What You’ll Uncover in Sumedt Jitpukdebodin Basic Penetration Testing Online Course in Thai language
คอร์สนี้จะเป็นคอร์สสำหรับการเรียนรู้การทดสอบเจาะระบบ (Penetration Testing) ซึ่งจะมีความแตกต่างจากการแฮ็ค (Hacking) อยู่มาก ซึ่งความรู้ทั้งหมดท่านจะสามารถนำไปปรับใช้กับองค์กรเพื่อการตรวจสอบระบบและป้องกันระบบได้อย่างทันท่วงที คอร์สนี้จะไม่ได้เพียงแค่ในตำราใดๆ…
Sumedt Jitpukdebodin – Basic Penetration Testing Online Course in Thai language
Evaluate Course ตอนที่อยู่ที่ UDEMY ครับ
สามารถใช้ coupon code “ALL-THE-TIME” ที่ลดได้ทุกช่วงเวลาในการลดจาก 8500 เหลือ 6500 ได้ครับ
https://learner-security.teachable.com/p/basic-penetration-tester-online-course-in-thai-language/?product_id=541583&coupon_code=ALL-THE-TIME
หากเป็นนักศึกษาที่ไม่เกินป.ตรี สามารถติดต่อเพื่อขอส่วนลดเหลือ 5000 ได้ผ่านทางเพจ https://www.facebook.com/hackandsecbook/ ครับ
Your Teacher
I am an Data Safety Marketing consultant. I labored with one of the best Administration Safety Service Supplier Firm in Thailand round 7 years.I’ve wrote a pc safety guide in Thailand and write many public article in Thai and English. And I’ve expertise in penetration testing undertaking and consulting many instances in previous few years.
My certificates are LPIC1, Comptia Safety+, NCLA ,CEH, eCPPT, eWPT, IWSS, LFCS ,GPEN
Get instantly obtain Sumedt Jitpukdebodin – Basic Penetration Testing Online Course in Thai language
Course Curriculum
- Fb Group ของกลุ่มผู้เรียน
- Home windows XP สำหรับใช้เป็นเครื่องเหยื่อ
- การแก้ไขปัญหา Kali Rolling Version ไม่สามารถขยายหน้าจอได้ใน VMWare Workstation
- VDO Hyperlink สำหรับ obtain Advance Metasploit Subsequent Stage
- VMWare for net utility safety lab
- Slide after all
- การได้รับเงินตอบแทนเมื่อเชิญเพื่อนเข้ามาสมัคร Course (Affiliate Program)
- Home windows 7 VM Hyperlink
- Course Overview (0:56)
- Introduction and primary information of knowledge safety (14:49)
- Danger Evaluation – Half 1 (14:10)
- Danger Evaluation – Half 2 (5:27)
- Kali Linux (6:32)
- How one can run Kali Linux (5:52)
- Kali Rolling Version (5:09)
- How one can set up Kali Linux in Virtualbox (11:24)
- How one can set up Visitor Further Instrument in Virtualbox (6:26)
- How one can set up Kali Linux in VMWare Fusion (13:41)
- Set up open-vm-instruments-desktop in VMWare Fusion (4:09)
- Overview of Intelligence Gathering (9:36)
- What’s DNS, NSLOOKUP, WHOIS (9:00)
- How one can use NSLOOKUP (14:40)
- What’s dig command (1:22)
- Dig and Zonetransfer (9:28)
- Zonetransfer with instruments (15:55)
- Intelligence Gathering with Home windows and Web site (16:33)
- OSINT – Half 1 (11:33)
- OSINT – Half 2 (7:36)
- What’s Recon-ng? And easy methods to use it (5:13)
- Recon-ng in actions – Half 1 (10:51)
- Recon-ng in actions – Half 2 (12:43)
- Recon-ng in actions – Half 3 (9:12)
- Google Hacking – Half 1 (10:37)
- Google Hacking – Half 2 (13:03)
- Google Hacking with Instruments (10:18)
- What’s Spiderfoot? And easy methods to use it (9:29)
- Search Engine for Pentester (5:26)
- Metadata and easy methods to view it (18:10)
- What’s floor of goal (2:17)
- What’s NetBIOS (2:43)
- Community Safety and Basic Community – Half 1 (11:56)
- Community Safety and Basic Community – Half 2 (6:38)
- Studying NMAP in sensible approach – Half 1 (11:12)
- Studying NMAP in sensible approach – Half 2 (8:56)
- NSE Classes (4:18)
- Instance of NSE (6:54)
- Studying NSE in sensible approach (13:42)
- Auditing web site with NSE – Half 1 (9:44)
- Auditing web site with NSE – Half 2 (11:50)
- Write your individual NSE (16:25)
- Edit NSE on your suggest (4:21)
- How one can set up Nessus and How one can use Nessus scanner (16:16)
- How one can setup and use Openvas (5:59)
- Internet Vulnerability Scanner and Arachni (12:53)
- Netcat Utilization (12:56)
- Community Sniffer and Man in the center (16:03)
