Penetration Testing

199 STUDENTS ENROLLED

This most potent way to discover weaknesses in a network is to use the same mindset, tool and technique as hackers.In this Advance Ethical Hacking/Penetration Testing course,You will learn all your way up to Gathering Information,Scanning your target,Finding Vulnerabilities,Exploit them with post exploitation under your belt.
Here You will learn properly and professionally breaking the things and figuring out how and why they can be hacked.

It’s the 2nd module of cyber security expert Module from Cosmic Skills.

You will learn:
1.How to perform Penetration Testing on Various Environment.
2.Enumeration is the keys You will enumerate a lot.
3.Test various type of real world scenario and will successfully exploit them.
4.This course will make you ready for a lot of Security Certification throughout the Globe.

Recommended Experience:
1.Complete “Ethical Hacking for Beginners” by Cosmic Skills.

Course Curriculum

Section 1: Introduction to Pentesting
What is Penetration Testing FREE 00:03:00
Section 2: Creating Lab
Lab Setup for Pentesting 00:01:00
Installing Kali 00:07:00
Installing Kali on VMware [Updated] 00:05:00
Installing kali on VirtualBox [updated] 00:06:00
Installing Metasploitable-v2 00:05:00
Installing Kioptrix 1.0 00:05:00
Installing Kioptrix 1.2 00:03:00
Installing Mr.Robot 00:04:00
Section 3: Introduction to Kali Linux
Command line basics FREE 00:13:00
Bash Script basics 00:14:00
Services 00:05:00
Section 4: Some useful tools
Cherrytree (Notes Keeping) 00:07:00
Ncat 00:03:00
Netcat 00:13:00
Wireshark 00:05:00
Section 5: Information Gathering
Information Gathering-1 00:05:00
Information Gathering-2 00:08:00
Information Gathering-3 00:04:00
Information Gathering-4 00:04:00
theHarvester 00:05:00
Discover tool 00:07:00
Understanding Google Hacking 00:06:00
Google Dorks 00:13:00
Section 6: Scanning
Metasploit Scanning 00:08:00
Nmap Scanning 00:13:00
Nessus Scan 00:07:00
Section 7: Enumeration
DNS enumeration 00:08:00
HTTP enumeration 00:09:00
SMB enumeration 00:14:00
SSH enumeration 00:06:00
Section 8: Web App Exploits
SQL exploitation using SQLMAP FREE 00:05:00
Manual SQL Injection 00:18:00
Cross-site scripting(XSS) 00:15:00
Local File Inclusion (Part-1) 00:06:00
Local File Inclusion (Part-2) 00:09:00
Remote File Inclusion 00:09:00
Section 9: File Transfer
CURL file transfer 00:02:00
FTP transfer 00:08:00
NC file transfer 00:03:00
PHP file transfer 00:01:00
TFTP file transfer 00:05:00
WGET file transfer 00:01:00
Section 10: Metasploit Basics
Introduction to Metasploit 00:05:00
MsfVenom 00:05:00
Creating Bind Shell 00:08:00
Creating Reverse Shell 00:00:00
Hacking Linux using Metasploit 00:06:00
Hacking Windows using Metasploit 00:08:00
Introduction to Armitage 00:05:00
Section 11: Exploitation
Exploiting Kioptrix 1.0 00:05:00
Exploiting Kioptrix 1.1 00:07:00
Exploiting Mr. Robot 00:12:00
Section 12: Password Attack
Password Attack 00:08:00
Section 13: Privilege Escalation
Kioptrix level 1.1 Privilege Escalation 00:05:00
Mr.Robot Privilege Escalation 00:13:00
Section 14: Buffer Overflow
Buffer Overflow Basics 00:04:00
BoF Requirements 00:05:00
Exploiting Buffer Overflow on SLMAIL 00:28:00
Capstone
Lord of the Root 00:29:00
Raven1 00:16:00

Course Reviews

5

5
1 ratings
  • 5 stars1
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. 5

    good one to boost up some knowledge
    in the buffer overflow topic your told that some sell scripts given below video but there was no files

TAKE THIS COURSE
  •  5,000.00  699.00
  • 365 Days
  • Course Certificate

Top Rated Course

© Cosmic Skills Edu LLP . All rights reserved.
WhatsApp chat