Complete White Hat Hacking & Penetration Testing Bundle

70167b10d694a94eb578edf7162ab25e9c0be06d main hero image

Network Penetration Tester – Build a $120K/Year Career

Learn to Think Like a Hacker & Protect Networks Before It’s Too Late

    More and more companies are realizing that white hat hackers are essential to the safety of their data and networks. Exploit this desperate need by becoming a white hat hacker yourself, and finally getting the salary of your dreams. This course is the perfect introduction to the skills every white hat hacker needs to succeed. From hacking techniques and penetration testing to cryptography, you’ll gain the knowledge to protect any computer or network by course’s end.

    • Learn to think like a hacker in order to protect networks w/ over 36 lectures & 5 hours of content
    • Study hacking tools, methodologies & techniques
    • Follow along w/ real-life situational labs based on real environments.
    • Practice w/ included target virtual machines
    • Understand how to scan networks & exploit their vulnerabilities
    • Study system hacking, sniffing, Trojans, Backdoors, Viruses & Worms, cryptography, and more
    • Perform attacks using Metasploit
    • Learn how to perform penetration testing

    Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

    For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

    • Length of time users can access this course: lifetime
    • Access options: web streaming, mobile streaming
    • Certification of completion not included
    • Redemption deadline: redeem your code within 30 days of purchase
    • Experience level required: all levels
    • Basic IT skills suggested
    • Basic knowledge of Linux and/or Windows
    • Internet required

    Course Outline

    • Introduction to Ethical Hacking. Footprinting and Reconnaissance
      • Introduction
      • Introduction to Ethical Hacking. Footprinting and Reconnaissance
      • Demo – Information Gathering using Google Dorks and DNS Queris
      • Demo – Scanning and Enumeration
      • Do it yourself – Information Gathering Exercise
    • Scanning Networks, Enumeration and Discovering Vulnearbilities
      • Scanning and enumeration
      • Vulnerabilties Identification
      • Demo – Installing Nessus Scanner
      • Demo – Use Nessus to Discover Vulnerabilities
      • Demo – Using Nikto to discover Web Vulnerabilities
      • Demo – Using Paros for Vulnerability Discovery
      • Demo – Use Dirbuster to brute force sub-directories and filenames
      • Do it yourself – Scanning and enumeration, Vulnerability Discovery Exercise
    • System Hacking and Vulnerability Exploitation
      • System hacking – vulnerability exploitation
      • Passwords
      • Authentication
    • Sniffing
      • Sniffing
      • Man in the Middle over Wireless or Wired Networks
      • Capturing HTTPS traffic over MITM). Get Gmail and Facebook passwords
    • Metasploit
      • Metasploit
      • Demo – Exploiting FTP Server Vulnerability using Metasploit
      • Demo – Post Exploitation Example
      • Demo – Exploiting NFS Vulnerability and exporting SSH Keys to the Victim PC
      • Demo – Eploiting Samba Service on Linux using Metasploit
      • Do it yourself – Vulnerability Exploitation using Metasploit Exercise
    • Trojans, Backdoors, Viruses and Worms
      • Trojans and Backdoors
      • Computer viruses and worms
    • Cryptography
      • Cryptography concepts
      • Cryptographic Algorithms
      • Cryptography and cryptanalysis tools. Cryptography attacks
      • Demo – Hack SSH passwords using Medusa
      • Hack the SSH Password using Hydra
      • Hack Linux Passwords using John the Ripper
      • Do it yourself – Passwords Protection Exercise
    • Penetration Testing on Wireless Networks
      • Penetration Testing on Wireless Networks
      • Do it yourself – WiFi Networks Security – practical approach
      • Case Study – Windows Hosted Network Bug or Feature
    • Penetration Testing Overview. Final words
      • Penetration Testing Overview. Final Words

    3bf3f6f4e4227a136f7da05fd6a6e06e257e2dd4 main hero image

    Basics of VMWare vSphere & ESXi Virtualization Software

    Gain the Knowledge to Create & Maintain a Virtual Infrastructure

      Any modern day network and security professional is obligated to be well-versed in cloud technology. This course will get you up to speed on virtualization and cloud technology, and even teach you to set up and maintain a virtual system from scratch. With this knowledge, you’ll be equipped to host anything from a few to hundreds of machines (even with varying operating systems) in one single infrastructure.

