Best Penetration Testing Course EVER!

Опубликовано: 10 Декабрь 2024
на канале: ComproAvi
5,132
151

Access Full Course For Free: https://courses.comproavi.com/courses...

All resources / links / labs are also much easily accessible when you enroll in the course for free on my website.

But if you plan to study directly from this YouTube video,
Download all required links, labs and resources from: https://docs.google.com/document/d/11...

Apply coupon "COMPROAVI" to make the course FREE on my website.
If that doesn't work, try other free coupons "THANKSAVINASH", "AVINASHROCKS" and "YOUARETHEBEST"

Course created by Avinash Yadav (yes - that's me)
Follow me on LinkedIn:   / avinash-infosec  
Check my courses on Udemy: https://www.udemy.com/user/avinash-in...
Visit my website: https://courses.comproavi.com
Subscribe to me on YouTube: ‪@ComproAvi‬

I have more such videos on the channel, check my channel out.

Subscribe, Share And Like For Free, If You Want To See More Of My Videos :)



-----
⭐️ Timestamps ⭐️

Introduction 0:00
Course Starts Here 7:14

SECTION 1 - FUNDAMENTALS

Theoretical Basics of Penetration Testing 8:40

Lab Setup using the VMware Player 38:37

Basics of Kali Linux for Pentesters 51:39

Basics of Windows for Pentesters 3:04:26


SECTION 2 - PASSIVE INFORMATION GATHERING

Passive Reconnaissance - Part 1 3:56:41

Passive Reconnaissance - Part 2 4:08:43

Passive Reconnaissance - Part 3 4:21:27

Store Passive Data in the Right Way 4:33:05


SECTION 3 - ACTIVE INFORMATION GATHERING

Active Reconnaissance - Part 1 4:35:19

Active Reconnaissance - Part 2 4:45:53

Active Reconnaissance - Part 3 4:59:19

Store Active Data in the Right Way 5:09:53


SECTION 4 - VULNERABILITY ANALYSIS

What is a Vulnerability Assessment 5:10:04

Manually Identify, Analyze and Rank Vulnerabilities 5:10:16

Automated Vulnerability Assessment using Nessus 5:34:54

Automated Vulnerability Assessment - Nmap & VEGA 5:56:32


SECTION 4 - EXPLOITATION

LAB 1 - Exploitation with Metasploit Framework 6:06:06

LAB 2 - Exploitation without Metasploit Framework using Manual Public Exploits 6:37:23

Essential Things You Should Know 7:07:59


SECTION 5 - WEB PENETRATION TESTING

CMS Pentesting - Initial Information Gathering 7:08:11

CMS Pentesting - Directory Busting and CMS Scanning 7:22:42

CMS Pentesting - General Brute Forcing and Exploitation 7:36:46

Do you know the Power of Version Numbers? 8:03:07

Important Specific Vulnerabilities such as SQL Injection in-depth 8:39:00

Important Specific Vulnerabilities such as XSS in-depth 9:05:17

Important Specific Vulnerabilities such as File Upload & Command Injection 9:23:00

Part 1 Web Server Pentesting: Intro & Enumeration Ideas 9:37:14

Part 2 Web Server Pentesting: Risky PUT & DELETE Methods 9:50:06

Part 3 Web Server Pentesting: SSH Brute Forcing w/ Hydra 10:04:57


SECTION 6 - NETWORK PENETRATION TESTING

The Core of Network Testing - Part 1 10:13:27

The Core of Network Testing - Part 2 10:30:22

The Core of Network Testing - Part 3 10:49:48

Post Exploitation using Metasploit - Part 1 11:00:38

Post Exploitation using Metasploit - Part 2 11:14:03

Post Exploitation using Metasploit - Part 3 11:25:43

It's not the end yet 11:35:37

BUT WAIT. THERE'S MORE TO LEARN IN THE FULL VERISON OF THIS COURSE WHICH IS AVAILABLE FOR FREE ON MY WEBSITE.
Link: https://courses.comproavi.com/courses...



-----
Disclaimer :

This EDUCATIONAL video is ONLY meant for web developers or security professionals who want to secure their websites and networks from such attacks.

We do not promote any illegal activity or hacking without written permissions in general.

The security testing techniques demonstrated should only be used on systems and networks with permission to test. The purpose of the video is to teach viewers about cybersecurity and penetration testing, and not for any illegal or malicious activities. Any actions taken by viewers are solely their own responsibility, and the creator of the video, his partners and affiliates, YouTube, its partners and affiliates will not be held liable for any misuse of the information and tools presented. The video does not contain anything illegal, and all tutorials and videos within this course have been made using our own servers, websites, routers etc.

The purpose of the video is to raise awareness about security and inform viewers on how to prevent themselves from becoming victims of hackers. We believe knowing basics of how hacking is done is essential to defending oneself from hackers.

Further, penetration testing is a fully legal and ethical career within the field of cybersecurity. This video teaches the basics of penetration testing so that individuals can improve on their skills and start a career in this field.