The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


Advanced Offensive Computer Security Training

Course designed for pentesters, security professionals, and hackers who are looking for an advanced course in system/network penetration testing. It is designed to be a hands-on, lab-oriented course using Kali Linux as a base operating system, with additional tools added as we go along. What makes this course especially compelling are the sections on mobile hacking, rootkits and exploit development, so rarely found in basic to  mid-level courses.

Certificate of completion, 9 CPE credits

Course is self-paced


WITH THIS COURSE YOU GET:

    • Exercises and challenges;
    • Open discussion with other students;
    • An e-book of all the materials in pdf and epub formats, for your convenience (currently part 1, more to come); you can preview the e-book here ->;
    • Certificate of Completion;

WHO SHOULD ATTEND

Participants in the following industries will benefit the most:

        • Information security engineers
        • Penetration Testers
        • Those engaged in cyber warfare or espionage activities

STUDENT REQUIREMENTS

Students should know:

        • Basic Linux
        • Understanding of Microsoft Windows
        • Exploitation Concepts
        • Information Security Concepts

WHAT TO BRING

        • An Open mind
        • A computer with Kali Linux installed (VM is acceptable)
        • Enthusiasm for Information Security

Your instructor:

KeithDeBus

Keith DeBus is a former professor of computer science with over 20 years of IT experience. He is now the President of IT Securitas (www.itsecuritas.net), a leading IT security and pentesting firm. He has published numerous articles on cyber security, penetration testing, digital forensics and cyber warfare. DeBus has trained personnel from every branch of the U.S. military (Army, Air Force, Navy) and personnel from the NSA, CIA, FBI and NCIS in cyber warfare tactics.

DeBus is an internationally recognized expert on cyber warfare, network "hacking" and network intrusion detection systems (NIDS). Mr. DeBus holds or has held the following IT certifications; Sec+, CEH, CPT, ECSA/LPT, CHFI, CISA, CISM and CISSP


Course format

    • The course is self-paced – you can visit the training whenever you want and your content will be there.
    • Once you’re in, you keep access forever, even when you finish the course. 
    • There are no deadlines, except for the ones you set for yourself. 

Curriculum: 

Getting Started with Kali

    • Getting Started with Kali
    • BASH Basics
    • Netcat, the All- Powerful
    • TCP/IP and Wireshark

Information Gathering Techniques

    • Information Gathering Techniques – Introduction
    • Email Scraping
    • Shodan
    • Netcraft
    • Information Gathering using DNS
    • Information Gathering from SNMP
    • Information Gathering using SMTP
    • Information Gathering with Maltego

Port Scanning

    • Port Scanning - Introduction
    • Evading Firewalls and IDS
    • Nmap Scripting Engine (NSE)
    • Port Scanning
    • Operating System (OS) Fingerprinting
    • Port Scanning with Unicornscan

ARP Spoofing and MitM

    • ARPspoofing and MiTM
    • MiTM with Ettercap
    • DNS Spoofing with dnspoof
    • Using MiTM with driftnet to View the Target’s Images
    • Using a MiTM attack to Spy on the Target
    • Using Ettercap to Alter Messages/Packets
    • MiTM attacks, Hijacking Software Updates

Buffer Overflow Exploitation

    • Buffer Overflow Exploitation - Introduction
    • Buffer Overflow Exploitation - In Practice
    • Buffer Overflow Exploitation, Fuzzing
    • Exploit Development: Fuzzing with Spike

Working with Exploits

    • Working with Exploits
    • Working with Exploits: Using Exploit-DB to find Exploits

Transferring Files

    • Transferring Files, TFTP
    • Transferring Files, hping3

Metasploit

    • Metasploit, The Basics
    • Metasploit, Exploiting Linux with Metasploit
    • Metasploit, Hacking a Windows OS
    • Metasploit, Post Exploitation

QUESTIONS? 

If you have any questions, please contact our eLearning Manager at [email protected].

Course Reviews

4.7

4.7
3 ratings
  • 5 stars2
  • 4 stars1
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. W13

    5

    I likes the handling of he buffer overflow examples. Nice work

  2. W13

    4

    This course was a good sneak preview into a part of the techniques used for hacking,.

  3. Great Course

    5

    Great course, but I think should be to add chapter about Nexpose and Nessus

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.