Learn ethical hacking, penetration testing and network security skills with our comprehensive course!
What you will learn
☑ Ethical Hacking
☑ Linux Commands
☑ Kali Linux
☑ Creating a Secure Environment
☑ Footprinting
☑ Scanning
☑ Website Penetration Testing
☑ Wireless Cracking
☑ Man in the Middle Attacks
☑ System Hacking
☑ Python Programming Fundamentals
☑ Coding Custom Pentesting Tools
☑ Tips for Building a Career in Cyber Security
Description
If you would like to master ethical hacking, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux and Python hacking with over 28 hours of HD video tutorials! We will cover the following topics in this course:
- How to setup a Kali Linux system
- Essential Linux system commands
- How to create a secure penetration testing environment
- Footprinting
- Scanning
- Website penetration testing
- WPA2 wireless network cracking
- Man in the middle attacks
- System hacking using Metasploit
- Python programming fundamentals
- Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)
- Tips for building a career in cyber security
This course was designed for absolute beginners, so no previous ethical hacking or programming knowledge is necessary. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the tutorials is available within the discussion forum.
Still not sold? Check out some of these great reviews!
“Great course, beginner friendly. And most importantly, great instructor and great community.”
“It’s really detailed and helps you get started well!”
“Thank you for all the changes and all the new stuff you keep adding. I have more than a few ethical hacking courses and this is the best one, at least so far. I had my doubts when I got it due to it being so short but I am really happy that I did. Great job, keep it up!”
Thank you for taking the time to read this and we hope to see you in the course!
English
Language
Content
Introduction and Installation
Introduction to the course
VirtualBox installation
Kali Linux installation
Enabling full-screen
Basic Linux Commands
Basic commands part 1
Basic commands part 2
Basic commands part 3
Creating a Secure Hacking Environment
Changing IP address and wireless adapter setup
Creating a bootable Kali USB drive
Essential networking terms
Essential hacking terms
Additional Kali tools to install
Changing our MAC address with macchanger
Footprinting
Google hacking
Nikto basics
Whois tool
Email harvesting
Shodan
Zone transfer with Dig
Scanning
Installing Metasploitable
Nmap part 1
Nmap part 2
Nmap part 3
Zenmap
TCP scans
Nmap bypassing defenses
Nmap scripts part 1
Nmap scripts part 2
Website Penetration Testing
Installing OWASP
HTTP request
HTTP response
Burpsuite configuration
Editing packets in Burpsuite
Whatweb and Dirb
Password recovery attack
Burpsuite login bruteforce
Hydra login bruteforce
Session fixation
Injection attacks
Simple command injection
Exploiting command injection vulnerability
Finding blind command injection
SQL basics
Manual SQL injection part 1
Manual SQL injection part 2
SQLmap basics
XML injection
Installing XCAT and preventing injection attacks
Reflected XSS
Stored XSS
Changing HTML code with XSS
XSSer and XSSsniper
WPA2 Wireless Cracking
Wireless attacking theory
Enabling monitor mode
Capturing handshake with airodump
RockYou.txt
Cracking with Aircrack
Cracking with Hashcat
Creating password lists with Crunch
Creating password lists with Cupp
Rainbow tables part 1
Rainbow tables part 2
Installing Fluxion
Finding and cracking hidden networks
Preventing wireless attacks
Man in the Middle Attacks
ARP protocol basics
Man in the middle attack theory
Installing MITMf
Manual ARP spoofing
Problems while installing MITMf
HTTP traffic sniffing
DNS spoofing and HTTPS password sniffing
Hooking browsers with BEEF
Screenshotting targets browser
Cloning any webpage
Ettercap basics
System Hacking
MSFconsole environment
Metasploit modules explained
Bruteforcing SSH with Metasploit
Attacking Tomcat with Metasploit
Getting Meterpreter with command injection
PHP code injection
2 Metasploitable exploits
Wine installation
Creating Windows payloads with Msfvenom
Encoders and Hex editor
Windows 10 Meterpreter shell
Meterpreter environment
Windows 10 privilege escalation
Preventing privilege escalation
Post exploitation modules
Getting Meterpreter over Internet with port forwarding
Eternalblue exploit
Persistence module
Hacking over the internet with Ngrok
Android device attack with Venom
The real hacking begins now!
Python Crash Course
Variables
Raw input
If-else statements
For loops
While loops
Python lists
Functions
Classes
Importing libraries
Files in Python
Try and except rule
Coding an Advanced Backdoor
Theory behind reverse shells
Simple server code
Connection with reverse shell
Sending and receiving messages
Sending messages with while true loop
Executing commands on target system
Fixing backdoor bugs and adding functions
First test using our backdoor
Trying to connect every 20 seconds
Creating persistence part 1
Creating persistence part 2
Changing directory
Uploading and downloading files
Downloading files from the internet
Starting programs using our backdoor
Capturing screenshot on the target PC
Embedding backdoor in an image part 1
Embedding backdoor in an image part 2
Checking for administrator privileges
Adding help option
Creating a Keylogger for the Backdoor
Importing Pynput
Simple keylogger
Adding report function
Writing keystrokes to a file
Adding the keylogger to our reverse shell part 1
Adding the keylogger to our reverse shell part 2
Final project test
Basic Authentication Bruteforcer
Printing banner
Adding available options
Starting threads for bruteforce
Writing function to run the attack
Bruteforcing router login
Bypassing antivirus with your future programs
Sending malware with spoofed email
BONUS – Building a Career in Cyber Security
What will you learn in this section?
Why is ethical hacking a valuable skill?
What is the best ethical hacking certification?
Tips for getting your first job as an ethical hacker
How I started my career as an ethical hacker
How to price your work