- DNS Spoofing (2:52)
- DNS Spoofing with Ettercap (4:47)
- Bettercap (5:20)
- Utilizing bettercap to inject javascript (13:05)
- Overview of Metasploit – Half 1 (4:54)
- Overview of Metasploit – Half 2 (17:24)
- Metasploit Professional Log
- Rating of Module (3:51)
- Msfconsole (10:56)
- Metasploit in one line (3:23)
- Msfvenom (11:39)
- Msfvenom in actions – Half 1 (13:57)
- Msfvenom in actions – Half 2 (8:27)
- Metasploit works with database (9:30)
- Internet Supply Module (4:43)
- Exploit MS08_067_netapi with Metasploit (14:36)
- Exploit Simple File Administration Internet Server with Metasploit (12:54)
- Brute Forcing SSH with Metasploit (5:21)
- Automate in Metasploit (5:51)
- Metasploit Cheat Sheet
- Metasploit Base64 encoder module (7:47)
- Overview crack the password (14:32)
- Cewl Utilization (4:32)
- Brute forcing SSH with Hydra (13:08)
- Brute forcing HTTP with Hydra (10:08)
- LM Hash และ Linux Password (8:41)
- Cracking LMHash and NTLM (12:29)
- Home windows Credential Editor (5:04)
- Cracking Linux Password (4:34)
- Crack PDF Password (7:26)
- Crack Zip File (4:28)
- Slide of Internet Structure
- Internet Structure – Half 1 (8:20)
- Internet Structure – Half 2 (12:52)
- Data gathering web site (9:23)
- Basic SQL (9:43)
- SQL Injection (11:21)
- Timebase SQL Injection (4:51)
- Cheat Sheet SQL Injection (8:50)
- SQL Injection with SQLMap (13:40)
- SQL Injection 2nd order assault (16:37)
- Cross Website Scripting (XSS) (13:57)
- File Inclusion – Half 1 (8:58)
- File Inclusion – Half 2 (4:11)
- File Add (3:45)
- Insecure Direct Object Reference (IDOR) (6:06)
- Command Injection (2:22)
- Command Injection with COMMIX (13:08)
- Cross Website Request Forgery (CSRF) (4:16)
- Instance payload for redirect
- Overview of Consumer Facet Exploitation (2:10)
- Overview of DLL Hijacking (7:08)
- DLL Hijacking in actions (14:47)
- Exploit with Winrar SFX (9:40)
- Bypass antivirus with Shellter (7:13)
- Create malicious doc with Metasploit (8:38)
- Exploit Adobe Reader with adobe_pdf_embbed_exe (5:35)
- Exploit Adobe Flash Participant with Metasploit (2:50)
- Microsoft DDEAUTO Assault (6:58)
- Overview of Put up Exploitation and Put up exploitation in Home windows (16:08)
- Put up Exploitation in Linux (12:04)
- Privilege Escalation with soiled c0w vulnerability in Linux OS (11:02)
- Privilege Escalation with Sizzling Potato approach in Home windows OS (12:44)
- Privilege Escalation with At all times Set up Elevated in Home windows OS (2:59)
- BypassUAC with Metasploit (2:40)
- Put up Exploitation with home windows command (9:02)
- Pivoting community (4:09)
- Pivoting community with autoroute command in Metasploit (4:37)
- Pivoting community with SSH (5:00)
- Pivoting community with proxychains (3:54)
- Put up exploitation with Metasploit – Half 1 (9:46)
- Put up exploitation with Metasploit – Half 2 (7:39)
- Privilege Escalation with MS16-032 (Powershell) (3:25)
- Put up exploitation – utilizing Mimikatz in Metasploit (2:20)
- Basic Home windows Privilege Escalation
- Powershell – Reverse TCP Shell (1:51)
- OSX Put up-Exploitation
- Put up Exploitation in Linux with Mimipenguin & Swap_digger (5:08)
Get instantly obtain Sumedt Jitpukdebodin – Basic Penetration Testing Online Course in Thai language
- Reporting (7:02)
- Instance of pattern report from many firm
- Lab 1 – Half 1 (10:53)
- Lab 1 – Half 2 (12:38)
- Lab 2 – Half 1 (10:59)
- Lab 2 – Half 2 (18:46)
- Vulnerability Lab01 (11:55)
- Lab – hack drupal (Droopy) (26:51)
- Shadow Dealer Toolkit Demo (18:47)
IMPORTANT: This whole “Sumedt Jitpukdebodin – Basic Penetration Testing Online Course in Thai language” is totally downloadable and accessible in your account
(In case of a damaged hyperlink, we’ll renew your hyperlink shortly).
Your persistence is appreciated.