Learn Ethical Hacking

What will you learn from this Learn Ethical Hacking From Scratch course?

  • More than 120 videos that include complete detail about the computer security and ethical hacking.
  • Complete knowledge about the definition of hacking, ethical hacking and various kinds of hackers
  • Full learning about various fields of the ethical hacking
  • Installing Kali Linux, which is known as a popular penetration testing operating system
  • Installing Windows and other vulnerable operating systems as virtual machines for the purpose of testing
  • Complete learning about the basics of Linux
  • Full knowledge about the Linux commands and how to have interaction with the terminal
  • Adequate learning about the Network Penetration Testing
  • Information about the basics of networking and how these devices interact in a network
  • Various practical attacks, which can be utilized without having any information about the key to the major network
  • Controlling connection of the clients around the people without any information regarding password
  • Making a duplicate Wi-Fi network with the help of spy and internet connections with the clients
  • Gathering complete detail regarding clients and networks, like opened ports, OS, etc.
  • Cracking WPA/ WPA2? WEP encryption by utilizing a great range of ways.
  • ARP Poisoning/ ARP Spoofing
  • Launching different Man in the Middle attacks
  • Discovering installing services, open ports, and vulnerabilities in the company’s systems
  • Getting access to all the accounts accessed by the clients in your network
  • Sniffing packets from the customers and then demonstrate them for extracting important details, like cookies, videos, images, passwords, etc.
  • Getting control over all the computer systems by utilizing the side attacks of the server
  • Exploring buffer overflows and execution of the code vulnerabilities for attaining control over the systems.
  • Receiving control on the computer systems with the help of client side attacks
  • Attaining control over the computer systems by utilizing fake updates
  • Getting authorization over the computer systems by using the power of backdooring downloads available on the fly
  • Making undetectable backdoors
  • Backdooring basic programs
  • Backdooring different types of files, including PDFs, pictures, etc.
  • Collecting important details of the people, such as social media accounts, emails, friends, emails, etc.
  • Utilization of the social media for attaining complete control over the targeted systems
  • Sending emails from all the email accounts without having any information about that account’s password
  • Reading, downloading, uploading and executing different types of files on the compromised systems
  • Capturing major strikes taking place on a compromised system
  • Utilizing a compromised computer as a way to attaining access to all other computers having the same network
  • Complete understanding of the working of websites and web applications
  • Full information about communication method of browsers with the websites
  • Gathering important details regarding websites
  • Discovering technologies, servers, and services utilized on the targeted website
  • Figuring out emails and important data that are associated with a particular website
  • Finding every subdomain having association with a site
  • Finding out unpublished files and directories that are associated with the targeted website
  • Finding every website that is hosted on the same server as the target website
  • Gaining complete control over the targeted website and exploiting file upload vulnerabilities
  • Discovering, exploring, and fixing vulnerabilities about the code execution
  • Discovering, fixing, and exploiting vulnerabilities regarding local file inclusion
  • Discovering, exploiting, and fixing vulnerabilities of SQL injections
  • Bypassing login and its forms as admin by utilizing SQL injections
  • Complete learning about the way to write queries in SQL for finding tables, sensitive details, and databases, like usernames and passwords by utilizing SQL injections
  • Reading and writing files to the server with the help of SQL injections
  • Learning the accurate method for writing SQL queries so that SQL injections can be prevented
  • Discovering the stored XSS and reflected vulnerabilities
  • Fixing XSS vulnerabilities and getting protection as a user

Learn Ethical Hacking From Scratch Course Requirements

  • The students should have some basic skills about the IT industry
  • They should have access to the wireless adapter for the section of the Wi-Fi section. We strongly recommend you should buy TP-Link TL-WN722n v1 and ALFA AWUS036NHA

Learn Ethical Hacking From Scratch Course Description

First of all, we want to welcome you to this advanced and comprehensive course about the ethical hacking. It is the perfect for the people who are complete beginners and have zero knowledge regarding hacking or penetrating testing. At the start of the course, you will get a chance to learn about some basic details regarding ethical hacking and the various fields of penetration testing.

