Penetration Testing for beginners (Hands-on)

Learn practical skills for penetration testing & ethical hacking using kali Linux! and start your cybersecurity career

Ratings 5.00 / 5.00
Penetration Testing for beginners (Hands-on)

What You Will Learn!

  • Learn how to exploit/hack Windows/Linux/Android and their services
  • Learn how to become Penetration Tester
  • Learn how to do ethical hacking
  • Learn how to gain access by exploiting vulnerabilities and weaknesses
  • Learn what is Penetration Testing
  • Learn why perform a Penetration Test?
  • Learn basic terms used in penetration testing
  • Learn difference between Vulnerability Assessments vs Penetration Test
  • Learn types of Penetration Testing based on knowledge of the target, the position of tester and where it is performed
  • Learn how to Create Penetration Testing Lab Setup | Lab Environment
  • Install VirtualBox - Lab Setup
  • Install Kali Linux - Lab Setup
  • Install Metasploitable2 - Lab Setup
  • Install Windows - Lab Setup
  • Learn basic commands - Linux for Beginners | Lab
  • Learn what is Reconnaissance and Planning
  • What is Passive Reconnaissance | Lab
  • Whois and domain information | Lab
  • Email harvesting | Lab
  • Website source code and Website mirroring | Lab
  • Find Social Media accounts | Lab
  • Information gathering through Job posting and Resumes | Lab
  • How to identify Web Application Firewall | Lab
  • What is OSINT Framework
  • Learn Scanning and Discovery
  • What is Active Reconnaissance
  • TCP 3-Way Handshake and TCP Flags
  • Active Reconnaissance -Tools
  • NMAP LAB over the internet | Lab
  • NMAP LAB on Local Network | Lab
  • NMAP LAB -Vulnerability scanning using scripts | Lab
  • Learn what is Exploitation and Hacking
  • Exploiting/Hacking FTP | Lab
  • Exploiting/Hacking SSH | Lab
  • Exploiting/Hacking Telnet 23 | Lab
  • Exploiting/Hacking SMTP Port 25 | Lab
  • Exploiting/Hacking HTTP Port 80 | Lab
  • Exploiting/Hacking SMB 139 and 445 | Lab
  • Exploiting/Hacking BindShell Port 1524 | Lab
  • Exploiting/Hacking MySQL port 3306 | Lab
  • Exploiting/Hacking VNC port 5900 | Lab
  • Exploiting/Hacking Tomcat port 8180 | Lab
  • Exploiting/Hacking Windows 10 | Lab
  • Learn how to reset windows password without knowing | Lab
  • Exploiting/Hacking Linux | Kali Linux - Linux | Lab
  • How password cracking works
  • Learn how to Maintaining Access
  • How to create backdoor for Windows | Lab
  • How to hack any Android Phone | Lab
  • how to know any phone location
  • Learn how to clear tracks/logs
  • Clearing Tracks on Windows | Lab
  • Clearing Tracks on Linux | Lab
  • Learn how to Generation report with impact and remediation
  • many more kali Linux tools | Lab

Description

Welcome to the Penetration Testing for Beginners course!

Penetration testing skills make you a more marketable IT tech. In this course, I am going to show you the basics of Penetration Testing/hacking which will support you to start by yourself to develop your Penetration Testing/hacking skills to an advanced level. This course considers you have No prior knowledge in Penetration Testing/hacking. This course will take you from a beginner to a more advanced level with hands-on examples. and by the end of this course, you'll be able to hack any system like Windows/Linux/Android and become an expert ethical hacker and keep yourself secured like Information security experts!

Penetration testing is also known as pen testing or ethical hacking. It describes the intentional launching of simulated cyberattacks that seek out exploitable vulnerabilities in computer systems, networks, websites, and applications. This course is practical but it will not ignore the theory. We will start with Kali Linux basics, then will try to make you comfortable with the Linux environment. Then we will learn how to install the needed software (VirtualBox, Kali Linux, Metasploitable2, Windows 10) as virtual machines then we will start the Penetration Testing/hacking with the complete Penetration testing process from Information gathering to exploitation, maintaining access to clearing logs and Final report generation with impact and remediation.


Note: This course is created for educational purposes and all the information learned should be used when the attacker is authorized. all the attacks are launched in my own lab or against systems that I have permission to test.


What you’ll learn

What is Penetration Testing

Why perform a Penetration Test?

Need to know basic terms

Difference between Vulnerability Assessments vs Penetration Test

Types of Penetration Testing

Based on knowledge of the target

Based on the position of tester

Based on where it is performed

Penetration Testing Process steps

How to create Penetration Testing Lab Setup | Lab Environment

How to Create Penetration Testing Environment - Lab Setup

How to Install VirtualBox - Lab Setup

How to Install Kali Linux - Lab Setup

How to Install Metasploitable2 - Lab Setup

How to Install Windows - Lab Setup

Basic commands - Linux for Beginners | Practical Labs

Learn basic commands - Linux for Beginners | Lab

Reconnaissance and Planning | Penetration Testing | Practical Labs

Introduction to Reconnaissance and Planning

What is Passive Reconnaissance | Lab

Whois and domain information | Lab

Email harvesting | Lab

Website source code and Website mirroring | Lab

Find Social Media accounts - Information gathering | Lab

Information gathering through Job posting and Resumes | Lab

How to identify Web Application Firewall | Lab

OSINT Framework

Scanning and Discovery | Penetration Testing | Practical Labs

What is Active Reconnaissance

TCP 3-Way Handshake and TCP Flags

Active Reconnaissance -Tools

Active Reconnaissance -LAB Scenario

NMAP LAB over the internet | Lab

NMAP LAB on Local Network | Lab

NMAP LAB -Vulnerability scanning using scripts | Lab

Exploitation | Penetration Testing | Practical Labs

Exploiting FTP Port 21 | Kali Linux - Metasploitable2 | Lab

Exploiting SSH 22 | Kali Linux - Metasploitable2 | Lab

Exploiting Telnet 23 | Kali Linux - Metasploitable2 | Lab

Exploiting SMTP Port 25 | Kali Linux - Metasploitable2 | Lab

Exploiting HTTP Port 80 | Kali Linux - Metasploitable2 | Lab

Exploiting SMB 139 and 445 | Kali Linux - Metasploitable2 | Lab

Exploiting BindShell Port 1524 | Kali Linux - Metasploitable2 | Lab

Exploiting MySQL port 3306 | Kali Linux - Metasploitable2 | Lab

Exploiting VNC port 5900 | Kali Linux - Metasploitable2 | Lab

Exploiting Tomcat port 8180 | Kali Linux - Metasploitable2 | Lab

Exploiting Windows 10 | Kali Linux - Windows | Lab

Exploiting Linux | Kali Linux - Linux | Lab

Maintaining Access | Penetration Testing | Practical Labs

Maintaining Access

How to create backdoor for Windows | Kali Linux - Windows | Lab

How to hack any Android Phone | Kali Linux - Android | Lab

Clearing Tracks | Penetration Testing | Practical Labs

How to clear tracks

Clearing Tracks on Windows | Lab

Clearing Tracks on Linux | Lab

Report Generation | Penetration Testing

Report Generation with impact and remediation

Who Should Attend!

  • Anyone loves hacking
  • Hackers
  • Penetration testers
  • Ethical hackers

TAKE THIS COURSE

Tags

  • Ethical Hacking

Subscribers

179

Lectures

50

TAKE THIS COURSE



Related Courses