Course Information
Course Overview
Learn how to test and protect your network using Ethical Hacking and Penetration Testing Techniques.
In this Advanced White Hat Hacking And Penetration Testing training course, Infinite Skills takes you beyond the basics of Ethical Hacking and shows you advanced techniques for discovering potential security problems with your websites and networks. This course requires that you already have familiarity with the basics of penetration testing, and assumes that you have already completed the Learning White Hat Hacking And Penetration Testing course from Infinite Skills.
The course jumps right into the nitty gritty with a chapter about using Dradis. You will learn about scanning, including stealth scanning, data acquisition using various methods, and advanced ways to utilize Metasploit. In this Ethical Hacking tutorial you also learn how to use Burp Suite to do web testing, what reverse engineering is and how to use it, and finally, Ric covers fuzzing with Peach.
Once you have completed this training course on Advanced White Hat Hacking And Penetration Testing, you will have an in-depth understanding of how to test networks and websites for potential exploits for the purpose of securing them. You will also know how to use the tools and software that you will need to perform and analyze this testing.
This White Hat Hacking course follows on from our Beginners White Hat Hacking Course
Course Content
- 9 section(s)
- 77 lecture(s)
- Section 1 01. Introduction
- Section 2 02. Getting Organized
- Section 3 03. Scanning
- Section 4 04. Data Acquisition
- Section 5 05. Metasploit
- Section 6 06. Web Testing
- Section 7 07. Reverse Engineering
- Section 8 08. Fuzzing
- Section 9 0901 Extending Your Learning
What You’ll Learn
- Learn How To Test For And Protect Your Network From Hackers, Build Robust Networks That Can Withstand Penetration From Unauthorized Access, Learn How To Defeat Hackers And Secure Your Hardware From Attack
Skills covered in this course
Reviews
-
AAndrea Santambrogio
The author mentions "Advanced" but the concepts covered are pretty basic. Some trivial demos on how to use tools without actually getting into the details of pentesting. I would have expected less overviews and more deep dives to be honest, given the title of the course.
-
CCHERITTA BROWN
The Instructor is easy to understand and follow along with. This course material is relevant to model scaling, security roles, and compliance requirements for most work environments.
-
EEd Tolleson
some of the add-ons are no longer available which tells me this is a little dated but still good information just need to be aware you will need to do some research.
-
BBoian Boytchev
Almost good. Need Update. MSFPayload is now MSFVenom for example.