Udemy

Hands-on Penetration Testing Labs 1.0

Enroll Now
  • 13,181 Students
  • Updated 4/2020
4.5
(1,510 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
4 Hour(s) 26 Minute(s)
Language
English
Taught by
Jesse K, M.S., OSCP, CEH, Security+, Linux+, Network+, CISSP
Rating
4.5
(1,510 Ratings)
2 views

Course Overview

Hands-on Penetration Testing Labs 1.0

Comprehensive walkthroughs of penetration testing labs

NOTE: This is independent from my other course, Hands-on Pentration Labs 1.0 - they both have original content and you're not required to buy one or the other by itself.

Looking for Powerpoint slides and lectures that will put you to sleep? Keep moving, because this course is not for you.

This course consists of 100% hands-on technical labs, utilizing industry standard open source technology to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course (VMware Player, Kali Linux, Kioptrix, etc.). Moreover, I've set up a Google drive for you to conveniently download all vulnerable VMs. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.

The main points that will be covered in this course is enumeration, remote exploitation, buffer overflows, and privilege escalation. These labs will show you how to interpret results from tools such as Nmap, Dirb, and enum4linux, and use them effectively to compromise vulnerable systems. Please note that these labs contain spoilers, and it is a good idea to attempt to compromise the vulnerable systems on your own prior to getting the answers from the walk through that's provided.

Course Content

  • 1 section(s)
  • 18 lecture(s)
  • Section 1 Hands-on Labs

What You’ll Learn

  • Enumerate/scan systems with Netdiscover, Nmap, Dirb, Nikto, etc., Perform remote exploitation of systems, Escalate local privileges to root level, Utilize a variety of industry standard penetration testing tools within the Kali Linux distro, Build buffer overflows manually


Reviews

  • 割田太郎
    4.0

    GooD

  • Z
    Zan Liffick
    1.0

    No actual explanation of what he’s doing and why

  • P
    Pole Fungamali
    5.0

    thank you

  • M
    Muzzammil Siddiqui
    5.0

    Great beginning !

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed