Hack Like A White Hat Hacker - A Practical Introduction
Published 11/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 564.10 MB | Duration: 0h 36m
Decide if penetration testing is the right job for you, based on insights from a professional white hat hacker.
What you'll learn
Witness a practical penetration testing example from a professional penetration tester
Get motivated about starting a career as a penetration tester
Gain an initial view of penetration tester
Learn the different steps of a penetration testing mission
Requirements
No prior requirements are needed for this course
Description
Welcome to this course that will demystify the exciting job of a white hat hacker, and help you decide if it's worth pursuing! If you're curious about penetration testing, cybersecurity, but now little to nothing about it, you're in the right place.I will take you through a practical use case approach. Rather than inundating you with theoretical jargon, I will immerse you in a practical use case where you'll have a peek behind the curtain. You will discover different tools, vulnerabilities, and how to use them to hack a web application.Starting from the very first kickoff meeting and progressing through the various stages that define a pentest mission, this course will offer you valuable insights into the fundamental building blocks of a pentest job. We will take you on a journey through the mission, immersing you in the real-world experiences of a white hat hacker's job. Upon completing this course, you will possess the knowledge and experience necessary to make an informed decision about whether a career in penetration testing aligns with your aspirations. This course will help you evaluate whether a job in this field resonates with your interests and goals.The sole purpose of this course is to introduce penetration testing, it is NOT intended for those who want to build their technical skills.
Overview
Section 1: Introduction
Lecture 1 Welcome to the course
Section 2: Pentest mission planning
Lecture 2 Agenda for the pentest mission
Lecture 3 Kickoff meeting
Lecture 4 Engagement plan
Section 3: Enumeration
Lecture 5 Port scanning
Lecture 6 Service fingerprinting
Lecture 7 Application mapping
Lecture 8 SSH interaction
Lecture 9 Attack plan
Section 4: Exploitation
Lecture 10 Cross-Site scripting
Lecture 11 Local file inclusion
Lecture 12 SQL injection
Lecture 13 Password cracking
Lecture 14 Remote shell access
Section 5: Privilege escalation
Lecture 15 Post-exploitation enumeration
Lecture 16 Privilege escalation
Section 6: Additional considerations
Lecture 17 Audit trails
Lecture 18 Become a penetration tester like me
Students who don't know if penetration testing is the right career for them,Anyone who want to switch to cybersecurity but are not sure if it's worth the jump,Curious minds who want to discover the offensive side of cybersecurity
Screenshots
Download link
rapidgator.net:
https://rapidgator.net/file/e72e850b5773450f90582120d8ecedee/fyqdj.Hack.Like.A.White.Hat.Hacker..A.Practical.Introduction.rar.html
uploadgig.com:
https://uploadgig.com/file/download/991A965e3e7Cbf74/fyqdj.Hack.Like.A.White.Hat.Hacker..A.Practical.Introduction.rar
ddownload.com:
https://ddownload.com/f6bwsobxhmkx/fyqdj.Hack.Like.A.White.Hat.Hacker..A.Practical.Introduction.rar