Cybersecurity & Ethical Hacking: Mastering the Basics
- Description
- Curriculum
- FAQ
- Reviews
Learn Ethical Hacking: Bug Bounty, Reverse Engineering & Cybersecurity
Are you ready to dive into the world of ethical hacking? This course is designed for beginners who want to learn ethical hacking and build a strong foundation in cybersecurity, penetration testing, and vulnerability assessment. If you wish to start a career in bug bounty hunting, explore reverse engineering, or understand hacking ethically, this course will give you the essential skills to get started.
What You Will Learn:
-
The fundamentals of ethical hacking and penetration testing
-
How to conduct bug bounty hunting and find security vulnerabilities
-
Techniques for ethical hacking reverse engineering to analyze software and applications
-
Understanding network security, firewalls, and encryption methods
-
How to exploit and secure web applications using ethical hacking techniques
-
The basics of malware analysis and Cybersecurity Defense Strategies
-
Tools like Kali Linux, Metasploit, Wireshark, and Burp Suite
Who Is This Course For?
-
Anyone looking to learn ethical hacking from scratch
-
Aspiring ethical hackers interested in penetration testing and cybersecurity
-
Individuals who want to explore bug bounty programs and find security flaws
-
Developers who want to secure their applications against hacking attempts
-
Security enthusiasts looking to understand hacking ethical concepts and defenses
Why Take This Course?
-
No prior experience required – beginner-friendly and hands-on approach
-
Step-by-step tutorials covering ethical hacking reverse engineering techniques
-
Practical exercises to help you develop real-world cybersecurity skills
-
Covers essential tools and methodologies used by ethical hackers and security professionals
-
Prepares you for careers in penetration testing, security analysis, and bug bounty hunting
By the end of this course, you will have a solid understanding of ethical hacking principles, bug bounty methodologies, and reverse engineering techniques. You’ll gain hands-on experience hacking ethical systems, testing vulnerabilities, and protecting networks from cyber threats.
Take the first step toward a career in cybersecurity. Enroll now and start learning ethical hacking today!
-
2Video - Section 2 OverviewVideo lesson
A short video overview of what the expectations are for creating your lab environment using VirtualBox.
-
3Video and Lab - Create a Virtual Install of Kali LinuxVideo lesson
-
4Video - Spoofing Your Browser to Get Access to Windows 10 ProVideo lesson
-
5Video and Lab - Create a Virtual Install of Windows 10 - 2024Video lesson
In this short lab, you will learn how to create a windows 10 Pro target machine needed for this course.
-
6Video and Lab - Create a Virtual Install of Metasploitable2 Using VirtualBoxVideo lesson
In this lab, you will learn how to import Metasploitable2 into VirtualBox. Metasploitable2 is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques.
-
7Video and Lab - Create a Virtual Install of Metasploitable3 w2k8 Using VBVideo lesson
Metasploitable3 is an intentionally vulnerable VM of Windows 2008 Server. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques.
-
8Video and Lab - Create a Virtual Install of OWASPVideo lesson
In this short lab, you will learn how to create a virtual install of the OWASP Web Application Project
-
9Video - Taking a Snapshot of your Current ConfigurationVideo lesson
-
10Video and PPT - Scoping the EngagementVideo lesson
In this short PowerPoint presentation, you will learn about the importance of scoping an engagement.
-
11Video and PPT - Statement of Work (SOW) DocumentVideo lesson
Regardless of which cybersecurity exam, exam vendor, or certification path you choose, you will be expected to know what documents are required before, during, and after a pentest. For exam purposes, you will need to understand the purpose of the Statement of Work document, why it is important, and what should be included in the document. You are also expected to know the difference between a Statement of Work and the Rules of Engagement.
-
12Video and PPT - Rules of Engagement (ROE) DocumentVideo lesson
Regardless of which cybersecurity exam, exam vendor, or certification path you choose, you will be expected to know what documents are required before, during, and after a pentest. For exam purposes, you will need to understand the purpose of the Rules of Engagement, why it is important, and what should be included in the document.
You are also expected to know the difference between a Statement of Work and the Rules of Engagement.
