How To Build the Ultimate Penetration Testing Hacking Lab
What you’ll learn
At the end of the course you’ll will have a complete penetration testing lab installed
You will have a complete pentest lab configured on your laptop.
You’ll be able to freely practice hacking machines without fear of getting in trouble or causing irreversible damage.
You’ll be able to confidently explain hacking techniques and attacks because you’ve actually executed them yourself!
You need a beefy laptop to run through this course.
8GB of RAM is the minimum requirement but 16GB is ideal
100GB of free hard drive space on a SSD is ideal; however a traditional HDD will also work but it’ll take twice as long to build
Windows 10 is recommended; however Windows 8.1 or Windows 7 is also acceptable.
You need to be already know the bare basics of Virtualization, Linux and Windows.
Do You Have What It Takes?
Have you ever wondered how hackers breach systems? How does malware work? How do hackers crack passwords, gain unauthorized access to social sites such as Facebook or impersonate legitimate users by stealing credentials?
What if it were possible to pass the CompTIA Security+ exam without just reading a book or watching a video?
What if you could actually create real-life attack scenarios in the comfort of your own home using the very tools the attackers use?
Maybe You Have Questions…
Do I need to know Linux?
What programming languages do I need?
How long will it take?
I’m new, where should I start?
The cybersecurity sector is a hot field. According to Symantec, “the demand for the (cybersecurity) workforce is expected to rise to 6 million (globally) by 2019, with a projected shortfall of 1.5 million” and the 2014 Cisco Annual Security Report warned that there was an estimated 1 million openings in cybersecurity.
Cybersecurity positions are on the rise. Cybersecurity was the top IT priority in the Obama administration and appears to be a priority for Trump as well. There is a deep need for talented, professional white-hat hackers who can protect critical infrastructure and make a positive difference in the world.
This is what most people do…
Most people who want to get into cybersecurity make the rookie mistake of wading through endless blogs, books (Messer and Myers), Youtube videos, magazines and Reddit forums trying to read everything they can about hacking.
With this approach, you’ll probably gain some good head knowledge about how to hack, but if a potential employer gave you an Ethernet jack and a laptop and said:
Here, go break into our enterprise – you’ve got 30 minutes.
Would you know what to do?
The raw truth
Most professional hackers can gain domain administrator rights before lunch.
It’s not hard but if you don’t know where to begin it can be extremely challenging.
Do it right the first time
That’s where the Weekend Pen-Testing Lab Creation Boot camp comes in. This intensive two-day boot camp shortcuts your time investment by training you to build a professional-grade penetration testing lab.
This is a hands-on course that will transform you into a confident penetration tester (even if you have no prior experience).
The boot camp is a step-by-step system for building a practice lab so you can gain the experience you need to become a professional penetration tester. You can then use your lab not only as a platform to pass the CompTIA Security+ exam but also other more advanced certifications such as the CEH “Certified Ethical Hacker” and others.
By the end of this course, not only will you know how to hack but you’ll have the infrastructure in place to hone your tradecraft and become an excellent candidate for entry level penetration testing jobs.
If you do the work, complete the exercises and practice your hacks – you will succeed. You will be building a professional pen-testing lab using the very same attack tools the bad guys use to breach organizations and compromise systems.
Are you up for the challenge?
When you finish this course, you will:
Feel a deep sense of confidence and responsibility as you’ll not only know how to hack Windows servers and clients but also how to explain how its done to your colleagues and friends. You’ll feel smarter because you’ll BE smarter.
Feel in control of your career as you’ll have a complete hacking lab established on your computer with the exact attack tools used by black-hat hackers and professional penetration testers.
You’ll have a platform to practice and refine your tradecraft as you attack Windows, Linux and web server systems all within the safety of your lab environment.
Here’s what you’ll get
6 hands-on modules that walk you through the basics of building a pen-test lab. You’ll learn the step-by-step process for setting up vulnerable hosts and executing sophisticated attacks against them in the comfort of your own home. Everything takes place in a lab that emulates real production networks so you’ll gain the first step of experience needed to apply for entry-level pen-testing jobs. Another side-benefit is that you may be able to leverage the skills you gain from this course to negotiate a higher salary and more challenging career options.
