Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Ethical Hacking And Network Security From Scratch In 2022

    Posted By: ELK1nG
    Ethical Hacking And Network Security From Scratch In 2022

    Ethical Hacking And Network Security From Scratch In 2022
    Last updated 5/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.77 GB | Duration: 15h 9m

    Ethical Hacking skills to get ahead. Learn how Hackers hack networks and devices and how to secure them.Learn Kali Linux

    What you'll learn
    Practical Ethical Hacking and Penetration Testing Skills
    Learn How to set up a Hacking Lab (Kali Linux, Metasploitable, VMs).
    You will MASTER Ethical Hacking and Network Security Key Concepts (Reconnaissance, Sniffing, Exploitation …).
    Acquire the Skills to MITIGATE ALL THE ATTACKS presented in the course.
    Learn How to Hack Routers and IoT Devices using RouterSploit.
    Learn How to Hack Systems using Metasploit.
    Learn How to Hack WiFi Networks (Traffic Sniffing and Injection, Deauthentication Attack, WPA2 Cracking).
    Learn How to Secure a WiFi Network and stay safe and anonymous while browsing the Web.
    Learn How to implement Full Disk Encryption.
    Learn How to Hack ARP (Poisoning, Ettercap, Bettercap, Caplets, Ban, …).
    Learn How to Hack STP.
    Learn How to Hack CDP.
    Learn How to Hack Switches.
    Acquire an In-Depth Understanding of Steganography and How to Hide Secret Data.
    Learn about the tools used for Cracking Passwords (John the Ripper, Hydra, Rainbow Tables, rcrack).
    Acquire an In-Depth Understanding of GnuPG (symmetric and asymmetric encryption, key management, digital signatures).
    Acquire an In-Depth Understanding of Hashes and How to Break them.
    Learn How to Hack HTTPS (SSL Sniffing, SSL Stripping, HTTPS Downgrade).
    Learn How to Hack DHCP (Flooding, Starvation, Roque Server).
    Learn How to Hack Google Searches (Google Dorks).
    Learn How to use Shodan to discover and Hack IoT devices.
    Acquire In-Depth Sniffing Techniques (Wireshark, Filters, tcpdump, airodump-ng).
    Acquire In-Depth Scanning Techniques using Nmap, Nmap Scripting Engine, Zenmap, arp-scan and netdiscover.
    Acquire an In-Depth Understanding of Netfilter/Iptables Linux Firewall (Chains, Tables, Matches, Targets).
    Requirements
    A computer (Windows, Mac, or Linux) with an Internet Connection and at least 4GB RAM and 20GB free hard disk space.
    Linux basics like commands, text editors, file system etc. This course is not for complete Linux beginners.
    Basic knowledge of Networking concepts (how clients and servers typically communicate, TCP, ARP, DNS, IP's, ports, etc).
    For Hacking WiFi Networks (9 lectures only) a wireless adapter that supports monitor mode (more info provided in the course).
    Your time and enthusiasm to learn and practice :))
    Description
    This course IS NOT like any other Ethical Hacking course you can take online. At the end of this course, you will MASTER the key concepts and you will become an Ethical Hacker and Network Security Expert.This is a brand new Ethical Hacking and Network Security Applied course launched in April 2020 and it’s updated to teach you the skills required for the future that comes.Course Updates:Update: November 2021 - Updates to be 2022 ready.Update: November 2020 - Updates to be 2021 ready.Update: October 2020 - NEW Video: Hacking Linux by running DoS attacks without root access (Fork Bomb)Update: June 2020 - NEW Section: Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services - Dark Web, Deep Web)Update: May 2020 - NEW Section: Vulnerability Assessment Systems - OpenVASCourse Launch: April 15, 2020The world is changing, constantly, and at a fast pace! The technology-driven future in which we’ll live is filled with promise but also challenges. This Ethical Hacking course is really different! You’ll learn what really matters and you’ll get the skills to get ahead and gain an edge.I won’t teach you how to run an exploit on a vulnerable application that will be patched in a few days and will not work anymore. Instead, I’ll teach you the network security principles that will last for years to come using a practical approach but without neglecting the theory which is the base of a deep understanding.Do you want to learn a new valuable skill, get hired, get a promotion, or simply prepare for the future that comes? Well, then this course is for you! By enrolling in this course now, you make the best investment in your career!Given the surge in cyber-security threats, millions of new jobs will open across the industry and the global digital security spending will exceed hundreds of billions of dollars in the years to come.After this course, you'll have an in-depth understanding of how hackers think and behave.This course is for you if you want to learn Ethical Hacking and Network Security applied to the real-world.It’s specially designed for you whether you have no experience in Network Security, you’ve taken other related courses and you want to level up your skills, or you are coming from other fields like Network and System administration or Programming.You'll have access to my closed and exclusive online Group in order to provide you with improved, faster, and better support for your course-related questions.This course is taught by me, a Senior Network Engineer and Professional Trainer. Why should you learn from me?I'm a Practitioner and an Enthusiast. Welcome to the real world! I entered the Network Security world 15 years ago. I’m not just a random guy that teaches Ethical Hacking and Network Security. Just imagine that during this time I’ve learned and applied more and more almost on a daily basis. And now I’m giving everything to you!I'm an Educator and I know how to make a Curriculum. I know exactly what is important and what is not. For the last 10 years, I've trained thousands of people on Security, Networking, and Programming.You'll learn not only some commands and tools but also advanced concepts for real-world jobs that will last. After this course, you'll be an effective Ethical Hacker!You'll have lifetime access and you can return and look for a specific hack or countermeasure anytime you want. And let's not forget, if you don't like the course, you are covered by a 30-day money-back guarantee, full refund, no questions asked!The topics covered in this Hands-On Ethical Hacking and Network Security Applied course are:Setting the Hacking Environment (Kali Linux, Metasploitable, VMs)Use Kali to Hack Networks and DevicesHacking Routers and IoT Devices using RouterSploitHacking anything with MetasploitHacking LinuxCryptography In-Depth (Hashes, Digital Signature, Encryption)Attacks on Hash AlgorithmsFull Disk Encryption (Data at rest protection)GnuPG In DepthSteganography In DepthHiding files in other filesAnonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services - Dark Web, Deep Web)Cracking Passwords (John & Hydra)Rainbow TablesInformation Gathering (Reconnaissance)Nmap & Zenmap, Nmap Scripting Engine (NSE)arp-scan & net-discoverHacking Google Searches In DepthShodanVulnerability Assessment Systems - OpenVASSniffing Traffic (Wireshark & tcpdump)Hacking WiFi NetworksHacking WPA2Hacking ARP (Ettercap & Bettercap)Hacking HTTPSHacking DNSHacking DHCPHacking Cisco DevicesHacking SwitchesHacking STPMitigating all attacks presented in the courseEvery topic includes many live examples in Kali Linux, a command section, quizzes, slides, and many practice challenges.The skills you’ll learn will broaden your horizons and could change your life.

