Ethical Hacking
Course Overview
The “Ethical Hacking” course is a comprehensive and practical program designed to teach individuals the principles and techniques of ethical hacking and penetration testing. Covering a wide range of topics, the course equips learners with the knowledge and skills required to identify vulnerabilities in computer systems and networks, assess security risks, and implement countermeasures to protect against cyber threats.
Who Needs This Course
This course is valuable for:
Aspiring Ethical Hackers: Individuals looking to start a career in ethical hacking and cybersecurity.
IT Professionals: IT administrators, network engineers, and system administrators seeking to enhance their security skills.
Security Enthusiasts: Hobbyists and enthusiasts interested in understanding how cybersecurity professionals protect computer systems.
Developers: Developers who want to learn about common security vulnerabilities and how to secure their applications.
Security Analysts: Security analysts aiming to gain practical experience in penetration testing.
Cybersecurity Students: Students pursuing cybersecurity degrees or certifications.
Benefits for Learners
Enrolling in the “Ethical Hacking” course provides learners with several important benefits:
Practical Ethical Hacking Skills: Gain hands-on experience in ethical hacking techniques and methodologies.
Understanding Security Concepts: Learn the fundamental concepts of cybersecurity, network security, and information security.
Setting Up a Hacking Lab: Learn how to create a secure virtual hacking lab environment for safe and controlled experimentation.
Information Gathering: Understand how to gather information about potential targets, including IP addresses and email addresses.
Scanning and Enumeration: Learn how to scan for open ports, vulnerabilities, and enumerate system information.
Vulnerability Analysis: Discover vulnerabilities using tools like Nmap and Nessus and understand how to assess their impact.
Exploitation and Access: Gain practical experience in exploiting vulnerabilities, gaining unauthorized access, and maintaining persistence.
Python Coding Projects: Develop your programming skills by working on Python coding projects related to ethical hacking.
Website Application Penetration Testing: Learn how to test web applications for common vulnerabilities like SQL injection and cross-site scripting (XSS).
Wireless Hacking: Explore wireless network security, including cracking WEP and WPA/WPA2 keys.
Post Exploitation and Privilege Escalation: Understand post-exploitation techniques, privilege escalation, and maintaining access.
Anonymity and Privacy: Learn about tools and techniques for maintaining anonymity and privacy online.
Error Handling, File I/O, and Python Basics: Brush up on Python programming basics, error handling, and file input/output.
By the end of this course, learners will have the knowledge and skills to conduct ethical hacking and penetration testing activities ethically and responsibly. This course equips individuals with the expertise required to pursue a career in cybersecurity or enhance their existing IT and security roles.
SECTION 1: INTRODUCTION
SECTION 2: SETTING UP OUR HACKING LAB
-
4What Is A Virtual Machine
-
5Why Linux
-
6Downloading Virtual Box & Kali Linux
-
7Important - New Kali Linux Categories
-
8Creating Our First Virtual Machine
-
9Installing Kali Linux Operating System
-
10New & Old Versions Of Kali Linux
-
11Full Screen Mode & Network Settings
-
125 Stages Of A Penetration Test
SECTION 3: LINUX OPERATING SYSTEM
SECTION 4: RECONNAISSANCE & INFORMATION GATHERING
-
16What Is Information Gathering
-
17Obtaining IP Address, Physical Address Using Whois Tool
-
18Whatweb Stealthy Scan
-
19Aggressive Website Technology Discovering On IP Range
-
20Gathering Emails Using The Harvester & Hunter.io
-
21How To Download Tools Online
-
22Finding Usernames With Sherlock
-
23Bonus - Email Scraper Tool In Python 3
SECTION 5: SCANNING
-
24Theory Behind Scanning
-
25TCP & UDP
-
