Ethical Hacking And Network Security From Scratch In 2022
Last updated 5/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.77 GB | Duration: 15h 9m
Last updated 5/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.77 GB | Duration: 15h 9m
Ethical Hacking skills to get ahead. Learn how Hackers hack networks and devices and how to secure them.Learn Kali Linux
What you'll learn
Practical Ethical Hacking and Penetration Testing Skills
Learn How to set up a Hacking Lab (Kali Linux, Metasploitable, VMs).
You will MASTER Ethical Hacking and Network Security Key Concepts (Reconnaissance, Sniffing, Exploitation …).
Acquire the Skills to MITIGATE ALL THE ATTACKS presented in the course.
Learn How to Hack Routers and IoT Devices using RouterSploit.
Learn How to Hack Systems using Metasploit.
Learn How to Hack WiFi Networks (Traffic Sniffing and Injection, Deauthentication Attack, WPA2 Cracking).
Learn How to Secure a WiFi Network and stay safe and anonymous while browsing the Web.
Learn How to implement Full Disk Encryption.
Learn How to Hack ARP (Poisoning, Ettercap, Bettercap, Caplets, Ban, …).
Learn How to Hack STP.
Learn How to Hack CDP.
Learn How to Hack Switches.
Acquire an In-Depth Understanding of Steganography and How to Hide Secret Data.
Learn about the tools used for Cracking Passwords (John the Ripper, Hydra, Rainbow Tables, rcrack).
Acquire an In-Depth Understanding of GnuPG (symmetric and asymmetric encryption, key management, digital signatures).
Acquire an In-Depth Understanding of Hashes and How to Break them.
Learn How to Hack HTTPS (SSL Sniffing, SSL Stripping, HTTPS Downgrade).
Learn How to Hack DHCP (Flooding, Starvation, Roque Server).
Learn How to Hack Google Searches (Google Dorks).
Learn How to use Shodan to discover and Hack IoT devices.
Acquire In-Depth Sniffing Techniques (Wireshark, Filters, tcpdump, airodump-ng).
Acquire In-Depth Scanning Techniques using Nmap, Nmap Scripting Engine, Zenmap, arp-scan and netdiscover.
Acquire an In-Depth Understanding of Netfilter/Iptables Linux Firewall (Chains, Tables, Matches, Targets).
Requirements
A computer (Windows, Mac, or Linux) with an Internet Connection and at least 4GB RAM and 20GB free hard disk space.
Linux basics like commands, text editors, file system etc. This course is not for complete Linux beginners.
Basic knowledge of Networking concepts (how clients and servers typically communicate, TCP, ARP, DNS, IP's, ports, etc).
For Hacking WiFi Networks (9 lectures only) a wireless adapter that supports monitor mode (more info provided in the course).
Your time and enthusiasm to learn and practice :))
Description
This course IS NOT like any other Ethical Hacking course you can take online. At the end of this course, you will MASTER the key concepts and you will become an Ethical Hacker and Network Security Expert.This is a brand new Ethical Hacking and Network Security Applied course launched in April 2020 and it’s updated to teach you the skills required for the future that comes.Course Updates:Update: November 2021 - Updates to be 2022 ready.Update: November 2020 - Updates to be 2021 ready.Update: October 2020 - NEW Video: Hacking Linux by running DoS attacks without root access (Fork Bomb)Update: June 2020 - NEW Section: Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services - Dark Web, Deep Web)Update: May 2020 - NEW Section: Vulnerability Assessment Systems - OpenVASCourse Launch: April 15, 2020The world is changing, constantly, and at a fast pace! The technology-driven future in which we’ll live is filled with promise but also challenges. This Ethical Hacking course is really different! You’ll learn what really matters and you’ll get the skills to get ahead and gain an edge.I won’t teach you how to run an exploit on a vulnerable application that will be patched in a few days and will not work anymore. Instead, I’ll teach you the network security principles that will last for years to come using a practical approach but without neglecting the theory which is the base