Applied Ethical Hacking and Rules of Engagement
40h empirical knowledge of Cyber Security, Penetration Testing, Python Hacking, Kali Linux & Wazuh SIEM on Elastic Stack
4.43 (1410 reviews)

83,293
students
40 hours
content
Sep 2022
last update
$84.99
regular price
What you will learn
40h video Bootcamp, deep-diving into Ethical Hacking and Threat Hunting subjects
4 Courses in 1: #A) Ethical Hacking #B) Threat Hunting #C) Python Hacking Scripting #D) Linux Security Distros
+5h Live Hacking Sessions for Hack the Box CTF (Here you become a hacker)
+15 hours hands-on Ethical hacking incl. Reconnaissance, Exploitation, ٫Network Attacks, Social Engineering, and 5h WebAPP Pentesting
+5 hours Red Teaming, incl. Cobalt Strike Ops and Devs Active Directory Attacks and MITREATT&CK
+5 hours Threat Hunting using Elastic-Stack and Wazuh Manager
Cobalt Strike, Metasploit, Empire, Python, Kali Linux +200 other industry-proven cybersecurity tools
Deploy a complete SIEM with Elastic Stack & Wazuh Manager for real production
Master pentest standards and tools, hacking methods with their standards e.g. MITRE ATT&CK, OWASP, PTES
2 crash courses included: Python3 scripting and Kali Linux
How to perform Web App Attacks such as SQLi, XSS, IDOR, Webshell Upload, Code and Command Injection, and much more
Programming Corporate-Level SIEM Use-Cases & Their Common Mistakes
How to develop scripting Projects, geared towards IT Security
Breach secure systems using client-side & social engineering techniques and tools
How corporate-level IT security solutions are planned & developed
Develop and conduct Red Team engagement using open source and commercial frameworks
Create Malware with Python as well as Cobalt Strike Framework
Master OWASP Top 10 best practices and other security standards
Pentest on servers, web apps, appliances, corporate networks and Active Directory Forests
How to customize your malware agent and make it like windows legitimate traffic and binary
Master log aggregation basic concepts with hands-on practices
Perform various attack technics using automated as well as manual tools
Securely send social engineered & phishing emails disguised as any legitimate email address without authentication
How to perform network attacks and sniff sensitive data such as passwords
Elastic Stack: Elasticsearch, Kibana and Filebeat in action
Master intelligence gathering and reconnaissance using the latest techniques
How to map your targets and create network topologies of your targets
Linux command line (Kali Linux and Parrot OS Security)
How to do lateral movement on secure networks, do privilege escalation and become administrator of the environment
How to do attacks on active directory and get domain admin with different techniques
Advanced nmap techniques and NSE scripts
Master Metasploit framework as your arsenal of exploits
Screenshots




3683734
udemy ID
12/5/2020
course created date
5/2/2021
course indexed date
Bot
course submited by