-
13Video and PPT - Master Service Agreement (MSA), NDAVideo lesson
Two additional documents pentesters need to be familiar with are the Master Service Agreement and the Nondisclosure Agreement (NDA).
-
14Video and PPT - Pentesting Final ReportVideo lesson
Regardless of the cyber security exam or the exam vendor, documentation and reporting will be one of the required domains of knowledge. In addition, you can expect to be asked questions about the different sections of the Pentesting Final Report.
-
15Video and PPT - Overview of MITRE ATT&CK frameworkVideo lesson
A high-level overview of the MITRE ATT&CK framework.
-
16Video and PPT - Overview of the NIST Pentesting FrameworkVideo lesson
A high-level overview of the NIST Penetration Testing Framework and Standard.
-
17Video and PPT - Overview of the Penetration Testing Execution Standard (PTES)Video lesson
A high-level overview of the Penetration Testing Execution Standard (PTES) framework.
-
18Video and Lab - Introduction to NMapVideo lesson
In this first lab, students will use Nmap to investigate their network and identify potential targets. In this lab, students will be introduced to network discovery using Nmap, and becoming familiar the using CLI in Linux.
-
19Video - Nmap Service and Open Port scanVideo lesson
Regardless of which cyber security exam you are preparing for, you can expect plenty of questions regarding Nmap switches. You will need to know which switch(s) to use to perform a specific scan, and you will need to be able to identify the type of scan used to generate a particular Nmap output. Lastly, from the Nmap output, you will need to identify the vulnerability shown in the Nmap results.
-
20Video - Nmap OS DetectionVideo lesson
-
21Video - Nmap Service and Version DetectionVideo lesson
Regardless of your cyber security exam or vendor, you will be expected to know how to perform service and version detection using Nmap.
-
22Video - Nmap Host DiscoveryVideo lesson
Regardless of your cyber security exam or vendor, you will be expected to know how to perform a host discovery using Nmap.
-
23Video and lab - NMap Scripting Engine (NSE)Video lesson
The Nmap scripting engine is one of Nmap's most powerful and, at the same time, most flexible features. It allows users to write their own scripts and share these scripts with other users for the purposes of networking, reconnaissance, etc. These scripts can be used for:
Network discovery
More sophisticated and accurate OS version detection
Vulnerability detection
Backdoor detection
Vulnerability exploitation
In this lab, you will look at the scripts that have been shared and are built into Kali and will examine how to use them to do thorough recon on our target, to increase the possibility of success, and reduce the possibilities of frustration.
-
24Video - Analyzing NMap ResultsVideo lesson
Regardless of your exam vendor for your next cyber security exam, you may be asked to analyze the output of an NMap scan. You may be asked to reconstruct the NMap command that generated the output and finally, you may be asked to determine from the output the best attack vector.
-
26Video and lab - Using Banner Grabbing to Aid in ReconnaissanceVideo lesson
In this lab, you will learn about banner grabbing. Banner grabbing is a technique used to gather information about running services on a computer system.
-
27Video and Lab - Enumerating Windows 10 Using WinPEASVideo lesson
In this lesson, you will learn how to perform an automated enumeration of a vulnerable Windows 10 target using WinPeas looking for ways to elevate privileges.
-
28Video and lab - Gathering Information Using Recon-ngVideo lesson
This lab provided hands-on experience with a key tool in cybersecurity, enhancing students' practical skills in digital reconnaissance and data analysis.
-
29Video and Lab - Creating a Persistent Backdoor Using Service PersistenceVideo lesson
In this short lab, you will learn how to use Metasploitable to create a persistent connection with a Windows 10 Pro machine.
-
30Video and Lab - Create a Windows Reverse Shell Using PowerShellVideo lesson
In this short lab, you will learn how to use Metasploitable to create a persistent connection with a Windows 10 Pro machine.
-
31Video and Lab -Launch a Graphic Console Window Using SSH and XTERM.mp4Video lesson
In this short lab, you will learn how to Launch a graphic console window Using SSH and XTERM.
-
32Video and Lab - Window 7/10 Privilege Escalation Using UAC BypassVideo lesson
In this lab, we will learn how to perform privilege escalation on a Microsoft Windows machine using the Metasploit UAC bypass module.
