Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Ethical Hacking And Network Security From Scratch In 2022

Posted By: ELK1nG
Ethical Hacking And Network Security From Scratch In 2022

Ethical Hacking And Network Security From Scratch In 2022
Last updated 5/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.77 GB | Duration: 15h 9m

Ethical Hacking skills to get ahead. Learn how Hackers hack networks and devices and how to secure them.Learn Kali Linux

What you'll learn
Practical Ethical Hacking and Penetration Testing Skills
Learn How to set up a Hacking Lab (Kali Linux, Metasploitable, VMs).
You will MASTER Ethical Hacking and Network Security Key Concepts (Reconnaissance, Sniffing, Exploitation …).
Acquire the Skills to MITIGATE ALL THE ATTACKS presented in the course.
Learn How to Hack Routers and IoT Devices using RouterSploit.
Learn How to Hack Systems using Metasploit.
Learn How to Hack WiFi Networks (Traffic Sniffing and Injection, Deauthentication Attack, WPA2 Cracking).
Learn How to Secure a WiFi Network and stay safe and anonymous while browsing the Web.
Learn How to implement Full Disk Encryption.
Learn How to Hack ARP (Poisoning, Ettercap, Bettercap, Caplets, Ban, …).
Learn How to Hack STP.
Learn How to Hack CDP.
Learn How to Hack Switches.
Acquire an In-Depth Understanding of Steganography and How to Hide Secret Data.
Learn about the tools used for Cracking Passwords (John the Ripper, Hydra, Rainbow Tables, rcrack).
Acquire an In-Depth Understanding of GnuPG (symmetric and asymmetric encryption, key management, digital signatures).
Acquire an In-Depth Understanding of Hashes and How to Break them.
Learn How to Hack HTTPS (SSL Sniffing, SSL Stripping, HTTPS Downgrade).
Learn How to Hack DHCP (Flooding, Starvation, Roque Server).
Learn How to Hack Google Searches (Google Dorks).
Learn How to use Shodan to discover and Hack IoT devices.
Acquire In-Depth Sniffing Techniques (Wireshark, Filters, tcpdump, airodump-ng).
Acquire In-Depth Scanning Techniques using Nmap, Nmap Scripting Engine, Zenmap, arp-scan and netdiscover.
Acquire an In-Depth Understanding of Netfilter/Iptables Linux Firewall (Chains, Tables, Matches, Targets).
Requirements
A computer (Windows, Mac, or Linux) with an Internet Connection and at least 4GB RAM and 20GB free hard disk space.
Linux basics like commands, text editors, file system etc. This course is not for complete Linux beginners.
Basic knowledge of Networking concepts (how clients and servers typically communicate, TCP, ARP, DNS, IP's, ports, etc).
For Hacking WiFi Networks (9 lectures only) a wireless adapter that supports monitor mode (more info provided in the course).
Your time and enthusiasm to learn and practice :))
Description
This course IS NOT like any other Ethical Hacking course you can take online. At the end of this course, you will MASTER the key concepts and you will become an Ethical Hacker and Network Security Expert.This is a brand new Ethical Hacking and Network Security Applied course launched in April 2020 and it’s updated to teach you the skills required for the future that comes.Course Updates:Update: November 2021 - Updates to be 2022 ready.Update: November 2020 - Updates to be 2021 ready.Update: October 2020 - NEW Video: Hacking Linux by running DoS attacks without root access (Fork Bomb)Update: June 2020 - NEW Section: Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services - Dark Web, Deep Web)Update: May 2020 - NEW Section: Vulnerability Assessment Systems - OpenVASCourse Launch: April 15, 2020The world is changing, constantly, and at a fast pace! The technology-driven future in which we’ll live is filled with promise but also challenges. This Ethical Hacking course is really different! You’ll learn what really matters and you’ll get the skills to get ahead and gain an edge.I won’t teach you how to run an exploit on a vulnerable application that will be patched in a few days and will not work anymore. Instead, I’ll teach you the network security principles that will last for years to come using a practical approach but without neglecting the theory which is the base of a deep understanding.Do you want to learn a new valuable skill, get hired, get a promotion, or simply prepare for the future that comes? Well, then this course is for you! By enrolling in this course now, you make the best investment in your career!Given the surge in cyber-security threats, millions of new jobs will open across the industry and the global digital security spending will exceed hundreds of billions of dollars in the years to come.After this course, you'll have an in-depth understanding of how hackers think and behave.This course is for you if you want to learn Ethical Hacking and Network Security applied to the real-world.It’s specially designed for you whether you have no experience in Network Security, you’ve taken other related courses and you want to level up your skills, or you are coming from other fields like Network and System administration or Programming.You'll have access to my closed and exclusive online Group in order to provide you with improved, faster, and better support for your course-related questions.This course is taught by me, a Senior Network Engineer and Professional Trainer. Why should you learn from me?I'm a Practitioner and an Enthusiast. Welcome to the real world! I entered the Network Security world 15 years ago. I’m not just a random guy that teaches Ethical Hacking and Network Security. Just imagine that during this time I’ve learned and applied more and more almost on a daily basis. And now I’m giving everything to you!I'm an Educator and I know how to make a Curriculum. I know exactly what is important and what is not. For the last 10 years, I've trained thousands of people on Security, Networking, and Programming.You'll learn not only some commands and tools but also advanced concepts for real-world jobs that will last. After this course, you'll be an effective Ethical Hacker!You'll have lifetime access and you can return and look for a specific hack or countermeasure anytime you want. And let's not forget, if you don't like the course, you are covered by a 30-day money-back guarantee, full refund, no questions asked!The topics covered in this Hands-On Ethical Hacking and Network Security Applied course are:Setting the Hacking Environment (Kali Linux, Metasploitable, VMs)Use Kali to Hack Networks and DevicesHacking Routers and IoT Devices using RouterSploitHacking anything with MetasploitHacking LinuxCryptography In-Depth (Hashes, Digital Signature, Encryption)Attacks on Hash AlgorithmsFull Disk Encryption (Data at rest protection)GnuPG In DepthSteganography In DepthHiding files in other filesAnonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services - Dark Web, Deep Web)Cracking Passwords (John & Hydra)Rainbow TablesInformation Gathering (Reconnaissance)Nmap & Zenmap, Nmap Scripting Engine (NSE)arp-scan & net-discoverHacking Google Searches In DepthShodanVulnerability Assessment Systems - OpenVASSniffing Traffic (Wireshark & tcpdump)Hacking WiFi NetworksHacking WPA2Hacking ARP (Ettercap & Bettercap)Hacking HTTPSHacking DNSHacking DHCPHacking Cisco DevicesHacking SwitchesHacking STPMitigating all attacks presented in the courseEvery topic includes many live examples in Kali Linux, a command section, quizzes, slides, and many practice challenges.The skills you’ll learn will broaden your horizons and could change your life.

