• No products in the cart.

$350.00 $75.00

Course Curriculum

    • 1. Introduction MK 00:00:00
    • Introduction MK
    • 2. Lab Files and Course Material MK 00:00:00
    • 1. Build your Lab MK 00:04:00
    • Build your Lab MK
    • 2. Setting Up Your Virtual Lab MK 00:04:00
    • Setting Up Your Virtual Lab MK
    • 3. Setting Up Your Workspace MK 00:04:00
    • Setting Your Work Space MK
    • 1. Penetration Testing Phases 00:05:00
    • Penetration Testing Phases
    • 2. Update Upgrade Kali Linux MK 00:05:00
    • Update Upgrade Kali Linux
    • 3. Find / Locate MK 00:07:00
    • Find / Locate
    • 4. Find / Locate MK 00:09:00
    • Find / Locate MK
    • 5. Finding your way Around Kali 00:05:00
    • Finding your way Around Kali
    • 1. HTTP Services MK 00:00:00
    • 2. SSH Services MK 00:00:00
    • 1. Netcat MK 00:00:00
    • 2. Grabbing the Baneer MK 00:03:00
    • Grabbing the Baneer
    • 3. Transferring Using Netcat MK 00:00:00
    • 4. Remote Administration Using Netcat MK 00:00:00
    • 5. Wireshack MK 00:00:00
    • 6. Analysing Wireshark Traffic in a Simple Way MK 00:00:00
    • 7. Another Wireshack Example MK 00:00:00
    • 1. Gather Passive Information MK 00:00:00
    • 2. Easy way to get critical information MK 00:00:00
    • 3. Passive Information MK 00:00:00
    • 3. Gathering Personal Information 00:00:00
    • 5. Maltego MK 00:00:00
    • 6. Using Maltego MK 00:00:00
    • 7. Related Entities in Maltego MK 00:00:00
    • 8. More Maltego MK 00:00:00
    • 9. Google Hacking MK 00:00:00
    • 10. Google Search Operator MK 00:00:00
    • 1. NMap MK 00:00:00
    • 2. Sweeping the Network MP 00:00:00
    • 3. Get more Information about your Victim 00:00:00
    • 4. NMAP NSE Scripts MK 00:00:00
    • 5. Zenmap MK 00:00:00
    • 6. SMB Enumeration MK 00:00:00
    • 7.SMB Null Session MK 00:00:00
    • 8. DNS Enumerator MK 00:00:00
    • 9. Enum4Linux MK 00:00:00
    • 1. Pass Attack MK 00:00:00
    • 2. Xhydra MK 00:00:00
    • 3. SSH Cracking MK 00:00:00
    • 4. Ncrack MK 00:00:00
    • 5. Ncrack Different OS 00:00:00
    • 6. Use the right Wordlist 00:00:00
    • 7. Crunch MK 00:00:00
    • 8. The Most AMAZING and Effective Wordlist MK 00:00:00
    • 9. Final word about Password Attack MK 00:00:00
    • 1. SQL Injection Introduction MK 00:00:00
    • 2. What is SQL Injection MK 00:00:00
    • 3. Set up your Web Apllication Lab MK 00:00:00
    • 4. Is the site Infected with SQLI MK 00:00:00
    • 5. The Amazing SQL Map MK 00:00:00
    • 6. Live Example MK 00:00:00
    • 1. Introduction to Network Attacks 00:00:00
    • 2. Enable Routing MK 00:00:00
    • 3. MITM Attacks Using Ettercap MK 00:00:00
    • 4. Start Xplico MK 00:00:00
    • 5. Ettercap and Xplico Attack MK 00:00:00
    • 6. Wireshack and Xplico MK 00:00:00
    • 7. DNS spoofing MK 00:00:00
    • 8. DNS Spoofing Attack MK 00:00:00
    • 1. Social Engineering Introduction MK 00:00:00
    • 2. Spoofed Email MK 00:00:00
    • 3. Social Engineering Toolkit 00:00:00
    • 4. Fixing Set Mk 00:00:00
    • 5. Credential Harvest MK 00:00:00
    • 6. Another SET Attack MK 00:00:00
    • 7. Another SET Attack 2 MK 00:00:00
    • 8. Meterpreter Session Mk 00:00:00
    • 1. Working With Exploits 00:12:00
    • Working With Exploits
    • 2. Metasploit Mk 00:00:00
    • 3. Post Attack Mk 00:00:00
    • 4. Armitage Mk 00:00:00
    • 5. Fixing Armitage MK 00:00:00
    • 6. Armitage in Action MK 00:00:00
    • 7. Different Armitage Usage Mk 00:00:00
    • 8. Armitage Example MK 00:00:00
    • 9. Network Penetration Using Armitage Mk 00:00:00
    • 1. Port Forwarding MK 00:00:00
    • 2. Hacking Remotely Demonstration MK 00:00:00
Site Design © HCI Communications Ltd. All rights reserved.