Ethical Hacking / Penetration Testing Course | Luka Sikic | Skillshare

Ethical Hacking / Penetration Testing Course

Luka Sikic, Cyber Security is just a myth

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
26 Videos (52m)
    • Introduction

      0:41
    • Preparing Kali Linux on VMware

      2:53
    • Kali Linux Basics (Tools, Services, Files)

      2:33
    • Passive Information Gathering - Subdomains

      1:00
    • Passive Information Gathering - Emails

      1:25
    • Active Information Gathering - Network Scan

      1:47
    • Active Information Gathering - OS Detection

      1:23
    • Active Information Gathering - Service Enumeration

      1:38
    • Active Information Gathering - Dirbuster

      2:50
    • Active Information Gathering - Netcat Banner Grabbing

      1:18
    • Active Information Gathering - Subdomains

      1:01
    • Vulnerability Scanning - NSE Scripts

      1:18
    • Vulnerability Scanning - Wordpress

      2:20
    • Vulnerability Scanning - Joomla

      1:31
    • Vulnerability Scanning - Web Server

      1:02
    • Exploitation - Windows Metasploit Backdoor

      3:36
    • Exploitation - Metasploit Exploits

      1:53
    • Exploitation - SQL Injection

      2:58
    • Exploitation - Local File Inclusion

      2:18
    • Exploitation - Remote File Inclusion

      2:55
    • Exploitation - Command Injection

      1:32
    • Tunneling - Metasploit Route Pivoting

      3:20
    • Post Exploitation - Metasploit Modules

      2:46
    • Post Exploitation - User Account Control Ask Exploit

      1:39
    • Privilege Escalation - Windows

      2:40
    • Privilege Escalation - Linux

      1:59
20 students are watching this class

About This Class

This is full course including all necessary information to start your carrier in Cyber Security domain. This course aims to teach you how to perform full penetration testing on local/remote network and web applications.

Content:

  • Introduction
    • Introduction lesson
    • Kali Linux preparation and Installation
  • Kali Linux Basics
    • Tools
    • Services
    • Files
  • Information Gathering
    • Passive Information Gathering
    • Active Information Gathering
  • Enumeration
    • System Services Enumeration
    • Web Application/Server Enumeration
  • Vulnerability Scanning
    • Web Server
    • Web Applications
    • System Services
  • Exploitation
    • Client side
    • Server Side
      • Metasploit
      • Web Application Vulnerabilities (manual exploitation)
  • Tunneling
  • Post Exploitation
  • Privilege Escalation
    • Linux
    • Windows

334

Students

--

Projects

  • --
  • Beginner
  • Intermediate
  • Advanced
  • All Levels
  • Beg/Int
  • Int/Adv

Level

Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.

Luka Sikic

Cyber Security is just a myth

Report class