Ultimate Ethical Hacking from Zero To Hero
- Description
- Curriculum
- FAQ
- Reviews
What is Ethical Hacking?
Ethical hacking is an authorized practice of detecting vulnerabilities in an application, system, or organization’s infrastructure and bypassing system security to identify potential data breaches and threats in a network. Ethical hackers aim to investigate the system or network for weak points that malicious hackers can exploit or destroy. They can improve the security footprint to withstand attacks better or divert them.
The company that owns the system or network allows Cyber Security engineers to perform such activities in order to test the system’s defenses. Thus, unlike malicious hacking, this process is planned, approved, and more importantly, legal.
Ethical hackers aim to investigate the system or network for weak points that malicious hackers can exploit or destroy. They collect and analyze the information to figure out ways to strengthen the security of the system/network/applications. By doing so, they can improve the security footprint so that it can better withstand attacks or divert them.
Ethical hackers are hired by organizations to look into the vulnerabilities of their systems and networks and develop solutions to prevent data breaches. Consider it a high-tech permutation of the old saying “It takes a thief to catch a thief.”
They check for key vulnerabilities include but are not limited to:
-
Injection attacks
-
Changes in security settings
-
Exposure of sensitive data
-
Breach in authentication protocols
-
Components used in the system or network that may be used as access points
-
6Why Kali Linux ?Video lesson
-
7Booting Up Kali LinuxVideo lesson
-
8The Linux FilesystemVideo lesson
-
9Basic Linux CommandsVideo lesson
-
10Managing Kali Linux ServicesVideo lesson
-
11Searching, Installing, and Removing ToolsVideo lesson
-
12Kali Linux CLI - Environment VariablesVideo lesson
-
13Kali Linux CLI - Bash History CommandVideo lesson
-
14Kali Linux CLI - Piping and RedirectionVideo lesson
-
15Kali Linux CLI - Text Searching and ManipulationVideo lesson
-
16Kali Linux CLI - Editing FilesVideo lesson
-
17Kali Linux CLI - Comparing FilesVideo lesson
-
18Kali Linux CLI - Managing ProcessesVideo lesson
-
19Kali Linux CLI - File and Command MonitoringVideo lesson
-
20Kali Linux CLI - Downloading FilesVideo lesson
-
21Kali Linux CLI - Customizing the Bash EnvironmentVideo lesson
-
22Netcat (nc) EssentialsVideo lesson
-
23Bash Scripting - Our First Bash ScriptVideo lesson
-
24Bash Scripting - VariablesVideo lesson
-
25Bash Scripting - If, Else, Elif StatementsVideo lesson
-
26Bash Scripting - LoopsVideo lesson
-
27Bash Scripting - FunctionsVideo lesson
-
28*NEW* QuizQuiz
-
30Web Application Security EssentialsVideo lesson
-
31How Web Applications WorkVideo lesson
-
32HTTP (Hypertext Transfer Protocol)Video lesson
-
33What is DNS and How DNS worksVideo lesson
-
34OWASP Top 10 VulnerabilitiesVideo lesson
-
35Web Application Assessment Tools - DIRBVideo lesson
-
36Web Application Assessment Tools - Burp SuiteVideo lesson
-
37Web Application Assessment Tools - NiktoVideo lesson
-
38*NEW* QuizQuiz
-
39Networking EssentialsVideo lesson
-
40OSI modelVideo lesson
-
41What is Wireshark and why should you learn it?Video lesson
-
42Install WiresharkVideo lesson
-
43WireShark Getting StartedVideo lesson
-
44Sets a filter for any packet that has x.x.x.x as IP addressVideo lesson
-
45Sets a conversation filter between two specific IP addressesVideo lesson
-
46Sets a filter to display all http and dns protocolsVideo lesson
-
47Sets filters for any TCP packet with a specific source or destination portVideo lesson
-
48Displays all TCP packets that contain a certain termVideo lesson
-
49Filters all HTTP GET and POST requestsVideo lesson
-
50Filter out certain types of protocolsVideo lesson
-
51Can Wireshark capture passwords?Text lesson
-
52Plain text network protocolsText lesson
-
53Capture Insecure Connections (Net Cat)Video lesson
-
54Capture FTP PasswordsVideo lesson
-
55Extract files from FTP using WiresharkVideo lesson
-
56Capture HTTP PasswordsVideo lesson
-
57Capture files (images) from HTTP trafficVideo lesson
-
58Port Scanners EssentialsVideo lesson
-
59What is NmapVideo lesson
-
60Preparing the EnvironmentVideo lesson
-
61Scanning Techniques of NmapVideo lesson
-
62Basic Nmap Scan against IP or hostVideo lesson
-
63Nmap Ping ScanVideo lesson
-
64Scan specific ports or scan entire port rangesVideo lesson
-
65Scan multiple IP addressesVideo lesson
-
66Scan the most popular portsVideo lesson
-
67Scan hosts and IP addresses reading from a text fileVideo lesson
-
68Save your Nmap scan results to a fileVideo lesson
-
69Disabling DNS name resolutionVideo lesson
-
70Scan + OS and service detection with fast executionVideo lesson
-
71Detect service/daemon versionsVideo lesson
-
72Scan using TCP or UDP protocolsVideo lesson
-
73CVE detection using NmapVideo lesson
-
74Launching DOS with NmapVideo lesson
-
75Launching brute force attacksVideo lesson
-
76Detecting malware infections on remote hostsVideo lesson
-
77Nmap Firewall and IDS Evasion TechniquesVideo lesson
External Links May Contain Affiliate Links read more