This Course is part of a Career Path: Become a Vulnerability Assessment Analyst

Course Content

Module 1: Linux

1.1 Linux (part 1)
1.2 Linux (part 2) Kali Linux Commands
1.3 Linux (part 3) - Directories, myfile and Nano
1.4 Linux (part 4) chmod, manipulation and packages
1.5 Linux (part 5) IP Addressing and netcat
1.6 Linux (part 6) Copy Commands and crontab

Module 2: Programming

2.1 Programming (part 1) Fundamentals for Pen Testers
2.2 Programming (part 2) Bash Scripting and If/Then Command
2.3 Programming (part 3) Network Pings
2.4 Programming (part 4) Python for Port Scanning
2.5 Programming (part 5) Python Import Command

Module 3: Metasploit

3.1 Metasploit (part 1) Introduction
3.2 Metasploit (part 2) Fundamentals
3.3 Metasploit (part 3) Operation
3.4 Metasploit (part 4) Auxiliary Module
3.5 Metasploit (part 5) msfcli
3.6 Metasploit (part 6) msfvenom

Module 4: Information Gathering

4.1 Information Gathering Intro (part 1)
4.2 Information Gathering (part 2) Domain Name Services
4.3 Information Gathering (part 3) Targeting Email and Maltego
4.4 Information Gathering (part 4) recon-ng and google operators
4.5 Information Gathering (part 5) NMAP and PortScanning

Module 5: Vulnerability Discovery/Scanning

5.1 Vulnerability Scanning Intro (part 1)
5.2 Vulnerability Scanning (part 2) Nessus
5.3 Vulnerability Scanning (part 3) Nmap Scripting Engine
5.4 Vulnerability Scanning (part 4) Metasploit
5.5 Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto
5.6 Vulnerability Scanning (part 6) Directory Transversals

Module 6: Traffic Capture

6.1 Traffic Capture Introduction (part 1)
6.2 Traffic Capture (part 2) Analyzing Network Protocol with Wireshark
6.3 Traffic Capture (part 3) Address Resolution Protocol ARP
6.4 Traffic Capture (part 4) DNS
6.5 Traffic Capture (part 5) ettercap
6.6 Traffic Capture (part 6) SSL Stripping

Module 7: Exploitation

7.1 Exploitation (part 1) Direct Exploitation
7.2 Exploitation (part 2) SQL Commands
7.3 Exploitation (part 3) Directory Traversal
7.4 Exploitation (part 4) Open Source Vulnerability
7.5 Exploitation (part 5) Using Backdoor to Access an FTP Server
7.6 Exploitation (part 6) Attaching to an IP Address

Module 8: Passwords

8.1 Passwords (part 1) Password Attacks
8.2 Passwords (part 2) Online Password Cracking
8.3 Passwords (part 3) Offline Password Attacks
8.4 Passwords (part 4) Using oclhashcat

Module 9: Advanced Exploitation

9.1 Advanced Exploitation (part 1) Introduction
9.2 Advanced Exploitation (part 2) Client Side Attacks
9.3 Advanced Exploitation (part 3) Exploiting Java
9.4 Advanced Exploitation (part 4) Social Engineering
9.5 Advanced Exploitation (part 5) Bypassing Antivirus Software

Module 10: Post Exploitation

10.1 Post Exploitation (part 1) File Transfer without and Interactive Shell
10.2 Post Exploitation (part 2) Exploit Development
10.3 Post Exploitation (part 3) Pivoting
10.4 Post Exploitation (part 4) Setting Up a Domain Controller

Module 11: WebApps

11.1 WebApp Introduction (part 1) Web App Testing
11.2 WebApp (part 2) Vulnerable Web Applications
11.3 WebApp (part 3) SQL Injection
11.4 WebApp (part 4) File Inclusion
11.5 WebApp (part 5) Cross Site Scripting XSS

Module 12: Exploit Development

12.1 Exploit Development Introduction (part 1)
12.2 Exploit Development (part 2) A Program in Memory
12.3 Exploit Development (part 3) Stack Frame for Function
12.4 Exploit Development (part 4) GNU Compilers
12.5 Exploit Development (part 5) Python
12.6 Exploit Development (part 6) Executing Unintended Code
12.7 Exploit Development (part 7) Network Based Exploits and Debuggers
12.8 Exploit Development (part 8) Creating a Cyclic Pattern
12.9 Exploit Development (part 9) Verifying Offsets
12.10 Exploit Development (part 10) Creating Shell Code in Kali Linux
12.11 Exploit Development (part 11) Fuzzing
12.12 Exploit Development (part 12) Public Exploits and Perl
12.13 Exploit Development (part 13) Turning a 3Com Exploit into a Metasploit Module
12.14 Exploit Development (part 14) Structured Exception Handler Over-Write

Module 13: Smartphone Pentest Framework

13.1 SPF Introduction (part 1)
13.2 SPF (part 2) Attach to Smartphone Based Apps
13.3 SPF (part 3) Turning an Android App into a SPF Agent
13.4 SPF (part 4) Functionality for Agents
13.5 SPF (part 5) Pentesting Mobile Devices

Course Description

Those [who] continuously acquire new and better forms of knowledge that they can apply to their work and to their lives will be the movers and shakers in our society for the indefinite future." - Brian Tracy

Penetration testing is one of the most in-demand skill sets right now. There are more jobs that require advanced level hacking then there are people who have the ability to fill them. No one should be restricted from learning, and this class is a really great one.

