Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked SecureNinja – Red Team Hacking Course


itsMe

Recommended Posts

This is the hidden content, please

About Course

SecureNinja’s Red Team Hacking will teach you the skills, techniques and proven methodology of how to setup and be a Red Team Member. Red Team Hacking by name infers that it is 100% offensive, and that is just what you will learn during this comprehensive and fun-filled course which will show you how to break into and exploit systems.

Introduction (2:01)
Module 1 Overview of Ethical Hacking Pt 1 (13:25)
Module 1 Overview of Ethical Hacking Pt 2 (8:02)
Module 1 LAB 1 Hacking Toolkit (15:32)
Module 1 Quiz
Module 2 Executing the Hacking Methodology Pt 1 (10:55)
Module 2 LAB 1 Surveillance Techniques (10:56)
Module 2 Executing the Hacking Methodology Pt 2 (0:48)
Module 2 DEMO 1 Wayback Machine, Shodan, Diggity (5:54)
Module 2 Executing the Hacking Methodology Pt 3 (3:40)
Module 2 DEMO 2 OSVDB, Exploit-db (3:15)
Module 2 Executing the Hacking Methodology Pt 4 (3:50)
Module 2 LAB 2 Scanning Techniques (6:27)
Module 2 Executing the Hacking Methodology Pt 5 (0:57)
Module 2 DEMO 3 Netcat (9:36)
Module 2 Quiz
Module 3 Attacking Devices Pt 1 (9:44)
Module 3 DEMO 1 Searching the Internet for Vulnerabilities (3:17)
Module 3 Attacking Devices Pt 2 (15:49)
Module 3 LAB 1 Device Attacks (26:01)
Module 3 Attacking Devices Pt 3 (1:07)
Module 3 Quiz
Module 4 Designing Attacks Against Servers Pt 1 (22:28)
Module 4 DEMO 1 John The Ripper (3:35)
Module 4 Designing Attacks Against Servers Pt 2 (3:35)
Module 4 LAB 1 Server Attacks (31:17)
Module 4 Designing Attacks Against Servers Pt 3 (10:40)
Module 4 DEMO 2 Alternate Data Streams (8:35)
Module 4 Designing Attacks Against Servers Pt 4 (7:29)
Module 4 LAB 2 Information Hiding (10:56)
Module 4 Designing Attacks Against Servers Pt 5 (2:59)
Module 4 Quiz
Module 5 Attacking Services Pt 1 (7:34)
Module 5 DEMO 1 SYN Flooding (8:54)
Module 5 Attacking Services Pt 2 (21:11)
Module 5 LAB 1 Attacking Services (19:01)
Module 5 Attacking Services Pt 3 (0:38)
Module 5 Quiz
Module 6 Attacking Clients Pt 1 (16:06)
Module 6 LAB 1 Attacking Clients (14:20)
Module 6 Attacking Clients Pt 2 (0:48)
Module 6 Quiz
Module 7 Web Application Hacking Pt 1 (6:32)
Module 7 LAB 1 Attacking Web Apps (22:46)
Module 7 Web Application Hacking Pt 2 (0:33)
Module 7 Quiz
Module 8 Hacking Wireless Pt 1 (11:52)
Module 8 LAB 1 Attacking Wireless (16:29)
Module 8 Hacking Wireless Pt 2 (0:41)
Module 8 Quiz
Module 9 Mobile Device Hacking (2:59)
Module 9 Quiz
Module 10 Advanced Hacks (5:32)
Module 10 Quiz
Module 11 Building a Range (22:41)
Module 11 DEMO 1 Building a Range (3:22)
Module 11 Quiz
Module 12 Additional Considerations Pt 1 (5:14)
Module 12 DEMO 1 Additional Considerations (10:15)
Module 12 Additional Considerations Pt 2 (0:29)
Module 12 Quiz
Module 13 Next Steps (3:10)

This is the hidden content, please

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.