-
33Video and Lab - Verify Windows Privilege Escalation: Unquoted Service PathVideo lesson
Unquoted Path or Unquoted Service Path is reported as a critical vulnerability in Windows. This vulnerability allows attackers to escalate their privileges using the NT AUTHORITY/SYSTEM account.
The following command can be used to verify the presence of an Unquoted Service path vulnerability.
wmic service get name,pathname,displayname,startmode | findstr /i auto | findstr /i /v "C:Windows\" | findstr /i /v """
-
34Video and Lab - Windows Privilege Escalation Unquoted Service PathVideo lesson
A service whose service executable path contains spaces and is not wrapped within quotes can lead to a vulnerability known as Unquoted Service Path. This vulnerability allows a normal user to gain administrative access to the machine by performing privilege escalation using the local system account, which is needed to launch the service executable.
-
35Video and PPT - Overview of OWASP Top 10Video lesson
Overview of OWASP Top 10 Web Application Vulnerabilities
-
36Video and Lab - Assemble Fake TCPIP Packets Using Hping3Video lesson
Hping3 is a terminal application for Linux that will allow us to analyze and assemble TCP/IP packets quickly. Unlike a conventional ping used to send ICMP packets, hping3 allows the sending of TCP, UDP, and RAW-IP packets.
-
37Video and Lab - Identify Active Network Hosts and Services Using NmapVideo lesson
The purpose of reconnaissance is to collect as much information about a target network as possible. From a hacker’s perspective, the information gathered is very helpful when preparing for an attack. A penetration tester tries to find the information and to patch the vulnerabilities if found. This is also called Footprinting
-
38Video and Lab - Perform a Vulnerability Scan Using OWASP Zed Attack ProxyVideo lesson
OSWAP ZAP is an open-source, free tool used to perform penetration tests. The main goal of Zap is to allow easy penetration testing to find the vulnerabilities in web applications.
-
39Video and Lab - Configuring BurpSuite as a Proxy.pdfVideo lesson
In this short lab, you will learn how to setup BurpSuite using a virtual install of Kali Linux. Burp or Burp Suite is a set of tools used for penetration testing of web applications.
-
40Video - Web Application Firewall Detection Using WAFW00FVideo lesson
Wafwoof is a free and open-source tool that can identify whether the firewall is present on a website or not.
-
41video and Lab - Perform a SQL Injection Attack Using SqlmapVideo lesson
SQLmap is an open-source penetration test tool that automates the process of detecting and exploiting weaknesses in SQL injection (SQLi) and taking over the server database.
-
42Video and Lab - Exploit Vulnerable Web Applications Using Command InjectionVideo lesson
In this lab, you will learn how to exploit a vulnerable web application using command injection. Command injection is also known as OS Command injection, is an attack technique used to execute commands on a host operating system via a vulnerable web application.
-
43Video and Lab - Exploiting HTTP PUT MethodVideo lesson
In this lab, we exploit the HTTP PUT method using Metasploitable3 as are target machine. If the HTTP PUT method is enabled on the webserver it can be used to upload a specified resource to the target machine, such as a web shell. We will also look at how to determine if the HTTP PUT method is enabled.
-
44Video and Lab - Brute Forcing WordPress PasswordVideo lesson
Unlike hacks that focus on vulnerabilities in software, a Brute Force Attack aims to be the most straightforward kind of method to gain access to a site: it repeatedly tries usernames and passwords until it gets in. Often deemed ‘inelegant,’ they can be very successful when people use passwords like ‘123456’ and usernames like ‘admin.’
-
45Video and Lab - Compiling Exploit Code for Linux Using GCCVideo lesson
In this short lab, you will learn how to compile exploit code that will escalate privileges on a Linux target.
-
46Video and Lab - Prepare a Windows OVA file for your Virtual Lab EnvironmentVideo lesson
In this short lab, you will learn how to prepare a Windows 7 OVA file for your virtual lab environment and the next lab.
-
47Video and Lab - Cross Compiling Windows Exploits Using Mingw-w64Video lesson
External Links May Contain Affiliate Links read more