Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security.
Ethical Hacking, also called Penetration Testing is an act of intruding/penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit to cause data theft, financial loss or other major damages.
Ethical hackers are expected to report all the vulnerabilities and weakness found during the process to the management.
This course will teach you everything you need to know about cyber security and ethical hacking, and you will also be issued a verifiable course completion certificate.
Course Curriculum
1. Cyber Security Basics & Setting Up The Lab | |||
Installing Kali Linux [Hacking Operating System] | 00:06:00 | ||
Basics Of Linux | 00:06:00 | ||
Network Basics | 00:04:00 | ||
Cyber Security Basics & Setting Up The Lab | 00:01:00 | ||
2. Online Anonymity [Hide From Internet] | |||
Advanced Anonymity | 00:04:00 | ||
Online Anonymity [Hide From Internet] | 00:00:40 | ||
3. Pre Connection Attacks | |||
1. Sniffing Packets – Sensitive Data such as Password, Username | 00:05:00 | ||
2. Performing Targeted Sniffing | 00:00:00 | ||
3. Disconnect Any Device From WiFi | 00:10:00 | ||
4. Creating A Fake WiFi Access Point | 00:16:00 | ||
3. Pre Connection Attacks | 00:00:40 | ||
4. Gaining Access To The System | |||
Generating A Complex Undetectable Backdoor | 00:14:00 | ||
Bind Any File Type and PayloadBackdoor Together | 00:00:00 | ||
Spoof Extension – Creating The Backdoor Payload Undetectable | 00:11:00 | ||
Creating A Complex Undetectable Payload | 00:14:00 | ||
BeefHook Introduction and Setup | 00:19:00 | ||
Running Commands On Beef | 00:09:00 | ||
Gaining Full Access With Our Payload And Beef | 00:12:00 | ||
Injecting Our Hook Using MITMF | 00:12:00 | ||
Listening For Incoming Connecting | 00:14:00 | ||
4. Gaining Access To The System | 00:00:00 | ||
5. Post Exploitation | |||
Post Exploitation – Part 1 | 00:12:00 | ||
Post Exploitation – Part 2 | 00:22:00 | ||
5. Post Exploitation | 00:00:00 | ||
6. Advanced Hacking Attacks | |||
DNS Spoofing [Advanced] | 00:11:00 | ||
Suspicious Activity | 00:07:00 | ||
Advanced Hacking Attack [Real-Word Example] | 00:17:00 | ||
6. Advanced Hacking Attacks | 00:00:00 | ||
7. Website Hacking Penetration Testing | |||
Introduction and Basics Of Website Hacking | 00:00:00 | ||
Website Hacking – Metasploit | 00:07:00 | ||
Collecting Sensitive Files such as Username, Passwords | 00:14:00 | ||
Uploading Files On The Website – Website Hacking | 00:12:00 | ||
Executing More Vulnerabilities | 00:15:00 | ||
7. Website Hacking Penetration Testing | 00:00:00 |
Course Reviews
No Reviews found for this course.