of a deep understanding.Do you want to learn a new valuable skill, get hired, get a promotion, or simply prepare for the future that comes? Well, then this course is for you! By enrolling in this course now, you make the best investment in your career!Given the surge in cyber-security threats, millions of new jobs will open across the industry and the global digital security spending will exceed hundreds of billions of dollars in the years to come.After this course, you'll have an in-depth understanding of how hackers think and behave.This course is for you if you want to learn Ethical Hacking and Network Security applied to the real-world.It’s specially designed for you whether you have no experience in Network Security, you’ve taken other related courses and you want to level up your skills, or you are coming from other fields like Network and System administration or Programming.You'll have access to my closed and exclusive online Group in order to provide you with improved, faster, and better support for your course-related questions.This course is taught by me, a Senior Network Engineer and Professional Trainer. Why should you learn from me?I'm a Practitioner and an Enthusiast. Welcome to the real world! I entered the Network Security world 15 years ago. I’m not just a random guy that teaches Ethical Hacking and Network Security. Just imagine that during this time I’ve learned and applied more and more almost on a daily basis. And now I’m giving everything to you!I'm an Educator and I know how to make a Curriculum. I know exactly what is important and what is not. For the last 10 years, I've trained thousands of people on Security, Networking, and Programming.You'll learn not only some commands and tools but also advanced concepts for real-world jobs that will last. After this course, you'll be an effective Ethical Hacker!You'll have lifetime access and you can return and look for a specific hack or countermeasure anytime you want. And let's not forget, if you don't like the course, you are covered by a 30-day money-back guarantee, full refund, no questions asked!The topics covered in this Hands-On Ethical Hacking and Network Security Applied course are:Setting the Hacking Environment (Kali Linux, Metasploitable, VMs)Use Kali to Hack Networks and DevicesHacking Routers and IoT Devices using RouterSploitHacking anything with MetasploitHacking LinuxCryptography In-Depth (Hashes, Digital Signature, Encryption)Attacks on Hash AlgorithmsFull Disk Encryption (Data at rest protection)GnuPG In DepthSteganography In DepthHiding files in other filesAnonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services - Dark Web, Deep Web)Cracking Passwords (John & Hydra)Rainbow TablesInformation Gathering (Reconnaissance)Nmap & Zenmap, Nmap Scripting Engine (NSE)arp-scan & net-discoverHacking Google Searches In DepthShodanVulnerability Assessment Systems - OpenVASSniffing Traffic (Wireshark & tcpdump)Hacking WiFi NetworksHacking WPA2Hacking ARP (Ettercap & Bettercap)Hacking HTTPSHacking DNSHacking DHCPHacking Cisco DevicesHacking SwitchesHacking STPMitigating all attacks presented in the courseEvery topic includes many live examples in Kali Linux, a command section, quizzes, slides, and many practice challenges.The skills you’ll learn will broaden your horizons and could change your life.
Overview
Section 1: Getting Started
Lecture 1 Why Ethical Hacking? Why Now?
Lecture 2 IMPORTANT. Please read!
Lecture 3 How to Get the Most Out of This Course
Lecture 4 Getting Course Resources
Lecture 5 Join Our Online Community!
Section 2: Setting the Hacking Environment
Lecture 6 The Hacking Lab Environment
Lecture 7 Installing Kali Linux in a VM
Lecture 8 Kali and Linux Mint Download Links (OVA Files)
Lecture 9 Things to Do After Installing Kali
Section 3: Hackings Systems
Lecture 10 Installing Metasploitable and Setting the Penetration Testing Lab
Lecture 11 Updating and Starting Metasploit
Lecture 12 Hacking Anything: Metasploit Demo
Lecture 13 Using msfconsole
