Ethical Hacking - Capture the Flag Walkthroughs - v3

Capture the Flag Walkthrough exercises to help strengthen your penetration and hacking skills

   Watch Promo

What you'll learn

  • Better understanding of the hackers methodology.
  • Learn basic tools and techniques in vulnerability assessment and exploitation.
  • Foot printing, scanning, enumeration, exploitations and privilege escalation.
  • Python and BASH scripting.
  • Better utilization of the Linux CLI.

Requirements

  • 4 GB of RAM (8 GB preferred).
  • Hardware and software capable of handling virtualization.
  • A good understanding of networking.
  • Entry level knowledge of pentesting or hacking.
  • Comfortable using the Linux command line interface (CLI).
  • Comfortable learning bits of programming code such as Python and PHP.
  • Comfortable creating virtual machines.
  • Comfortable with the English language.

Description

If you've taken the ethical hacking courses, you've been introduced to the tools and the methodology used by pentesters and ethical hackers. Prof. K's Ethical Hacking - Capture the Flag Walkthrough series brings it all together, showing students how to perform an actual pentest and gain root access. But, more importantly, students learn how to build the hacker's methodology into their mindset.

Prof. K's Ethical Hacking - Capture the Flag Walkthrough series is designed to introduce students to skills similar to what pentesters and hackers use in real-life situations. In addition, this course will provide a greater understanding of how vulnerabilities are discovered and exploited.

Although all hackers use no specific step-by-step methodology, a typical hacking process comprises the following steps:

  1. Footprinting – the passive method of gaining information about the target system before performing the attack.
  2. Scanning – the process of taking information obtained from the footprinting phase to target the attack more precisely. Some methods used in this phase are port scans, ping sweeps, operating systems detection, observation of facilities used by the target, etc.
  3. Enumeration – the process of extracting more detailed information about the information obtained during the scanning phase to determine its usefulness. Some methods used in this step are user accounts enumeration, SNMP enumeration, UNIX/Linux enumeration, LDAP enumeration, NTP enumeration, SMTP enumeration, DNS enumeration, etc.
  4. System hacking is planning and executing the attack based on the information obtained in the previous phases. In this phase, the attacker performs the hacking process using hacking tools.
  5. Escalation of privilege – obtaining privileges granted to higher privileged accounts than the attacker broke into initially. This step aims to move from a low-level account (such as a guest account) to an administrator.
  6. Covering tracks – the process of removing any evidence of the attacker's presence in a system. For example, the attacker purges log files and removes other evidence the system owner needs to determine that an attack occurred.
  7. Planting backdoors – securing unauthorized remote access to a computer so the attacker can access the system later without being detected. Backdoors are computer programs that give attackers remote access to a targeted computer system. Entry-level Walkthroughs for Capture the Flag exercises that will help strengthen your pentesting skills.

Students step through each of the Capture the Flags (CTF) walkthroughs using a step-by-step lab file and video tutorial. Students follow the steps taken by a pentester or ethical hacker to enumerate a target and gain root access. Additionally, each CTF reinforces the steps of the hacking methodology used by pentesters and hackers.


Students who have completed Prof. K's Ethical Hacking Courses can now practice what they have learned in Prof. K's Ethical Hacking - Capture the Flag Walkthrough series of exercises. You've seen the tools and heard all the war stories. Now, learn ethical hacking as you've always wanted to.

Don't cheat yourself! Check out the free preview of the first module of the course.

Who this course is for:

  • Those wanting to learn pentesting technigues.
  • Those wanting to learn more about pentesting tools.
  • Those wanting to learn the methodology of a hacker.
  • Those wanting to valaidate their pentaetsing skills.
  • Those wanting to work in cyber security.


Your Instructor


Prof K
Prof K

Prof. K comes to StationX with a Master of Science in Cyber Security from UMUC (2015) and Master of Science in Information Technology from Capella University (2007).

Prof. k has worked in technology since 1998 working as a Microsoft Support Technician, a Microsoft Certified Trainer, Technology support specialist, a Senior Network Technology Consultant, an IT Auditor and most recently as the owner and operator of his own technology firm, CLK Technology Solutions located in Tucson Arizona. Professor K's expertise in technology focuses on designing, building, supporting network infrastructures and network security.

Professor K has taught online since 2008 and teaches for a number of other online universities and colleges.

Prof. k holds a number of valid technology certifications including:

  • MCTS: Windows Server 2008 Active Directory, Configuration
  • MCTS: Windows Server 2008 Applications Infrastructure, Configuration
  • MCTS: Windows Server 2008 Network Infrastructure, Configuration
  • A+, Net+, Security+
  • CompTIA Secure Infrastructure Specialist – CSIS
  • CompTIA IT Operations Specialist – CIOS

Professor K spends his spare time working in his wood shop and providing free technical support to the local retirement community in Tucson Arizona.


Join Today & Get Access To This Course & Every Resource You Need Grow Your Cyber Skills & Advance Your Career. Beginner & Expert Training.

Course Curriculum


  Training Overview
Available in days
days after you enroll
  Course Overview
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Become A Member And Unlock Unlimited Access To This Course Plus Over 1,000+ Top Cyber Security Classes, Virtual Labs, Practice Tests, And Exam Simulations.

Designed To Help You Expand Your Skill Set And Propel Your Career Forward. Whether You're Just Starting Out Or You're An Industry Expert, There's Something Here For Everyone. Let's Grow Together!