lesson
    • Kali Linux preparation and Installation
  • Kali Linux Basics
    • Tools
    • Services
    • Files
  • Information Gathering
    • Passive Information Gathering
    • Active Information Gathering
  • Enumeration
    • System Services Enumeration
    • Web Application/Server Enumeration
  • Vulnerability Scanning
    • Web Server
    • Web Applications
    • System Services
  • Exploitation
    • Client side
    • Server Side
      • Metasploit
      • Web Application Vulnerabilities (manual exploitation)
  • Tunneling
  • Post Exploitation
  • Privilege Escalation
    • Linux
    • Windows

20

Students

--

Projects

0

Reviews (0)

Luka Sikic

Cyber Security is just a myth