Whitehat Hacking and Penetration Testing Video Tutorial Course

CareerVision Training

£ 70 - (Rs 6,050)
VAT incl.

Important information

  • Training
  • Beginner
  • Distance learning
  • Duration:
  • When:
  • Delivery of study materials

• Format: DVD-ROM
• Duration: 10.5 Hours (103 lessons)
• Instructor: Ric Messier
• Platform: Windows PC or Mac


In this Ethical Hacking - Whitehat Hacking and Penetration testing training course, expert Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks.

Some of the topics covered in this course are; researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography.

Important information

Requirements: This is a DVD Video Tutorial Course which is shipped to you. Work through the video tutorials at your own pace. If you have the software you can practice along with the instructor using the same exercise files as the instructor which are included on the DVD. The narrated training videos demonstrate the key tools and professional techniques helping you to work faster and smarter. All the concepts of each application are explained clearly and precisely. The DVD works on PC and Mac. You can jump to and from lessons and work at your own pace.


Where and when

Starts Location
Distance Learning

What you'll learn on the course

Security Awareness
Whitehat Hacking
Protecting Hardware
Protecting Software

Course programme

01. Introduction
0101 What You Should Expect From The Video
0102 What Is Hacking?
0103 Why Do We Hack?
0104 Types Of Hacking (Ethical, Black Hat, Gray Hat, Hacktivism, Etc)
0105 Being Ethical
0106 Legal Issues Around Hacking
0107 Methodology
0108 Types Of Attacks
0109 Skills Necessary And Skills To Be Learned
0110 What Is Penetration Testing/Scope?
02. Getting The Background - Footprinting And Reconnaissance
0201 What Is Footprinting?
0202 History Lessons - Way Back Machine
0203 Using Your Resources - Job Listings, People Searches, Social Networks
0204 Using Whois Lookups
0205 Using DNS To Extract Information
0206 Finding Network Ranges
0207 Google Hacking
0208 Mining For Information Using Google Hacking
0209 Google Hacking Database
03. Networking Fundamentals
0301 History Of TCP/IP
0302 Using Wireshark To Examine Packets
0303 OSI And IP Models
0304 Addressing
0305 UDP
0306 TCP
0307 Services
0308 Using Wireshark For Deep Analysis
0309 DHCP
0310 Using ARP
04. Cryptography
0401 History Of Cryptography
0402 Types Of Cryptography
0403 Public Key
0404 Certificates
0405 Hashing
0406 AES, DES, 3DES
0407 SSL/TLS
0408 SSH
0409 Disk Encryption
0410 Cryptographic Analysis
05. Scanning And Enumeration
0501 Types Of Scans
0502 Using NMAP
0503 Other Types Of Scans
0504 Using hping And Its Uses
0505 War Dialing
0506 IDS Evasion
0507 Banner Grabbing
0508 Vulnerability Scanning
0509 Using Nessus
0510 Enumeration Techniques
0511 SNMP
0512 LDAP
0513 Using Proxies
0514 Tor And Anonymizers
0515 Tunneling
06. Penetration
0601 Goals
0602 Password Cracking And Complexity
0603 Password Attacks
0604 Password Storage Techniques
0605 Privilege Escalation
0606 Spyware, Rootkits And Key Loggers
0607 Metasploit Basics
0608 Auditing/Logging
0609 Metasploit Again
07. Malware - Trojans, Backdoors, Viruses And Worms
0701 Definitions And History
0702 Detection Of Malware
0703 Anti-Virus Evasion
0704 Deployment Of Malware
0705 Virus Types
0706 Malware Analysis
0707 Windows ADS And Hiding Malware
0708 Doing Debugging - OllyDbg
0709 Packing And Automated A/V Maker Tools
0710 More Malware Analysis
08. Denial Of Service Attacks
0801 What Is DoS? DDoS?
0802 DoS Attacks
0803 Cyber Crime
0804 Botnets
0805 Attack Countermeasures - Flooding
09. Web Application Hacking
0901 What Is Web Application Testing?
0902 Web Application Architecture
0903 Web Testing Tools
0904 Cross Site Scripting
0905 SQL Injection
0906 Cross Site Request Forgery
0907 Session Hijacking And Attacks And Cookies
0908 Password Attacks
0909 Encoding
10. Wireless Networking
1001 Wireless Networking
1002 Encryption Techniques - WEP, WPA, WPA2
1003 Finding Hotspots
1004 Breaking WEP Encryption
1005 Rogue Access Points And Attacks
1006 Wireless Sniffing
1007 Protecting Wireless Networks
11. Detection Evasion
1101 What Is Evasion And Why Do We Use It?
1102 Steganography
12. Programming Attacks
1201 Stacks And Heaps
1202 Buffer Overflows
1203 Protecting Against Buffer Overflow Attacks
1204 Format String
1205 De-Compilation
1206 Reverse Engineering
13. About The Author
1301 About Me