Complete White Hat Hacking & Penetration Testing Bundle

Ending In:
Add to Cart - $19
Add to Cart ($19)
$888
97% Off
wishlist
Courses
5
Lessons
113
Enrolled
5,062

What's Included

Product Details

Access
Lifetime
Content
5 hours
Lessons
36

Network Penetration Tester - Build a $120K/Year Career

Learn to Think Like a Hacker & Protect Networks Before It's Too Late

By IT University | in Online Courses

More and more companies are realizing that white hat hackers are essential to the safety of their data and networks. Exploit this desperate need by becoming a white hat hacker yourself, and finally getting the salary of your dreams. This course is the perfect introduction to the skills every white hat hacker needs to succeed. From hacking techniques and penetration testing to cryptography, you'll gain the knowledge to protect any computer or network by course's end.
  • Learn to think like a hacker in order to protect networks w/ over 36 lectures & 5 hours of content
  • Study hacking tools, methodologies & techniques
  • Follow along w/ real-life situational labs based on real environments.
  • Practice w/ included target virtual machines
  • Understand how to scan networks & exploit their vulnerabilities
  • Study system hacking, sniffing, Trojans, Backdoors, Viruses & Worms, cryptography, and more
  • Perform attacks using Metasploit
  • Learn how to perform penetration testing
Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Basic IT skills suggested
  • Basic knowledge of Linux and/or Windows
  • Internet required

Course Outline

  • Introduction to Ethical Hacking. Footprinting and Reconnaissance
    • Introduction
    • Introduction to Ethical Hacking. Footprinting and Reconnaissance
    • Demo - Information Gathering using Google Dorks and DNS Queris
    • Demo - Scanning and Enumeration
    • Do it yourself - Information Gathering Exercise
  • Scanning Networks, Enumeration and Discovering Vulnearbilities
    • Scanning and enumeration
    • Vulnerabilties Identification
    • Demo - Installing Nessus Scanner
    • Demo - Use Nessus to Discover Vulnerabilities
    • Demo - Using Nikto to discover Web Vulnerabilities
    • Demo - Using Paros for Vulnerability Discovery
    • Demo - Use Dirbuster to brute force sub-directories and filenames
    • Do it yourself - Scanning and enumeration, Vulnerability Discovery Exercise
  • System Hacking and Vulnerability Exploitation
    • System hacking - vulnerability exploitation
    • Passwords
    • Authentication
  • Sniffing
    • Sniffing
    • Man in the Middle over Wireless or Wired Networks
    • Capturing HTTPS traffic over MITM). Get Gmail and Facebook passwords
  • Metasploit
    • Metasploit
    • Demo - Exploiting FTP Server Vulnerability using Metasploit
    • Demo - Post Exploitation Example
    • Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the Victim PC
    • Demo - Eploiting Samba Service on Linux using Metasploit
    • Do it yourself - Vulnerability Exploitation using Metasploit Exercise
  • Trojans, Backdoors, Viruses and Worms
    • Trojans and Backdoors
    • Computer viruses and worms
  • Cryptography
    • Cryptography concepts
    • Cryptographic Algorithms
    • Cryptography and cryptanalysis tools. Cryptography attacks
    • Demo - Hack SSH passwords using Medusa
    • Hack the SSH Password using Hydra
    • Hack Linux Passwords using John the Ripper
    • Do it yourself - Passwords Protection Exercise
  • Penetration Testing on Wireless Networks
    • Penetration Testing on Wireless Networks
    • Do it yourself - WiFi Networks Security - practical approach
    • Case Study – Windows Hosted Network Bug or Feature
  • Penetration Testing Overview. Final words
    • Penetration Testing Overview. Final Words

View Full Curriculum


Access
Lifetime
Content
2.5 hours
Lessons
24

Basics of VMWare vSphere & ESXi Virtualization Software

Gain the Knowledge to Create & Maintain a Virtual Infrastructure

By IT University | in Online Courses

Any modern day network and security professional is obligated to be well-versed in cloud technology. This course will get you up to speed on virtualization and cloud technology, and even teach you to set up and maintain a virtual system from scratch. With this knowledge, you'll be equipped to host anything from a few to hundreds of machines (even with varying operating systems) in one single infrastructure.
  • Get introduced to virtualization & cloud computing technology w/ over 24 lectures & 2.5 hours of content
  • Host hundreds of virtual machines running various operating systems
  • Link machines together in a virtual network or cloud infrastructure
  • Create a virtual system using the VMware VSphere environment
  • Understand, design & deploy a virtual system w/ ease
  • Learn to instal, deploy, manage & maintain a virtual system
Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Build your own cloud using VMware virtualization software
    • Introduction
    • What to expect from this course (0:40)
    • What is virtualisation and how it works (1:28)
    • VMware ESXi hypervisor. Get your own copy of Vmware ESXi (2:45)
    • Hardware compatibly list
    • Installing Vmware ESXi
    • Introduction to Vmware vSphere Client
    • Basics of vSphere Client
    • Creating and Cloning Virtual Machines
    • Network Virtualization
    • Converting already existing Servers to Virtual Machines - VMware Converter
    • Resource Pools
    • Installing the second ESXi Host
    • Basics of vCenter (1:26)
    • Installing vCenter
    • Manage ESXi using vCenter
    • Introduction to Storage Area Network and Openfiler (3:41)
    • Connecting to Shared Storage
    • Installing and Configuring Openfiler
    • Performance and Events Monitoring
    • Virtualization benefits: vMotion
    • Introduction to High Availability in Vmware
    • Mange vCenter trough Browser (1:58)
    • Final words (0:18)

