CareerVision Training

Whitehat Hacking and Penetration Testing Advanced Training

CareerVision Training

£ 72 - ($ 1.334)

Información importante

  • Training
  • Beginner
  • A distancia
  • Duración:
  • Cuándo:
    A definir

  The following course, offered by Career vision, will help you improve your skills and achieve your professional goals. During the program you will study different subjects which are deemed to be useful for those who want to enhance their professional career. Sign up for more information!

Información importante

Dónde se enseña y en qué fechas

inicio Ubicación
A definir
Distance Learning

¿Qué aprendés en este curso?




 •  Format: DVD or Instant Download
 •  Duration: 5.25 Hours (78 lessons)
 •  Instructor: Ric Messier
 •  Platform: Windows PC or Mac

In this Advanced White Hat Hacking And Penetration Testing training course, expert author Ric Messier takes you beyond the basics of Ethical Hacking and shows you advanced techniques for discovering potential security problems with your websites and networks. This course requires that you already have familiarity with the basics of penetration testing, and assumes that you have already completed the Learning White Hat Hacking And Penetration Testing course from Infinite Skills.

Ric jumps right into the nitty gritty with a chapter about using Dradis. You will learn about scanning, including stealth scanning, data acquisition using various methods, and advanced ways to utilize Metasploit. In this Ethical Hacking tutorial you also learn how to use Burp Suite to do web testing, what reverse engineering is and how to use it, and finally, Ric covers fuzzing with Peach.

Once you have completed this training course on Advanced White Hat Hacking And Penetration Testing, you will have an in-depth understanding of how to test networks and websites for potential exploits for the purpose of securing them. You will also know how to use the tools and software that you will need to perform and analyze this testing.

Benefits of this Software Training:
 •  Tuition by expert tutors.
 •  Narrated training videos demonstrate the key tools and professional techniques
        helping you to work faster and smarter.
 •  Learning is fast as the trainers guide you using simplistic terms and minimal jargon.
 •  Personal Tutoring - Step-by-step video training from your own desktop.
        Delivered via DVD/CD training or online tuition.
 •  The tutor transfers knowledge to you quickly and effectively.
 •  All the concepts of each application are explained clearly and precisely.
 •  Course works on PC and Mac.
 •  Alternative to a boring book or manual and expensive training courses,
        seminars and amp; classes.
 •  Jump to and from lessons - learn at your own pace.
 •  The visual and practical nature shortens the learning curve compared to standard
        training manuals.


The following sections are available for free viewing. Click on the links below to get started.

00. Free Videos From This Course What You Will Learn About Ric Messier Ethical Hacking Importing Data With Dradis Stealth Scanning Using Wappalyzer Starting Up Metasploit Running Burp Suite Buffer Overflows File And Network Fuzzing With Peach 01. Introduction 0101 What You Should Expect 0102 What You Should Know 0103 What You Will Learn 0104 System Requirements 02. Getting Organized 0201 Ethical Hacking 0202 Dradis Framework 0203 Using Notes With Dradis 0204 Importing Data With Dradis 0205 Installing Plugins In Google Chrome 0206 Installing Plugins In Mozilla Firefox 0207 Raspberry PI 0208 SSH Forwarding 03. Scanning 0301 Refresher On NMAP 0302 Scan Types 0303 Stealth Scanning 0304 Application Scans Using AMAP 0305 Web Testing With NMAP 0306 Scanning And Scripting With NMAP And UDP 0307 Scanning With Hping 0308 Payload-Based Scanning With Unicorn Scan 0309 TCP Scanning With Unicorn Scan 04. Data Acquisition 0401 Using Wappalyzer 0402 Using Passive Recon 0403 Using Firebug 0404 Using Groundspeed 0405 Converting With Hackbar 0406 Managing Cookies 05. Metasploit 0501 Starting Up Metasploit 0502 Scanning With Metasploit 0503 Service Scanning With Metasploit 0504 SMB Scanning With Metasploit 0505 Importing Nessus Results 0506 Creating Payloads 0507 Creating Standalone Exploits 0508 Encoding And Packing 0509 Writing Fuzzers Using Metasploit 0510 Exploits 0511 Using Meterpreter 0512 Post-Exploitation 0513 Pivoting 0514 Manipulating Windows API 0515 Client Side Attacks 0516 Social Engineering Toolkit 0517 Spear Phishing 0518 Web Attacks 0519 Automating Metasploit 0520 SQL Server Logins 0521 Token Stealing 0522 Extending Metasploit 06. Web Testing 0601 Running Burp Suite 0602 Passive Scanning 0603 Active Scanning 0604 Using The Intruder 0605 Brute Forcing Passwords 0606 SQL Injection Testing With Burp Suite 0607 Cross Site Scripting With Burp Suite 0608 Using The Burp Suite Repeater 0609 Using The Burp Suite Sequencer 0610 XSS-Me 0611 SQL-Inject Me 0612 TamperData 0613 Injection Attacks With TamperData 0614 Hidden Form Fields 0615 ZED Attack Proxy 0616 Fuzzing With ZED Attack Proxy 0617 Hackbar 07. Reverse Engineering 0701 Assembly Basics 0702 Buffer Overflows 0703 Format String Attacks 0704 Debugging - Linux 08. Fuzzing 0801 Peach Fuzzer 0802 HTTP Fuzzing With Peach 0803 E-Mail Fuzzing With Peach 0804 File And Network Fuzzing With Peach 0805 Sulley 0806 Spike Proxy 09. Wrapping Up 0901 Extending Your Learning 10. About The Author 1001 About Ric Messier