Companies Home Search Profile

Capture the Flag (CTF) - intermediate Level Training

Focused View

Whitesec online security organization

6:02:21

173 View
  • 1 - Installing kali Linux and vmware workstation.mp4
    03:25
  • 2 - 1Metasploit Framework About Metasploit.mp4
    01:11
  • 3 - 2Metasploit Framework Metasploitable Machine.mp4
    01:35
  • 4 - 3Metasploit Framework Footprinting.mp4
    12:03
  • 5 - 4Metasploit Framework Scanning.mp4
    08:55
  • 6 - 5Metasploit Framework Exploiting FTP.mp4
    04:40
  • 7 - 6Metasploit Framework Exploiting RMI.mp4
    04:13
  • 8 - 1Linux Commands for Pentesters.mp4
    22:50
  • 9 - 2Linux Commands for Pentesters.mp4
    30:54
  • 10 - 1Basic Penetration Testing on Linux Base Machine.mp4
    00:43
  • 11 - 2Basic Penetration Testing Lab setup.mp4
    01:32
  • 12 - 3Basic Penetration Testing FootPrinting and scanning.mp4
    04:59
  • 13 - 4basic Penetration Testing Backdoor Webserver.mp4
    14:08
  • 14 - 5Baisc Penetration Testing Gaining shell.mp4
    04:25
  • 15 - 6Basic Penetration Testing Gaining root Access.mp4
    13:52
  • 16 - 1Basic Linux penetration Testing2intro.mp4
    00:20
  • 17 - 2Basic Linux penetration Testing2Scanning.mp4
    03:05
  • 18 - 3Basic Linux penetration Testing2initial Access.mp4
    07:08
  • 19 - 4Basic Linux penetration Testing2Uploading Shell.mp4
    03:15
  • 20 - 5Basic Linux penetration Testing2Privilege escalation.mp4
    07:47
  • 21 - 1Basic Linux penetration Testing3 introduction.mp4
    00:39
  • 22 - 2Basic Linux penetration Testing3 scanning.mp4
    03:41
  • 23 - 3Basic Linux penetration Testing3 Password Cracking.mp4
    05:37
  • 24 - 4Basic Linux penetration Testing3 initial access.mp4
    05:44
  • 25 - 5Basic Linux penetration Testing3 initial access2.mp4
    03:14
  • 26 - 6Basic Linux penetration Testing3 Privilege escalation.mp4
    06:48
  • 27 - 1Linux Penetration Testing setup Lab.mp4
    01:00
  • 28 - 2Linux Penetration Testing Scanning.mp4
    13:23
  • 29 - 3Linux Penetration Testing User Enumeration.mp4
    07:52
  • 30 - 4Linux Penetration Testing Bruteforce Attack.mp4
    06:50
  • 31 - 5Linux Penetration Testing Gaining shell access.mp4
    03:52
  • 32 - 6Linux Penetration Testing Privilege escalation to User.mp4
    08:23
  • 33 - 7Linux Penetration Testing Privilege escalation.mp4
    06:17
  • 34 - 1Linux Penetration Testing Beginner LevelCTF1.mp4
    00:20
  • 35 - 2Linux Penetration Testing Beginner LevelCTF2.mp4
    02:12
  • 36 - 3Linux Penetration Testing Beginner LevelCTF3.mp4
    06:09
  • 37 - 4Linux Penetration Testing Beginner LevelCTF4.mp4
    11:53
  • 38 - 1Windows Penetration Testing Beginner Level setup.mp4
    02:39
  • 39 - 2Windows Penetration Testing Beginner Level scanning.mp4
    15:44
  • 40 - 3Windows Penetration Testing Beginner Level capture flag.mp4
    01:57
  • 41 - 4Windows Penetration Testing Beginner Level Initial Access.mp4
    09:35
  • 42 - 5Windows Penetration Testing Beginner Level Privilege escalation.mp4
    04:28
  • 43 - 6Windows Penetration Testing Beginner Level Flag.mp4
    01:09
  • 44 - 1Windows Penetration Testing IntermediatelevelIntroduction.mp4
    00:45
  • 45 - 2Windows Penetration Testing IntermediatelevelScanning.mp4
    08:33
  • 46 - 3Windows Penetration Testing IntermediatelevelInitial Access.mp4
    06:56
  • 47 - 4Windows Penetration Testing IntermediatelevelExplore.mp4
    06:37
  • 48 - 5Windows Penetration Testing IntermediatelevelPrivilege escalation.mp4
    04:23
  • 49 - 6Windows Penetration Testing IntermediatelevelPrivilege escalation 2.mp4
    05:06
  • 50 - 1Linux Penetration Testing Intermediate Level introduction.mp4
    00:25
  • 51 - 2Linux Penetration Testing Intermediate Level Scanning.mp4
    04:16
  • 52 - 3Linux Penetration Testing Intermediate Level Initial Access.mp4
    08:28
  • 53 - 4Linux Penetration Testing Intermediate Level Initial Access2.mp4
    04:53
  • 54 - 5Linux Penetration Testing Intermediate Level initial Access3.mp4
    08:20
  • 55 - 6Linux Penetration Testing Intermediate Level Initial Access4Exploiting.mp4
    04:10
  • 56 - 7Linux Penetration Testing Intermediate Level Exploiting executable.mp4
    03:08
  • 57 - 8Linux Penetration Testing Intermediate Level Exploiting Executable.mp4
    06:16
  • 58 - 9Linux Penetration Testing Intermediate Level Privilege escalation.mp4
    09:39
  • Description