The main target of this Learn Ethical Hacking From Scratch course is on the practical way of penetration testing without any need to neglect the theory for all the attacks. Prior to teaching about the penetration testing, you have to learn about the techniques for setting up a lab and installing the required software to penetration testing so that you can practice your own machine. Each of the attacks that you will learn in this course is launched against the practical devices in the instructor’s lab.

The Learn Ethical Hacking From Scratch course is divided in a precise manner that will allow the students to learn the basics of computer networks and system. Furthermore, you will learn about the techniques through which devices can have communication with each other. The course will begin by talking regarding the method by which exploits these systems for carrying out a great range of powerful attacks. This extensive Learn Ethical Hacking from Scratch course will take you through the beginner and ends up at an advanced level. In simple words, we can say that you will attain proper knowledge regarding major penetrating testing fields after finishing the course.

The Learn Ethical Hacking From Scratch course is divided into four main sections that are mentioned below:

  1. Network Penetration Testing

In this section, the instructor will teach the students about the methods for testing the security of networks, both wireless as well as wired. At the start, they will learn about the working of networks, the terminology of basic network and how the communication between the devices takes place. Further content is divided into three sub-sections

Pre-connection

The majority of people have a computer along with a wireless card, but they still don’t have much information about the penetration testing. In this section, we will allow you to learn about the techniques for gathering details regarding the computers and networks in your nearby environment and launching a great range of attacks without knowing the password, like controlling all the sections near you.

In addition, the instructor will teach you about the technique for making a fake access point and then attracts the users for connecting to them and capturing all the important details entered by it.

Attaining Access

In this section, you will collect details regarding the networks near you so that they can be found. Furthermore, you will learn about the techniques for cracking the key and attaining access to the targeted network. The main purpose of this sub-section is to teach the students about the various methods for cracking WPA/ WPA/ WEP encryption.

Posting connection

In the previous sections, we have explained the key to the target network and the method to have a connection with it. Now, we will explain about a range of strong attacks launched against the network and the clients connected with it. Also, the students will gain access to these attacks to all the accounts accessed by the devices having a connection with your network. It will also allow you to check out all the traffic utilized by the devices.

  1. Gaining Access

The instructor will explain about two major approaches in this section so that you can attain control over any computer system:

Server-side attacks

This part of the course will tell you about the way to gain complete access to computer systems without any requirement for user interaction. In addition, you will be allowed to learn the technique for gathering details regarding a target computer system like its open ports, operating system, and installed services. You will also learn the techniques for discovering vulnerabilities and weakness.

Moreover, the students will know how to exploit these issues for attaining full control over the target. At last, we will explain you about the way to generate various types of reports for your discoveries.

Client Side Attacks

The only method to get access to the weaknesses in a target system is to have interaction with the user. You will learn about the way to launch a range of strong attacks in this approach for fooling the target user and allow them to install a backdoor on their device. It can be performed by making fake updates and backdooring the downloaded files or serving them to the user.

In addition, the instructor will also teach how to collect details regarding the target person and utilizing social engineering for delivering a backdoor as an image or any other type of file.

  1. Post Exploration

Here, you will get a chance to learn about the way to have interaction with the systems in this section for which you are comprising for a long time. You will also learn about the method for accessing the file system, maintaining your access, and focusing on the target and using the computer as a way for hacking the computer systems.

  1. Web Application Penetration Testing

This section is created for teaching the students about the way websites work. Furthermore, you will tell you the exact method to collect details regarding your target website, like server location, website owner, used technologies, and much more. In addition, you will get to know the method for discovering and exploiting lots of dangerous vulnerabilities, like XSS vulnerabilities, SQL injections, etc.

After finishing every section, you will be able to know about the method for detecting, securing, and preventing your computer system. You will also learn to prevent yourself from these attacks.

