Hands-on: Complete Penetration Testing and Ethical Hacking!

Hands-on: Complete Penetration Testing and Ethical Hacking!

What you’ll learn
Setting Up The Laboratory
Install Kali Linux - a penetration testing operating system
Install Windows & vulnerable operating systems as virtual machines for testing
Discover vulnerable applications
Vulnerability scanning, Exploit, Post Exploit, Payload
Gain control over computer systems using server side attacks
Exploit vulnerabilities to gain control over systems
Gathering password hashes, cracking passwords, taking screenshots, logging keystrokes etc.
Using backdoors to persist on the victim machine
Information Gathering Over the Internet Tools
Web App Hacking Tools
Social Engineering Toolkit (SET) for Phishing
The very latest up-to-date information and methods

Are there any course requirements or prerequisites?
A strong desire to understand hacker tools and techniques
Be able to download and install all the free software and tools needed to practice
All items referenced in this course are Free
A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world

Who this course is for:
People who want to start from scratch and to move more advanced level
Leaders of incident handling teams
People who want to take their Hacking skills to the next level
People who are cyber security experts
People who want transition to Cyber Security
Incident handlers
System administrators who are on the front lines defending their systems and responding to attacks
Other security personnel who are first responders when systems come under attack