MENU CART {{currentCart.getItemCount()}}
[Video Course] Practical Hacking MasterClass by Infosec4TC

[Video Course] Practical Hacking MasterClass by Infosec4TC

Enjoy Free Delivery With Purchase of RM100 and Above! on order

RM30.00
{{shoplineProductReview.avg_score}} {{'product.product_review.stars' | translate}} | {{shoplineProductReview.total}} {{'product.product_review.reviews' | translate}}
{{amazonProductReview.avg_rating}} {{'product.product_review.stars' | translate}} | {{amazonProductReview.total_comment_count}} {{'product.product_review.reviews' | translate}}
Quantity
The maximum quantity per submit is 99999
This quantity is invalid, please enter a valid quantity.
Sold Out

Not enough stock.
Your item was not added to your cart.

Not enough stock.
Please adjust your quantity.

Limit {{ product.max_order_quantity }} per order.

Only {{ quantityOfStock }} item(s) left.

Please message the shop owner for order details.

Description

A Student Support Portal by PHMC SECURITIES
A Student Live Chat (7 PM to 11 PM IST, Time is Favorable For all Countries) Mon - Fri
Free Access to Web Hacking P-LAB for One Month on Verification of Identity
A VPN Server for Static IP to Access P-LAB
The WAPT E-Book by PHMC SECURITIES
Attendance Certificate worth 10 CPE Point

( Make sure to email at support@phmcsecurities.org from your registered Email for claiming your Additional Resources)
This course Currently Includes The All 7 Modules in our Series but We are Adding More Additional Lectures each Month

Module 1 : Extreme Basics :-

Understanding the Process of Hacking
Choosing an Operating System
Preparing a Portable Hacking USB Drive
Working with Visualization and Installing Kali Linux
Working with Cloud and Pen-Testing Tools
Orientation to Kali Linux
Understanding File Operations, Navigation and Permissions & Ownership in Terminal
Module 2 : Hack the Web :-

Setting DVWA Lab for Legal Safety
Understanding and Exploiting Vulnerabilities :-
CSRF
XSS Reflected, Stored and DOM
Command Injection
File Upload and Inclusion
SQL Injection
Weak Session IDs
Brute Forcing
Creating Payload to Attack Web Applications
Scanning for Vulnerabilities through Automated Tools like VEGA
Module 3 : Anonymity and Deception :-

Working with Proxy, VPN and TOR
Advanced TOR to VPN and VPN to TOR Circuits
Mac Address and DNS LEAKS
Fake Online Identity and Email
Spoofed Call and SMS from Any Number
and a lot much More
Module 4 : Human is the Weakest Link :-

Open Source Intelligence Data Gathering on Human
Main Techniques Used
Ethical Hacking through Hardware like Arduino and Digispark
Extreme Level Phishing though GoPhish on a Virtual Private Server
Module 5 : The Art of Reconnaissance :-

Working with Google Hacking
Getting Deep with Nmap
Detecting OS, Finding Ports, Checking for Vulnerabilities
and some more things to be added soon
Module 6 : Attack like a Pro :-

Setting up Metasploit
Learning MSFConsole, MSFVenom
Multi Handler and Meterpreter
Introduction to Venom for Antivirus Evasion
Making Fully Undetectable Payloads
Module 7 : Reporting:-

Learn What to Mention
Learn What not to Mention
Steps to Recreate and PoC
Example of a Good Report

💢💢💢💢💢💢💢💢

Product Details: https://bit.ly/3qdBPzB

File size: 4.1GB

Payment and delivery:
1. Please provide your EMAIL address in “message:” during checkout.
2. The download link will be emailed to you after payment has been confirmed.

🔥 All files will be delivered through Google Drive.
🔥 Lifetime Access

Kindly PM us if you are looking for other ebooks/ Video Courses.
Enjoy learning!

Related Products