1 00:00:06,803 --> 00:00:09,987 - Thank you for your time and for watching this course. 2 00:00:09,987 --> 00:00:12,436 This course started with an overview of ethical hacking 3 00:00:12,436 --> 00:00:14,196 and penetration testing. 4 00:00:14,196 --> 00:00:15,616 Then it covered tons of tools 5 00:00:15,616 --> 00:00:18,008 like the Kali Linux distribution. 6 00:00:18,008 --> 00:00:19,350 You learned how to perform passive 7 00:00:19,350 --> 00:00:22,972 and active reconnaissance, how to hack web applications, 8 00:00:22,972 --> 00:00:27,136 user credentials, databases, networking devices, 9 00:00:27,136 --> 00:00:28,847 and wireless networks. 10 00:00:28,847 --> 00:00:31,007 You also learned what buffer overflows are 11 00:00:31,007 --> 00:00:33,385 and how to use them for exploitation. 12 00:00:33,385 --> 00:00:35,214 We covered several methodologies 13 00:00:35,214 --> 00:00:37,753 including how to perform Windows Powershell Attacks 14 00:00:37,753 --> 00:00:41,793 and several evasion and post exploitation techniques. 15 00:00:41,793 --> 00:00:43,986 You also learned how to use social engineering 16 00:00:43,986 --> 00:00:47,281 to perform attacks and techniques to gain access, 17 00:00:47,281 --> 00:00:50,657 maintain persistence, and perform pivoting. 18 00:00:50,657 --> 00:00:52,992 In this course, you also learned best practices 19 00:00:52,992 --> 00:00:56,705 when writing and distributing penetration testing reports. 20 00:00:56,705 --> 00:00:59,922 I hope you have had as much fun watching this course 21 00:00:59,922 --> 00:01:01,755 as we did teaching it.