Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Intermediate Ethical Hacking Hands-on Training

Course Cover
compare button icon

Course Features

icon

Duration

8.28 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

8.28 hours

Course Description

Take the intermediate course in ethical hacking to build a solid foundation

About This Video

  • Learn more about advanced password hacking using Metasploit
  • NGROK allows you to access Kali over the WAN.
  • Learn how to attack web applications using Burp Suite using SQL Injection

Intermediate Ethical Hacking Training Hands-On provides a level of white, grey and black hat skills that every cybersecurity professional should have. Advanced reconnaissance techniques are also taught using the NMap scripting tool and other hacking tools used to pentesters.

This section includes web application attacks, wireless networks attacks, PowerShell Empire attacks, Netcat fundamentals, and Wireshark basics.

Learn how to create a reversible shell using command injection. Also, how to upgrade a dumb terminal into a fully functional BASH Shell. We will also learn advanced password hacking using Metasploit, and how to dump Wi Fi credentials using netsh.

The course will give you a solid understanding of wireless penetration testing, external and internal network penetration testing, and web application testing. The lab exercises are based upon real-world Red Team best practices.

Who is this book for

This course is open to anyone who is interested learning intermediate pentesting skills. Students should have completed an introduction course in ethical hacking and pentesting before enrolling in this course.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Explore how to access Kali across the WAN with NGROK

Learn about advanced password hacking with Metasploit

Learn about how to attack web apps with Burp Suite using SQL Injection

Target Students

Before taking this course, students should have completed an introduction to an ethical hacking or pentesting course

This course is for anyone who is interested in learning intermediate skills of pentesting

Course Cover