Course Overview

Key Features

  • 7 Hrs of HQ e-learning content
  • 101 High Quality Lectures
  • Topics on Nmap, Nessus, Nexpose
  • Covers Web Application Testing
  • Course Completion Certificate

Training Options

Self-Paced Learning

$ 99

  • Lifetime access to high-quality self-paced e-learning content curated by industry experts
  • 24x7 learner assistance and support

Corporate Training

Customized to your team's needs

  • Blended learning delivery model (self-paced eLearning and/or instructor-led options)
  • Flexible pricing options
  • Enterprise grade Learning Management System (LMS)
  • Enterprise dashboards for individuals and teams
  • 24x7 learner assistance and support

Course Curriculum

Course Content

  • Advanced Ethical Hacking

    Preview
    • Module 01 - Introduction

      09:41Preview
      • 1.1 Welcome
        01:10
      • 1.2 What This Course Will Cover
        02:17
      • 1.3 System Requirements
        03:20
      • 1.4 Prerequisites
        02:54
    • Module 02 - Dradis: Results Tracking

      17:58Preview
      • 2.1 Acquiring Dradis
        04:24
      • 2.2 Installing Dradis
        02:32
      • 2.3 Using Dradis
        04:02
      • 2.4 Adding Notes
        02:50
      • 2.5 Categorizing Information
        04:10
    • Module 03 - Nmap

      23:44Preview
      • 3.1 Review of Scan Types
        04:36
      • 3.2 Advanced Scanning
        05:14
      • 3.3 Scripting Engine
        05:03
      • 3.4 Investigating Scan Types with Wireshark
        05:33
      • 3.5 Importing Results to Dradis
        03:18
    • Module 04 - Nessus

      40:17Preview
      • 4.1 Acquiring Nessus
        02:23
      • 4.2 Setting Up Nessus
        04:02
      • 4.3 Configuring Nessus
        04:30
      • 4.4 Scan Details: Network
        04:13
      • 4.5 Scan Details: Credentials/Plugins/Options
        04:25
      • 4.6 Scan Details: Web Applications
        05:54
      • 4.7 Starting a Scan
        03:45
      • 4.8 Reviewing Results
        04:49
      • 4.9 False Positives
        03:27
      • 4.10 Setting Up Jobs
        02:49
    • Module 05 - Nexpose

      16:36Preview
      • 5.1 Acquiring Nexpose
        03:02
      • 5.2 Setting Up Nexpose
        02:13
      • 5.3 Configuring Nexpose
        04:22
      • 5.4 Adding Hosts to Nexpose
        03:29
      • 5.5 Reviewing Results And Manual Checks
        03:30
    • Module 06 - Manual Testing

      30:40Preview
      • 6.1 Netcat
        04:23
      • 6.2 Protocol Checking
        07:52
      • 6.3 SSL Client
        04:48
      • 6.4 SSLScan
        04:37
      • 6.5 Nikto
        05:00
      • 6.6 Snmpwalk
        04:00
    • Module 07 - Metasploit

      56:16Preview
      • 7.1 Acquiring Metasploit
        02:32
      • 7.2 Setting Up Metasploit
        02:01
      • 7.3 Metasploit Web Interface
        03:26
      • 7.4 Configuring Workspaces
        02:44
      • 7.5 Running Nmap from Metasploit
        03:34
      • 7.6 Importing Nessus Results
        02:43
      • 7.7 Scanning with Metasploit
        03:51
      • 7.8 Looking at Vulnerabilities
        02:48
      • 7.9 Searching for Vulnerabilities
        02:09
      • 7.10 Running Exploits
        02:33
      • 7.11 Post Exploitation Data Gathering
        04:08
      • 7.12 Pivoting And Tunneling
        03:19
      • 7.13 Writing an MSF Plugin
        06:11
      • 7.14 Writing Fuzzers
        06:18
      • 7.15 Social Engineering Toolkit
        02:06
      • 7.16 Spear Phishing
        05:53
    • Module 08 - Simple Web Application Testing

