Penetration Testing – Hacking Project from A to Z

Know How to manage Penetration Testing /Hacking project from scratch
Materials and extra resources
1
How to get access to the students portal
Introduction
1
Introduction
2
is there a real Ethical Hacking Jobs?
3
Penetration Testing Standard
4
Reports and Documentation
5
Instructor Support
6
Course flow
Setup Your Lab
1
Install VMWARE Player
2
Download OS Images
3
Download Kali Linux
4
Download OWASBWA and Metasploit able
5
Bad Store
6
Configure Linux VM
7
Update your Kali VM
8
Configure Windows VM
9
Configure Legacy OS Virtual machine
Penetration Testing Project
1
Penetration Testing Project
2
Compliance
3
VA vs PT
4
RFP (Request for Proposal)
5
Types of PT
6
Social Engineering PT
Tools and Utility
1
PT and VA Tools
2
Nessus
3
Nexpose 1
4
Nexpose 2
5
OWASP ZAP
6
Metaspolit Pro
7
Metasploit community
Let's Start the project
1
Identifying your scope
2
Start the project
Identification of the Target
1
Whois Information
2
Email Harvesting
3
GHDB
4
Introduction to Maltego
5
Maltego
6
People Search Engine
Port Scaning
1
NMAP
2
Zenmap
Enumeration
1
Enumeration
2
DNS Enumeration
3
DNS Zone Transfer
4
SMB Enumeration
5
Enum4Linux
6
Windows Enumeration
Vulnerability Management
1
Vulnerability assessment
2
Nessus VA Report
3
Nessus Report 2
4
OWASP ZAP VA
5
Nexpose VA
Penetration Testing Project initiation
1
Penetration testing
2
MetaSploit PT 1
3
MetaSploit PT 2
4
MetaSploit Pro 3
5
Metasploit community
6
Armitage
SQL Injection
1
SQL Injection Introduction
2
What is SQL Injection ?
3
Is the site infected with SQLI ?
4
The amazing SQLMAP
5
Live Example
Social Engineering Campaign
1
Social Engineering Campaign
2
Social Engineering Toolkit (SET)
3
Credential Harvest
4
Social Engineering using MetaSploit Pro
Managing the finding
1
Patches
2
Writing the report
3
Finding and Solutions
Services Fees
1
Penetration Testing Fees
Be the first to add a review.
Please, login to leave a review