Overview

Section 1: Getting Started

Lecture 1 Why Ethical Hacking? Why Now?

Lecture 2 IMPORTANT. Please read!

Lecture 3 How to Get the Most Out of This Course

Lecture 4 Getting Course Resources

Lecture 5 Join Our Online Community!

Section 2: Setting the Hacking Environment

Lecture 6 The Hacking Lab Environment

Lecture 7 Installing Kali Linux in a VM

Lecture 8 Kali and Linux Mint Download Links (OVA Files)

Lecture 9 Things to Do After Installing Kali

Section 3: Hackings Systems

Lecture 10 Installing Metasploitable and Setting the Penetration Testing Lab

Lecture 11 Updating and Starting Metasploit

Lecture 12 Hacking Anything: Metasploit Demo

Lecture 13 Using msfconsole

Lecture 14 The Metasploit Workflow

Lecture 15 Commands - Metasploit

Lecture 16 Hacking Routers and IoT Devices using RouterSploit

Lecture 17 Exploiting the Default Gateway Using RouterSploit

Lecture 18 Commands - RouterSploit

Lecture 19 Hacking Linux: Running a DoS Attack Without root Access

Section 4: Challenges - Hacking Systems

Lecture 20 Challenges - RouterSploit

Lecture 21 Challenges - Metasploit

Section 5: Cryptography and Steganography

Lecture 22 Intro to Hashes

Lecture 23 Commands - Hashes

Lecture 24 The Properties of Hash Algorithms

Lecture 25 The Application of Hash Algorithms

Lecture 26 Attacks on Cryptographic Hash Algorithms

Lecture 27 Intro to Full Disk Encryption

Lecture 28 Full Disk Encryption Using dm-crypt and LUKS

Lecture 29 Unlocking LUKS Encrypted Drives With A Keyfile

Lecture 30 Commands - Full Disk Encryption

Lecture 31 Full Disk Encryption Solution using VeraCrypt (Windows, Mac and Linux)

