Intermediate Ethical Hacking Hands-on Training

Instructor: Packt - Course Instructors

What you'll learn

  •   Apply Python scripting skills for penetration testing.
  •   Analyze the methods for conducting wireless network attacks.
  •   Conduct web application penetration testing.
  •   Explore and explain the functionalities of PowerShell Empire.
  • Skills you'll gain

  •   Virtual Environment
  •   Network Protocols
  •   Penetration Testing
  •   Vulnerability Assessments
  •   Network Security
  •   TCP/IP
  •   Active Directory
  •   Open Web Application Security Project (OWASP)
  •   Windows PowerShell
  •   Microsoft Windows
  •   Cyber Security Assessment
  •   Scripting
  •   Wireless Networks
  •   Network Analysis
  • There are 12 modules in this course

    This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Intermediate Ethical Hacking Hands-On Training provides essential intermediate skills in white, grey, and black hat hacking. It covers advanced reconnaissance with the NMap scripting engine and pentesting tools. Key sections include: - Web application attacks, wireless network attacks, PowerShell Empire, Netcat, and Wireshark fundamentals. - Creating a reverse shell via command injection, - Upgrade a dumb terminal to a BASH Shell, - Perform advanced password hacking with Metasploit, - Dump Wi-Fi credentials using netsh. By the end of the course, you’ll understand network, wireless, and web application penetration testing. Lab exercises are based on real-world Red Team practices. The course teaches web application attacks, Python scripting for pentesters, wireless network attacks, and advanced hacking methodologies, and explores PowerShell Empire. Designed for those with introductory knowledge in ethical hacking or pentesting, this course deepens your expertise. This course is ideal for aspiring ethical hackers and IT security professionals who have a basic understanding of networking, operating systems, and scripting. A familiarity with Kali Linux and basic command-line operations is recommended, but not required, as the course will guide you through the necessary setups.

    Virtual Lab Build

    NMap

    Reverse Shells, Privilege Escalation, and Persistent Backdoors

    PowerShell Empire

    Post Exploitation of Microsoft Windows

    Practical Pentesting Labs

    Auditing Wireless Networks

    Wireshark

    Web App Penetration Testing

    Remaining Anonymous While Pentesting

    SQL Injection to Shell Walkthrough

    Explore more from Computer Security and Networks

    ©2025  ementorhub.com. All rights reserved