No description
Find a file
2018-04-06 18:04:32 -04:00
buffer_overflow_example Update README.md 2018-02-16 00:06:04 -05:00
capture_the_flag adding CTF information 2017-10-20 13:50:49 -04:00
cheat_sheets adding additional references 2018-02-13 16:21:27 -05:00
cloud_resources Rename Kali in AWS.md to README.md 2017-08-17 16:25:53 -04:00
exploit_development adding post exploitation, social engineering, and exploit development resources 2018-04-06 18:04:32 -04:00
fuzzing_resources Add fuzzing resources links 2017-09-19 22:29:26 -04:00
metasploit_resources adding metasploit info 2018-01-17 22:57:47 -05:00
mobile_security adding reverse engineering and mobile security references 2017-12-25 23:57:11 -05:00
osint adding OSINT resources 2018-01-17 22:45:47 -05:00
pen_testing_reports Rename public_reports.md to README.md 2017-08-17 16:26:15 -04:00
post_exploitation adding post exploitation, social engineering, and exploit development resources 2018-04-06 18:04:32 -04:00
python creating a quick python scanner 2018-03-13 19:11:29 -04:00
recon adding recon info 2018-01-20 00:14:08 -05:00
reverse_engineering adding exploit development references 2017-12-26 00:11:34 -05:00
social_engineering adding post exploitation, social engineering, and exploit development resources 2018-04-06 18:04:32 -04:00
useful_commands_and_scripts Create reverse_shells.md 2018-01-18 18:57:24 -05:00
virl_topologies Create README.md 2018-02-20 17:50:02 -05:00
vulnerable_servers updating webgoat information 2018-02-14 12:57:46 -05:00
wireless_resources Update z-wave.md 2018-01-04 22:08:20 -05:00
README.md Update README.md 2018-02-18 12:00:04 -05:00

The Art of Hacking Series

The Art of Hacking is a series of video courses that is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetration testing techniques. These video courses provide step-by-step real-life scenarios. You will see first hand how an ethical hacker performs initial reconnaissance of a victim and assess systems and network security controls security posture. This website has been created to provide supplemental material to reinforce some of the critical concepts and techniques that the student has learned and links a GitHub repository that hosts scripts and code that help you build your own hacking environment, examples of real-life penetration testing reports, and more.

The following are the different video courses that will be part of the Art of Hacking series:

These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), and any other ethical hacking certification. This course helps any cyber security professional that want to learn the skills required to becoming a professional ethical hacker or that want to learn more about general hacking methodologies and concepts.

These video courses are published by Pearson, but this GitHub repository is maintained and supported by the lead author of the series (Omar Santos).