HOME > IT & Software > The Complete Pentesting Privilege Escalation Course

The Complete Pentesting Privilege Escalation Course

SynopsisThe Complete Pentesting & Privilege Escalation Course, av...
The Complete Pentesting Privilege Escalation Course  No.1

The Complete Pentesting & Privilege Escalation Course, available at $64.99, has an average rating of 4.8, with 61 lectures, based on 44 reviews, and has 1133 subscribers.

You will learn about Penetration Tests Privilege Escalation for Windows Privilege Escalation for Linux CTF Solutions This course is ideal for individuals who are Students who want to be cyber security professionals or Cyber security professionals who wants to get a certification or Cyber security students who wants to deepen their knowledge about pentests and privilege escalation It is particularly useful for Students who want to be cyber security professionals or Cyber security professionals who wants to get a certification or Cyber security students who wants to deepen their knowledge about pentests and privilege escalation.

Enroll now: The Complete Pentesting & Privilege Escalation Course

Summary

Title: The Complete Pentesting & Privilege Escalation Course

Price: $64.99

Average Rating: 4.8

Number of Lectures: 61

Number of Published Lectures: 61

Number of Curriculum Items: 61

Number of Published Curriculum Objects: 61

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Penetration Tests
  • Privilege Escalation for Windows
  • Privilege Escalation for Linux
  • CTF Solutions
  • Who Should Attend

  • Students who want to be cyber security professionals
  • Cyber security professionals who wants to get a certification
  • Cyber security students who wants to deepen their knowledge about pentests and privilege escalation
  • Target Audiences

  • Students who want to be cyber security professionals
  • Cyber security professionals who wants to get a certification
  • Cyber security students who wants to deepen their knowledge about pentests and privilege escalation
  • Welcome to The Complete Pentesting & Privilege Escalation Course

    If you want to become a cyber security professional, if you want to deepen your knowledge in ethical hacking topics, if you are preparing yourself for certifications such as OSCP; then you are at the right place! This is an intermediate to advanced course. If you want to make most of it, you should already have a background in cyber security and Python.

    Throughout the course we will solve number of vulnerable machines on Vulnhub, TryHackMe & HackTheBox along with the other platforms. Especially Privilege Escalation topic will be thoroughly explained during the course, which will provide you the best tools if you are studying to get a certification such as OSCP. Furthermore we will not only focus on Linux machines but Windows machines as well.

    Training is given by Atil Samancioglu who has more than 200.000 students worldwide on Ethical Hacking & Mobile Application Development topics along with the Codestars serving more than 1 MM students.If you are ready to take your ethical hacking skills to next level you can immediately see the content of the course and enroll today!

    Some of the topics that we are going to cover during the course, completely hands-on:

  • Advanced Linux

  • CTF Solutions

  • Linux Privilege Escalation

  • Windows Privilege Escalation

  • Kernel Exploit

  • Suid

  • Sudo

  • Cronjobs

  • Metasploit

  • Potato Attacks

  • Brute Force

  • Meterpreter Shells

  • Content

    This training will be completely hands on experience but without neglecting the theory. We will cover a lot of scenarios when we solve vulnerable machines which you will face a lot during pentests and certification exams. This will be a big step for you to advance your cyber security career.

    In order to make most of this course you should have taken The Complete Ethical Hacking Course and similar courses before. You should have a working Kali Linux or a counterpart system already, this will not be covered during the course.

    Due to the licensing issues, in the Windows pentest & privilege escalation sections we will need a Hack The Box membership. If you do not want to pay for that, you can always watch the last two sections by only taking notes, without exercising. However you should take into consideration that by exercising you can learn in a better way.

    Warning:This course aims to provide a good training for people who want to be cyber security professionals. You should not break the law in any way with the offensive penetration test techniques and you accept the responsibility by taking this course. 

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Lecture 2: Course Manual

    Chapter 2: Bandit

    Lecture 1: Bandit Intro

    Lecture 2: Bandit File Find Cat

    Lecture 3: Bandit Strings Grep

    Lecture 4: Bandit Base64

    Lecture 5: Bandit Gzip Bzip Tar

    Lecture 6: Bandit Nmap

    Lecture 7: Bandit Diff Ssh

    Lecture 8: Bandit Suid

    Lecture 9: Bandit Cron

    Lecture 10: Bandit Cron Advanced

    Lecture 11: Bandit NCat Python

    Lecture 12: Bandit Vim More

    Lecture 13: Bandit Git

    Lecture 14: Bandit Shell

    Chapter 3: Wakanda

    Lecture 1: Wakanda Setup

    Lecture 2: Web Service

    Lecture 3: Gathering More Information

    Lecture 4: Python Reverse Shell

    Lecture 5: Sudo Privilege Escalation

    Chapter 4: Mr. Robot

    Lecture 1: Mr. Robot Setup

    Lecture 2: Username Brute Force

    Lecture 3: Password Brute Force

    Lecture 4: Hacking WordPress

    Lecture 5: Changing User

    Lecture 6: Suid Privilege Escalation

    Chapter 5: Fristi Leaks

    Lecture 1: Fristi Leaks Setup

    Lecture 2: Hacking the Server

    Lecture 3: Switching to Admin

    Lecture 4: Cryptology

    Lecture 5: Root

    Chapter 6: Linux Privilege Escalation

    Lecture 1: Vulnerable Machine in This Section

    Lecture 2: TryHackMe Setup

    Lecture 3: Enumeration

    Lecture 4: Kernel Exploit

    Lecture 5: More Password Enumeration

    Lecture 6: Sudo List

    Lecture 7: Shadow

    Lecture 8: Preload

    Lecture 9: What is Suid?

    Lecture 10: Suid Privilege Escalation

    Lecture 11: Path

    Lecture 12: Environment Variables

    Lecture 13: Crontab

    Lecture 14: Sudo Vulnerability

    Chapter 7: Windows Privilege Escalation

    Lecture 1: HackTheBox Setup

    Lecture 2: HackTheBox VPN

    Lecture 3: First Machine Setup

    Lecture 4: Hacking Windows

    Lecture 5: Windows Command Prompt

    Lecture 6: Exploit Suggester

    Lecture 7: Other Tools

    Lecture 8: Admin

    Lecture 9: Potato Attack

    Lecture 10: Manual Privilege Escalation

    Chapter 8: Arctic

    Lecture 1: Arctic Setup

    Lecture 2: Admin Dashboard

    Lecture 3: Cold Fusion

    Lecture 4: Schelevator

    Chapter 9: Closing

    Lecture 1: Closing

    Instructors

  • The Complete Pentesting Privilege Escalation Course  No.2
    Codestars ? over 2 million students worldwide!
    Teaching the Next Generation of Coders
  • The Complete Pentesting Privilege Escalation Course  No.3
    Atil Samancioglu
    Bestselling Instructor
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 1 votes
  • 3 stars: 6 votes
  • 4 stars: 10 votes
  • 5 stars: 27 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!