Let Penetration Testing and Hacking Subject Matter Expert, published Author, and industry event speaker, Georgia Weidman teach you advanced penetration testing.

About the Free Online Advanced Penetration Testing Training

Aggressive systems require aggressive hackers. Advanced Penetration Testing training embodies that notion. It's an intense approach to the world of exploitation and pentesting set in the highest security environments around. In our online Advanced Penetration Testing training class, you'll learn how to challenge traditional practices and use alternate methods and software in penetration testing. Cover how to attack from the web using cross-site scripting, SQL injection attacks, remote and local file inclusion and how to understand the defender of the network you're breaking into to. You'll also learn new tricks for exploiting a network and the post-exploitation process---how to backdoor SSH logins, enable RDP/VNC and additional data exfiltration techniques. It's a headfirst dive into the world of advanced pentesting, and there are no life jackets---only binaries.

CEU / CPE: 20

Total Clock Hours: 14 hrs, 36 mins

Get a Certificate of Completion

If you enjoy this course, be sure to learn what to do after you have made it inside the target, in our free Post Exploitation Hacking class!

What Is Involved in the Advanced Penetration Testing Course?

This course provides an intense approach to penetration testing in high security environments. You will learn to exploit networks using various methods, including SQL injection attacks, cross-site scripting, and local and remote file inclusion, while gaining the knowledge to understand the defender of the network you are penetrating. Unethical hackers are becoming more devious and cunning than ever before. They are also becoming smarter and savvier when it comes to technology. That means that advanced level ethical hackers are needed to stay ahead of them. In our Advanced Penetration Testing course, you will learn to attack as the bad guys do to help create more secure networks and systems for high security environments. The course also covers the post-exploitation process, including how to enable RDP/VNC, backdoor SSH logins, and other data exfiltration techniques. The Advanced Penetration Testing course had a total clock time of 14 hrs. and 36 mins. and you will receive a certificate of completion upon finishing the course. Georgia Weidman, penetration testing and hacking subject matter expert, author, and well-known industry event speaker, will teach you everything you need to know in this free course!

Are There Prerequisites for the Advanced Penetration Testing Training?

While there are no prerequisites for this course, it is primarily designed for network penetration testers who are looking for more advanced level tricks that will help them better protect high security organizations. It's recommended that students are familiar with IT security best practices and have a working knowledge of TCP/IP and common web technologies: - Basic Windows administration for servers and workstations - Basic Linux/*NIX system administration skill - Basic command line proficiency on both Windows and *NIX systems They should also be familiar with the following languages: - HTTP - HTML - Javascript - ASP - PHP - SQL

What Does a Penetration Tester Do?

Advanced penetration testers are often the IT professionals who identify gaps in network security, system security, and employee training and knowledge, and then provide suggestions for how to resolve those vulnerabilities in high security organizations. Penetration testers are considered essential personnel in environments with a proactive cyber security strategy. Advanced penetration testers use the same methods of a cyber attacker to prevent attempts at attacks. Just as a criminal hacker takes a high-level look at an organization's technical landscape to determine how to proceed with an attack, penetration testers investigate the complexities of the infrastructure to identify attacks before they happen. Because penetration testers use the same tools and strategies that criminal attackers use to identify vulnerabilities, they are able to uncover the areas within systems, networks, and applications that are most at risk for attack.

Why Take the Advanced Penetration Testing Course?

Cybercrime is rampant – it considered one of the world's fastest growing threats. In fact, nearly one-third of companies worldwide report that they have suffered from cyberattacks. To combat the ever-rising threat of cyberattacks, more organizations are working to develop strategies to fight and prevent these attacks. As a result, the cyber security job market is thriving. It is no longer sufficient to deal with attacks as they happen, companies need individuals to perform penetration testing proactively to thwart hackers and cyber criminals. Taking the Advanced Penetration Testing class will prepare you to enter a field where you will be in-demand, making both your salary and your opportunity for advancement greater than they are in other industries. If you have a passion for information technology and you want to be a white-hat hacker, this is definitely the course for you. Do you know someone who could benefit from this training class? Email them an invite and they can join you, and you earn cybytes!

Instructed By

Instructor Profile Image
Georgia Weidman
Founder and CTO at Shevirah and Bulb Security

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Advanced Penetration Testing Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.