Главная
Study mode:
on
1
- Course Introduction/whoami
2
- Part 1: Introduction, Notekeeping, and Introductory Linux
3
- Part 2: Python 101
4
- Part 3: Python 102 (Building a Terrible Port Scanner)
5
- Part 4: Passive OSINT
6
- Part 5: Scanning Tools & Tactics
7
- Part 6: Enumeration
8
- Part 7: Exploitation, Shells, and Some Credential Stuffing
9
- Part 8: Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
10
- Part 9: NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
11
- Part 10: MS17-010, GPP/cPasswords, and Kerberoasting
12
- Part 11: File Transfers, Pivoting, Report Writing, and Career Advice
Description:
Embark on a comprehensive 15-hour journey into the world of ethical hacking and network penetration testing. Learn essential skills from introductory Linux and Python programming to advanced techniques like LLMNR poisoning, token impersonation, and Kerberoasting. Explore passive OSINT, scanning tools, enumeration, and exploitation methods. Build an Active Directory lab, practice credential stuffing, and master file transfers and pivoting. Gain practical experience with hands-on exercises and access a GitHub repository for homework. Conclude with valuable insights on report writing and career advice in the cybersecurity field.

Full Ethical Hacking Course - Beginner Network Penetration Testing

Cyber Mentor
Add to list