Installing Virtual Machines
Try reloading this page, or reviewing your browser settings
Focus Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities.
Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites.
What You’ll Learn
Exploit your network and perform penetration tests
Footprint and scan networks and websites for vulnerabilities
Be aware of key vulnerabilities to watch out for within your network and website
Who This Book Is For
Network security experts, web security specialists, application security experts, penetration testers, and ethical hackers.
About The Author
Sunil Gupta consults as a computer and cyber security expert in information technology with a focus on cyber security. He is invited as a speaker to a number of conferences and community events. He is a visionary and cyber security professional who thrives on solving complex security problems. He is passionate about customer service and his role as a cyber security expert, and always exceeds his clients’ expectations.
Sunil works as a freelance security consultant and researcher in Delhi, India. His primary focus lies with perimeter defense, secure network design, vulnerability discovery, penetration testing, compliance and intrusion detection systems. His client list includes Barclays bank, Aviation College Qatar (QATAR), Ethiopian Airlines, Telecom Authority Tanzania, NCB bank (Saudi Arabia), and Accenture (India) to name a few.
About this video
- Sunil Gupta
- Online ISBN
- Total duration
- 1 hr 8 min
- Copyright information
- © Sunil Gupta 2019
- Sunil Gupta
- Sunil Gupta
[00:00:00] Hello and welcome to the Ethical Hacking Networks and Websites. My name is Sunil Gupta. I’m an ethical hacker and a public speaker, and I will be your instructor for the course. So in course we are going to start with the pen testing lab set up in which we are going to install VMware workstation and inside VMware workstation we are going to install Windows and Kali Linux. Then we will learn how you can perform scanning techniques using Nmap. We will perform port scanning. We will also perform vulnerability scanning using nexus that how you can gather information about loopholes and vulnerabilities inside your network. Later we will also perform exploitation using metasploit Kali Linux to gather more and more information about the operating systems available inside your network. We will also talk about how you can scan of a website using Kali Linux and we are going to use Zed Attack Proxy tool available inside Kali Linux for web penetration testing. And finally we will end up the course with the most popular injection attack on the applications. So this is all about the overview of the course Thank you so much for your time and I’ll see you inside the course.