Course Information
Course Overview
Learn how to test and protect your network using Ethical Hacking and Penetration Testing Techniques.
In this Ethical Hacking - Whitehat Hacking and Penetration testing tutorial, expert ethical hacker Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks.
Some of the topics covered in this course are; researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography. You will learn about scanning networks, penetration testing and the use of Metasploit, malware and viruses, DoS and DDoS attacks, web application hacking and securing wireless networks. Finally, you will learn about detection evasion and preventing programming attacks, and much more throughout this video based tutorial.
By the time you have completed this video tutorial for Whitehat Hacking and Penetration testing, you will have a deeper understanding of the areas you may be potentially be vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers.
Course Content
- 12 section(s)
- 101 lecture(s)
- Section 1 01. Introduction
- Section 2 02. Getting The Background - Footprinting And Reconnaissance
- Section 3 03. Networking Fundamentals
- Section 4 04. Cryptography
- Section 5 05. Scanning And Enumeration
- Section 6 06. Penetration
- Section 7 07. Malware - Trojans, Backdoors, Viruses And Worms
- Section 8 08. Denial Of Service Attacks
- Section 9 09. Web Application Hacking
- Section 10 10. Wireless Networking
- Section 11 11. Detection Evasion
- Section 12 12. Programming Attacks
What You’ll Learn
Skills covered in this course
Reviews
-
GGiovanni Fabbris
Really useful insight and tools.
-
RRegis Zimmer
This is a very broad course, but it touches those many issues very superficially. Good if you are a novice. However, quite frustrating if you expect a little deeper information and applications.
-
RRobert Taylor
The instructor covered some topics that I had not seen before such as what is a format string attack. Unfortunately, most of the topics were not covered in enough detail or with enough information to actually hack anything. The course format was more of an informative exposition of, for example, this is what a buffer overflow is rather than a training video on how to actually use it to hack into a system. Since I have already taken the Penetration with Kali Linux course and attempted the OSCP test a couple of times I was hoping to find some bits of detail that would help me advance on to a greater ability to hack. I didn't really find that in this course.
-
EEric Rising
Good info, but hardly any 'real-world' examples of gaining access. Many of the lectures say you COULD use this info to help gain access, but nothing further is explored/showed. I like the Metasploit example for that reason.