Lecture 32 Intro to GnuPG

Lecture 33 Symmetric Encryption Using GnuPG

Lecture 34 GnuPG Key Management

Lecture 35 GnuPG Key Servers

Lecture 36 Asymmetric Encryption Using GnuPG

Lecture 37 Digital Signing using GnuPG

Lecture 38 Asymmetric Encryption and Digital Signing using GnuPG

Lecture 39 Commands - GnuPG (gpg)

Lecture 40 Using an Encrypted Text Editor (EncryptPad)

Lecture 41 Steganography Explained

Lecture 42 Steganography In Depth

Lecture 43 Hide Secret Messages Through Steganography with Steghide

Lecture 44 Commands - Steganography

Section 6: Challenges - Cryptography and Steganography

Lecture 45 Challenges - Hashes

Lecture 46 Challenges - GPG

Lecture 47 Challenges - Steganography (steghide)

Section 7: Cracking Passwords

Lecture 48 Understanding /etc/passwd and /etc/shadow files

Lecture 49 Intro to Cracking Passwords

Lecture 50 Cracking Linux Passwords Using John the Ripper

Lecture 51 John the Ripper Advanced

Lecture 52 Commands - John the Ripper (JTR)

Lecture 53 Cracking Passwords Countermeasures

Lecture 54 Cracking Service Passwords with Hydra

Lecture 55 Commands - Hydra

Lecture 56 Rainbow Tables Explained

Lecture 57 Cracking Hashes Using RainbowCrack (rtgen & rcrack)

Lecture 58 Cracking Hashes Countermeasures

Lecture 59 Commands - Cracking Hashes Using Rainbow Tables

Section 8: Challenges - Cracking Passwords

Lecture 60 Challenges - John the Ripper and Hydra

Lecture 61 Challenges - Rainbow Tables

Section 9: Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Dark Web)

Lecture 62 How Does Online Tracking Really Work

Lecture 63 Staying Anonymous Online: Incognito vs. VPN/Proxy vs. Tor vs. Tails

Lecture 64 Using Disposable Email Addresses

Lecture 65 Protecting Your Phone Number

Lecture 66 Intro to Onion Routing and Tor

Lecture 67 Onion Routing and Tor In Depth

Lecture 68 Installing and Running the Tor Browser

Lecture 69 Tor vs. VPN

Lecture 70 The Layers of the Web: Surface Web, Deep Web and Dark Web

Lecture 71 Surface Web vs. Dark Web Anonymity

Lecture 72 Through the Dark Web. Is it worth it?

Lecture 73 Tor Weaknesses and Security Best Practices

Section 10: Information Gathering And Vulnerability Assessment

Lecture 74 Intro to Reconnaissance

Lecture 75 Scanning Networks with Nmap

Lecture 76 Nmap Advanced

Lecture 77 Commands - Nmap

Lecture 78 Nmap Scripting Engine (NSE)

Lecture 79 Commands - NSE

Lecture 80 Zenmap

Lecture 81 Comparing Nmap Scan Results

Lecture 82 ARP Scanning (arp-scan and netdiscover)

Lecture 83 Commands - ARP Scanning

Lecture 84 Intro to Vulnerability Assessment Systems (VAS)

Lecture 85 Hacking Google Searches (Google Dorks)

Lecture 86 Hacking Google Searches In Depth

Lecture 87 Finding Webcams Using Google Dorks

Lecture 88 Using Shodan: The Search Engine For the Internet of Things

Lecture 89 The Shodan Algorithm

Lecture 90 Using Shodan Filters

Lecture 91 Shodan CLI

Section 11: Challenges - Reconnaissance

Lecture 92 Challenges - Nmap and ARP Scanning

Section 12: Sniffing Traffic

Lecture 93 Intro to Sniffing

Lecture 94 Using Wireshark for Packet Sniffing and Analyzing

Lecture 95 Wireshark Filters

Lecture 96 Capture Traffic Using tcpdump

Lecture 97 Commands - tcpdump

Section 13: Challenges - Wireshark and tcpdump

Lecture 98 Challenges - Wireshark and tcpdump

Section 14: Hacking WiFi Networks

Lecture 99 WiFi Cards for Hacking WiFi Networks (Monitor Mode & Packet Injection)

Lecture 100 Choosing the Right External USB WiFi Card

Lecture 101 Connecting a USB WiFi Card to Kali Linux in a VM

Lecture 102 Wireless Modes: Managed and Monitor (RFMON)

