In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking. The first thing you will learn is some basic information about ethical hacking and the different fields in penetration testing.
This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in my lab.
The course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other. We will start by talking about how we can exploit these systems to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level — by the time you finish, you will have knowledge about most penetration testing fields.
Section 1 – Introduction
Section 2 – Setting up The Lab
Section 3 – Linux Basics
Section 4 – Network Penetration Testing
Section 5 – Network Penetration Testing – Pre Connection Attacks
Section 6 – Network Penetration Testing – Gaining Access (WEP_WPA_WPA2 Cracking)
Section 7 – Network Penetration Testing – Post Connection Attacks
Section 8 – Network Penetration Testing – Detection & Security
Section 9 – Gaining Access To Computer Devices
Section 10 – Gaining Access – Server Side Attacks
Section 11 – Gaining Access – Client Side Attacks
Section 12 – Gaining Access – Client Side Attacks – Social Engineering
Section 13 – Post Exploitation
Section 14 – Website Penetration Testing
Section 15 – Website Pentesting – Information Gathering
Section 16 – Website Pentesting – File Upload, Code Execution & File Inclusion Vulns
Section 17 – Website Pentesting – SQL Injection Vulnerabilities
Section 18 – Website Pentesting – Cross Site Scripting Vulnerabilities
Section 19 – Website Pentesting – Discovering Vulnerabilities Automatically Using OWASP ZAP