Would you like to learn what hackers do to setting up a lab, learn Kali Linux and conduct your own penetration testing because this will help you level up your cyber security and ethical hacking career?

In this course you will learn:

  • Introduction to Ethical Hacking! What is it?
  • Setting Up the Lab Environment
  • Kali Linux Basics
  • Network Penetration Testing
  • Network Penetration Testing – Pre Connection Attacks
  • Network Penetration Testing – Gaining Access To Networks
  • Network Penetration – Post Connection Attacks
  • Network Penetration – Detection & Security
  • Gaining Access to Computers – Server Side Attacks

This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!

  • Start Ethical Hacking in 2019 Course Curriculum!
  • Introduction to Ethical Hacking! What is it?
  • Introduction
  • FREE PREVIEW
  • Why learn hacking
  • Setting Up the Lab Environment
  • Lab Introduction
  • Installing Kali Linux Using a Pre-Built Image
  • Installing Kali Linux Using an ISO Image
  • Installing Windows
  • Installing Metasploitable
  • How To Create Snapshots
  • Kali Linux Basics
  • Kali Linux Overview
  • Terminal & Basic Linux Commands
  • Updating Source List & Installing Programs
  • Network Penetration Testing
  • Network Penetration Testing Introduction
  • How Networks work
  • Connecting A Wireless Adapter
  • Changing MAC addresses
  • Wireless Monitor Modes & How to Change Them
  • Network Penetration Testing – Pre Connection Attacks
  • Packet Sniffing Using Airodump-ng1
  • Targeted Packet Sniffing Using Airodump-ng1
  • De-authentication Attack (Disconnecting Any Device From A Network)
  • Creating a Fake Access Point – Theory
  • Creating a Fake Access Point – Practical
  • Network Penetration Testing – Gaining Access To Networks
  • Gaining Access to the Networks Introduction
  • Cracking WEP Encryption – Theory
  • Cracking WEP Encryption (Basic Case)
  • Cracking WEP Encryption (Fake Authentication)
  • Cracking WEP Encryption (ARP Replay Attack)
  • Cracking WPA & WPA2 Encryption (Exploiting WPS) – Theory
  • Cracking WPA & WPA2 Encryption (Exploiting WPS) – Practical
  • Cracking WPA & WPA2 Encryption (Using Wifite)
  • Cracking WPA & WPA2 Encryption (Capturing Handshake) – Theory
  • Cracking WPA & WPA2 Encryption (Capturing Handshake) – Practical
  • Creating a Wordlist Using Crunch
  • Launching a Wordlist Attack To Crack WPA & WPA2 Password
  • Securing Yourself From Above Attacks
  • Network Penetration – Post Connection Attacks
  • Introduction to Post Connection Attacks
  • Gathering Information Using Netdiscover
  • Introduction To nmap & How To Use It
  • Network Scanning Using nmap
  • Network Scanning Using Zenmap
  • MITM Attack – ARP Poisoning (Theory)
  • MITM Attack – ARP Poisoning Using arpspoof
  • MITM Attack – ARP Poisoning Using MITMf
  • Bypassing HTTPS Using MITMf
  • Session Hijacking & Stealing Cookies
  • DNS Spoofing Using MITMF
  • Capturing Keystrokes & Running Any Code On Target’s Browser
  • Launching MITM Attacks In A Real Environment
  • Basic Overview Of Wireshark
  • Capturing & Analysing Packets Using Wireshark
  • Reading Usernames Passwords & Cookies From Packet Capture
  • Network Penetration – Detection & Security
  • Detecting ARP Poisoning Attacks
  • Detecting Suspicious Activities Using Wireshark
  • Gaining Access to Computers – Server Side Attacks
  • Introduction to Gaining Access To Computers
  • Introduction to Server Side Attacks
  • Information Gathering & Exploiting a Misconfiguration
  • Using a Public Exploit To Hack Into a Server
  • Exploiting a Remote Code Execution Vulnerability
  • Installing & Setting Up Metasploit Community
  • Initializing A Scan Using Metasploit Community
  • Analyzing Scan Results & Exploiting Vulnerabilities
  • Installing & Setting Up Nexpose
  • Initializing a Scan Using Nexpose

Course Curriculum

No curriculum found !

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE
  • £99.00
  • 1 year
3 STUDENTS ENROLLED
Yvar is a registrated trade name of Ster Shop BV

Eindhovenseweg 116 5582HW Waalre
The Netherlands.

T: +3140844000
E: info@yvar.com
KVK: 17110779
BTWnr: NL8110.24.106.B01
IBAN: NL10ABNA0533372631

FAQ | Contact | Terms and Conditions |