-
Bernard Kimanzi Kiema
The lectures are well taught and explanation are perfect,simple and easy to understand.Well prepared.I have already registered for another course expecting to get the same well planned content. Zaid 5 star no doubt.
-
Femi
I bought 3 course, and they have been eye opening so far. Amazing instructor.
Curriculum
-
Introduction
-
Preparation - Creating a Penetration Testing Lab
-
Preparation - Linux Basics
-
Information Gathering
-
Information Gathering - Gathering Info About A Company/Website
-
Information Gathering - Gathering Info About A Person
-
Windows Malware
-
Windows Malware - Generating Undetectable Backdoors
-
Windows Malware - Spying
-
Windows Malware - Enhancing Malware
-
Windows Malware - Creating Trojans
-
Mac OS X Malware
-
Linux Malware
-
Delivery Methods
-
Using The Above Attacks Outside The Local Network
-
Post Exploitation
-
Post Exploitation - Meterpreter
-
Post Exploitation - Empire
-
Security
-
Bonus Section