Lecture 14 The Metasploit Workflow
Lecture 15 Commands - Metasploit
Lecture 16 Hacking Routers and IoT Devices using RouterSploit
Lecture 17 Exploiting the Default Gateway Using RouterSploit
Lecture 18 Commands - RouterSploit
Lecture 19 Hacking Linux: Running a DoS Attack Without root Access
Section 4: Challenges - Hacking Systems
Lecture 20 Challenges - RouterSploit
Lecture 21 Challenges - Metasploit
Section 5: Cryptography and Steganography
Lecture 22 Intro to Hashes
Lecture 23 Commands - Hashes
Lecture 24 The Properties of Hash Algorithms
Lecture 25 The Application of Hash Algorithms
Lecture 26 Attacks on Cryptographic Hash Algorithms
Lecture 27 Intro to Full Disk Encryption
Lecture 28 Full Disk Encryption Using dm-crypt and LUKS
Lecture 29 Unlocking LUKS Encrypted Drives With A Keyfile
Lecture 30 Commands - Full Disk Encryption
Lecture 31 Full Disk Encryption Solution using VeraCrypt (Windows, Mac and Linux)
Lecture 32 Intro to GnuPG
Lecture 33 Symmetric Encryption Using GnuPG
Lecture 34 GnuPG Key Management
Lecture 35 GnuPG Key Servers
Lecture 36 Asymmetric Encryption Using GnuPG
Lecture 37 Digital Signing using GnuPG
Lecture 38 Asymmetric Encryption and Digital Signing using GnuPG
Lecture 39 Commands - GnuPG (gpg)
Lecture 40 Using an Encrypted Text Editor (EncryptPad)
Lecture 41 Steganography Explained
Lecture 42 Steganography In Depth
Lecture 43 Hide Secret Messages Through Steganography with Steghide
Lecture 44 Commands - Steganography
Section 6: Challenges - Cryptography and Steganography
Lecture 45 Challenges - Hashes
Lecture 46 Challenges - GPG
Lecture 47 Challenges - Steganography (steghide)
Section 7: Cracking Passwords
Lecture 48 Understanding /etc/passwd and /etc/shadow files
Lecture 49 Intro to Cracking Passwords
Lecture 50 Cracking Linux Passwords Using John the Ripper
Lecture 51 John the Ripper Advanced
Lecture 52 Commands - John the Ripper (JTR)
Lecture 53 Cracking Passwords Countermeasures
Lecture 54 Cracking Service Passwords with Hydra
Lecture 55 Commands - Hydra
Lecture 56 Rainbow Tables Explained
Lecture 57 Cracking Hashes Using RainbowCrack (rtgen & rcrack)
Lecture 58 Cracking Hashes Countermeasures
Lecture 59 Commands - Cracking Hashes Using Rainbow Tables
Section 8: Challenges - Cracking Passwords
Lecture 60 Challenges - John the Ripper and Hydra
Lecture 61 Challenges - Rainbow Tables
Section 9: Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Dark Web)
Lecture 62 How Does Online Tracking Really Work
Lecture 63 Staying Anonymous Online: Incognito vs. VPN/Proxy vs. Tor vs. Tails
Lecture 64 Using Disposable Email Addresses
Lecture 65 Protecting Your Phone Number
Lecture 66 Intro to Onion Routing and Tor
Lecture 67 Onion Routing and Tor In Depth
Lecture 68 Installing and Running the Tor Browser
Lecture 69 Tor vs. VPN
Lecture 70 The Layers of the Web: Surface Web, Deep Web and Dark Web
Lecture 71 Surface Web vs. Dark Web Anonymity
Lecture 72 Through the Dark Web. Is it worth it?
Lecture 73 Tor Weaknesses and Security Best Practices
Section 10: Information Gathering And Vulnerability Assessment
Lecture 74 Intro to Reconnaissance
Lecture 75 Scanning Networks with Nmap
Lecture 76 Nmap Advanced
Lecture 77 Commands - Nmap
Lecture 78 Nmap Scripting Engine (NSE)
Lecture 79 Commands - NSE
Lecture 80 Zenmap
Lecture 81 Comparing Nmap Scan Results
Lecture 82 ARP Scanning (arp-scan and netdiscover)
Lecture 83 Commands - ARP Scanning
Lecture 84 Intro to Vulnerability Assessment Systems (VAS)
Lecture 85 Hacking Google Searches (Google Dorks)
Lecture 86 Hacking Google Searches In Depth
Lecture 87 Finding Webcams Using Google Dorks
Lecture 88 Using Shodan: The Search Engine For the Internet of Things
Lecture 89 The Shodan Algorithm
Lecture 90 Using Shodan Filters
Lecture 91 Shodan CLI
Section 11: Challenges - Reconnaissance
Lecture 92 Challenges - Nmap and ARP Scanning
Section 12: Sniffing Traffic
Lecture 93 Intro to Sniffing
Lecture 94 Using Wireshark for Packet Sniffing and Analyzing
Lecture 95 Wireshark Filters
Lecture 96 Capture Traffic Using tcpdump
