Applied Ethical Hacking and Rules of Engagement

40h empirical knowledge of Cyber Security, Penetration Testing, Python Hacking, Kali Linux & Wazuh SIEM on Elastic Stack
4.43 (1410 reviews)
Udemy
platform
English
language
Network & Security
category
Applied Ethical Hacking and Rules of Engagement
83,293
students
40 hours
content
Sep 2022
last update
$84.99
regular price

What you will learn

40h video Bootcamp, deep-diving into Ethical Hacking and Threat Hunting subjects

4 Courses in 1: #A) Ethical Hacking #B) Threat Hunting #C) Python Hacking Scripting #D) Linux Security Distros

+5h Live Hacking Sessions for Hack the Box CTF (Here you become a hacker)

+15 hours hands-on Ethical hacking incl. Reconnaissance, Exploitation, ٫Network Attacks, Social Engineering, and 5h WebAPP Pentesting

+5 hours Red Teaming, incl. Cobalt Strike Ops and Devs Active Directory Attacks and MITREATT&CK

+5 hours Threat Hunting using Elastic-Stack and Wazuh Manager

Cobalt Strike, Metasploit, Empire, Python, Kali Linux +200 other industry-proven cybersecurity tools

Deploy a complete SIEM with Elastic Stack & Wazuh Manager for real production

Master pentest standards and tools, hacking methods with their standards e.g. MITRE ATT&CK, OWASP, PTES

2 crash courses included: Python3 scripting and Kali Linux

How to perform Web App Attacks such as SQLi, XSS, IDOR, Webshell Upload, Code and Command Injection, and much more

Programming Corporate-Level SIEM Use-Cases & Their Common Mistakes

How to develop scripting Projects, geared towards IT Security

Breach secure systems using client-side & social engineering techniques and tools

How corporate-level IT security solutions are planned & developed

Develop and conduct Red Team engagement using open source and commercial frameworks

Create Malware with Python as well as Cobalt Strike Framework

Master OWASP Top 10 best practices and other security standards

Pentest on servers, web apps, appliances, corporate networks and Active Directory Forests

How to customize your malware agent and make it like windows legitimate traffic and binary

Master log aggregation basic concepts with hands-on practices

Perform various attack technics using automated as well as manual tools

Securely send social engineered & phishing emails disguised as any legitimate email address without authentication

How to perform network attacks and sniff sensitive data such as passwords

Elastic Stack: Elasticsearch, Kibana and Filebeat in action

Master intelligence gathering and reconnaissance using the latest techniques

How to map your targets and create network topologies of your targets

Linux command line (Kali Linux and Parrot OS Security)

How to do lateral movement on secure networks, do privilege escalation and become administrator of the environment

How to do attacks on active directory and get domain admin with different techniques

Advanced nmap techniques and NSE scripts

Master Metasploit framework as your arsenal of exploits

Screenshots

Applied Ethical Hacking and Rules of Engagement - Screenshot_01Applied Ethical Hacking and Rules of Engagement - Screenshot_02Applied Ethical Hacking and Rules of Engagement - Screenshot_03Applied Ethical Hacking and Rules of Engagement - Screenshot_04
3683734
udemy ID
12/5/2020
course created date
5/2/2021
course indexed date
Bot
course submited by