Brief Summary
This advanced course dives deep into ethical hacking, focusing on advanced techniques for securing networks and websites. You'll explore tools like Dradis, Metasploit, and Burp Suite, while learning vital skills like stealth scanning and fuzzing to find and fix vulnerabilities.
Key Points
-
Advanced techniques in ethical hacking
-
Using Dradis for information gathering
-
Stealth and data scanning methods
-
Utilizing Metasploit for penetration testing
-
Web testing with Burp Suite
-
Understanding reverse engineering and fuzzing
Learning Outcomes
-
Gain expertise in advanced penetration testing techniques
-
Learn to use essential hacking tools like Metasploit and Burp Suite
-
Understand scanning methods and their applications
-
Get hands-on experience with reverse engineering and fuzzing
-
Develop skills to secure networks and detect vulnerabilities
About This Course
Learn how to test and protect your network using Ethical Hacking and Penetration Testing Techniques.
In this Advanced White Hat Hacking And Penetration Testing training course, Infinite Skills takes you beyond the basics of Ethical Hacking and shows you advanced techniques for discovering potential security problems with your websites and networks. This course requires that you already have familiarity with the basics of penetration testing, and assumes that you have already completed the Learning White Hat Hacking And Penetration Testing course from Infinite Skills.
The course jumps right into the nitty gritty with a chapter about using Dradis. You will learn about scanning, including stealth scanning, data acquisition using various methods, and advanced ways to utilize Metasploit. In this Ethical Hacking tutorial you also learn how to use Burp Suite to do web testing, what reverse engineering is and how to use it, and finally, Ric covers fuzzing with Peach.
Once you have completed this training course on Advanced White Hat Hacking And Penetration Testing, you will have an in-depth understanding of how to test networks and websites for potential exploits for the purpose of securing them. You will also know how to use the tools and software that you will need to perform and analyze this testing.
This White Hat Hacking course follows on from our Beginners White Hat Hacking Course
Learn How To Test For And Protect Your Network From Hackers
Build Robust Networks That Can Withstand Penetration From Unauthorized Access
Learn How To Defeat Hackers And Secure Your Hardware From Attack
Andrea S.
The author mentions "Advanced" but the concepts covered are pretty basic. Some trivial demos on how to use tools without actually getting into the details of pentesting. I would have expected less overviews and more deep dives to be honest, given the title of the course.