Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Penetration Testing Web Hacking
Section 1: Introduction
How to Use LMS & Start Learning? (6:19)
1 : Introduction to Penetration Testing for Beginners Course (3:32)
2 : What is Penetration Testing (2:31)
3 : Why perform a Penetration Test- (3:38)
4 : Need to know basic terms (3:29)
5 : Vulnerability Assessments vs Penetration Test (2:10)
Assessment Exercise- 01
Section 2: Types of Penetration and Penetration Testing Process
6 : knowledge of the target (4:21)
7 : Penetration testing types based on the position of tester (2:56)
8 : Penetration Testing Process (9:37)
Assessment Exercise- 02
Section 3: How to create Penetration Testing Lab Setup Lab Environment and Basic commands
9 : How to Create Penetration Testing Lab Setup (12:14)
10 : How to Install VirtualBox - Lab Setup for Penetration Testingv (6:29)
11 : How to Install Kali Linux - Lab Setup for Penetration Testing (12:53)
12 : How to Install Metasploitable2 - Lab Setup for Penetration Testing (7:30)
13 : How to Install Windows - Lab Setup for Penetration Testing (6:39)
14 : Learn basic commands - Linux for Beginners (34:34)
Assessment Exercise- 03
Section 4: Reconnaissance and Planning - Penetration Testing
15 : Introduction to Reconnaissance and Planning (3:07)
16 : Passive Reconnaissance (3:26)
17 : Whois and domain information (21:29)
18 : Email harvesting (6:38)
19 : Website source code and Website mirroring (5:37)
20 : Find Social Media accounts Information gathering (10:27)
21 : Information gathering through Job posting and Resumes (5:00)
22 : How to identify Web Application Firewall (2:09)
23 : OSINT Framework (5:21)
Assessment Exercise- 04
Section 5: Scanning and Discovery - Penetration Testing
24 : What is Active Reconnaissance (4:04)
25 : TCP 3 Way Handshake and TCP Flags (5:34)
26 : Active Reconnaissance Tools (1:17)
27 : Active Reconnaissance LAB Scenario (2:10)
28 : NMAP LAB over the internet1 (10:57)
29 : NMAP LAB on Local Network (21:23)
30 : NMAP LAB Vulnerability scanning using scripts (10:29)
Assessment Exercise- 05
Section 6: Exploitation - Penetration Testing
31 : Exploiting FTP Port 21 Kali Linux Metasploitable2 Lab (16:25)
32 : Exploiting SSH 22 Kali Linux Metasploitable2 Lab (17:40)
33 : Exploiting Telnet 23 Kali Linux Metasploitable2 Lab (16:54)
34 : Exploiting SMTP Port 25 Kali Linux Metasploitable2 Lab (12:02)
35 : Exploiting HTTP Port 80 Kali Linux Metasploitable2 Lab (19:00)
36 : Exploiting SMB 139 and 445 Kali Linux Metasploitable2 Lab (15:38)
37 : Exploiting BindShell Port 1524 Kali Linux Metasploitable2 Lab (6:29)
38 : Exploiting MySQL port 3306 Kali Linux Metasploitable2 Lab (16:02)
39 : Exploiting VNC port 5900 Kali Linux Metasploitable2 Lab (16:32)
40 : Exploiting Tomcat port 8180 Kali Linux Metasploitable2 Lab (15:51)
41 : Exploiting Windows 10 Kali Linux Windows Lab (22:37)
42 : Exploiting Linux Kali Linux Linux Lab (36:18)
Assessment Exercise- 06
Section 7: Maintaining Access Penetration Testing
43 : Maintaining Access (7:28)
44 : How to create backdoor for Windows Kali Linux Windows Lab (18:17)
45 : How to hack any Android Phone Kali Linux Android Lab (14:32)
Assessment Exercise- 07
Section 8: Clearing Tracks and Report Generation - Penetration Testing
46 : How to clear tracks (4:16)
47 : Clearing Tracks on Windows (13:02)
48 : Clearing Tracks on Linux (7:27)
49 : Report Generation (13:28)
Assessment Exercise- 08
Section 9:Final Exam
Final Exam
44 : How to create backdoor for Windows Kali Linux Windows Lab
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock