If you would like to master ethical hacking, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux and Python hacking with over 28 hours of HD video tutorials! We will cover the following topics in this course:
-
How to setup a Kali Linux system
-
Essential Linux system commands
-
How to create a secure penetration testing environment
-
Footprinting
-
Scanning
-
Website penetration testing
-
WPA2 wireless network cracking
-
Man in the middle attacks
-
System hacking using Metasploit
-
Python programming fundamentals
-
Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)
-
Tips for building a career in cyber security
This course was designed for absolute beginners, so no previous ethical hacking or programming knowledge is necessary. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the tutorials is available within the discussion forum.
Still not sold? Check out some of these great reviews!
“Great course, beginner friendly. And most importantly, great instructor and great community.”
“It’s really detailed and helps you get started well!”
“Thank you for all the changes and all the new stuff you keep adding. I have more than a few ethical hacking courses and this is the best one, at least so far. I had my doubts when I got it due to it being so short but I am really happy that I did. Great job, keep it up!”
Thank you for taking the time to read this and we hope to see you in the course!
Basic Linux Commands
Creating a Secure Hacking Environment
Footprinting
Scanning
Website Penetration Testing
Wireless Cracking
-
29Installing OWASP
-
30HTTP request
-
31HTTP response
-
32Burpsuite configuration
-
33Editing packets in Burpsuite
-
34Whatweb and Dirb
-
35Password recovery attack
-
36Burpsuite login bruteforce
-
37Hydra login bruteforce
-
38Session fixation
-
39Injection attacks
-
40Simple command injection
-
41Exploiting command injection vulnerability
-
42Finding blind command injection
-
43SQL basics
-
44Manual SQL injection part 1
-
45Manual SQL injection part 2
-
46SQLmap basics
-
47XML injection
-
48Installing XCAT and preventing injection attacks
-
49Reflected XSS
-
50Stored XSS
-
51Changing HTML code with XSS
-
52XSSer and XSSsniper
Man in the Middle Attacks
-
53Wireless attacking theory
-
54Enabling monitor mode
-
55Capturing handshake with airodump
-
56RockYou.txt
-
57Cracking with Aircrack
-
58Cracking with Hashcat
-
59Creating password lists with Crunch
-
60Creating password lists with Cupp
-
61Rainbow tables part 1
-
62Rainbow tables part 2
-
63Installing Fluxion
-
64Finding and cracking hidden networks
-
65Preventing wireless attacks
System Hacking with Metasploit
-
66ARP protocol basics
-
67Man in the middle attack theory
-
68Installing MITMf
-
69Manual ARP spoofing
-
70Problems while installing MITMf
-
71HTTP traffic sniffing
-
72DNS spoofing and HTTPS password sniffing
-
73Hooking browsers with BEEF
-
74Screenshotting targets browser
-
75Cloning any webpage
-
76Ettercap basics