Learn Ethical Hacking From A-Z: Beginner To Expert | |||
Course Introduction | |||
Course Overview | 00:08:00 | ||
About Your Instructors | 00:03:00 | ||
Section Overview | 00:03:00 | ||
Current Cybersecurity Market | 00:09:00 | ||
The 3 Types of Hackers | 00:05:00 | ||
The 4 Elements of Security | 00:04:00 | ||
Ethical Hacker Terminology | 00:04:00 | ||
Common Methods of Hacking | 00:08:00 | ||
Cybersecurity & Ethical Hacking Overview | 00:03:00 | ||
Ethical Hacking vs Penetration Testing | 00:06:00 | ||
Job Opportunities in Cybersecurity | 00:01:00 | ||
Who is This Course is For? | 00:01:00 | ||
Networking Basics | |||
Networking Section Overview | 00:12:00 | ||
How Data Travels Across The Internet | 00:02:00 | ||
Understanding Ports and Protocols | 00:08:00 | ||
Understanding IP Addresses: Public & Private | 00:02:00 | ||
What Are Subnets? | 00:03:00 | ||
The Average Network vs Remote Based | 00:06:00 | ||
Setting Up Your Hacking Lab | |||
Hacking Lab Section Overview | 00:09:00 | ||
Understanding Virtual Machines | 00:03:00 | ||
Setup Your Kali Linux Machine | 00:10:00 | ||
VN Setup & Testing Vulnerable Systems | 00:23:00 | ||
Linux/Python/Bash & PowerShell Basics | |||
Linux+Python+Bash+Powershell Section Overview | 00:06:00 | ||
Linux Basics | 00:11:00 | ||
Working With Directories & Moving Files | 00:03:00 | ||
Installing & Updating Application Files | 00:02:00 | ||
Linux Text Editors | 00:04:00 | ||
Searching For Files | 00:02:00 | ||
Bash Scripting Basics | 00:09:00 | ||
Python Basics | 00:11:00 | ||
How To Remain Anonymous On The Web | |||
Remaining Anonymous Section Overview | 00:06:00 | ||
TOR Browser Overview | 00:06:00 | ||
Anonsurf Overview | 00:03:00 | ||
Changing Mac Addresses | 00:03:00 | ||
Using a Virtual Private Network/Server (VPN, VPS) | 00:04:00 | ||
How To Hack Into WIFI | |||
WiFi Hacking Section Overview | 00:06:00 | ||
WiFi Hacking System Setup | 00:09:00 | ||
WEP Hacking Attack #1 | 00:09:00 | ||
WEP Hacking Attack #2 | 00:04:00 | ||
WPA/WPA2 Hacking | 00:10:00 | ||
Passive & Active Reconnaissance (Information Gathering) | |||
Reconnaissance Section Overview | 00:04:00 | ||
Passive Recon vs Active Recon | 00:01:00 | ||
Recon-ng Overview | 00:15:00 | ||
Whois Enumeration | 00:02:00 | ||
DNS Enumeration Overview | 00:02:00 | ||
Netcraft.com DNS Information | 00:03:00 | ||
Google Hacking | 00:05:00 | ||
Shodan.io Overview | 00:02:00 | ||
Securityheaders.com (Analyze HTTPS Headers of website) | 00:02:00 | ||
Ssllabs.com/ssltest (Look for SSL issues on website) | 00:02:00 | ||
Pastebin.com (Sensitive Information) | 00:01:00 | ||
NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.) | 00:15:00 | ||
Netcat Overview + SMB/NFSEnumeration | 00:14:00 | ||
Nikto & Sparta Web Application Scanner | 00:06:00 | ||
SMPT Enumeration + Nessus/Openvas Scanners | 00:05:00 | ||
Launching Attacks | |||
Launching Attacks Overview | 00:10:00 | ||
Analyzing Information Gathered | 00:04:00 | ||
Taking Advantage of Telenet | 00:06:00 | ||
Searching & Understanding Exploits | 00:06:00 | ||
Copy Exploits From Searchsploit | 00:03:00 | ||
Understanding Exploits | 00:04:00 | ||
Launching Exploits | 00:24:00 | ||
Brute Force Attacks | 00:07:00 | ||
How To Crack Passwords | 00:04:00 | ||
ARP Spoofing Overview | 00:21:00 | ||
Introduction To Cryptography | 00:14:00 | ||
Post Exploitation | |||
Post Exploitation Section Overview | 00:03:00 | ||
Privilege Escalation | 00:29:00 | ||
Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus | 00:27:00 | ||
Installing a Keylogger | 00:03:00 | ||
Installing a Backdoor | 00:07:00 | ||
Website & Web Application Hacking | |||
Website & Web Application Hacking Overview | 00:06:00 | ||
Web Application Scanning | 00:08:00 | ||
Directory Buster Hacking Tool | 00:03:00 | ||
Nikto Web App Hacking Tool | 00:03:00 | ||
SQLmap and SQL Ninja Overview | 00:01:00 | ||
How To Execute Brute Force Attacks | 00:13:00 | ||
Using Command Injection | 00:03:00 | ||
Malicious File Upload | 00:10:00 | ||
Local & Remote File Inclusion | 00:10:00 | ||
SQL Injection Overview | 00:19:00 | ||
Using Cross Site Request Forgery | 00:11:00 | ||
Cross Site Scripting Overview | 00:12:00 | ||
Mobile Phone Hacking & Security | |||
Mobile Phone Hacking Section Overview | 00:11:00 | ||
Mobile Attack Vectors | 00:02:00 | ||
Mobile Hacking Using URLs | 00:02:00 | ||
Jail Breaking and Rooting Considerations | 00:01:00 | ||
Privacy Issues (Geo Location) | 00:01:00 | ||
Mobile Phone Data Security | 00:02:00 | ||
Getting Your Name Out There As An Ethical Hacker | |||
Getting Your Name Out There Section Overview | 00:02:00 | ||
Building A Brand | 00:09:00 | ||
Personal Branding | 00:13:00 | ||
Setup Your Website and Blog | 00:11:00 | ||
Writing a Book | 00:10:00 | ||
Starting a Podcast | 00:08:00 | ||
Networking Overview | 00:06:00 | ||
How To Make Money As An Ethical Hacker | |||
Making Money Section Overview | 00:02:00 | ||
Bug Bounty Programs | 00:04:00 | ||
How To Start Freelancing | 00:11:00 | ||
How To Start Client Consulting | 00:09:00 | ||
How To Start A Career In Cybersecurity | |||
Potential Salary & Cybersecurity Roadmap | 00:10:00 | ||
Books Recommendations | 00:03:00 | ||
Places to Practice Hacking for Free | 00:03:00 | ||
Resources | |||
Resources – Learn Ethical Hacking From A-Z: Beginner To Expert | 00:00:00 | ||
Assignment | |||
Assignment -Learn Ethical Hacking From A-Z: Beginner To Expert | 3 weeks, 3 days | ||
Order Your Certificate | |||
Order Your Certificate QLS | 00:00:00 |
Membership renews after 12 months. You can cancel anytime from your account.