What Is Strategic Management? Approaches, Benefits, and Careers
January 14, 2025
Article
This course is part of The Complete Ethical Hacking Bootcamp: Beginner To Advanced Specialization
Instructor: Packt - Course Instructors
Included with
Recommended experience
Intermediate level
This course is for those with basic ethical hacking knowledge aiming to advance their skills. Prior foundational course or experience recommended.
Recommended experience
Intermediate level
This course is for those with basic ethical hacking knowledge aiming to advance their skills. Prior foundational course or experience recommended.
Install and configure Metasploitable and other essential tools.
Analyze network structures through advanced mapping and vulnerability scanning.
Apply various attack methods to perform web application penetration tests.
Evaluate wireless network security by conducting exploitation and password cracking.
Add to your LinkedIn profile
September 2024
3 assignments
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
Take your ethical hacking knowledge to the next level with this intermediate course designed for aspiring cybersecurity professionals. Begin with active information gathering and port scanning, where you'll master tools like Nmap and Zenmap, and learn techniques for bypassing firewalls and utilizing Nmap scripts. This comprehensive module ensures you have a robust understanding of network mapping and vulnerability scanning, critical for identifying and mitigating security threats.
Next, you'll dive into web application penetration testing, starting with the installation and configuration of essential tools like OWASP and BurpSuite. You'll explore various attack methods, including brute force, injection, and cross-site scripting (XSS). Detailed video lessons guide you through each technique, from HTTP request manipulation to exploiting SQL and XML injection vulnerabilities. By the end of this module, you'll have a thorough understanding of how to test and secure web applications against a range of cyber threats. The course then shifts focus to wireless penetration testing, where you'll learn the fundamentals of wireless attacks and the tools needed to execute them. You'll work with Airodump-ng, Aircrack-ng, and Hashcat to capture and crack passwords, create password lists, and find hidden networks. The final module on system hacking and exploitation covers advanced topics like using the Metasploit framework, crafting payloads with Msfvenom, and performing privilege escalation on Windows 10. Practical lessons ensure you can apply these techniques effectively, preparing you for real-world cybersecurity challenges. This course is designed for individuals with a basic understanding of ethical hacking who wish to advance their skills. Prior completion of a foundational ethical hacking course or equivalent experience is recommended.
In this module, we will explore active information gathering and port scanning techniques. You will learn to install Metasploitable, use Nmap and Zenmap for network mapping, execute TCP scans, bypass firewalls, and utilize Nmap scripts for detailed information gathering.
9 videos1 reading
In this module, we will dive into web application penetration testing. You will gain hands-on experience with OWASP, BurpSuite, and various tools to perform HTTP testing, password recovery attacks, brute force attacks, session fixation, and multiple types of injection attacks, including SQL and XSS.
24 videos1 assignment
In this module, we will cover wireless penetration testing techniques. You will learn to capture handshakes, crack passwords using various tools, create password lists, utilize rainbow tables, and prevent common wireless attacks, ensuring a robust understanding of wireless security.
13 videos
In this module, we will focus on system hacking and exploitation. You will learn to use the Metasploit console, execute various hacking techniques, craft payloads, gain Meterpreter sessions, perform post-exploitation activities, and implement strategies to prevent privilege escalation, ensuring a comprehensive approach to system security.
21 videos1 reading2 assignments
Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Course
McMaster University
Course
University of Maryland, College Park
Course
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.