The Complete Ethical Hacking Absolute Beginners Course
Duration: 12:13:16 | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 4.94 GB
Genre: eLearning | Language: English [Auto]
Duration: 12:13:16 | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 4.94 GB
Genre: eLearning | Language: English [Auto]
Learn Ethical Hacking, Types, Terminologies, Tools, Skills, Process, Reconnaissance, Footprinting, Fingerprinting & more
What you'll learn
Students will be able to Learn Ethical Hacking
Students will be able to Learn Types of Ethical Hacking
Students will be able to Learn Types of Terminologies
Students will be able to Learn Types of Tools
Students will be able to Learn Skills
Those who want to Understand about Process
Those who want to Understand about Reconnaissance
Those who want to Understand about Footprinting
Those who want to Understand about Fingerprinting
To Learn about Networking Refresher
To Learn about IP Addresses
To Learn about MAC Addresses
To Learn about TCP, UDP, & the Three-Way Handshake
To Learn about Common Ports and Protocols
To Learn about OSI Model
Students will be able to Learn Subnetting
Students will be able to Learn Installing VMWare or VirtualBox
Students will be able to Learn Installing Kali Linux
Students will be able to Learn Configuring VirtualBox
Students will be able to Learn Kali Linux Overview
Students will be able to Learn Sudo Overview
Those who want to Understand about Navigating the File System
Those who want to Understand about Users and Privileges
Those who want to Understand about Common Network Commands
Those who want to Understand about Network Commands Update
Students will be able to Learn Installing and Updating Tools
Students will be able to Learn Installing gedit
Students will be able to Learn Viewing, Creating and Editing Files
Students will be able to Learn Scripting with Bash
Students will be able to Learn Intro to Python
Students will be able to Learn Strings
Students will be able to Learn Math
To Learn about Variables and Methods
To Learn about Functions
To Learn about Boolean Expressions
To Learn about Relational and Boolean Operators
To Learn about Conditional Statements
To Learn about Lists
Those who want to Understand about Tuples
Those who want to Understand about Looping
Those who want to Understand about Importing Modules
Those who want to Understand about Advanced Strings
Students will be able to Learn Dictionaries
Students will be able to Learn Sockets
Students will be able to Learn 5 Stages of Ethical Hacking
Students will be able to Learn Passive Recon Overview
Students will be able to Learn Identifying Our Target
Students will be able to Learn Discovering Email Addresses
Students will be able to Learn Breached Credentials
Students will be able to Learn Hunting Subdomains
To Learn about Identifying Website Technologies
To Learn about Gathering Information w/ Burp Suite
To Learn about Google Fu
To Learn about Utilizing Social Media
Those who want to Understand about Installing Kioptrix
Those who want to Understand about Scanning w/ Nmap
Those who want to Understand about Enumerating HTTP/HTTPS
Those who want to Understand about Enumerating SMB
Those who want to Understand about Enumerating SSH
Those who want to Understand about Researching Potential Vulnerabilities
Those who want to Understand about Scanning w/ Nessus
Students will be able to Learn Reverse Shells vs Bind Shells
Students will be able to Learn Staged vs Non-Staged Payloads
Students will be able to Learn Gaining Root w/ Metasploit
Students will be able to Learn Manual Exploitation
Students will be able to Learn Brute Force Attacks
To Learn about Credential Stuffing and Password Spraying
To Learn about Setting up Blue
To Learn about Blue Walkthrough
To Learn about Academy Setup
To Learn about Dev Walkthrough
To Learn about Butler Walkthrough
To Learn about Blackpearl Walkthrough
Requirements
No prior experience is necessary
Interest in Learning Ethical Hacking
You have to be focused on the Lecture
Description
Welcome to our Course !
You can Learn complete information related to Ethical Hacking. It is the best course for Ethical Hacking. This course of Ethical Hacking will able you to start your Learning as absolute beginner.
Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term "Hacker" was originated.
Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer.
Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.
A computer expert who does the act of hacking is called a "Hacker". Hackers are those who seek knowledge, to understand how systems operate, how they are designed, and then attempt to play with these systems.
Important Topics you can learn and get Explanation are :
Ethical Hacking Introduction
Types
Terminologies
Tools
Skills
Process
Reconnaissance
Footprinting
Fingerprinting
Sniffing
Networking Refresher
IP Addresses
MAC Addresses
TCP, UDP, & the Three-Way Handshake
Common Ports and Protocols
The OSI Model
Subnetting
Installing VMWare or VirtualBox
Installing Kali Linux
Configuring VirtualBox
Kali Linux Overview
Sudo Overview
Navigating the File System
Users and Privileges
Common Network Commands
Network Commands Update
Installing and Updating Tools
Installing gedit
Viewing, Creating and Editing Files
Scripting with Bash
Intro to Python
Strings
Math
Variables and Methods
Functions
Boolean Expressions
Relational and Boolean Operators
Conditional Statements
Lists
Tuples
Looping
Importing Modules
Advanced Strings
Dictionaries
Sockets
Building a Port Scanner
The 5 Stages of Ethical Hacking
Passive Recon Overview
Identifying Our Target
Discovering Email Addresses
Breached Credentials
Hunting Subdomains
Identifying Website Technologies
Gathering Information w/ Burp Suite
Google Fu
Utilizing Social Media
Installing Kioptrix
Scanning w/ Nmap
Enumerating HTTP/HTTPS
Enumerating SMB
Enumerating SSH
Researching Potential Vulnerabilities
Scanning w/ Nessus
Reverse Shells vs Bind Shells
Staged vs Non-Staged Payloads
Gaining Root w/ Metasploit
Manual Exploitation
Brute Force Attacks
Credential Stuffing and Password Spraying
Setting up Blue
Blue Walkthrough
Academy Setup
Academy Walkthrough
Dev Walkthrough
Butler Walkthrough
Blackpearl Walkthrough
Thank you so much !
Our Team will Happy to see in Course !
Note that Our team is present every time for you and available here for any questions you may have. You can ask any question which you want.
Who this course is for:
Anyone who want to Learn about Ethical Hacking
Those who have Interest in Ethical Hacking
More Info