MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Advanced White Hat Hacking & Penetration Testing Tutorial

Course Summary

Learn how to test and protect your network using Ethical Hacking and Penetration Testing Techniques.


  • +

    Course Syllabus

    • 01. Introduction
      • 0101 What You Should Expect
      • 0102 What You Should Know
      • 0103 What You Will Learn
      • 0104 System Requirements
      • HOW TO OBTAIN YOUR CERTIFICATE OF COMPLETION FOR THIS INFINITE SKILLS COURSE.
    • 02. Getting Organized
      • 0201 Ethical Hacking
      • 0202 Dradis Framework
      • 0203 Using Notes With Dradis
      • 0204 Importing Data With Dradis :
      • 0205 Installing Plugins In Google Chrome
      • 0206 Installing Plugins In Mozilla Firefox
      • 0207 Raspberry PI
      • 0208 SSH Forwarding
    • 03. Scanning
      • 0301 Refresher On NMAP
      • 0302 Scan Types
      • 0303 Stealth Scanning
      • 0304 Application Scans Using AMAP
      • 0305 Web Testing With NMAP
      • 0306 Scanning And Scripting With NMAP And UDP
      • 0307 Scanning With Hping
      • 0308 Payload-Based Scanning With Unicorn Scan
      • 0309 TCP Scanning With Unicorn Scan
    • 04. Data Acquisition
      • 0401 Using Wappalyzer
      • 0402 Using Passive Recon
      • 0403 Using Firebug
      • 0404 Using Groundspeed
      • 0405 Converting With Hackbar
      • 0406 Managing Cookies
    • 05. Metasploit
      • 0501 Starting Up Metasploit
      • 0502 Scanning With Metasploit
      • 0503 Service Scanning With Metasploit
      • 0504 SMB Scanning With Metasploit
      • 0505 Importing Nessus Results
      • 0506 Creating Payloads
      • 0507 Creating Standalone Exploits
      • 0508 Encoding And Packing
      • 0509 Writing Fuzzers Using Metasploit
      • 0510 Exploits
      • 0511 Using Meterpreter
      • 0512 Post-Exploitation
      • 0513 Pivoting
      • 0514 Manipulating Windows API
      • 0515 Client Side Attacks
      • 0516 Social Engineering Toolkit
      • 0517 Spear Phishing
      • 0518 Web Attacks
      • 0519 Automating Metasploit
      • 0520 SQL Server Logins
      • 0521 Token Stealing
      • 0522 Extending Metasploit
    • 06. Web Testing
      • 0601 Running Burp Suite
      • 0602 Passive Scanning
      • 0603 Active Scanning
      • 0604 Using The Intruder
      • 0605 Brute Forcing Passwords
      • 0606 SQL Injection Testing With Burp Suite
      • 0607 Cross Site Scripting With Burp Suite
      • 0608 Using The Burp Suite Repeater
      • 0609 Using The Burp Suite Sequencer
      • 0610 XSS-Me
      • 0611 SQL-Inject Me
      • 0612 TamperData
      • 0613 Injection Attacks With TamperData
      • 0614 Hidden Form Fields
      • 0615 ZED Attack Proxy
      • 0616 Fuzzing With ZED Attack Proxy
      • 0617 Hackbar
    • 07. Reverse Engineering
      • 0701 Assembly Basics
      • 0702 Buffer Overflows
      • 0703 Format String Attacks
      • 0704 Debugging - Linux
    • 08. Fuzzing
      • 0801 Peach Fuzzer
      • 0802 HTTP Fuzzing With Peach
      • 0803 E-Mail Fuzzing With Peach
      • 0804 File And Network Fuzzing With Peach
      • 0805 Sulley
      • 0806 Spike Proxy
    • 0901 Extending Your Learning
      • 0901 Extending Your Learning


Course Fee:
USD 99

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top