Course Content

Module 1: Linux

00:49
1.1 Linux (part 1)
13:48
1.2 Linux (part 2) Kali Linux Commands
13:10
1.3 Linux (part 3) - Directories, myfile and Nano
14:40
1.4 Linux (part 4) chmod, manipulation and packages
15:40
1.5 Linux (part 5) IP Addressing and netcat
05:26
1.6 Linux (part 6) Copy Commands and crontab

Module 2: Programming

00:51
2.1 Programming (part 1) Fundamentals for Pen Testers
10:02
2.2 Programming (part 2) Bash Scripting and If/Then Command
09:26
2.3 Programming (part 3) Network Pings
13:16
2.4 Programming (part 4) Python for Port Scanning
11:10
2.5 Programming (part 5) Python Import Command

Module 3: Metasploit

00:59
3.1 Metasploit (part 1) Introduction
14:47
3.2 Metasploit (part 2) Fundamentals
24:17
3.3 Metasploit (part 3) Operation
05:27
3.4 Metasploit (part 4) Auxiliary Module
09:40
3.5 Metasploit (part 5) msfcli
14:40
3.6 Metasploit (part 6) msfvenom

Module 4: Information Gathering

00:47
4.1 Information Gathering Intro (part 1)
15:03
4.2 Information Gathering (part 2) Domain Name Services
17:58
4.3 Information Gathering (part 3) Targeting Email and Maltego
06:00
4.4 Information Gathering (part 4) recon-ng and google operators
29:53
4.5 Information Gathering (part 5) NMAP and PortScanning

Module 5: Vulnerability Discovery/Scanning

00:27
5.1 Vulnerability Scanning Intro (part 1)
17:03
5.2 Vulnerability Scanning (part 2) Nessus
11:33
5.3 Vulnerability Scanning (part 3) Nmap Scripting Engine
09:31
5.4 Vulnerability Scanning (part 4) Metasploit
14:19
5.5 Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto
08:00
5.6 Vulnerability Scanning (part 6) Directory Transversals

Module 6: Traffic Capture

00:43
6.1 Traffic Capture Introduction (part 1)
07:52
6.2 Traffic Capture (part 2) Analyzing Network Protocol with Wireshark
11:54
6.3 Traffic Capture (part 3) Address Resolution Protocol ARP
05:11
6.4 Traffic Capture (part 4) DNS
11:12
6.5 Traffic Capture (part 5) ettercap
09:37
6.6 Traffic Capture (part 6) SSL Stripping

Module 7: Exploitation

16:34
7.1 Exploitation (part 1) Direct Exploitation
14:26
7.2 Exploitation (part 2) SQL Commands
06:49
7.3 Exploitation (part 3) Directory Traversal
06:30
7.4 Exploitation (part 4) Open Source Vulnerability
06:18
7.5 Exploitation (part 5) Using Backdoor to Access an FTP Server
06:07
7.6 Exploitation (part 6) Attaching to an IP Address

Module 8: Passwords

12:11
8.1 Passwords (part 1) Password Attacks
05:28
8.2 Passwords (part 2) Online Password Cracking
12:25
8.3 Passwords (part 3) Offline Password Attacks
17:28
8.4 Passwords (part 4) Using oclhashcat

Module 9: Advanced Exploitation

00:42
9.1 Advanced Exploitation (part 1) Introduction
11:09
9.2 Advanced Exploitation (part 2) Client Side Attacks
06:59
9.3 Advanced Exploitation (part 3) Exploiting Java
23:08
9.4 Advanced Exploitation (part 4) Social Engineering
18:56
9.5 Advanced Exploitation (part 5) Bypassing Antivirus Software

Module 10: Post Exploitation

20:36
10.1 Post Exploitation (part 1) File Transfer without and Interactive Shell
17:16
10.2 Post Exploitation (part 2) Exploit Development
08:24
10.3 Post Exploitation (part 3) Pivoting
13:13
10.4 Post Exploitation (part 4) Setting Up a Domain Controller

Module 11: WebApps

01:03
11.1 WebApp Introduction (part 1) Web App Testing
11:41
11.2 WebApp (part 2) Vulnerable Web Applications
14:31
11.3 WebApp (part 3) SQL Injection
07:19
11.4 WebApp (part 4) File Inclusion
08:22
11.5 WebApp (part 5) Cross Site Scripting XSS

Module 12: Exploit Development

00:52
12.1 Exploit Development Introduction (part 1)
10:42
12.2 Exploit Development (part 2) A Program in Memory
05:55
12.3 Exploit Development (part 3) Stack Frame for Function
19:35
12.4 Exploit Development (part 4) GNU Compilers
08:21
12.5 Exploit Development (part 5) Python
14:10
12.6 Exploit Development (part 6) Executing Unintended Code
15:13
12.7 Exploit Development (part 7) Network Based Exploits and Debuggers
17:02
12.8 Exploit Development (part 8) Creating a Cyclic Pattern
17:22
12.9 Exploit Development (part 9) Verifying Offsets
16:25
12.10 Exploit Development (part 10) Creating Shell Code in Kali Linux
17:43
12.11 Exploit Development (part 11) Fuzzing
12:51
12.12 Exploit Development (part 12) Public Exploits and Perl
16:17
12.13 Exploit Development (part 13) Turning a 3Com Exploit into a Metasploit Module
34:02
12.14 Exploit Development (part 14) Structured Exception Handler Over-Write

