Ethical Hacking for Beginners
- Description
- Curriculum
- FAQ
- Reviews
This course is for anyone interested in becoming an ethical hacker, no matter your current skill level. The curriculum is designed for absolute beginners interested in a career as a security professional, beginning with the absolute basics of penetration testing, and progressing to advanced topics and techniques. Get started today in your Ethical Hacking career.
The goal of ethical hacking is to find security vulnerabilities in an organization’s digital systems and networks. The best way to test the security of this infrastructure is to attempt to break in through penetration testing techniques. The increasing amount of high-profile cyber incidents continues to emphasize the need for individuals with these skills, with job demand projected to continue at an exponential rate.
The techniques shown here leverage free tools which are explained throughout the course, including instructions for creating your own home lab for practice and study. One of the primary tools you will become familiar with is Kali Linux, which is a Debian-based Linux distribution aimed at penetration testing and security auditing.
This course explores the following topics and more:
– Networking Basics
– Creating a Virtual Lab
– Kali Linux Tools for Penetration Testing
– Linux Basics
– Python Basics
– Penetration Testing Methodology
– Legal Considerations
– Report Writing
– Passive and Active Reconnaissance
– Scanning and Enumeration
– Reverse and Bind Shell
– Automated Payloads and Exploitation
– Brute Force Attacks
– Credential Stuffing
– Password Spraying
– Tips for Maintaining Access and Covering Tracks
– Web Server Vulnerabilities
– Wifi Hacking
-
52.0 Networking BasicsVideo lesson
-
62.1 IP AddressingVideo lesson
-
72.2 MAC AddressingVideo lesson
-
82.3 The OSI ModelVideo lesson
-
92.4 Binary NumberingVideo lesson
-
102.5 SubnettingVideo lesson
-
112.6 Subnetting: Hands-On PracticeVideo lesson
-
122.7 TCP and UDPVideo lesson
-
132.8 Well-Known PortsVideo lesson
-
235.0 Linux BasicsVideo lesson
-
245.1 Sudo CommandVideo lesson
-
255.2 File System NavigationVideo lesson
-
265.3 File PermissionsVideo lesson
-
275.4 Working with FilesVideo lesson
-
285.5 Linux UsersVideo lesson
-
295.6 Common CommandsVideo lesson
-
305.7 Installing UpdatesVideo lesson
-
315.8 Installing PythonVideo lesson
-
325.9 Using GitHubVideo lesson
-
335.10 Bash ScriptingVideo lesson
-
346.0 Python BasicsVideo lesson
-
356.1 StringsVideo lesson
-
366.2 VariablesVideo lesson
-
37FunctionsVideo lesson
-
38Boolean ExpressionsVideo lesson
-
39OperatorsVideo lesson
-
40ListsVideo lesson
-
41TuplesVideo lesson
-
42SetsVideo lesson
-
43DictionariesVideo lesson
-
44ConditionsVideo lesson
-
45LoopsVideo lesson
-
46ModulesVideo lesson
-
6410.0 Gaining AccessVideo lesson
-
6510.1 Reverse ShellVideo lesson
-
6610.2 Bind ShellVideo lesson
-
6710.3 Sending PayloadsVideo lesson
-
6810.4 Automated ExploitationVideo lesson
-
6910.5 Brute Force AttacksVideo lesson
-
7010.6 Credential StuffingVideo lesson
-
7110.7 Password SprayingVideo lesson
External Links May Contain Affiliate Links read more