Companies Home Search Profile

Penetration Testing: Malware backdoor for beginners

Focused View

Bassam Darweesh

38:54

45 View
  • 1. What we will do in this section.mp4
    01:33
  • 2. Install VMWare.mp4
    02:32
  • 3. Configure Network Vmware.mp4
    04:06
  • 4. Create Virtual Machine.mp4
    02:53
  • 5. Install Windows 7.mp4
    06:05
  • 6. Install Kali Linux.mp4
    03:19
  • 1. Malware.mp4
    02:55
  • 2.1 Malware.pdf
  • 2. Malware pdf document.html
  • 3. NCAT.mp4
    02:43
  • 4. Reverse Connection.mp4
    01:40
  • 5. Persistent Backdoor.mp4
    03:04
  • 6. Metasploit.mp4
    08:04
  • Description


    Learn the different types of Malware & how to do ethical hacking, penetration testing and get access on a system

    What You'll Learn?


    • Step by step of how to build your own virtual hacking environment & penetration testing Lab
    • Learn & Understand the different types of malware
    • Learn How to Use NCAT for getting access on a victim's Computer through internal network
    • Learn How to Use reverse connection for getting access through external network (from the internet)
    • Learn How to Create a persistent backdoor
    • Learn How to Use the Metasploit & meterpreter shell for getting access & control on a system
    • A detailed pdf documents are available for deep dive information

    Who is this for?


  • Anyone Planning to be Ethical Hacker, Penetration Tester, Reverse Engineer, Malware Analyst, Security consultants, etc.
  • Anyone preparing for CEH, LPT, OSCP, OSCE etc.
  • What You Need to Know?


  • No Linux, programming or hacking knowledge required
  • Nothing else! It’s just you, your computer and your ambition to get started
  • More details


    Description

    Welcome to our Course "Penetration Testing: Malware backdoor for beginners "


    This course will take you on a journey of learning what malware is, how to create backdoor with NCAT and how you can get control over a system.

    Once you are able to understand how hackers think, you will be able to use your new skills to continue your learning in ethical hacking and penetration testing.


    We have designed this course to enable those aspiring to enter the information security field to learn concepts on malware/backdoor. By the end of this course, you will be familiar with the various types of malware attacks and able to create a backdoor & get access and control to a System

    This course is perfect for anybody who is passionate about developing their skills in the field of Ethical Hacking, Penetration Testing, Cyber Security and Information Security. No prior training is required to take this course as we will start with the basics. We welcome anyone with a thirst for learning.


    Together, we will walk you through the entire learning process step by step.

    With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section or send us a message and we'll respond to you

    Who this course is for:

    • Anyone Planning to be Ethical Hacker, Penetration Tester, Reverse Engineer, Malware Analyst, Security consultants, etc.
    • Anyone preparing for CEH, LPT, OSCP, OSCE etc.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Bassam Darweesh
    Bassam Darweesh
    Instructor's Courses
    Bassam is a senior consultant with +15 years of work experience in the IT and information security fields. He leaded and managed many of successful Projects in different industries specially the financial sector (Banks & insurance companies).Bassam is new to Udemy but he is a creative on creating entertaining presentations, labs and demonstrations that breakdown complex technology topics for audiences. He also has decades of experience teaching students from all over the world.Bassam's areas of Expertise;    Penetration Testing and Security Audits    Advanced Threat Analytics    Digital Forensics    Networks Design, Implementation and Monitoring [NOC]    Cisco, Microsoft , Amazon, VMware, Solarwinds, Manage Engine Solutions    Firewalls (Cisco, Palo Alto, Sophos, Cyberoam, Sonicwall,..etc)    Information Protection, Multi-Factor authentication, Mobile Device Management (BYOD)    MS Exchange 2013/2016    MS Lync 2010, Lync 2013 and Skype for Business 2015    IP Call Manger (Cisco, Avaya IP Office and Open Source)    Infrastructure (windows Servers, AD, DNS, DHCP, GP, ADFS,CA,..etc)    Cloud Computing (Microsoft Azure, Office365 and AWS)    Python Programming    Adobe premiere Pro and After Effects    Analytics, Business Strategies and Projects Management
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 11
    • duration 38:54
    • English subtitles has
    • Release Date 2023/09/04