Lecture 103 Commands - WiFi Monitor Mode

Lecture 104 Sniffing Wireless Traffic using airodump-ng

Lecture 105 Commands - Sniffing WiFi Traffic using airodump-ng

Lecture 106 Wireless Injection: Deauthentication Attack

Lecture 107 Commands - Deauthentication Attack

Lecture 108 Hacking WPA2: Capture the Handshake

Lecture 109 Hacking WPA2: Cracking the WiFi Password

Lecture 110 Commands - Capturing the Handshake and Cracking the Password

Lecture 111 Configuring the WiFi Network for Maximum Security

Section 15: Challenges - Hacking WiFi Networks

Lecture 112 Challenges -WiFi Monitor Mode

Lecture 113 Challenges - Hacking WPA2

Section 16: Hacking Network Protocols

Lecture 114 The ARP Protocol

Lecture 115 Hacking ARP - MITM and ARP Poisoning

Lecture 116 Hacking ARP - Hands-On Attack Using Ettercap

Lecture 117 Commands - ARP Poisoning using Ettercap

Lecture 118 Bettercap: The Swiss Army Knife for Attacks and Monitoring

Lecture 119 Hacking ARP - Hands-On Attack using Bettercap

Lecture 120 Commands - Bettercap

Lecture 121 Hacking ARP - DoS Attack using Bettercap

Lecture 122 Hacking ARP Countermeasures

Lecture 123 Hacking Automation: Bettercap Caplets

Lecture 124 Hacking DNS: DNS Spoofing

Lecture 125 HTTP, HTTPS, HSTS

Lecture 126 SSL Sniffing and SSL Stripping

Lecture 127 Hacking HTTPS: SSL Sniffing (Lab)

Lecture 128 Hacking HTTPS: SSL Stripping (Lab)

Lecture 129 Hacking HTTPS Countermeasures: How to Stay Safe on the Web

Lecture 130 Hacking Switches: Mac Flooding

Lecture 131 Hacking Switches: Mac Flooding Countermeasures

Lecture 132 Hacking DHCP: Protocol and Attacks

Lecture 133 Hacking DHCP: Discover Flooding Attack using Yersinia (DoS)

Lecture 134 Hacking DHCP: Starvation Attack using DHCPig (DoS)

Lecture 135 Hacking DHCP Countermeasures

Lecture 136 Hacking Cisco Devices: CDP Flooding

Lecture 137 Hacking Cisco Devices: CDP Flooding Countermeasures

Lecture 138 Hacking Switches: STP Attack

Lecture 139 Hacking Switches: STP Attack Countermeasures (BPDU Guard & Root Guard)

Section 17: [EXTRA] - Linux Netfilter and Iptables Firewall

Lecture 140 Introduction to Netfilter and Iptables

Lecture 141 Chain Traversal in a Nutshell

Lecture 142 Iptables Basic Usage

Lecture 143 Iptables Options (Flags) - Part 1

Lecture 144 Iptables Options (Flags) - Part 2

Lecture 145 Where Do We Write Iptables Rules

Lecture 146 Setting the Default Policy

Lecture 147 Deleting the Firewall

Lecture 148 Filter by IP Address

Lecture 149 Filter by Port

Lecture 150 Intro to Stateful Firewalls (Connection Tracking)

Lecture 151 Implementing Stateful Firewalls with Iptables

Lecture 152 Filter by MAC Address

Lecture 153 Match by Date and Time

Lecture 154 The ACCEPT and DROP Targets

Lecture 155 The LOG Target

Section 18: Challenges - Netfilter and Iptables

Lecture 156 Challenges - Netfilter and Iptables

Section 19: [EXTRA] - SSH Hardening: Public Key Authentication (Cisco IOS & Linux)

Lecture 157 SSH Public Key Authentication Overview

Lecture 158 Generating SSH Key Pair on Windows

Lecture 159 What about MacOS?

Lecture 160 Generating SSH Key Pair on Linux

Lecture 161 Configuring SSH Public Key Authentication on Cisco IOS - Part 1 [Windows]

Lecture 162 Configuring SSH Public Key Authentication on Cisco IOS - Part 2 [Linux]

Lecture 163 Configuring SSH Public Key Authentication on Linux

Section 20: Where To Go From Here?

Lecture 164 What's Next?

Section 21: Course Completion

Lecture 165 Congratulations

Lecture 166 BONUS

Network and System Administrators.,Anyone interested in learning Ethical Hacking and Penetration Testing.,Anyone interested in learning how to secure systems from Hackers.,Programmers