Would you like to get started as an ethical hacker? Do you want to become a professional penetration tester? Enroll now in The Complete Ethical Hacking Course and learn how to think like a hacker, and become familiar with the toolkit of a professional pentester. This course covers a wide range of topics relating to network security:
-
Introduction to ethical hacking
-
Reconnaissance
-
Scanning and enumeration
-
Network presence
-
Attacking systems
-
Web hacking
-
Social engineering
When you enroll in the course you will immediately receive access to 19+ hours of HD video tutorials, as well as additional supplemental resources for developing the necessary skills to succeed in the field. Learn by doing with demonstrations using popular pentesting tools such as Maltego, FOCA, Recon-ng, Nmap, masscan, tcpdump, Wireshark, Ettercap, Burp Suite, Scapy, Mimikatz, Hashcat, Konboot, Hydra, OWASP, SQLmap, mitmproxy, Skipfish and more!
Thank you for taking the time to read this, and we hope to see you in the course!
Reconnaissance - Surveying the Attack Surface
Scanning and Enumeration - Getting Down to Business
Network Presence
-
17Scanning & enumeration
-
18Identifying active hosts pt. 1
-
19Identifying active hosts pt. 2
-
20Identifying active services
-
21OS and services fingerprinting
-
22Network mapping
-
23Final thoughts
-
24DEMO - Nmap syntax pt. 1
-
25DEMO - Nmap syntax pt. 2
-
26DEMO - Nmap hosts discovery
-
27DEMO - Nmap service discovery
-
28DEMO - Nmap scripts
-
29DEMO - masscan
Attacking
Web Hacking
-
39Security overview pt. 1: Windows architecture
-
40Security overview pt. 2: credentials security
-
41Security overview pt. 3: memory corruption & exploitation
-
42Windows hacking basics
-
43Local access and privilege escalation
-
44Dumping hashes and cracking passwords
-
45Linux attacking basics pt. 1
-
46Linux attacking basics pt. 2
-
47References
-
48DEMO - Windows msf exploit pt. 1
-
49DEMO - Windows msf exploit pt. 2
-
50DEMO - Post exploitation activities
-
51DEMO - Mimikatz
-
52DEMO - Dumping hashes
-
53DEMO - Hashcat
-
54DEMO - Konboot
-
55DEMO - Post exploitation Windows cmd
-
56DEMO - Post exploitation Windows powershell
-
57DEMO - Online password cracking pt. 1
-
58DEMO - Online password cracking pt. 2
-
59DEMO - Attacking Linux targets pt. 1
-
60DEMO - Attacking Linux targets pt. 2
Social Engineering - Hacking Humans
-
61Introduction to web hacking
-
62Web security architecture overview pt. 1
-
63Web security architecture overview pt. 2
-
64Attacking the web server pt. 1
-
65Attacking the webserver pt. 2
-
66Attacking the platform pt. 1
-
67Attacking the platform pt. 2
-
68Attacking the technology pt. 1
-
69Attacking the technology pt. 2
-
70OWASP top 10 pt. 1
-
71OWASP top 10 pt. 2
-
72Attacking the business logic pt. 1
-
73Attacking the business logic pt. 2
-
74Tools and methodology
-
75References
-
76DEMO - OWASP Mutillidae
-
77DEMO - SQL injection
-
78DEMO - SQLMAP intro
-
79DEMO - SQLMAP practice
-
80DEMO - Burpsuite
-
81DEMO - Burpsuite XSS Hunter
-
82DEMO - mitmproxy
-
83DEMO - Skipfish pt.1
-
84DEMO - Skipfish pt.2