Bookmarks Hacking Phases via Hand-on Examples – Part 1 | Udemy

Hacking Phases via Hand-on Examples – Part 1 | Udemy
Name:
Hacking Phases via Hand-on Examples – Part 1 | Udemy
Rating:
Users voted: 0
Language:
Year Release:

https://i.postimg.cc/ZRTTLYs7/Cc-Up-R369-Qz-SKmuys4-QEEWf-Vvihlj0-Tp9.jpg

Hacking Phases via Hand-on Examples – Part 1 | Udemy | 421.47 MB

What you’ll learn
Hacking Phases via Hand-on Examples: Scanning and Gaining Access

Welcome to this course: Hacking Phases via hand-on examples. As you may know, hacking includes 5 stages: Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Track. In this course, you will learn 2 phases: Scanning and Gaining Access, as they are really important and fancy, via hand-on examples. This course is about Ethical Hacking, so we will learn from both sides: Attackers and Defenders. We will use VMWare technology to simulate the hacker and victim’s machines; so that you will see how the real hacking is. The victim’s virtual machine is made with intentional vulnerabilities to serve the content of this course.

About the course’s content, first of all, the brief overview of this course and demo’s environment is introduced. Secondly, we will put it all together, showing the demonstration sessions. After that, we will study the main concepts of this course: Scanning and Gaining Access phases through the examples’ explanations. Last but not least, several ideas will be suggested to mitigate the vulnerabilities that were noted in our examples.

Regarding the course’s requirements, to enjoy it you will need some basic knowledge of Networking and Linux, but beginners should not worry since everything will be explained carefully from the first slide.

After completed the course, students will be able to understand and demonstrate the scanning, enumeration, exploitation and even privilege escalation processes, which are very important in Scanning and Gaining Access phases. As the Ethical Hackers / Penetration Testers, students will also can describe and implement the techniques to secure the system from the view of Defender side.

Who this course is for:
Security students
System/Network Administrators

Download link:

Links are Interchangeable - Single Extraction - Premium is support resumable