Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Course Curriculum

  • 1

    Virtual Network Lab Build

    • Start Here!

    • Create a Kali Image using Virtualbox

    • Lab - Creating an Virtual Install of Kali Using VirtualBox

    • Creating an Unattended Virtual Install of XP Using VirtualBox

    • Lab - Creating a virtual install of Windows XP Using Virtualbox

    • Troubleshooting connectivity with VMs

    • Create a Virtual install of Kali using VMWare

    • Create a Virtual Install of XP Using VMWare

  • 2

    Optimizing Kali

    • Install Kali Linux Tools Using Katoolin

    • Lab - Install Kali Linux Tools Using Katoolin

  • 3

    Anonymity - Remaining Anonymous While Hacking Online

    • Remaining Anonymous Online using TOR and Proxychains

    • Lab - Remaining Anonymous Online using TOR and Proxychains

    • Setup a free VPN Using Kali Linux

    • Lab - Setup a free VPN Using Kali Linux

    • Using anonsurf on Kali Linux to Stay Anonymous

    • Lab - Using anonsurf on Kali Linux to Stay Anonymous

  • 4

    Gathering Information - Open-source intelligence (OSINT)

    • Information Gathering Using Maltego CE

    • Lab - Information Gathering Using Maltego

    • Information Gathering Using Metagoofil

    • Lab – Information Gathering Using Metagoofil

  • 5

    NMap

    • Introduction to Nmap

    • Lab - Using the Nmap Scripting Engine (NSE)

    • Nmap Scripting Engine (NSE)

    • Lab - Introduction to Nmap

    • Scanning for WannaCry Ransomware

    • Lab Scanning for WannaCry Ransomware

  • 6

    Scanning for Vulnerabilities

    • Installing NESSUS Using Docker

    • Lab - Installing NESSUS Using Docker

    • Scanning for Vulnerabilities Using Nessus

    • Lab - Scanning for Vulnerabilities Using Nessus

    • Using Your Nessus Scan Results

    • Installing OpenVAS Using Docker

    • Lab - Installing OpenVAS Using Docker

    • Scanning for Vulnerabilities Using OpenVAS

    • Lab - Scanning for Vulnerabilities Using OpenVAS

  • 7

    Exploiting Windows XP

    • Using Metasploit to Launch a DOS Attack Against Windows XP

    • Lab- Using Metasploit to Launch a DOS Attack Against Windows XP

    • Establishing A VNC Shell Using Meterpreter

    • Lab - Establishing A VNC Shell Using Meterpreter

    • Using Meterpreter to Backdoor Windows XP

    • Lab - Using Meterpreter to backdoor Windows XP

  • 8

    NetCat

    • Server 2008 Buffer Overflow Attack Using Netcat

  • 9

    Exploiting Linux

    • Installing Metasploitable2 Using VirtualBox

    • Lab - Installing Metasploitable2 Using VirtualBox

    • Installing Metasploitable2 Using VMWare Player

    • Lab - Installing Metasploitable2 Using VMWare Player

    • Lab - Hacking Metasploitable 2

    • Lab - Exploring Endpoint Attacks

    • This is SPARTA!

    • Lab - This is SPARTA!

  • 10

    Social Engineering

    • Harvesting Credentials Using the SET Tool Kit

    • Lab - Harvesting Credentials Using the SET Tool Kit

  • 11

    Bash Scripting for Pentesters

    • Introduction to BASH Scripting

    • Creating a BASH Script for Scanning Vulnerable Ports

  • 12

    Password Cracking

    • Password Cracking Using Medusa

    • Password Cracking Using Mimikatz

  • 13

    Web Based Application Attacks

    • Installing w3af in Kali Linux

    • Conducting A Website Vulnerability Scan Using w3af

    • Performing a Browser Based Attack

    • SQL Injection Attack Using SQLmap

  • 14

    Browser Exploitation Framework (BeEF)

    • Configure Kali for Exploiting the WAN

    • The Browser Exploitation Framework (BeEF)

About the instructor

IT Manager

Eric Chu

A proven and experienced IT Manager, customer-focused and equipped with a technical background. I have over 8 years’ experience in IT Service Delivery Management and leading small to medium crossfunctional teams, and over 15 years of experience in IT Training and Sales.Through my passion for technology, science, and innovation, I have fostered extensive practical knowledge of emerging technologies, complex networks, and data centre eco-systems.I have had the opportunity to work across the Asia Pacific region as an experienced Business Development Manager and IT Project Manager delivering end to end solutions.

What others have been saying about this course:

Use your Call To Action description to encourage students to sign up for your course

You may also be interested in...