Ethical Hacking Course: Intermediate Level Hands-On Training
Ethical Hacking - Intermediate Hands-on Training is an intermediate hands-on course for learning ethical hacking.
IT and Software ,Network and Security,Ethical Hacking
Lectures -51
Resources -43
Duration -8 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
Alert -
Intermediate Ethical Hacking Hands-on Training is a continuation of Ethical Hacking - Hands-on Training Part I. Before taking this course, students should have completed an introduction to an ethical hacking or pen-testing course. For best results, students should have completed Ethical Hacking - Hands-on Training Part I before signing up for the intermediate course.
Intermediate Ethical Hacking Hands-on Training picks up where Part I leaves off. In Part I, students were taught the fundamentals of pen-testing while being introduced to some basic skills.
Intermediate Ethical Hacking Hands-On Training provides an intermediate level of white, grey, and black hat skills every cybersecurity professional needs to know. Advanced reconnaissance techniques are taught using the NMap scripting engine and various hacking tools used by pen-testers.
Sections include Web Application Attacks, Wireless Network Attacks, PowerShell Empire, Netcat, and Wireshark Fundamentals.
For the best experience in learning to be an ethical hacker or pentester, students should complete the instructor's complete series on ethical hacking, starting with Ethical Hacking Hands-On Training Part I and proceeding to this intermediate course.
The three Ethical Hacking Capture the Flag Courses are the capstone series where students apply and use all the techniques taught in the two Ethical hacking courses.
By the end of the course, you will have a deep understanding of external and internal network penetration testing, wireless penetration testing, and web application penetration testing. The lab exercises in the course are based on real-world application of Red Team best practices.
Goals
- Ethical Hacking Fundamentals.
- Network Penetration Testing.
- Discover Critical vulnerabilities.
- Launch Various Man-in-the-middle attacks.
- Securing a system from all the major attacks.
- ARP Spoofing/ARP Poisoning.
Prerequisites
- Basic Computer Fundamentals & Terminologies.
- A computer installed with Windows/Linux /OS X.
- Wireless adapter with Monitor Mode support.
- Minimum of 8GB RAM.
- Internet connection.

Curriculum
Check out the detailed breakdown of what’s inside the course
Course Overview
1 Lectures
-
Course Overview and Welcome Video 05:20 05:20
Virtual Lab Build
5 Lectures

NMap
2 Lectures

Reverse Shells, Privilege Escalation and Persistent Backdoors
6 Lectures

PowerShell Empire
6 Lectures

Post Exploitation of Microsoft Windows
5 Lectures

Practical Pentesting Labs
6 Lectures

Auditing Wireless Networks
4 Lectures

Wireshark
5 Lectures

Web App Penetration Testing
7 Lectures

Anonymity - Remaining Anonymous While Pentesting
1 Lectures

CTF - SQL Injection to Shell Walkthrough
2 Lectures

Instructor Details

Cliff Krahenbill
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now