Lecture 97 Commands - tcpdump
Section 13: Challenges - Wireshark and tcpdump
Lecture 98 Challenges - Wireshark and tcpdump
Section 14: Hacking WiFi Networks
Lecture 99 WiFi Cards for Hacking WiFi Networks (Monitor Mode & Packet Injection)
Lecture 100 Choosing the Right External USB WiFi Card
Lecture 101 Connecting a USB WiFi Card to Kali Linux in a VM
Lecture 102 Wireless Modes: Managed and Monitor (RFMON)
Lecture 103 Commands - WiFi Monitor Mode
Lecture 104 Sniffing Wireless Traffic using airodump-ng
Lecture 105 Commands - Sniffing WiFi Traffic using airodump-ng
Lecture 106 Wireless Injection: Deauthentication Attack
Lecture 107 Commands - Deauthentication Attack
Lecture 108 Hacking WPA2: Capture the Handshake
Lecture 109 Hacking WPA2: Cracking the WiFi Password
Lecture 110 Commands - Capturing the Handshake and Cracking the Password
Lecture 111 Configuring the WiFi Network for Maximum Security
Section 15: Challenges - Hacking WiFi Networks
Lecture 112 Challenges -WiFi Monitor Mode
Lecture 113 Challenges - Hacking WPA2
Section 16: Hacking Network Protocols
Lecture 114 The ARP Protocol
Lecture 115 Hacking ARP - MITM and ARP Poisoning
Lecture 116 Hacking ARP - Hands-On Attack Using Ettercap
Lecture 117 Commands - ARP Poisoning using Ettercap
Lecture 118 Bettercap: The Swiss Army Knife for Attacks and Monitoring
Lecture 119 Hacking ARP - Hands-On Attack using Bettercap
Lecture 120 Commands - Bettercap
Lecture 121 Hacking ARP - DoS Attack using Bettercap
Lecture 122 Hacking ARP Countermeasures
Lecture 123 Hacking Automation: Bettercap Caplets
Lecture 124 Hacking DNS: DNS Spoofing
Lecture 125 HTTP, HTTPS, HSTS
Lecture 126 SSL Sniffing and SSL Stripping
Lecture 127 Hacking HTTPS: SSL Sniffing (Lab)
Lecture 128 Hacking HTTPS: SSL Stripping (Lab)
Lecture 129 Hacking HTTPS Countermeasures: How to Stay Safe on the Web
Lecture 130 Hacking Switches: Mac Flooding
Lecture 131 Hacking Switches: Mac Flooding Countermeasures
Lecture 132 Hacking DHCP: Protocol and Attacks
Lecture 133 Hacking DHCP: Discover Flooding Attack using Yersinia (DoS)
Lecture 134 Hacking DHCP: Starvation Attack using DHCPig (DoS)
Lecture 135 Hacking DHCP Countermeasures
Lecture 136 Hacking Cisco Devices: CDP Flooding
Lecture 137 Hacking Cisco Devices: CDP Flooding Countermeasures
Lecture 138 Hacking Switches: STP Attack
Lecture 139 Hacking Switches: STP Attack Countermeasures (BPDU Guard & Root Guard)
Section 17: [EXTRA] - Linux Netfilter and Iptables Firewall
Lecture 140 Introduction to Netfilter and Iptables
Lecture 141 Chain Traversal in a Nutshell
Lecture 142 Iptables Basic Usage
Lecture 143 Iptables Options (Flags) - Part 1
Lecture 144 Iptables Options (Flags) - Part 2
Lecture 145 Where Do We Write Iptables Rules
Lecture 146 Setting the Default Policy
Lecture 147 Deleting the Firewall
Lecture 148 Filter by IP Address
Lecture 149 Filter by Port
Lecture 150 Intro to Stateful Firewalls (Connection Tracking)
Lecture 151 Implementing Stateful Firewalls with Iptables
Lecture 152 Filter by MAC Address
Lecture 153 Match by Date and Time
Lecture 154 The ACCEPT and DROP Targets
Lecture 155 The LOG Target
Section 18: Challenges - Netfilter and Iptables
Lecture 156 Challenges - Netfilter and Iptables
Section 19: [EXTRA] - SSH Hardening: Public Key Authentication (Cisco IOS & Linux)
Lecture 157 SSH Public Key Authentication Overview
Lecture 158 Generating SSH Key Pair on Windows
Lecture 159 What about MacOS?
Lecture 160 Generating SSH Key Pair on Linux
Lecture 161 Configuring SSH Public Key Authentication on Cisco IOS - Part 1 [Windows]
Lecture 162 Configuring SSH Public Key Authentication on Cisco IOS - Part 2 [Linux]
Lecture 163 Configuring SSH Public Key Authentication on Linux
Section 20: Where To Go From Here?
Lecture 164 What's Next?
Section 21: Course Completion
Lecture 165 Congratulations
Lecture 166 BONUS
Network and System Administrators.,Anyone interested in learning Ethical Hacking and Penetration Testing.,Anyone interested in learning how to secure systems from Hackers.,Programmers