Udemy

Advanced White Hat Hacking & Penetration Testing Tutorial

Enroll Now
  • 7,568 Students
  • Updated 6/2013
4.1
(133 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
5 Hour(s) 8 Minute(s)
Language
English
Taught by
Infinite Skills
Rating
4.1
(133 Ratings)

Course Overview

Advanced White Hat Hacking & Penetration Testing Tutorial

Learn how to test and protect your network using Ethical Hacking and Penetration Testing Techniques.

In this Advanced White Hat Hacking And Penetration Testing training course, Infinite Skills takes you beyond the basics of Ethical Hacking and shows you advanced techniques for discovering potential security problems with your websites and networks. This course requires that you already have familiarity with the basics of penetration testing, and assumes that you have already completed the Learning White Hat Hacking And Penetration Testing course from Infinite Skills.

The course jumps right into the nitty gritty with a chapter about using Dradis. You will learn about scanning, including stealth scanning, data acquisition using various methods, and advanced ways to utilize Metasploit. In this Ethical Hacking tutorial you also learn how to use Burp Suite to do web testing, what reverse engineering is and how to use it, and finally, Ric covers fuzzing with Peach.

Once you have completed this training course on Advanced White Hat Hacking And Penetration Testing, you will have an in-depth understanding of how to test networks and websites for potential exploits for the purpose of securing them. You will also know how to use the tools and software that you will need to perform and analyze this testing.

This White Hat Hacking course follows on from our Beginners White Hat Hacking Course

Course Content

  • 9 section(s)
  • 77 lecture(s)
  • Section 1 01. Introduction
  • Section 2 02. Getting Organized
  • Section 3 03. Scanning
  • Section 4 04. Data Acquisition
  • Section 5 05. Metasploit
  • Section 6 06. Web Testing
  • Section 7 07. Reverse Engineering
  • Section 8 08. Fuzzing
  • Section 9 0901 Extending Your Learning

What You’ll Learn

  • Learn How To Test For And Protect Your Network From Hackers, Build Robust Networks That Can Withstand Penetration From Unauthorized Access, Learn How To Defeat Hackers And Secure Your Hardware From Attack

Skills covered in this course


Reviews

  • A
    Andrea Santambrogio
    2.0

    The author mentions "Advanced" but the concepts covered are pretty basic. Some trivial demos on how to use tools without actually getting into the details of pentesting. I would have expected less overviews and more deep dives to be honest, given the title of the course.

  • C
    CHERITTA BROWN
    5.0

    The Instructor is easy to understand and follow along with. This course material is relevant to model scaling, security roles, and compliance requirements for most work environments.

  • E
    Ed Tolleson
    3.5

    some of the add-ons are no longer available which tells me this is a little dated but still good information just need to be aware you will need to do some research.

  • B
    Boian Boytchev
    4.0

    Almost good. Need Update. MSFPayload is now MSFVenom for example.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed