What Is Inventory Management? Benefits, Challenges, and Methods
December 4, 2024
Article
Recommended experience
Intermediate level
This course teaches intermediate pentesting skills. Students should have completed an intro to ethical hacking or pentesting course first.
Recommended experience
Intermediate level
This course teaches intermediate pentesting skills. Students should have completed an intro to ethical hacking or pentesting course first.
Apply Python scripting skills for penetration testing.
Analyze the methods for conducting wireless network attacks.
Conduct web application penetration testing.
Explore and explain the functionalities of PowerShell Empire.
Add to your LinkedIn profile
September 2024
5 assignments
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
Intermediate Ethical Hacking Hands-On Training provides essential intermediate skills in white, grey, and black hat hacking. It covers advanced reconnaissance with the NMap scripting engine and pentesting tools. Key sections include:
- Web application attacks, wireless network attacks, PowerShell Empire, Netcat, and Wireshark fundamentals. - Creating a reverse shell via command injection, - Upgrade a dumb terminal to a BASH Shell, - Perform advanced password hacking with Metasploit, - Dump Wi-Fi credentials using netsh. By the end of the course, you’ll understand network, wireless, and web application penetration testing. Lab exercises are based on real-world Red Team practices. The course teaches web application attacks, Python scripting for pentesters, wireless network attacks, and advanced hacking methodologies, and explores PowerShell Empire. Designed for those with introductory knowledge in ethical hacking or pentesting, this course deepens your expertise. This course is ideal for aspiring ethical hackers and IT security professionals who have a basic understanding of networking, operating systems, and scripting. A familiarity with Kali Linux and basic command-line operations is recommended, but not required, as the course will guide you through the necessary setups.
In this module, we will introduce you to the course structure, detailing what you can expect to learn and what materials and tools you will need to get the most out of this training.
1 video1 reading
In this module, we will guide you through building your virtual lab. You will learn how to download and install essential virtual machine files, create virtual installations of various operating systems, and extend the capabilities of your virtual environment.
5 videos
In this module, we will cover the installation and use of Nmap for network scanning and enumeration. You will learn how to use the WebMap-Nmap Dashboard and nMapAutomator for efficient and automated network reconnaissance.
2 videos1 assignment
In this module, we will explore various methods of establishing reverse shells, escalating privileges on compromised systems, and creating persistent backdoors to maintain access over time.
6 videos
In this module, we will focus on PowerShell Empire, an advanced post-exploitation tool. You will learn to install and use PowerShell Empire, configure Server 2016, and perform post-exploitation activities within an Active Directory environment.
6 videos
In this module, we will delve into advanced post-exploitation techniques on Microsoft Windows systems. You will learn password hacking, post-exploitation tactics, and methods for enumerating Active Directory.
5 videos1 assignment
In this module, we will engage in practical pentesting labs that cover a range of vulnerabilities and exploits. You will gain hands-on experience with techniques such as exploiting Heartbleed, RDP brute force, Active Directory poisoning, and using Netcat for pentesting tasks.
6 videos
In this module, we will focus on auditing wireless networks. You will learn to install and configure wireless adapters, perform network audits, execute deauthentication attacks, and use Bettercap for wireless attacks.
4 videos
In this module, we will cover the use of Wireshark for network traffic analysis. You will learn to configure Wireshark for capturing wireless traffic and examine critical network events such as TCP handshakes.
5 videos1 assignment
In this module, we will focus on web application penetration testing. You will learn to set up OWASP and Burp Suite, perform SQL and command injection attacks, detect web application firewalls, and use banner grabbing for reconnaissance.
7 videos
In this module, we will cover techniques for remaining anonymous while performing penetration testing. You will learn to configure Whonix and other anonymity tools to protect your identity during your ethical hacking activities.
In this module, we will guide you through a practical walkthrough of using SQL injection to establish a shell. You will learn the steps involved in preparing for CTF challenges and executing a TTY reverse shell using PHP scripts.
2 videos2 assignments
Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Course
University of Cape Town
Course
Course
CertNexus
Course
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.
You will be eligible for a full refund until two weeks after your payment date, or (for courses that have just launched) until two weeks after the first session of the course begins, whichever is later. You cannot receive a refund once you’ve earned a Course Certificate, even if you complete the course within the two-week refund period. See our full refund policy.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.