(This course is available for immediate delivery) คอร์สนี้จะเป็นคอร์สสำหรับการเรียนรู้การทดสอบเจาะระบบ (Penetration Testing) ซึ่งจะมีความแตกต่างจากการแฮ็ค (Hacking) อยู่มาก ซึ่งความรู้ทั้งหมดท่านจะสามารถนำไปปรับใช้กับองค์กรเพื่อการตรวจสอบระบบและป้องกันระบบได้อย่างทันท่วงที คอร์สนี้จะไม่ได้เพียงแค่ในตำราใดๆ…
Sumedt Jitpukdebodin – Basic Penetration Testing Online Course in Thai language
Review Course ตอนที่อยู่ที่ UDEMY ครับ
สามารถใช้ coupon code “ALL-THE-TIME” ที่ลดได้ทุกช่วงเวลาในการลดจาก 8500 เหลือ 6500 ได้ครับ
https://learner-security.teachable.com/p/basic-penetration-tester-online-course-in-thai-language/?product_id=541583&coupon_code=ALL-THE-TIME
หากเป็นนักศึกษาที่ไม่เกินป.ตรี สามารถติดต่อเพื่อขอส่วนลดเหลือ 5000 ได้ผ่านทางเพจ https://www.facebook.com/hackandsecbook/ ครับ
Your instructor
I am an Information Security Consultant. I have worked for the best Management Security Service Provider Company in Thailand has been my home for 7 years. in Thailand and write many articles for the public in Thai English. Furthermore, I have personal experience. in Many times consulting and penetration testing in During the last few years.
My certificates are LPIC1, Comptia Security+ and NCLA. CEH, eWPT and IWSS.
Get your instant download Sumedt Jitpukdebodin – Basic Penetration Testing Online Course in Thai language
Course Curriculum
- Facebook Group ของกลุ่มผู้เรียน
- Windows XP สำหรับใช้เป็นเครื่องเหยื่อ
- การแก้ไขปัญหา Kali Rolling Edition ไม่สามารถขยายหน้าจอได้ใน VMWare Workstation
- VDO Link สำหรับ download Advance Metasploit Next Level
- VMWare web application security lab
- Slide of course
- การได้รับเงินตอบแทนเมื่อเชิญเพื่อนเข้ามาสมัคร Course (Affiliate Program)
- Windows 7 VM Link
- Course Overview (0:56).
- Information security basics and introduction (14:49).
- Risk Assessment – Part 1 (14:10)
- Risk Assessment – Part 2 (5:27)
- Kali Linux (6:32)
- How to run Kali Linux (5.52)
- Kali Rolling Edition (5.09)
- How to Install Kali Linux in Virtualbox (11.24).
- How to Install Guest Additional Tool in Virtualbox (6.26)
- How to Install Kali Linux in VMWare Fusion (13.41)
- Open-vm-Tools-Desktop in VMWare Fusion (4.09)
- Overview of Intelligence Gathering (13:36)
- What is DNS, NSLOOKUP or WHOIS? (9:00)
- How to use NSLOOKUP (1:40)
- What is dig command (1.22)?
- Dig and Zonetransfer (9.28)
- Zonetransfer with tools (15.55)
- Intelligence Gathering using Windows and Website (16.33)
- OSINT Part 1 (11.33)
- OSINT Part 2 (7.36)
- What is Recon?-ng? How to use it (5.13)
- Recon-ng in Actions – Part 1 (10.51)
- Recon-ng in Actions – Part 2 (12.43)
- Recon-ng in Actions – Part 3 (9.12)
- Google Hacking – Part 1 (10.37).
- Google Hacking – Part 2 (1:03 PM)
- Google Hacking with Tools (10.18)
- What is Spiderfoot and how can you use it? How to use it (9.29)
- Search Engine For Pentester (5.26)
- How to view metadata (18:10)
- What is the surface of the target (2:17?
- What is NetBIOS (2.43)?
- Network Security Basic Network – Part I (11:56).
- Network Security Basic Part 2 of Network (6:38)
- Learn NMAP in Practical way – Part 1 (11.12)
- Learn NMAP in Practical Way – Part 2 (8.56)
- NSE Categories (4.18)
- Example of NSE (6.54)
- Learning NSE in Practical way (13.42)
- Auditing website with NSE Part 1 (9.44).
- Auditing website using NSE – Part 2 (1:50)
- Create your own NSE (16.25)
- Edit NSE for your proposal (4.21)
- How to install Nessus (16:16).
- Openvas: How to Setup and Use (5:59).
- Web Vulnerability Scanning and Arachni (12.53)
- Usenetcat (12:56).
