Booking options
£19
£19
On-Demand course
All levels
This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement.
The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.
Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements.
Benefits of CPD
Improve your employment prospects
Boost your job satisfaction
Promotes career advancement
Enhances your CV
Provides you with a competitive edge in the job market
Demonstrate your dedication
Showcases your professional capabilities
The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill.
Benefits of IPHM
It will help you establish a positive reputation in your chosen field
You can join a network and community of successful therapists that are dedicated to providing excellent care to their client
You can flaunt this accreditation in your CV
It is a worldwide recognised accreditation
This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.
Benefits of Quality License Scheme
Certificate is valuable
Provides a competitive edge in your career
It will make your CV stand out
Course Overview | |||
Course Overview | 00:04:00 | ||
Building Your Virtual Lab Environment | |||
Video - Downloading ISO and OVA Fles for VirtualBox | 00:08:00 | ||
Video and lab - Creating a Virtual install of Kali using VirtualBox | 00:12:00 | ||
Video and Lab - Creating a Virtual Install of CSI Linux 2021.2 | 00:12:00 | ||
Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox | 00:08:00 | ||
Video - Installing the VirtualBox Extension pack | 00:02:00 | ||
Video - Taking a Snapshot of Your Current Configuration | 00:04:00 | ||
Passive Reconnaissance | |||
Video and Lab - Gathering Information Using Maltego | 00:09:00 | ||
Video and Lab - Gathering Information Using CSI Linux Investigator | 00:08:00 | ||
Video and Lab - Preparing CSI Linux to Use Shodan | 00:05:00 | ||
Video and Lab - Using Shodan to Find Vulnerable Devices | 00:16:00 | ||
Nmap | |||
Video and Lab - Introduction to NMap | 00:17:00 | ||
Video and lab - NMap Scripting Engine (NSE) | 00:19:00 | ||
Video and lab - Scanning for WannaCry Ransomware | 00:14:00 | ||
Scanning for Vulnerabilities Using Nessus | |||
Video and Lab - Installing NESSUS Using Docker | 00:11:00 | ||
Video and lab - Scanning for Vulnerabilities Using Nessus | 00:10:00 | ||
Video - Using Your Nessus Scan Results | 00:12:00 | ||
Scanning for Vulnerabilities Using OpenVAS | |||
Video and Lab - Installing OpenVAS Using Docker | 00:09:00 | ||
Video and Lab - Scanning for Vulnerabilities Using OpenVAS | 00:10:00 | ||
Exploiting Microsoft Windows | |||
Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP | 00:09:00 | ||
Video and Lab - Establishing A VNC Shell Using Meterpreter | 00:18:00 | ||
Video and Lab - Using Meterpreter to backdoor Windows XP | 00:11:00 | ||
Exploiting Linux | |||
Video and lab - Installing Metasploitable2 Using VirtualBox | 00:10:00 | ||
Social Engineering | |||
Video and Lab - Using the Social Engineering Toolkit (SET) | 00:07:00 | ||
BASH Scripting for Pentesters | |||
Video and Lab - Introduction to BASH Scripting | 00:08:00 | ||
Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports | 00:16:00 | ||
Video and Lab - Password Cracking Using Medusa | 00:06:00 | ||
Video and Lab - Passwords Cracking Using Mimikatz | 00:11:00 | ||
Pentesting Wireless Networks | |||
Video and Lab - Installing a Wireless Adapter in Kali | 00:09:00 | ||
Video and Lab - Hacking a Wireless Network Using Kali Linux | 00:14:00 | ||
Wireless Deauthentication Attack | 00:06:00 | ||
PMKID Client-less Wireless Attack Using Bettercap | 00:10:00 | ||
Web Based Application Attacks | |||
Video and Lab - Installing w3af in Kali Linux Using Docker | 00:13:00 | ||
Video and Lab - Conducting A Website Vulnerability Scan Using w3af | 00:05:00 | ||
Video and Lab - Performing a Browser Based Attack | 00:12:00 | ||
Video and lab - SQL Injection Attack Using SQLmap | 00:12:00 | ||
Browser Exploitation Framework (BeEF) | |||
Video - Configure Kali for Exploitation the WAN | 00:16:00 | ||
Video and lab - The Browser Exploitation Framework (BeEF) | 00:19:00 | ||
Remaining anonymous | |||
Video and Lab - Anonymize Kali Using Whonix | 00:10:00 | ||
Capture The Flag Walkthrough - Mr. Robot | |||
Video Walk Through -Key #1 | 00:13:00 | ||
Video Walk through - Key #2 | 00:19:00 | ||
Video Walk Through - Key #3 | 00:08:00 | ||
Capture The Flag Walkthrough - Stapler | |||
Video - Capture the Flag - Stapler Part 1 | 00:18:00 | ||
Video - Capture the Flag - Stapler Part 2 | 00:17:00 | ||
Video - Capture the Flag - Stapler Part 3 | 00:17:00 | ||
Obtain Your Certificate | |||
Order Your Certificate of Achievement | 00:00:00 | ||
Get Your Insurance Now | |||
Get Your Insurance Now | 00:00:00 | ||
Feedback | |||
Feedback | 00:00:00 |