Every attack explained in this course are practical that can destroy any computer device. It means, it can attack any device, no matter is a tablet or a laptop. We have explained all the attacks in an exciting manner. We will tell you about the theory behind all these attacks and then give you brief information about the method for carrying out the attacks by utilizing Kali Linux.

Please note: The main motive of this Learn Ethical Hacking From Scratch course is to provide education only and every attack explained in it are launched in the lab of instructor or against devices that he is permitted to test.

Who is the target audience of Learn Ethical Hacking From Scratch course?

  • All the individuals who have a deep interest in learning penetration testing and ethical hacking.
  • All the people who are seeking a way to provide protection to their systems from the hackers
  • Every individual who is looking to learn the method hackers can attack their systems.

1
Course Introduction & Overview
2
Teaser – Hacking a Windows 10 Computer & Accessing Their Webcam
3
What Is Hacking & Why Learn It ?
4
Lab Overview & Needed Software
5
Kali Linux – Option 1 – Installing Kali As a Virtual Machine
6
Kali Linux – Option 2 – Installing Kali Using the ISO Image
7
Installing Metasploitable As a Virtual Machine
8
Installing Windows As a Virtual Machine
9
Creating & Using Snapshots
10
Basic Overview of Kali Linux
11
The Terminal & Linux Commands
12
Updating Sources & Installing Programs
13
Network Penetration Testing Introduction
14
Networks Basics
15
What is MAC Address & How To Change It
16
Wireless Modes (Managed & Monitor)
17
Enabling Monitor Mode Manually (2nd method)
18
Enabling Monitor Mode Using airmon-ng (3rd method)
19
Packet Sniffing Basics Using Airodump-ng
20
Targeted Packet Sniffing Using Airodump-ng
21
Deauthentication Attack (Disconnecting Any Device From The Network)
22
Creating a Fake Access Point (Honeypot) – Theory
23
Creating a Fake Access Point (Honeypot) – Practical
24
Gaining Access Introduction
25
WEP Cracking – Theory Behind Cracking WEP Encryption
26
WEP Cracking – Basic Case
27
WEP Cracking – Fake Authentication
28
WEP Cracking – ARP Request Replay Attack
29
WPA Cracking – Introduction
30
WPA Cracking – Exploiting WPS Feature
31
WPA Cracking – Theory Behind WPA/WPA2 Cracking
32
WPA Cracking – How To Capture The Handshake
33
WPA Cracking – Creating a Wordlist
34
WPA Cracking – Using a Wordlist Attack
35
Securing Your Network From The Above Attacks
36
How to Configure Wireless Security Settings To Secure Your Network
37
Introduction
38
Information Gathering – Discovering Connected Clients using netdiscover
39
Gathering More Information Using Autoscan
40
Gathering Even More Information Using Zenmap
41
MITM – ARP Poisonning Theory
42
MITM – ARP Spoofing using arpspoof
43
MITM – ARP Spoofing Using MITMf
44
MITM – Bypassing HTTPS
45
MITM – Session Hijacking
46
MITM – DNS Spoofing
47
MITM – Capturing Screen Of Target & Injecting a Keylogger
48
MITM – Injecting Javascript/HTML Code
49
MITM – Using MITMf Against Real Networks
50
Wireshark – Basic Overview & How To Use It With MITM Attacks
51
Wireshark – Sniffing Data & Analysing HTTP Traffic
52
Wireshark – Capturing Passwords & Cookies Entered By Any Device In The Network
53
Detecting ARP Poisonning Attacks
54
Detecting suspicious Activities Using Wireshark
55
Gaining Access Introduction
56
Introduction
57
Basic Information Gathering & Exploitation
58
Using a Basic Metasploit Exploit
59
Exploiting a Code Execution Vulnerability
60
MSFC – Installing MSFC (Metasploit Community)
61
MSFC – Scanning Target(s) For Vulnerabilities