      48:31Preview
      • 8.1 Browser Plugins with Chrome
        04:21
      • 8.2 Browser Plugins with Firefox
        03:49
      • 8.3 Tamperdata
        04:36
      • 8.4 Performing Injections with Tamperdata
        02:43
      • 8.5 Cookie Data with Tamperdata
        05:55
      • 8.6 SQL Inject Me
        03:26
      • 8.7 XSS Me
        03:25
      • 8.8 Firebug
        04:30
      • 8.9 Hackbar
        04:00
      • 8.10 Wappalyzer
        03:47
      • 8.11 Passiverecon
        04:05
      • 8.12 Groundspeed
        03:54
    • Module 09 - Webgoat

      12:54
      • 9.1 Acquiring Webgoat
        02:50
      • 9.2 Practicing Web Application Attacks
        02:33
      • 9.3 Basics of Webgoat
        03:04
      • 9.4 Working Through Lessons
        04:27
    • Module 10 - Burpsuite

      45:05
      • 10.1 Acquiring Burpsuite
        01:32
      • 10.2 Installing Burpsuite
        01:57
      • 10.3 Running Burpsuite And Configuring Your Browser
        02:49
      • 10.4 Spidering
        03:16
      • 10.5 Passive Scanning
        03:10
      • 10.6 Active Scanning
        03:20
      • 10.7 Investigating Results
        06:32
      • 10.8 Password Attacks
        05:20
      • 10.9 Fuzzing Attacks
        06:40
      • 10.10 Doing Sequencing
        04:34
      • 10.11 Using the Intruder
        05:55
    • Module 11 - Other Web Tools

      26:38Preview
      • 11.1 Acquiring W3Af
        02:17
      • 11.2 Installing W3Af
        02:11
      • 11.3 Running W3Af
        02:48
      • 11.4 Configuring W3Af
        04:28
      • 11.5 Acquiring And Configuring Zed Attack Proxy (ZAP)
        02:49
      • 11.6 Quick Start with ZAP
        02:50
      • 11.7 Scanning with ZAP
        03:06
      • 11.8 Spidering with ZAP
        02:39
      • 11.9 Fuzzing With ZAP
        03:30
    • Module 12 - Injection Attacks

      25:06Preview
      • 12.1 Web Architecture
        03:15
      • 12.2 Basics of SQL Injection
        04:46
      • 12.3 Manual Testing
        03:48
      • 12.4 SQLMap
        06:04
      • 12.5 Command Injection
        03:24
      • 12.6 Cross Site Scripting
        03:49
    • Module 13 - Social Engineering Attacks

      18:25
      • 13.1 Spear Phishing
        03:53
      • 13.2 Cross Site Request Forgery
        04:12
      • 13.3 Rogue Servers
        04:15
      • 13.4 Spoofed Certificates
        06:05
    • Module 14 - Conclusion

      05:51Preview
      • 14.1 Course Wrap Up
        02:19
      • 14.2 Next Steps
        03:32
    • Module 15 - Credits

      02:36
      • 15.1 About the Author
        02:36

Why Online Bootcamp

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts

FAQs

  • How do I enroll for the online training?

    You can enroll for the online training through our website. You can make online payment using any of the following options:
    • Visa debit/credit card
    • American Express and Diners Club cards
    • Master Card
    • PayPal
    Once the online payment is done, you will automatically receive payment receipt, via email.

  • What will I get along with this training?

    In this training, you will have access to online e-learning.

  • Can I cancel my enrollment? Will I get a refund?

    Yes! You can cancel your enrollment. We will provide you complete refund after deducting the administration fee. To know more, please go through our Refund Policy.

  • Do you provide money back guarantee for the training programs?

    Yes. We do offer a money-back guarantee for many of our training programs. You can refer to the Refund Policy and raise refund requests via our Help and Support portal.

  • Can I extend the access period?

    Yes, you can extend the access period by paying an additional fee. Please raise a request via our Help and Support portal.

  • Where and how can I access the e-learning content? Are there any limitations?

    Once you register with us for a course by paying the course fee, you can have 24/7 access to the e-learning content on our website. An automated course purchase confirmation mail from our side will guide you through the process.

  • I am not able to access the online course. Whom should I contact for a solution?

    Please raise a request via our Help and Support portal to have your issue resolved.

  • How will I get my course completion certificate from Simplilearn?

    Yes! We offer course completion certificate after you successfully complete the training program.

  • I’d like to learn more about this training program. Who should I contact?

    Contact us using the form on the right of any page on the Simplilearn website, or select the Live Chat link. Our customer service representatives will be able to give you more details.

  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.