MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Advanced Ethical Hacking

Course Summary

In-depth course which covers the tools and techniques for performing penetration testing.


  • +

    Course Syllabus

    • Introduction
      • Welcome
      • What This Course Will Cover
      • System Requirements
      • Prerequisites
    • Dradis: Results Tracking
      • Acquiring Dradis
      • Installing Dradis
      • Using Dradis
      • Adding Notes
      • Categorizing Information
    • Nmap
      • Review of Scan Types
      • Advanced Scanning
      • Scripting Engine
      • Investigating Scan Types with Wireshark
      • Importing Results to Dradis
    • Nessus
      • Acquiring Nessus
      • Setting Up Nessus
      • Configuring Nessus
      • Scan Details: Network
      • Scan Details: Credentials / Plugins / Options
      • Scan Details: Web Applications
      • Starting a Scan
      • Reviewing Results
      • False Positives
      • Setting Up Jobs
    • Nexpose
      • Acquiring Nexpose
      • Setting Up Nexpose
      • Configuring Nexpose
      • Adding Hosts to Nexpose
      • Reviewing Results & Manual Checks
    • Manual Testing
      • Netcat
      • Protocol Checking
      • SSL_Client
      • SSLScan
      • Nikto
      • Snmpwalk
    • Metasploit
      • Acquiring Metasploit
      • Setting Up Metasploit
      • Metasploit Web Interface
      • Configuring Workspaces
      • Running Nmap from Metasploit
      • Importing Nessus Results
      • Scanning with Metasploit
      • Looking at Vulnerabilities
      • Searching for Vulnerabilities
      • Running Exploits
      • Post Exploitation Data Gathering
      • Pivoting & Tunneling
      • Writing an MSF Plugin
      • Writing Fuzzers
      • Social Engineering Toolkit
      • Spear Phishing
    • Simple Web Application Testing
      • Browser Plugins with Chrome
      • Browser Plugins with Firefox
      • Tamperdata
      • Performing Injections with Tamperdata
      • Cookie Data with Tamperdata
      • SQL Inject Me
      • XSS Me
      • Firebug
      • Hackbar
      • Wappalyzer
      • Passiverecon
      • Groundspeed
    • Webgoat
      • Acquiring Webgoat
      • Practicing Web Application Attacks
      • Basics of Webgoat
      • Working Through Lessons
    • Burpsuite
      • Acquiring Burpsuite
      • Installing Burpsuite
      • Running Burpsuite & Configuring Your Browser
      • Spidering
      • Passive Scanning
      • Active Scanning
      • Investigating Results
      • Password Attacks
      • Fuzzing Attacks
      • Doing Sequencing
      • Using the Intruder
    • Other Web Tools
      • Acquiring W3Af
      • Installing W3Af
      • Running W3Af
      • Configuring W3Af
      • Acquiring & Configuring Zed Attack Proxy (ZAP)
      • Quick Start with ZAP
      • Scanning with ZAP
      • Spidering with ZAP
      • Fuzzing With ZAP
    • Injection Attacks
      • Web Architecture
      • Basics of SQL Injection
      • Manual Testing
      • SQLMap
      • Command Injection
      • Cross Site Scripting
    • Social Engineering Attacks
      • Spear Phishing
      • Cross Site Request Forgery
      • Rogue Servers
      • Spoofed Certificates
    • Conclusion
      • Course Wrap Up
      • Next Steps
    • Credits
      • About the Author


Course Fee:
USD 89

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top