Learn practical skills for ethical hacking & penetration testing with this comprehensive course, no experience necessary
This course is for anyone interested in becoming an ethical hacker, no matter your current skill level. The curriculum is designed for absolute beginners interested in a career as a security professional, beginning with the absolute basics of penetration testing, and progressing to advanced topics and techniques. Get started today in your Ethical Hacking career.
The goal of ethical hacking is to find security vulnerabilities in an organization’s digital systems and networks. The best way to test the security of this infrastructure is to attempt to break in through penetration testing techniques. The increasing amount of high-profile cyber incidents continues to emphasize the need for individuals with these skills, with job demand projected to continue at an exponential rate.
The techniques shown here leverage free tools which are explained throughout the course, including instructions for creating your own home lab for practice and study. One of the primary tools you will become familiar with is Kali Linux, which is a Debian-based Linux distribution aimed at penetration testing and security auditing.
This course explores the following topics and more:
– Networking Basics
– Creating a Virtual Lab
– Kali Linux Tools for Penetration Testing
– Linux Basics
– Python Basics
– Penetration Testing Methodology
– Legal Considerations
– Report Writing
– Passive and Active Reconnaissance
– Scanning and Enumeration
– Reverse and Bind Shell
– Automated Payloads and Exploitation
– Brute Force Attacks
– Credential Stuffing
– Password Spraying
– Tips for Maintaining Access and Covering Tracks
– Web Server Vulnerabilities
– Wifi Hacking
David Bombal is the best, I came to this site just because of him and now recommend to any beginning learner or someone wanting to learn something new!! He is definitely worth his weight in gold!! A+ instructor and seems to be an all around good guy!
To all the instructors in this course. All my gratitude to you. This is one of the best course I have gone through for Ethical Hacking. Still have not completed the course but I am absolutely loving it so far. If there is anything I can do to support you’ll please let me know.
The course is very explainable, I hope to learn a lot in this course. The teacher is dynamic and uses simple language to explain.
The course is absolutely amazing…!!
It will help you to get a broad Level 1 knowledge about how things work.
So far so good. I like the format and the fact that you are taking the time to make clear the resources and functionality of the site/s. Although I am an experienced Linux user (I now use nothing else) I am new to EH/pen-testing.
Halfway through, and it is getting meaty. There are a few parts that take some re-watching, and I did not get all the behaviors/returns from some of the commands, like hosts on nmap -sn, but overall very good, learning a lot.
Not really for beginners exactly, a lot of the times they are using terms that you need a bit of experience to know about and they move fast. (have your google search ready if you are a complete beginner to IT). Other than that its a great course.
This is just a great course to give you practical examples of ethical hacking so you can choose for yourself if security is right for you.
This is not a beginners course. It skims over the basics really fast, feeling more like refreshers than explanations, and it touches on way too many topics in a too short amount of time. I wish it was less rushed and longer. Or he could’ve discussed less topics, but more in depth. Like this, it’s pretty useless to me unfortunately.
I’m not saying there’s no good info here, but you should approach it as a pocket guide reference when you already have some knowledge on networking and ethical hacking, and it should be marketed that way.
Even though I already knew some parts of this course (because I study IT), like network basics, they explain it all comprehensively. Its also easy to listen to them
Started out well,
but I got lost a bit from section 8 onwards. Got back on track from chapter 15. Overall very good course though.
I have been studying networking back in the days but the section about ip and netmask was really blury for me…
This course is very thorough and the information presented is very useful and easy to understand. I would advise note taking because of the volume of subject matter. This course is well worth the money. Highly recommend.
Explains what we will learn before proceeding the lesson so you know where to look when you need help with something. Also provides necessary things for what there doing in the lesson which is massively appreciated.
I’m loving it. This course is giving me the courage and direction which I needs.
Thanks , for making this amazing course.
I just began studying this course as long as i continued, i found that this course is very informative and awsome! Very good course and path! Cheers
English
Language
Course Introduction
1.0 Course Introduction
1.1 Introduction and Overview
1.2 Course Tools
Getting help
Answering your questions
Networking Basics
2.0 Networking Basics
2.1 IP Addressing
2.2 MAC Addressing
2.3 The OSI Model
2.4 Binary Numbering
2.5 Subnetting
2.6 Subnetting: Hands-On Practice
2.7 TCP and UDP
2.8 Well-Known Ports
Creating Virtual lab
3.0 Creating a Virtual Lab
3.1 VMware Player
3.2 Virtual Box
3.3 VMware Fusion
3.4 Kali Linux
3.5 VM Snapshots
Kali Linux Tools
4.0 Kali LInux Tools
4.1 Kali Linux Overview
4.2 Keeping Notes
Linux Basics
5.0 Linux Basics
5.1 Sudo Command
5.2 File System Navigation
5.3 File Permissions
5.4 Working with Files
5.5 Linux Users
5.6 Common Commands
5.7 Installing Updates
5.8 Installing Python
5.9 Using GitHub
5.10 Bash Scripting
Python Basics
6.0 Python Basics
6.1 Strings
6.2 Variables
Functions
Boolean Expressions
Operators
Lists
Tuples
Sets
Dictionaries
Conditions
Loops
Modules
Penetration Testing
7.0 Penetration Testing
7.1 Five Phases of Ethical Hacking
7.2 Legal Documents
7.3 Pentest Report Writing
Reconnaissance
8.0 Reconnaissance
8.1 Passive Reconnaissance
8.2 Email Address Gathering
8.3 Discovering Breached Credentials
8.4 Passive Kali Tools
8.5 Leveraging the Internet
8.6 Subdomains
Scanning
9.0 Scanning
9.1 Nmap Scanning
9.2 Web Server Scanning
9.3 File Share Enumeration
9.4 SSH Enumeration
9.5 Vulnerability Scanning
Gaining Access
10.0 Gaining Access
10.1 Reverse Shell
10.2 Bind Shell
10.3 Sending Payloads
10.4 Automated Exploitation
10.5 Brute Force Attacks
10.6 Credential Stuffing
10.7 Password Spraying
Maintaining Access
11.0 Maintaining Access
11.1 Tactics for Maintaining Access
Covering Tracks
12.0 Covering Tracks
12.1 Pentest Cleanup
Exploring OWASP
13.0 Exploring OWASP
13.1 OWASP Top 10
13.2 Using Burp Suite
13.3 SQL Injection
13.4 Broken Authentication
13.5 Sensitive Data Exposure
13.6 XML External Entities (XXE)
13.7 Broken Access Control
13.8 Security Misconfigurations
13.9 Cross-Site Scripting (XSS)
13.10 Insecure Deserialization
13.11 Known Vulnerabilities
13.12 Insufficient Logging and Monitoring
WiFi Theory
WiFi Introduction
Introduction to Wireless LANs (WLANs)
WLAN Antennas
Wireless Range Extenders
WLAN Frequencies and Channels
WLAN Standards
WiFi Hacking
Cracking WiFi with a single Linux Command (wifite)
Easy GUI WPA2 cracking using Fern
Cracking WiFi with airmon-ng
GPU WPA2 cracking using hashcat
Python WiFi DOS script
WiFi Adapters and Troubleshooting
WiFi adapters – are they required? And which are best?
Example of monitor vs managed mode
Get Alfa Adapter get working on Kali Linux
Fix TP-Link TL-WN722N Adapter issues
Wifite: Fixing issues
Course Wrap-Up
Course Wrap-Up