Gain practical skills in network mapping with Nmap, packet analysis with Wireshark, and ethical hacking methodologies using Kali Linux. Explore host discovery, port scanning, vulnerability assessments, traffic capture, packet dissection, and a wide range of security tools. Develop hands-on expertise in network reconnaissance, web app testing, wireless hacking, exploitation, and post-exploitation techniques. This comprehensive path equips you with essential InfoSec knowledge to identify risks, conduct ethical hacking assessments, and strengthen organizational security posture.
40 Skills|6 Courses|5 Projects
Quick Start with Nmap
Quick Start with Nmap
Beginner
9 Learned
Cyber Security
In this course, you will learn about Nmap, a powerful network scanning tool that is used to discover hosts and services on a computer network.
In this course, you will learn how to use Wireshark to capture and analyze network traffic. You will learn how to install Wireshark, capture packets, and analyze them. You will also learn how to use Wireshark to troubleshoot network issues, analyze network traffic, and secure your network.
Lab
Privilege Escalation Techniques on Linux
Beginner
3 Learned
Pen Testing
In this course, you will learn about privilege escalation techniques on Linux. It is a beginner level course and will cover various techniques to escalate privileges on Linux systems.
Lab
Kali Server Exploitation in Action
Beginner
2 Learned
Cyber SecurityPen Testing
This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting network services, brute-forcing remote access, developing custom scanners, attacking vulnerabilities like IngressLock, Samba, and Unreal IRCd, creating malicious PDFs, and privilege escalation. Through hands-on labs, you'll gain end-to-end pentesting skills - information gathering, vulnerability analysis, exploitation, and maintaining access.
Lab
Kali Web Application Attacks in Action
Beginner
0 Learned
Cyber SecurityPen Testing
In this course, you will learn how to perform web application attacks using Kali Linux. Topics covered include web penetration testing, discovering web vulnerabilities, using BeEF for web attacks, cross-site scripting (XSS) attacks, SQL injection, file inclusion attacks, web app pentesting with Metasploit, brute-forcing web passwords, cross-site request forgery (CSRF), command injection, bypassing CAPTCHA, denial of service (DoS) attacks, AJAX security issues, session hijacking, exploiting IE browser vulnerabilities with Metasploit, web shell backdoors, and mitigating web security vulnerabilities.
Lab
Web Vulnerability Mastery
Beginner
1 Learned
Pen Testing
In this course, you will learn about the most common web vulnerabilities and how to exploit them. You will learn about SQL Injection, File Inclusion, Cross-Site Scripting (XSS), File Upload, Command Injection, and Directory Traversal vulnerabilities. You will also learn how to exploit these vulnerabilities using various techniques and tools.