Ethical Hacking - Capture the Flag Walkthroughs 1

Video and lab Walkthroughs for Capture the Flag Exercises

Course Summary

Welcome to Ethical Hacking - Capture the Flag Walkthroughs Part I

You've taken enough ethical hacking courses. You know about the different pentesting tools but you're just not quite sure how to use them in a real-world pentest.

Congratulations! You came to the right course!

Students having completed the Syberoffense Ethical Hacking course can now put to use what they have learned. You've seen the tools, heard all the war stories, now learn to hack as you've always wanted to.

Using the hacking methodology, this course will teach you how to use those pentesting tools to enumerate and gain root access. Over the span of the course, you will learn the different attack vectors used to exploit a target.

You'll learn Python, PHP scripting and tricks of the trade that will astound you!

This is not a course for beginners, bug hunters or wanna-be script kiddies. Anyone enrolling should have a good command of the Linux terminal and be able to follow written step-by-step instructions. Each step of every capture the flag exercise is covered in a video tutorial.

You've taken the ethical hacking courses, you've been introduced to the tools and the methodology. This course brings it all together showing students how to perform an actual pentest and gain root access.

Students step through each of the Capture the Flags (CTF) walkthroughs learning how to footprint a target, enumerate the target for possible vulnerabilities, analyze the vulnerabilities and exploit the target to gain root access. Each CTF demonstrates the advanced techniques and different attack vectors used by professional pentesters and hackers.

Students having completed the Syberoffense Ethical Hacking course can now put to use what they have learned. You've seen the tools, heard all the war stories, now learn to hack like you've been wanting to.

Don't cheat yourself! Check out the free preview of the first module of the course. Students have a lifetime a access and more CTF exercises will be added over time.

Course Curriculum

Professor K

Professor K comes to Zenler with a Master of Science in Cyber Security from UMUC (2015) and Master of Science in Information Technology from Capella University (2007).

Prof. K has worked in technology since 1998 working as a Microsoft Support Technician, a Microsoft Certified Trainer, Technology support specialist, a Senior Network Technology Consultant, an IT Auditor and most recently as the owner and operator of his own technology firm, CLK Technology Solutions located in Tucson Arizona. Prof. K's expertise in technology focuses on designing, building, supporting network infrastructures and network security.

Prof. K has taught online since 2008 and teaches for a number of other online universities and colleges.

Prof. K holds a number of valid technology certifications including:

. MCTS: Windows Server 2008 Active Directory, Configuration

• MCTS: Windows Server 2008 Applications Infrastructure, Configuration

• MCTS: Windows Server 2008 Network Infrastructure, Configuration

• A+, Net+, Security+

Prof. K spends his spare time working in his wood shop and providing free technical support to the local retirement community in Tucson Arizona.

John Smith

Developer

Highly Recommended Course. Easy to Understand, Informative, Very Well Organized. The Course is Full of Practical and Valuable for Anyone who wants to Enhance their Skills. Really Enjoyed it. Thank you!!

Course Pricing

  • One time payment
  • $49.99 USD

    One time payment with life time access

    BUY NOW