      • Get introduced to virtualization & cloud computing technology w/ over 24 lectures & 2.5 hours of content
      • Host hundreds of virtual machines running various operating systems
      • Link machines together in a virtual network or cloud infrastructure
      • Create a virtual system using the VMware VSphere environment
      • Understand, design & deploy a virtual system w/ ease
      • Learn to instal, deploy, manage & maintain a virtual system

      Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

      For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

      • Length of time users can access this course: lifetime
      • Access options: web streaming, mobile streaming
      • Certification of completion not included
      • Redemption deadline: redeem your code within 30 days of purchase
      • Experience level required: all levels

      Course Outline

      • Build your own cloud using VMware virtualization software
        • Introduction
        • What to expect from this course (0:40)
        • What is virtualisation and how it works (1:28)
        • VMware ESXi hypervisor. Get your own copy of Vmware ESXi (2:45)
        • Hardware compatibly list
        • Installing Vmware ESXi
        • Introduction to Vmware vSphere Client
        • Basics of vSphere Client
        • Creating and Cloning Virtual Machines
        • Network Virtualization
        • Converting already existing Servers to Virtual Machines – VMware Converter
        • Resource Pools
        • Installing the second ESXi Host
        • Basics of vCenter (1:26)
        • Installing vCenter
        • Manage ESXi using vCenter
        • Introduction to Storage Area Network and Openfiler (3:41)
        • Connecting to Shared Storage
        • Installing and Configuring Openfiler
        • Performance and Events Monitoring
        • Virtualization benefits: vMotion
        • Introduction to High Availability in Vmware
        • Mange vCenter trough Browser (1:58)
        • Final words (0:18)

      26af982bd891754ea8adbf9561b6ae2b9f3c042b main hero image

      How to Build a $120,000/Year Career as a Web Penetration Tester

      Pinpoint Network Vulnerabilities in Order to Prevent Attacks by Hackers

        If you’re looking to build a career in security, there’s no better place to focus your efforts than penetration testing. By understanding the vulnerabilities and dangers presented by your network’s structure, you’ll learn how to remedy these gaps and save your company from major security breeches.

        • Master ethical hacking techniques used in penetration systems w/ over 22 lectures & 5.5 hours of content
        • Learn the basic methods for penetration testing of a web application
        • Go step-by-step through the entire penetration testing process
        • Control remote servers
        • Practice finding vulnerabilities in apps
        • Learn to gain information on potential targets
        • Study various attack types: authentication, session management, access controls, data stores, etc.

        Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

        For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

        • Length of time users can access this course: lifetime
        • Access options: web streaming, mobile streaming
        • Certification of completion not included
        • Redemption deadline: redeem your code within 30 days of purchase
        • Experience level required: all levels
        • Basic IT skills suggested
        • Basic knowledge of Linux and/or Windows
        • Internet required

        Course Outline

        • Why Web Security?
          • Introduction
          • Core Problems – Why Web Security
          • Web Technologies
          • Preparing the Lab Environment
        • Mapping the Web Application. User and Password Brute-Forcing
          • What Web Application Mapping Means
          • Usernames and Passwords Brute-Forcing using Burp
          • Spider and Analyze a Website using Burp
          • Brute-frocing Web Resources using Dirb and Dirbuster
        • Attacking Authentication and Session Management – Session Hijacking
          • Theoretical Overview of Attacking Authentication and Session Management
          • Session Hijacking trough Man In The Middle Attack
          • Intercept and access traffic over HTTPS. Get Facebook or Gmail Passwords
        • Access controls. Data stores and Client-side Controls
          • Theoretical Approach of Attacking Access Controls
          • SQL injection
          • Exploiting SQLi using Sqlmap and Getting Remote Shell
          • Upload and Remote File Execution
        • Attacking the Server and Application Logic
          • Attacking the server: OS Command injection, Path Traversal and Mail Injection
          • Attacking Application Logic
        • (XSS) Cross Site Scripting. Attacking the Users
          • Cross Site Scripting Theory. Attacking Users
          • Reflected XSS – Session Hijacking using Cross Site Scripting
          • Stored or Persistent Cross Site Scripting
          • Cross-site Request Forgery (CSRF)
        • Guideline for Discovering and Improving Application Security
          • Guideline for Discovering and Improving Application Security