Module 13: Smartphone Pentest Framework

01:09
13.1 SPF Introduction (part 1)
03:58
13.2 SPF (part 2) Attach to Smartphone Based Apps
08:22
13.3 SPF (part 3) Turning an Android App into a SPF Agent
08:57
13.4 SPF (part 4) Functionality for Agents
14:23
13.5 SPF (part 5) Pentesting Mobile Devices

Course Description

Those [who] continuously acquire new and better forms of knowledge that they can apply to their work and to their lives will be the movers and shakers in our society for the indefinite future." - Brian Tracy

Penetration testing is one of the most in-demand skill sets right now. There are more jobs that require advanced level hacking then there are people who have the ability to fill them. No one should be restricted from learning, and this class is a really great one.

Let Penetration Testing and Hacking Subject Matter Expert, published Author, and industry event speaker, Georgia Weidman teach you advanced penetration testing.

About the Free Online Advanced Penetration Testing Training


Aggressive systems require aggressive hackers. Advanced Penetration Testing training embodies that notion. It's an intense approach to the world of exploitation and pentesting set in the highest security environments around. In our online Advanced Penetration Testing training class, you'll learn how to challenge traditional practices and use alternate methods and software in penetration testing. Cover how to attack from the web using cross-site scripting, SQL injection attacks, remote and local file inclusion and how to understand the defender of the network you're breaking into to. You'll also learn new tricks for exploiting a network and the post-exploitation process---how to backdoor SSH logins, enable RDP/VNC and additional data exfiltration techniques. It's a headfirst dive into the world of advanced pentesting, and there are no life jackets---only binaries.

CEU / CPE: 20

Total Clock Hours: 14 hrs, 36 mins

Get a Certificate of Completion

If you enjoy this course, be sure to learn what to do after you have made it inside the target, in our free Post Exploitation Hacking class!

What Is Involved in the Advanced Penetration Testing Course?

This course provides an intense approach to penetration testing in high security environments. You will learn to exploit networks using various methods, including SQL injection attacks, cross-site scripting, and local and remote file inclusion, while gaining the knowledge to understand the defender of the network you are penetrating. Unethical hackers are becoming more devious and cunning than ever before. They are also becoming smarter and savvier when it comes to technology. That means that advanced level ethical hackers are needed to stay ahead of them. In our Advanced Penetration Testing course, you will learn to attack as the bad guys do to help create more secure networks and systems for high security environments. The course also covers the post-exploitation process, including how to enable RDP/VNC, backdoor SSH logins, and other data exfiltration techniques. The Advanced Penetration Testing course had a total clock time of 14 hrs. and 36 mins. and you will receive a certificate of completion upon finishing the course. Georgia Weidman, penetration testing and hacking subject matter expert, author, and well-known industry event speaker, will teach you everything you need to know in this free course!

Are There Prerequisites for the Advanced Penetration Testing Training?

While there are no prerequisites for this course, it is primarily designed for network penetration testers who are looking for more advanced level tricks that will help them better protect high security organizations. It's recommended that students are familiar with IT security best practices and have a working knowledge of TCP/IP and common web technologies: - Basic Windows administration for servers and workstations - Basic Linux/*NIX system administration skill - Basic command line proficiency on both Windows and *NIX systems They should also be familiar with the following languages: - HTTP - HTML - Javascript - ASP - PHP - SQL

What Does a Penetration Tester Do?

Advanced penetration testers are often the IT professionals who identify gaps in network security, system security, and employee training and knowledge, and then provide suggestions for how to resolve those vulnerabilities in high security organizations. Penetration testers are considered essential personnel in environments with a proactive cyber security strategy. Advanced penetration testers use the same methods of a cyber attacker to prevent attempts at attacks. Just as a criminal hacker takes a high-level look at an organization's technical landscape to determine how to proceed with an attack, penetration testers investigate the complexities of the infrastructure to identify attacks before they happen. Because penetration testers use the same tools and strategies that criminal attackers use to identify vulnerabilities, they are able to uncover the areas within systems, networks, and applications that are most at risk for attack.

Why Take the Advanced Penetration Testing Course?

Cybercrime is rampant – it considered one of the world's fastest growing threats. In fact, nearly one-third of companies worldwide report that they have suffered from cyberattacks. To combat the ever-rising threat of cyberattacks, more organizations are working to develop strategies to fight and prevent these attacks. As a result, the cyber security job market is thriving. It is no longer sufficient to deal with attacks as they happen, companies need individuals to perform penetration testing proactively to thwart hackers and cyber criminals. Taking the Advanced Penetration Testing class will prepare you to enter a field where you will be in-demand, making both your salary and your opportunity for advancement greater than they are in other industries. If you have a passion for information technology and you want to be a white-hat hacker, this is definitely the course for you. Do you know someone who could benefit from this training class? Email them an invite and they can join you, and you earn cybytes!

Instructed By

Instructor Profile Image
Georgia Weidman
Instructor

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Advanced Penetration Testing Certificate of Completion