26Installing Vulnerable Virtual Machine
-
27Netdiscover
-
28Performing First Nmap Scan
-
29Different Nmap Scan Types
-
30Discovering Target Operating System
-
31Detecting Version Of Service Running On An Open Port
-
32Filtering Port Range & Output Of Scan Results
-
33What Is A Firewall IDS
-
34Using Decoys And Packet Fragmentation
-
35Security Evasion Nmap Options
SECTION 6: PYTHON CODING PROJECT #1 - PORTSCANNER
SECTION 7: VULNERABILITY ANALYSIS
SECTION 8: EXPLOITATION & GAINING ACCESS
-
43What Is Exploitation
-
44What Is A Vulnerability
-
45Reverse Shells, Bind Shells
-
46Metasploit Framework Structure
-
47Msfconsole Basic Commands
-
48Our First Exploit - Vsftp 2.3.4 Exploitation
-
49Misconfigurations Happen - Bindshell Exploitation
-
50Information Disclosure - Telnet Exploit
-
51Software Vulnerability - Samba Exploitation
-
52Attacking SSH - Bruteforce Attack
-
53Exploitation Challenge - 5 Different Exploits
-
54Explaining Windows 7 Setup
-
55Eternal Blue Attack - Windows 7 Exploitation
-
56Double Pulsar Attack - Windows Exploit
-
57Blue Keep Vulnerability - Windows Exploit
-
58Update 2 – Routersploit
-
59Update 3 - Router Default Credentials
-
60Exercise Imposter Syndrome
SECTION 9: SMBGHOST CVE 2020-0796 - WINDOWS 10 MANUAL EXPLOITATION
SECTION 10: GAINING ACCESS (VIRUSES, TROJANS, PAYLOADS)
SECTION 11: POST EXPLOITATION - ELEVATING PRIVILEGES, EXTRACTING DATA, RUNNING KEYLOGGERS
SECTION 12: PYTHON CODING PROJECT #2 - BACKDOOR
SECTION 13: WEBSITE APPLICATION PENETRATION TESTING
-
86Website Penetration Testing Theory
-
87HTTP Request & Response
-
88Information Gathering & Dirb Tool
-
89Burp-suite Configuration
-
90ShellShock Exploitation
-
91Command Injection Exploitation
-
92Getting Meterpreter Shell With Command Execution
-
93Reflected XSS & Cookie Stealing
-
94Stored XSS
-
95HTML Injection
-
96SQL Injection
-
97CSRF Vulnerability
-
98Hydra Bruteforce Attack Example 1
-
99Hydra Bruteforce Attack Example 2
-
100Burp-suite Intruder
SECTION 14: PYTHON CODING PROJECT #3 - LOGIN BRUTEFORCE, DIRECTORY DISCOVERY
SECTION 15: MAN IN THE MIDDLE - MITM
SECTION 16: EXTRA WIRELESS ACCESS POINT CRACKING
SECTION 17: EXTRA GAINING ACCESS TO ANDROID DEVICE
SECTION 18: EXTRA INTRODUCTION TO ANONYMITY
SECTION 19: WHERE TO GO FROM HERE
SECTION 20: LEARN PYTHON BASICS
SECTION 21: LEARN PYTHON INTERMEDIATE
-
132Learning Python
-
133Python Data Types
-
134Numbers
-
135Math Functions
-
136Developer Fundamentals I
-
137Operator Precedence
-
138Optional Bin() And Complex
-
139Variables
-
140Expressions Vs Statements
-
141Augmented Assignment Operator
-
142Strings
-
143String Concatenation
-
144Type Conversion
-
145Escape Sequences
-
146Formatted Strings
-
147String Indexes
-
148Immutability
-
149Built-In Functions + Methods
-
150Booleans
-
151Exercise Type Conversion
-
152Developer Fundamentals II
-
153Exercise Password Checker
-
154Lists
-
155List Slicing
-
156Matrix
-
157List Methods I
-
158List Methods II
-
159List Methods III
-
160Common List Patterns
-
161List Unpacking
-
162None
-
163Dictionaries
-
164Developer Fundamentals III
-
165Dictionary Keys
-
166Dictionary Methods I
-
167Dictionary Methods II
-
168Tuples I
-
169Tuples II
-
170Sets I
-
171Sets II
-
172Breaking The Flow
-
173Conditional Logic
-
174Indentation In Python
-
175Truthy Vs Falsey
-
176Ternary Operator
-
177Short Circuiting
-
178Logical Operators
-
179Exercise Logical Operators
-
180Is Vs ==
-
181For Loops
-
182Iterables
-
183Exercise Tricky Counter
-
184Range()
-
185Enumerate()
-
186While Loops I
-
187While Loops II
-
188Break, Continue, Pass
-
189Our First GUI
-
190Developer Fundamentals IV
-
191Exercise Find Duplicates
-
192Functions
-
193Parameters And Arguments
-
194Default Parameters And Keyword Arguments
-
195Return
-
196Methods Vs Functions
-
197Docstrings
-
198Clean Code
-
199Args And Kwargs
-
200Exercise Functions
-
201Scope
-
202Scope Rules
-
203Global Keyword
-
204Nonlocal Keyword
-
205Why Do We Need Scope
-
206Modules In Python
-
207Optional Py Charm
-
208Packages In Python
-
209Different Ways To Import