- Network Sniffer & Man in The middle (16.03)
- DNS Spoofing (2.52)
- DNS Spoofing with Ettercap (4.47)
- Bettercap (5.20).
- Using bettercap to inject javascript (13:05)
- Overview of Metasploit, Part 1 (4.54)
- Overview of Metasploit Part 2 (17.24)
- Metasploit Pro Log
- Ranking of Module (3.51)
- Msfconsole (10:56)
- Metasploit in One line (3.23)
- Msfvenom (11:39)
- Msfvenom in Actions – Part 1 (13.57)
- Msfvenom in Actions – Part 2 (8.27)
- Metasploit can be used with a database (9:30).
- Web Delivery Module (4.43)
- Exploit MS08_067_netapi using Metasploit (14.36)
- Exploit Easy File Management Web Server using Metasploit (12.54).
- Brute Forcing a SSH with Metasploit (5.21)
- Automate in Metasploit (5:51)
- Metasploit Cheat Sheet
- Metasploit Base64 encoder module (7:47)
- Overview crack the password (14.32)
- Cewl Useage (4:32).
- Brute forcing SSH with Hydra
- Brute for HTTP with Hydra (10.08)
- LM Hash และ Linux Password (8:41)
- Cracking NTLM and LMHash (12:29).
- Windows Credential Editor (5.04)
- Cracking Linux Password (4:34)
- Crack PDF Password (7.26)
- Crack Zip File (4:28)
- Slide of Web Architecture
- Web Architecture – Part 1 (8:20)
- Web Architecture – Part 2 (12:52)
- Information gathering website (9.23).
- Basic SQL (9.43).
- SQL Injection (11:21)
- Timebase SQL Injection (4:51)
- Cheat Sheet SQL Injection (8:50)
- SQL Injection with SQLMap (13:30)
- SQL Injection 2nd order attack (16:37)
- Cross Site Scripting, (13:57).
- File Inclusion – Part I (8:58)
- File Inclusion Part 2 (4:11).
- File upload (3:45)
- Insecure Direct Object References (IDOR) (6.06)
- Command Injection (2.22)
- Command Injection using COMMIX (13.08)
- Cross Site Request Forgery, (CSRF), (4:16
- Example payload for redirect
- Overview of Client Side Exploitation (2.10)
- Overview of DLL Hijacking (7.08)
- DLL Hijacking in Actions (14:47).
- Exploit with Winrar SPX (9.40)
- Shellter Shellter Bypass Antivirus (7:13).
- Metasploit allows you to create malicious documents (8:38).
- Adobe Reader (5:35)
- Use Metasploit (2.50), Adobe Flash Player and Metasploit to Exploit
- Microsoft DDEAUTO Attack (6:58)
- Overview of Post Exploitation and Post-exploitation in Windows (16.08)
- Post Exploitation in Linux (12:04)
- Privilege Escalation using dirty c0w vulnerability in Linux OS (11:02)
- Privilege Escalation Using Hot Potato Technique in Windows OS (12:44)
- Privilege Escalation with Always Insist Elevated in Windows OS (2:59)
- BypassUAC and Metasploit (2.40)
- Post Exploitation using windows command (9.02)
- Pivoting network (4.09)
- Autoroute command and pivoting network in Metasploit (4:37)
- Pivoting network for SSH (5:00).
- Pivoting network with proxychains (3.54)
- Metasploit – Part 1, Post Exploitation (9:46)
- Part 2: Metasploit post exploitation (7:39).
- Privilege Escalation using MS16-032 (Powershell) (3:25)
- Post exploitation – using Mimikatz in Metasploit (2:20)
- Basic Windows Privilege Escalation
- Powershell – Reverse TCP Shell (1.51)
- OSX Post-Exploitation
- Post Exploitation in Linux with Mimipenguin & Swap_digger (5:08)
Download immediately Sumedt Jitpukdebodin – Basic Penetration Testing Online Course in Thai language
- Reporting (7.02)
- A sample report of a company
- Lab 1 – Part 1 (10:53)
- Lab 1 – Part 2 (12:38)
- Lab 2 – Part 1 (10:59)
- Lab 2 – Part 2 (18:46)
- Vulnerability Lab01 (11.55)
- Lab – Hack Droopy (Droopy), 26:51
- Shadow Broker Toolkit Demo (18:47)
Here’s what you’ll get in Sumedt Jitpukdebodin – Basic Penetration Testing Online Course in Thai language
Course Features
- Lectures 1
- Quizzes 0
- Duration 10 weeks
- Skill level All levels
- Language English
- Students 274
- Assessments Yes