    Overview

    Section 1: Getting Started

    Lecture 1 Why Ethical Hacking? Why Now?

    Lecture 2 IMPORTANT. Please read!

    Lecture 3 How to Get the Most Out of This Course

    Lecture 4 Getting Course Resources

    Lecture 5 Join Our Online Community!

    Section 2: Setting the Hacking Environment

    Lecture 6 The Hacking Lab Environment

    Lecture 7 Installing Kali Linux in a VM

    Lecture 8 Kali and Linux Mint Download Links (OVA Files)

    Lecture 9 Things to Do After Installing Kali

    Section 3: Hackings Systems

    Lecture 10 Installing Metasploitable and Setting the Penetration Testing Lab

    Lecture 11 Updating and Starting Metasploit

    Lecture 12 Hacking Anything: Metasploit Demo

    Lecture 13 Using msfconsole

    Lecture 14 The Metasploit Workflow

    Lecture 15 Commands - Metasploit

    Lecture 16 Hacking Routers and IoT Devices using RouterSploit

    Lecture 17 Exploiting the Default Gateway Using RouterSploit

    Lecture 18 Commands - RouterSploit

    Lecture 19 Hacking Linux: Running a DoS Attack Without root Access

    Section 4: Challenges - Hacking Systems

    Lecture 20 Challenges - RouterSploit

    Lecture 21 Challenges - Metasploit

    Section 5: Cryptography and Steganography

    Lecture 22 Intro to Hashes

    Lecture 23 Commands - Hashes

    Lecture 24 The Properties of Hash Algorithms

    Lecture 25 The Application of Hash Algorithms

    Lecture 26 Attacks on Cryptographic Hash Algorithms

    Lecture 27 Intro to Full Disk Encryption

    Lecture 28 Full Disk Encryption Using dm-crypt and LUKS

    Lecture 29 Unlocking LUKS Encrypted Drives With A Keyfile

    Lecture 30 Commands - Full Disk Encryption

    Lecture 31 Full Disk Encryption Solution using VeraCrypt (Windows, Mac and Linux)