        E4393a6420c7ccecb19ae1e025114ef5851ff2cd main hero image

        Introduction to Cisco Packet Tracer Network Simulator

        Get the Hands-On Network Experience You Need w/ This Powerful Simulator

          The best way to learn the techniques of a Cisco network engineer—do it yourself. The Packet Tracer allows you to do just that by letting you create networks with almost an unlimited number of devices. You’ll learn to troubleshoot like a pro without needing access to Cisco routers and switches.

          • Master Cisco’s Packet Tracer network simulator w/ over 16 lectures & 1.5 hours of content
          • Develop Cisco-specific technology skills without access to official Cisco routers & switches
          • Download Packet Tracer for free w/ a Netacad account
          • Simulate complex scenarios before trying on real equipment
          • Connect & configure devices w/ the Command Line Interface

          Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

          For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

          • Length of time users can access this course: lifetime
          • Access options: web streaming, mobile streaming
          • Certification of completion not included
          • Redemption deadline: redeem your code within 30 days of purchase
          • Experience level required: all levels
          • Basic IT skills suggested
          • Basic knowledge of Linux and/or Windows
          • Internet required

          Course Outline

          • What is Packet Tracer
            • Introduction
            • What is Packet Tracer (1:16)
          • Choosing Devices and Connections
            • Type of Devices
            • Type of Connections and Cables
            • Adding Devices and Interconnect Them
            • Adding Custom Interfaces to Devices
            • Interconnect Wireless Devices
          • Network Devices Configuration
            • Basic PC configuration
            • Servers Configuration
            • Basic Router Configuration
            • Advanced Router Configuration using CLI
            • Basic Switches Configuration
            • Advanced Switches Configuration using CLI
          • Tracking Packets
            • Realtime Packets Tracking
            • Packets Tracking – Simulation mode
          • Final Words
            • Do it yourself – Packet Tracer Labs

          B3e6705e3114a8361c25658cda4658e0cb5229d0 main hero image

          Set Up Your Own Web Hosting Environment

          Learn to Host Your Own Sites Using Linux in Just 1.5 Hours

            Whether you’re currently a web developer or hope to be one in the future, learning to host your own sites is an extremely valuable skill. This detailed course breaks down the process in just 1.5 hours, so you’ll have the skills of a Linux network professional without leaving your couch.

            • Learn to host a web page using a Linux box w/ over 15 lectures & 1.5 hours of content
            • Learn the basics of installing Linux OS
            • Understand DNS & how it works
            • Configure DNS/DDNS & Port forwarding from your router
            • Configure & secure Apache, PHP, MySQL & PHPMyAdmin
            • Study basic WordPress setup
            • Set up a web hosting environment from scratch

            Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

            For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

            • Length of time users can access this course: lifetime
            • Access options: web streaming, mobile streaming
            • Certification of completion not included
            • Redemption deadline: redeem your code within 30 days of purchase
            • Experience level required: all levels

            Course Outline

            • Setup your own web hosting environment
              • Introduction
              • What to expect from this course
              • Install Ubuntu Linux (6:32)
              • What is a DNS and DNS Server
              • Dynamic DNS
              • Buy a domain
              • Edit Hosts File
              • Setting up DNS server part 1
              • Setting up DNS server part 2
              • Installing Apache, PHP and MySQL
              • Installing and Secure PhPMyAdmin
              • Installing WordPress
              • Setup WordPress – It works!
              • Access your website from the Internet – Private IP, Public IP, Port Forwarding
              • Final Words

            Source

            https://deals.tweaktown.com/sales/datacenters-penetration-testing-bundle