Overview
This course teaches learners how to conduct penetration testing by reviewing nmap scans, using searchsploit to find exploits, enumerating and exploiting port 80, and exploring Linux privilege escalation. The teaching method includes practical demonstrations and hands-on exercises. The course is designed for beginners interested in ethical hacking and cybersecurity.
Syllabus
- Introduction.
- Reviewing the nmap scan.
- Using searchsploit to find exploits.
- Enumerating and exploiting port 80.
- Looking into Linux privilege escalation.
Taught by
The Cyber Mentor