    Lecture 32 Intro to GnuPG

    Lecture 33 Symmetric Encryption Using GnuPG

    Lecture 34 GnuPG Key Management

    Lecture 35 GnuPG Key Servers

    Lecture 36 Asymmetric Encryption Using GnuPG

    Lecture 37 Digital Signing using GnuPG

    Lecture 38 Asymmetric Encryption and Digital Signing using GnuPG

    Lecture 39 Commands - GnuPG (gpg)

    Lecture 40 Using an Encrypted Text Editor (EncryptPad)

    Lecture 41 Steganography Explained

    Lecture 42 Steganography In Depth

    Lecture 43 Hide Secret Messages Through Steganography with Steghide

    Lecture 44 Commands - Steganography

    Section 6: Challenges - Cryptography and Steganography

    Lecture 45 Challenges - Hashes

    Lecture 46 Challenges - GPG

    Lecture 47 Challenges - Steganography (steghide)

    Section 7: Cracking Passwords

    Lecture 48 Understanding /etc/passwd and /etc/shadow files

    Lecture 49 Intro to Cracking Passwords

    Lecture 50 Cracking Linux Passwords Using John the Ripper

    Lecture 51 John the Ripper Advanced

    Lecture 52 Commands - John the Ripper (JTR)

    Lecture 53 Cracking Passwords Countermeasures

    Lecture 54 Cracking Service Passwords with Hydra

    Lecture 55 Commands - Hydra

    Lecture 56 Rainbow Tables Explained

    Lecture 57 Cracking Hashes Using RainbowCrack (rtgen & rcrack)

    Lecture 58 Cracking Hashes Countermeasures

    Lecture 59 Commands - Cracking Hashes Using Rainbow Tables

    Section 8: Challenges - Cracking Passwords

    Lecture 60 Challenges - John the Ripper and Hydra

    Lecture 61 Challenges - Rainbow Tables

    Section 9: Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Dark Web)

    Lecture 62 How Does Online Tracking Really Work

    Lecture 63 Staying Anonymous Online: Incognito vs. VPN/Proxy vs. Tor vs. Tails

    Lecture 64 Using Disposable Email Addresses

    Lecture 65 Protecting Your Phone Number

    Lecture 66 Intro to Onion Routing and Tor

    Lecture 67 Onion Routing and Tor In Depth

    Lecture 68 Installing and Running the Tor Browser

    Lecture 69 Tor vs. VPN

    Lecture 70 The Layers of the Web: Surface Web, Deep Web and Dark Web

    Lecture 71 Surface Web vs. Dark Web Anonymity

    Lecture 72 Through the Dark Web. Is it worth it?

    Lecture 73 Tor Weaknesses and Security Best Practices

    Section 10: Information Gathering And Vulnerability Assessment

    Lecture 74 Intro to Reconnaissance

    Lecture 75 Scanning Networks with Nmap

    Lecture 76 Nmap Advanced

    Lecture 77 Commands - Nmap

    Lecture 78 Nmap Scripting Engine (NSE)

    Lecture 79 Commands - NSE

    Lecture 80 Zenmap

    Lecture 81 Comparing Nmap Scan Results

    Lecture 82 ARP Scanning (arp-scan and netdiscover)

    Lecture 83 Commands - ARP Scanning

    Lecture 84 Intro to Vulnerability Assessment Systems (VAS)

    Lecture 85 Hacking Google Searches (Google Dorks)

    Lecture 86 Hacking Google Searches In Depth

    Lecture 87 Finding Webcams Using Google Dorks

    Lecture 88 Using Shodan: The Search Engine For the Internet of Things

    Lecture 89 The Shodan Algorithm

    Lecture 90 Using Shodan Filters

    Lecture 91 Shodan CLI

    Section 11: Challenges - Reconnaissance

    Lecture 92 Challenges - Nmap and ARP Scanning

    Section 12: Sniffing Traffic

    Lecture 93 Intro to Sniffing

    Lecture 94 Using Wireshark for Packet Sniffing and Analyzing

    Lecture 95 Wireshark Filters

    Lecture 96 Capture Traffic Using tcpdump

    Lecture 97 Commands - tcpdump

    Section 13: Challenges - Wireshark and tcpdump

    Lecture 98 Challenges - Wireshark and tcpdump

    Section 14: Hacking WiFi Networks

    Lecture 99 WiFi Cards for Hacking WiFi Networks (Monitor Mode & Packet Injection)

    Lecture 100 Choosing the Right External USB WiFi Card

    Lecture 101 Connecting a USB WiFi Card to Kali Linux in a VM

    Lecture 102 Wireless Modes: Managed and Monitor (RFMON)