View Full Curriculum


Access
Lifetime
Content
5.5 hours
Lessons
22

How to Build a $120,000/Year Career as a Web Penetration Tester

Pinpoint Network Vulnerabilities in Order to Prevent Attacks by Hackers

By IT University | in Online Courses

If you're looking to build a career in security, there's no better place to focus your efforts than penetration testing. By understanding the vulnerabilities and dangers presented by your network's structure, you'll learn how to remedy these gaps and save your company from major security breeches.
  • Master ethical hacking techniques used in penetration systems w/ over 22 lectures & 5.5 hours of content
  • Learn the basic methods for penetration testing of a web application
  • Go step-by-step through the entire penetration testing process
  • Control remote servers
  • Practice finding vulnerabilities in apps
  • Learn to gain information on potential targets
  • Study various attack types: authentication, session management, access controls, data stores, etc.
Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Basic IT skills suggested
  • Basic knowledge of Linux and/or Windows
  • Internet required

Course Outline

  • Why Web Security?
    • Introduction
    • Core Problems - Why Web Security
    • Web Technologies
    • Preparing the Lab Environment
  • Mapping the Web Application. User and Password Brute-Forcing
    • What Web Application Mapping Means
    • Usernames and Passwords Brute-Forcing using Burp
    • Spider and Analyze a Website using Burp
    • Brute-frocing Web Resources using Dirb and Dirbuster
  • Attacking Authentication and Session Management - Session Hijacking
    • Theoretical Overview of Attacking Authentication and Session Management
    • Session Hijacking trough Man In The Middle Attack
    • Intercept and access traffic over HTTPS. Get Facebook or Gmail Passwords
  • Access controls. Data stores and Client-side Controls
    • Theoretical Approach of Attacking Access Controls
    • SQL injection
    • Exploiting SQLi using Sqlmap and Getting Remote Shell
    • Upload and Remote File Execution
  • Attacking the Server and Application Logic
    • Attacking the server: OS Command injection, Path Traversal and Mail Injection
    • Attacking Application Logic
  • (XSS) Cross Site Scripting. Attacking the Users
    • Cross Site Scripting Theory. Attacking Users
    • Reflected XSS – Session Hijacking using Cross Site Scripting
    • Stored or Persistent Cross Site Scripting
    • Cross-site Request Forgery (CSRF)
  • Guideline for Discovering and Improving Application Security
    • Guideline for Discovering and Improving Application Security

View Full Curriculum


Access
Lifetime
Content
1.5 hours
Lessons
16

Introduction to Cisco Packet Tracer Network Simulator

Get the Hands-On Network Experience You Need w/ This Powerful Simulator

By IT University | in Online Courses

The best way to learn the techniques of a Cisco network engineer—do it yourself. The Packet Tracer allows you to do just that by letting you create networks with almost an unlimited number of devices. You’ll learn to troubleshoot like a pro without needing access to Cisco routers and switches.
  • Master Cisco’s Packet Tracer network simulator w/ over 16 lectures & 1.5 hours of content
  • Develop Cisco-specific technology skills without access to official Cisco routers & switches
  • Download Packet Tracer for free w/ a Netacad account
  • Simulate complex scenarios before trying on real equipment
  • Connect & configure devices w/ the Command Line Interface
Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Basic IT skills suggested
  • Basic knowledge of Linux and/or Windows
  • Internet required

Course Outline

  • What is Packet Tracer
    • Introduction
    • What is Packet Tracer (1:16)
  • Choosing Devices and Connections
    • Type of Devices
    • Type of Connections and Cables
    • Adding Devices and Interconnect Them
    • Adding Custom Interfaces to Devices
    • Interconnect Wireless Devices
  • Network Devices Configuration
    • Basic PC configuration
    • Servers Configuration
    • Basic Router Configuration
    • Advanced Router Configuration using CLI
    • Basic Switches Configuration
    • Advanced Switches Configuration using CLI
  • Tracking Packets
    • Realtime Packets Tracking
    • Packets Tracking - Simulation mode
  • Final Words
    • Do it yourself - Packet Tracer Labs

View Full Curriculum


Access
Lifetime
Content
1.5 hours
Lessons
15

Set Up Your Own Web Hosting Environment

Learn to Host Your Own Sites Using Linux in Just 1.5 Hours

By IT University | in Online Courses

Whether you're currently a web developer or hope to be one in the future, learning to host your own sites is an extremely valuable skill. This detailed course breaks down the process in just 1.5 hours, so you'll have the skills of a Linux network professional without leaving your couch.
  • Learn to host a web page using a Linux box w/ over 15 lectures & 1.5 hours of content
  • Learn the basics of installing Linux OS
  • Understand DNS & how it works
  • Configure DNS/DDNS & Port forwarding from your router
  • Configure & secure Apache, PHP, MySQL & PHPMyAdmin
  • Study basic Wordpress setup
  • Set up a web hosting environment from scratch
Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Setup your own web hosting environment
    • Introduction
    • What to expect from this course
    • Install Ubuntu Linux (6:32)
    • What is a DNS and DNS Server
    • Dynamic DNS
    • Buy a domain
    • Edit Hosts File
    • Setting up DNS server part 1
    • Setting up DNS server part 2
    • Installing Apache, PHP and MySQL
    • Installing and Secure PhPMyAdmin
    • Installing Wordpress
    • Setup Wordpress - It works!
    • Access your website from the Internet - Private IP, Public IP, Port Forwarding
    • Final Words

View Full Curriculum



Terms

  • All sales final
  • Instant digital redemption