Ethical Hacking and Penetration Testing Cybersecurity Masterclass with Practice Exam
Your Instructor
Abdul Wahab is a distinguished Cybersecurity Professional whose expertise in Penetration Testing, Vulnerability Scanning, and Information Security Management sets him apart. His adeptness with tools like Burp Suite and Metasploit, combined with a strong foundation in Network Protocols and Operating Systems, allows him to excel in digital asset protection.
Abdul's proficiency in programming languages such as Python and Ruby, alongside his role as a Chief Information Security Officer, showcases his commitment to the security and integrity of digital environments. Through continuous learning and a keen understanding of cybersecurity trends, Abdul is dedicated to pioneering effective risk mitigation strategies.
Mammoth Interactive is a leading online course provider in everything from learning to code to becoming a YouTube star. Mammoth Interactive courses have been featured on Harvardโs edX, Business Insider and more.
Over 13 years, Mammoth Interactive has built a global student community with 6 million courses sold. Mammoth Interactive has released over 350 courses and 3,500 hours of video content.
Founder and CEO John Bura has been programming since 1997 and teaching
since 2002. John has created top-selling applications for iOS, Xbox and
more. John also runs SaaS company Devonian Apps, building
efficiency-minded software for technology workers like you.
Course Curriculum
-
Start01. Introduction (12:29)
-
Start02. Shodan Info-Gathering (Tip) (1:39)
-
Start03. Hackers And Their Playground (13:41)
-
Start04. Reconnaissance And Open_Source Intelligence (Osint) (13:35)
-
Start05. Burpsuite(Tip) (1:40)
-
Start06. Enumeration And Scanning (12:27)
-
Start07. Vulnerabilities And Exploitation (11:46)
-
Start08. Cracking Wpa2(Tip) (1:22)
-
Start09. Post-Exploitation And Data Exfiltration (14:34)
-
Start10. Capture The Flag Competition(Tip) (1:29)
-
Start11. Web Application And Api Security (11:16)
-
Start12. Defense-In-Depth And Emerging Technologies (10:20)
-
Start13. Metasploit Exploitation(Tip) (1:48)
-
Start14. The Dark Web And Ethics In Cybersecurity (15:35)
-
Start15.Resources