Cyber Security - Advanced Level

Difficulty: ⭐️⭐️⭐️⭐️⭐️

Description

This course introduces learners to an Advanced level of Cyber Security – an emerging field in Information Technology due to the rapid changes of cyber world with cyber crimes and attacks. Through theoretical lectures and hands-on practice, students will learn the latest ethical hacking tools and techniques, and how to perform various types of advanced attacks: Privilege Escalation, Client Side Attack, Web Application Attack, Password Attacks, Exploitation/Post-Exploitation with Metasploit, Bypassing Antivirus softwares.

Requirements

  • Solid understanding and skills about Linux
  • Solid understanding of computer networking
  • Intermediate Bash scripting skills
  • Cyber Security – Intermediate Level course (fixed requirement)

By the end of this course, students will achieve:

  • Advanced Bash scripting skills
  • Advanced practices about Kali Linux, Vulnerabilities Scanning, and essential cyber security tools
  • In-depth understanding and hands-on practices on advanced attacks: Privilege Escalation, Client Side Attack, Web Application Attack, Password Attacks (Wired/Wireless)
  • In-depth knowledge and hands-on practices on Port Redirection/Tunneling, and how to use Metasploit Framework for exploitation and post-exploitation
  • In-depth understanding and practices on how to bypass Antivirus softwares

Curriculum For This Course

      1. Privilege Escalation Exploits in Linux and Windows
      2. Configuration Issues
      1. Passive/Active client information gathering
      2. Social Engineering and Client Side Attacks
      3. Java Signed Applet Attack
      1. Cross Site Scripting (XSS)
      2. File Inclusion Vulnerabilities
      1. SQL Injection
      2. Web Application Proxies
      3. Automated SQL Injection Tools
      1. Brute Force: practical setup and launching attack
      2. Online password attack with Hydra, Medusa, Ncrack
      1. Password Hash Attack
      2. Password Cracking
      3. John the Ripper
      4. Rainbow Tables
      5. Passing the Hash in Windows
      1. Port Forwarding/Redirection
      2. SSH Tunneling
      3. Proxychains
      4. HTTP Tunneling
      5. Traffic Encapsulation
      1. Metasploit User Interfaces
      2. Setting up Metasploit Framework on Kali
      3. Exploring the Metasploit Framework
      4. Auxiliary Modules
      5. Exploit Modules
      6. Metasploit Payloads:
        1. Staged vs. Non-Staged Payloads
        2. Meterpreter Payloads
      1. Metasploit Payloads:
        1. Experimenting with Meterpreter
        2. Executable Payloads
        3. Reverse HTTPS Meterpreter
        4. Metasploit Exploit Multi Handler
      2. Building Your Own MSF Module
      3. Post Exploitation with Metasploit
      1. Encoding Payloads with Metasploit
      2. Crypting Known Malware with Software Protectors
      3. Using Custom/Uncommon Tools and Payloads

UPCOMING COURSES/WORKSHOPS

Group name Start date Session duration Number of sessions Standard price

LOOKING FOR OTHER OPTIONS?

Below are the courses that you may want to take after this course:

FEATURED MENTOR

Tokyo Techies Lecturer

Marlin Arnall

Cyber Security engineer and game enthusiast

Marlin is a passionate computer engineer with interest in cyber security. He has cultured a healthy paranoia about closed-source software, security threats, and data security. Marlin is very passionate about digital rights and protecting the open internet.

Ask him about how your devices can spy on you.