    Finding and exploiting Linux vulnerabilities and misconfigurations to gain a root shell.

    What You'll Learn?


    • Exploiting Open Ports
    • Linux Penetration Testing
    • Windows Penetration Testing
    • Hacking Webservers
    • Perform remote exploitation of systems
    • Escalate local privileges to root level

    Who is this for?


  • Ethical Hackers
  • Penetration Testers
  • What You Need to Know?


  • Need Basic Knowledge about Kali Linux
  • Need Basic Knowledge about System Commands
  • Need Basic Knowledge about webservers
  • More details


    Description

    A penetration test, also called a PEN-TEST or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture. These penetration tests are often carried out by ethical hackers. These in-house employees or third parties mimic the strategies and actions of an attacker in order to evaluate the hackability of an organization's computer systems, network or web applications. Organizations can also use pen testing to test their adherence to compliance regulations.

    Ethical hackers are information technology (IT) experts who use hacking methods to help companies identify possible entry points into their infrastructure. By using different methodologies, tools and approaches, companies can perform simulated cyber attacks to test the strengths and weaknesses of their existing security systems. Penetration, in this case, refers to the degree to which a hypothetical threat actor, or hacker, can penetrate an organization's cybersecurity measures and protocols.

    Capture the Flag (CTF) Training focuses on enhancing a professional’s regarding Pentesting, the latest knowledge and practical experience for expanding their skill set.This training is an assurance to polish the problem-solving skills, and to offer critical hands-on practice under the right level of pressure so that candidates get the feel of real-life situation.

    CTF Competitions are the perfect way to enhance the talent of an individual Hacker. Many organizations consider it a right platform to find the skilled ethical hacker with the best academic and hands-on learning experience. CTF training, therefore, is an opportunity not only to learn the skills of ethical hacking but also to be found by the organization for their best of the job opportunities. The successful completion of this training will help the participants in learning


    Who this course is for:

    • Ethical Hackers
    • Penetration Testers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Whitesec online security organization
    Whitesec online security organization
    Instructor's Courses
    The Fast Evolution And Constant Threat Of Cyber Attacks, Our Ever-Growing Reliance Upon Digital Processes, And The Exponential Increase In Online Data Makes Cyber Security One Of The Greatest Challenges Of Our Time. Despite This, Few Are Equipped With The Necessary Skills To Tackle It. Whitesec Was Created To Close The Skills Gap Quickly, Efficiently And Effectively. Taught By World-Renowned Ethical Hackers, Our Students Are Plunged Head-First Into Real World Cyber-Attack Simulations And Are Assessed Across A Variety Of Practical Assignments Designed To Cover Every Angle. In Short, We Teach Students How To Think, Act And Move Like A Hacker – And Then Outmanoeuvre Them. Sadly, This Kind Of Approach Did Not Exist On The Market Before Whitesec; Cyber Security Qualifications Were Mostly Delivered By Large, Expensive Training Firms, Relied Heavily On Theory, And Were Often Out-Of-Date Even Before Publication. What Was Critically Required Was Cyber Security Training That Moved As Fast As The Attackers. Thus, Whitesec Was Born. Our Method Not Only Equips People With The Right Skills And Mindsets, But Can Train Many People At Scale. Whitesec Initially Began With Training Nights In Many Countries But Quickly Developed Into Series Of Workshops. Soon, This Evolved Into A Four-Day, Classroom Based Course Called ‘Hands On Hacking’.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 58
    • duration 6:02:21
    • English subtitles has
    • Release Date 2022/11/20