28 resource guides with summaries of all the commands used in the video lesson as well as explanations as to what each command did.
The course is 100% online and 100% downloadable so you can take it with you on the go even without an internet connection.
You have unlimited updates. The cybersecurity landscape is continually evolving thus we are continually updating the course and adding new content to keep it relevant. By the course one time today and you’ll get grandfathered into updates forever.
Here’s what you’ll create
A pen-test lab including a Kali Linux attack box, a Windows XP host, a Windows 2008 Domain Controller and a vulnerable webserver.
A completely isolated environment where you can perfect your skills over-and-over again without any fear of breaking a real production system
Your time is now.
When you signup today you will get:
The Complete Pen Testing Lab Creation Two Boot Camp Course in 6 Modules
30 Convenient PDF Resource Guide Cheat Sheets
Everything is 100% Online and 100% Downloadable
Instant Access After Purchase
Lifetime Access with Unlimited Updates to the Course
So let us ask you the question: do you have what it takes to be a hacker?
After taking this course you will be able to confidently say: yes!
Section 1: Day 1 Morning: Prep work
Lecture 1 Welcome to the course!
Lecture 2 Module 1: Preparation
Lecture 3 How to get the most out of this course
Lecture 4 Portrait of a Hacker
Lecture 5 13375P34K!
Lecture 6 Hacking Stages
Lecture 7 Attack Tools
Lecture 8 Hardware Requirements for our Lab
Lecture 9 An overview of the Lab we will build together
Section 2: Day 1 Afternoon: Marshaling your big guns
Lecture 10 Welcome to “Marshaling your Guns”
Lecture 11 Downloading VMware Workstation
Lecture 12 Installing VMWare Workstation
Lecture 13 Tweaking VMWare Workstation for our pentest lab
Lecture 14 Downloading Kali Linux
Lecture 15 Adding Kali Linux to VMWare Workstation
Lecture 16 Installing Kali Linux
Lecture 17 Customizing Kali Linux for our Pen Tests
Lecture 18 BONUS: A quick tip for pimping out the Kali UI
Section 3: Day 1 Evening: Lining up your victims…
Lecture 19 Welcome to “Lining up your Victims”
Lecture 20 Installing Windows XP
Lecture 21 A clever hack for “finding” your XP VM…
Lecture 22 Finding a legal copy of Windows Server 2008
Lecture 23 Installing Windows Server 2008
Lecture 24 Configuring Windows Server 2008 as a Domain Controller
Lecture 25 Testing lab connectivity between Kali and our Windows 2008 Server
Lecture 26 May I introduce you to Metasploitable 2?!
Section 4: Day 2 Morning: Hacking Endpoints and Servers!
Lecture 27 Welcome to “Hacking Endpoints and Servers”
Lecture 28 How to p0wn any Windows XP box!
Lecture 29 Installing nessus on Kali Linux
Lecture 30 Configuring nessus on Kali Linux
Lecture 31 Scanning and hacking our Windows Server 2008 target
Section 5: Day 2 Afternoon: Hacking websites and web applications like a pro
Lecture 32 Welcome to “Hacking Websites and Web Apps”
Lecture 33 Scanning web apps with Nikto
Lecture 34 Hacking a client-side validation flaw using SQL injection
Section 6: Day 2 Evening: Resources
Lecture 35 Welcome to “Leveling up your Lab!”
Lecture 36 Web Application Hacking Resource Vault (1/4)
Lecture 37 Web Application Hacking Resource Vault (2/4)
Lecture 38 Web Application Hacking Resource Vault (3/4)
Lecture 39 Web Application Hacking Resource Vault (4/4)
Lecture 40 Vulnerable Virtual Machines and Old Apps
Lecture 41 CTFs
Section 7: Extra! How to get paid to have fun?!
Lecture 42 How to break into the exciting field of pentration testing
Section 8: BONUS SECTION: THANK YOU!!!
Lecture 43 BONUS LECTURE
This course is for the complete newbie.,If you’re an IT professional looking to break into the world of cybersecurity or are already in the field but want to create the ultimate test environment to learn how to hack, this course is for YOU
Udemy | English | 3h 43m | 1.15 GB
Created by: Vonnie Hudson