ADVANCE HACKING V2

Advanced Hacking V2 is a comprehensive cybersecurity course focused on ethical hacking and penetration testing. It teaches how to identify, analyze, and exploit security vulnerabilities in systems, networks, and web applications.

Intermediate 0(0 Ratings) 0 Students enrolled
Created by Satan Godfather Last updated Sat, 04-Apr-2026 Hindi
What will i learn?

Curriculum for this course
6 Lessons 04:36:53 Hours
ETHICALHACKING
1 Lessons 00:49:39 Hours
  • WHAT IS ETHICAL HACKING 00:49:39
  • FOOTPRINTING BASICS 00:48:39
  • LINUX ON HANDS 00:51:09
  • SCANNING 00:43:18
  • FOOTPRINTING ADVANCE 00:35:29
  • PRACTICAL 00:48:39
Requirements
+ View more
Description

Advanced Hacking V2 Course – Full Syllabus

 1. Introduction to Offensive Security

  • Basics of ethical hacking & pentesting
  • Red Team vs Blue Team concepts
  • Legal scope & responsible disclosure

 2. Getting Comfortable with Kali Linux

  • Kali Linux setup & environment
  • Terminal basics & navigation
  • Essential Linux commands
  • Package management & tools

 3. Command Line Fundamentals

  • Bash scripting basics
  • File handling & permissions
  • Automation techniques

 4. Information Gathering

Passive Recon

  • WHOIS, DNS, Subdomain enumeration
  • OSINT techniques

Active Recon

  • Network scanning
  • Service detection

5. Practical Tools

  • Nmap, 
  • NESSUS

 6. Scanning

  • Vulnerability scanning techniques
  • Automated vs manual scanning
  • Understanding scan results

 7. Vulnerability Research

  • Finding real-world vulnerabilities
  • Using tools like Snyk
  • CVE research & analysis

 8. Exploitation

  • Basics of exploitation
  • Manual vs automated exploitation
  • Writing simple exploits

9. Metasploit (Advanced)

  • Framework structure
  • Exploit modules
  • Payloads & sessions
  • Post-exploitation

 10. Web Exploitation Attacks

  • XSS, SQL Injection
  • CSRF, SSRF
  • File upload vulnerabilities
  • Authentication bypass

11. Windows Privilege Escalation

  • Misconfigurations
  • Token abuse
  • Kernel exploits

 12. Linux Privilege Escalation

  • SUID binaries
  • Cron jobs
  • Weak permissions

 13. File Exploits (Local Exploitation)

  • Exploiting local vulnerabilities
  • Binary exploitation basics

 14. Log Analysis (In-Depth)

  • Reading system logs
  • Detecting attacks
  • Incident response basics

 15. Bug Bounty 

  • Finding valid targets
  • Writing reports
  • Maximizing payouts
  • Avoiding duplicates 
+ View more
Other related courses
05:37:29 Hours
Updated Tue, 30-Jan-2024
5 85 150$ 80$
About the instructor
  • 12 Reviews
  • 124 Students
  • 7 Courses
+ View more
Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
120$ 200$
Buy now
Includes:
  • 04:36:53 Hours On demand videos
  • 6 Lessons
  • Access on mobile and tv
  • Full lifetime access
  • Compare this course with other