62
MSFC – Analysing Scan results & Exploiting Target System
63
Nexpose – Installing Nexpose
64
Nexpose – How To Configure & Launch a Scan
65
Nexpose – Analysing Scan Results & Generating Reports
66
Introduction
67
Installing Veil 3
68
Veil Overview & Payloads Basics
69
Generating An Undetectable Backdoor Using Veil 3
70
Listening For Incoming Connections
71
Using A Basic Deliver Method To Test The Backdoor & Hack Windows 10
72
Backdoor Delivery Method 1 – Using a Fake Update
73
Backdoor Delivery Method 2 – Backdooring Downloads on The Fly
74
How to Protect Yourself From The Discussed Delivery Methods
75
Introduction
76
Maltego Basics
77
Discovering Websites, Links & Social Networking Accounts Associated With Target
78
Discovering Twitter Friends & Associated Accounts
79
Discovering Emails Of The Target’s Friends
80
Analysing The Gathered Info & Building An Attack Stratigy
81
Backdooring Any File Type (images, pdf’s …etc)
82
Compiling & Changing Trojan’s Icon
83
Spoofing .exe Extension To Any Extension (jpg, pdf …etc)
84
Spoofing Emails – Send Emails As Any Email Account You Want
85
BeEF Overview & Basic Hook Method
86
BeEF – hooking targets using MITMf
87
BeEF – Running Basic Commands On Target
88
BeEF – Stealing Credentials/Passwords Using A Fake Login Prompt
89
BeEF – Gaining Full Control Over Windows Target
90
Detecting Trojans Manually
91
Detecting Trojans Using a Sandbox
92
Overview of the Setup
93
Ex1 – Generating a Backdoor That Works Outside The Network
94
Configuring The Router To Forward Connections To Kali
95
Ex2 – Using BeEF Outside The Network
96
Introduction
97
Meterpreter Basics
98
File System Commands
99
Maintaining Access – Basic Methods
100
Maintaining Access – Using a Reliable & Undetectable Method
101
Spying – Capturing Key Strikes & Taking Screen Shots
102
Pivoting – Theory (What is Pivoting?)
103
Pivoting – Exploiting Devices on The Same Network As The Target Computer
104
Introduction – What Is A Website ?
105
How To Hack a Website?
106
Gathering Basic Information Using Whois Lookup
107
Discoverin Technologies Used On The Website
108
Gathering Comprehensive DNS Information
109
Discovering Websites On The Same Server
110
Discovering Subdomains
111
Discovering Sensitive Files
112
Analysing Discovered Files
113
Discovering & Exploiting File Upload Vulnerabilities
114
Discovering & Exploiting Code Execution Vulnerabilities
115
Discovering & Exploiting Local File Inclusion Vulnerabilities
116
Remote File Inclusion Vulnerabilities – Configuring PHP Settings
117
Remote File Inclusion Vulnerabilities – Discovery & Exploitation
118
Preventing The Above Vulnerabilities
119
What is SQL
120
Dangers of SQL Injection Vulnerabilities
121
Discovering SQL injections In POST
122
Bypassing Logins Using SQL injection Vulnerability
123
Discovering SQL injections in GET
124
Reading Database Information
125
Finding Database Tables
126
Extracting Sensitive Data Such As Passwords
127
Reading & Writing Files On The Server Using SQL Injection Vulnerability
128
Discoverting SQL Injections & Extracting Data Using SQLmap
129
The Right Way To Prevent SQL Injection
130
Introduction – What is XSS or Cross Site Scripting?
131
Discovering Reflected XSS
132
Discovering Stored XSS
133
Exploiting XSS – Hooking Vulnerable Page Visitors To BeEF
134
Preventing XSS Vulnerabilities
135
Scanning Target Website For Vulnerabilities
136
Analysing Scan Results
137
Bonus Lecture – Discounts On My Full Ethical Hacking Courses

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Enrolled: 113 students
Duration: 72 Hrs
Lectures: 137

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed