This hands-on course equips you with intermediate ethical hacking skills, covering white, grey, and black hat techniques. You’ll explore advanced reconnaissance with NMap, web and wireless attacks, and tools like PowerShell Empire, Netcat, and Wireshark. Practical labs include creating reverse shells, upgrading terminals, and advanced password hacking with Metasploit. By the end, you’ll master real-world red team practices for network, wireless, and web application penetration testing.
Who should take this Course?
The Advanced Ethical Hacking Online Course is ideal for cybersecurity professionals, penetration testers, network administrators, and IT security specialists who want to deepen their knowledge of advanced hacking techniques and defense strategies. It is also suitable for ethical hackers, security researchers, and students pursuing careers in cybersecurity who are eager to gain hands-on experience with real-world attack simulations, vulnerability exploitation, and advanced security testing tools.
What you will learn
Learn web application attacks
Learn Python scripting for pentesters
Learn wireless network attacks
Learn advance hacking methodologies
Learn about web app penetration testing
Explore PowerShell Empire
Course Outline
Course Overview
Course Overview
Virtual Lab Build
Downloading ISO and OVA file for VirtualBox
Create a Virtual Install of Kali Using VirtualBox
Create a Virtual Install of Metasploitable2
Creating Windows 7 Pro Target Machine Using VirtualBox
Installing the VirtualBox Extension Pack
NMap
Installing the WebMap-Nmap Dashboard
Automated Recon/Enumeration Using nMapAutomator
Reverse Shells, Privilege Escalation, and Persistent Backdoors
Create a Reverse Shell Using Command Injection
Create a Reverse Shell Using a File Upload
Launch an Automated Meterpreter Session
Upgrade a Dumb Terminal to Fully Functional BASH Shell
Windows 7 Privilege Escalation Using UAC Bypass
Creating a Persistent Backdoor Using a Persistent Service
PowerShell Empire
Create Virtual Install of Server 2016 Full GUI Using VirtualBox
Preparing Your Server 2016 Target
Promote Server 2016 to a Domain Controller
Installing PowerShell Empire On Kali Linux
Enumerating Active Directory
Post-Exploitation of Windows Using PowerShell Empire
Post Exploitation of Microsoft Windows
Advanced Password Hacking with Metasploit
Post-Exploitation of Microsoft Windows
Brute Force the SMB Password on a Windows Server
Enumerating Active Directory Using RPCClient
Dumping Wi-Fi Credentials Using netsh
Practical Pentesting Labs
Heartbleed OpenSSL Exploit Vulnerability
Performing an RDP Brute Force Attack
Exploiting Active Directory using LLMNR/NBT-NS Poisoning
Accessing Kali Across the WAN with NGROK
Pentesting with Netcat
Enumerate DNS Records Using DNSRecon
Auditing Wireless Networks
Installing a Wireless Adapter in Kali
J Hacking a Wireless Network Using Kali Linux
Wireless Deauthentication Attack
PMKID Client-less Wireless Attack Using Bettercap
Wireshark
Overview of Wireshark 3.2
Wireshark Capture Options
Wireshark Toolbar Icons
Capturing Wireless Traffic Using Wireshark
Capturing a 3-way TCP Handshake Using Wireshark
Web App Penetration Testing
Creating a virtual install of OWASP
Setting Up Burp Suite
Attack Web Apps with Burp Suite Using SQL Injection
OS Command Injection Using Commix 3.2x
Web Application Firewall Detection Using WAFW00F
Exploit Vulnerable Web Applications Using Command Injection