In this intermediate White Hat Hacking training, Keith Barker prepares security professionals to become penetration and vulnerability testers.
Demand for security professionals is at an all-time high — and that’s particularly true for pen testers. With this security training, you’ll learn how to scan networks for vulnerabilities, use Kali Linux to (legally) hack into systems, and write reports on how you did it.
Security professionals who take this White Hat Hacking course will have the skills they need to advance into pen tester roles — and get one of the several offensive security certifications.
For anyone who manages security training, this White Hat Hacking training can be used for penetration and vulnerability exam prep, upskilling security professionals, or to create training plans for network or security professionals.
White Hat Hacking v10: What You Need to Know
While this White Hat Hacking training doesn’t map to a certification, it covers these security topics that are valuable to aspiring pen testers and more:
- Kali Linux VM and its benefits and uses for penetration testing
- Ethical hacking: vocabulary, concepts, and strategies, as well as attack categories, types, and vectors
- Hacker’s tools: search engine, website recon, metagoofil metadata tool, DNS tools, WHOIS, and more
- Network Scanning: overview, methodology, port discovery, stealth idle scanning, vulnerability scanning, and network mapping
- Network technologies: SNMP, NetBios, LDAP, NTP, SMTP, proxy services
- Password cracking: overview, concepts, MITM and sniffing, with demonstration in the lab
- Malware: spyware, buffer overflow, trojans, viruses, detection, analysis, remedies
- Web application security: OWASP, SQL injection, man-in-the-middle, session hijacking
- Cloud computing security, mobile security, Wi-Fi security, and other special topics