    Lecture 103 Commands - WiFi Monitor Mode

    Lecture 104 Sniffing Wireless Traffic using airodump-ng

    Lecture 105 Commands - Sniffing WiFi Traffic using airodump-ng

    Lecture 106 Wireless Injection: Deauthentication Attack

    Lecture 107 Commands - Deauthentication Attack

    Lecture 108 Hacking WPA2: Capture the Handshake

    Lecture 109 Hacking WPA2: Cracking the WiFi Password

    Lecture 110 Commands - Capturing the Handshake and Cracking the Password

    Lecture 111 Configuring the WiFi Network for Maximum Security

    Section 15: Challenges - Hacking WiFi Networks

    Lecture 112 Challenges -WiFi Monitor Mode

    Lecture 113 Challenges - Hacking WPA2

    Section 16: Hacking Network Protocols

    Lecture 114 The ARP Protocol

    Lecture 115 Hacking ARP - MITM and ARP Poisoning

    Lecture 116 Hacking ARP - Hands-On Attack Using Ettercap

    Lecture 117 Commands - ARP Poisoning using Ettercap

    Lecture 118 Bettercap: The Swiss Army Knife for Attacks and Monitoring

    Lecture 119 Hacking ARP - Hands-On Attack using Bettercap

    Lecture 120 Commands - Bettercap

    Lecture 121 Hacking ARP - DoS Attack using Bettercap

    Lecture 122 Hacking ARP Countermeasures

    Lecture 123 Hacking Automation: Bettercap Caplets

    Lecture 124 Hacking DNS: DNS Spoofing

    Lecture 125 HTTP, HTTPS, HSTS

    Lecture 126 SSL Sniffing and SSL Stripping

    Lecture 127 Hacking HTTPS: SSL Sniffing (Lab)

    Lecture 128 Hacking HTTPS: SSL Stripping (Lab)

    Lecture 129 Hacking HTTPS Countermeasures: How to Stay Safe on the Web

    Lecture 130 Hacking Switches: Mac Flooding

    Lecture 131 Hacking Switches: Mac Flooding Countermeasures

    Lecture 132 Hacking DHCP: Protocol and Attacks

    Lecture 133 Hacking DHCP: Discover Flooding Attack using Yersinia (DoS)

    Lecture 134 Hacking DHCP: Starvation Attack using DHCPig (DoS)

    Lecture 135 Hacking DHCP Countermeasures

    Lecture 136 Hacking Cisco Devices: CDP Flooding

    Lecture 137 Hacking Cisco Devices: CDP Flooding Countermeasures

    Lecture 138 Hacking Switches: STP Attack

    Lecture 139 Hacking Switches: STP Attack Countermeasures (BPDU Guard & Root Guard)

    Section 17: [EXTRA] - Linux Netfilter and Iptables Firewall

    Lecture 140 Introduction to Netfilter and Iptables

    Lecture 141 Chain Traversal in a Nutshell

    Lecture 142 Iptables Basic Usage

    Lecture 143 Iptables Options (Flags) - Part 1

    Lecture 144 Iptables Options (Flags) - Part 2

    Lecture 145 Where Do We Write Iptables Rules

    Lecture 146 Setting the Default Policy

    Lecture 147 Deleting the Firewall

    Lecture 148 Filter by IP Address

    Lecture 149 Filter by Port

    Lecture 150 Intro to Stateful Firewalls (Connection Tracking)

    Lecture 151 Implementing Stateful Firewalls with Iptables

    Lecture 152 Filter by MAC Address

    Lecture 153 Match by Date and Time

    Lecture 154 The ACCEPT and DROP Targets

    Lecture 155 The LOG Target

    Section 18: Challenges - Netfilter and Iptables

    Lecture 156 Challenges - Netfilter and Iptables

    Section 19: [EXTRA] - SSH Hardening: Public Key Authentication (Cisco IOS & Linux)

    Lecture 157 SSH Public Key Authentication Overview

    Lecture 158 Generating SSH Key Pair on Windows

    Lecture 159 What about MacOS?

    Lecture 160 Generating SSH Key Pair on Linux

    Lecture 161 Configuring SSH Public Key Authentication on Cisco IOS - Part 1 [Windows]

    Lecture 162 Configuring SSH Public Key Authentication on Cisco IOS - Part 2 [Linux]

    Lecture 163 Configuring SSH Public Key Authentication on Linux

    Section 20: Where To Go From Here?

    Lecture 164 What's Next?

    Section 21: Course Completion

    Lecture 165 Congratulations

    Lecture 166 BONUS

    Network and System Administrators.,Anyone interested in learning Ethical Hacking and Penetration Testing.,Anyone interested in learning how to secure systems from Hackers.,Programmers