Would you like to learn what hackers do to setting up a lab, learn Kali Linux and conduct your own penetration testing because this will help you level up your cyber security and ethical hacking career?
In this course you will learn:
- Introduction to Ethical Hacking! What is it?
- Setting Up the Lab Environment
- Kali Linux Basics
- Network Penetration Testing
- Network Penetration Testing – Pre Connection Attacks
- Network Penetration Testing – Gaining Access To Networks
- Network Penetration – Post Connection Attacks
- Network Penetration – Detection & Security
- Gaining Access to Computers – Server Side Attacks
This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!
- Start Ethical Hacking in 2019 Course Curriculum!
- Introduction to Ethical Hacking! What is it?
- Introduction
- FREE PREVIEW
- Why learn hacking
- Setting Up the Lab Environment
- Lab Introduction
- Installing Kali Linux Using a Pre-Built Image
- Installing Kali Linux Using an ISO Image
- Installing Windows
- Installing Metasploitable
- How To Create Snapshots
- Kali Linux Basics
- Kali Linux Overview
- Terminal & Basic Linux Commands
- Updating Source List & Installing Programs
- Network Penetration Testing
- Network Penetration Testing Introduction
- How Networks work
- Connecting A Wireless Adapter
- Changing MAC addresses
- Wireless Monitor Modes & How to Change Them
- Network Penetration Testing – Pre Connection Attacks
- Packet Sniffing Using Airodump-ng1
- Targeted Packet Sniffing Using Airodump-ng1
- De-authentication Attack (Disconnecting Any Device From A Network)
- Creating a Fake Access Point – Theory
- Creating a Fake Access Point – Practical
- Network Penetration Testing – Gaining Access To Networks
- Gaining Access to the Networks Introduction
- Cracking WEP Encryption – Theory
- Cracking WEP Encryption (Basic Case)
- Cracking WEP Encryption (Fake Authentication)
- Cracking WEP Encryption (ARP Replay Attack)
- Cracking WPA & WPA2 Encryption (Exploiting WPS) – Theory
- Cracking WPA & WPA2 Encryption (Exploiting WPS) – Practical
- Cracking WPA & WPA2 Encryption (Using Wifite)
- Cracking WPA & WPA2 Encryption (Capturing Handshake) – Theory
- Cracking WPA & WPA2 Encryption (Capturing Handshake) – Practical
- Creating a Wordlist Using Crunch
- Launching a Wordlist Attack To Crack WPA & WPA2 Password
- Securing Yourself From Above Attacks
- Network Penetration – Post Connection Attacks
- Introduction to Post Connection Attacks
- Gathering Information Using Netdiscover
- Introduction To nmap & How To Use It
- Network Scanning Using nmap
- Network Scanning Using Zenmap
- MITM Attack – ARP Poisoning (Theory)
- MITM Attack – ARP Poisoning Using arpspoof
- MITM Attack – ARP Poisoning Using MITMf
- Bypassing HTTPS Using MITMf
- Session Hijacking & Stealing Cookies
- DNS Spoofing Using MITMF
- Capturing Keystrokes & Running Any Code On Target’s Browser
- Launching MITM Attacks In A Real Environment
- Basic Overview Of Wireshark
- Capturing & Analysing Packets Using Wireshark
- Reading Usernames Passwords & Cookies From Packet Capture
- Network Penetration – Detection & Security
- Detecting ARP Poisoning Attacks
- Detecting Suspicious Activities Using Wireshark
- Gaining Access to Computers – Server Side Attacks
- Introduction to Gaining Access To Computers
- Introduction to Server Side Attacks
- Information Gathering & Exploiting a Misconfiguration
- Using a Public Exploit To Hack Into a Server
- Exploiting a Remote Code Execution Vulnerability
- Installing & Setting Up Metasploit Community
- Initializing A Scan Using Metasploit Community
- Analyzing Scan Results & Exploiting Vulnerabilities
- Installing & Setting Up Nexpose
- Initializing a Scan Using Nexpose
Course Curriculum
Course Reviews
No Reviews found for this course.
3 STUDENTS ENROLLED