toggle menu

Ethical Hacking

Buy Course Now
Study Mode: Online / Offline
Enrolled: 715 students
Course view: 1824
Duration: Self-Paced Learning
Lectures: 219
Course Materials: Downloadable Videos
Video: 27 Hours 20 Minutes
Course type: All Levels
Certificate of Completion: FREE
Ethical Hacking

Course Overview

The “Ethical Hacking” course is a comprehensive and practical program designed to teach individuals the principles and techniques of ethical hacking and penetration testing. Covering a wide range of topics, the course equips learners with the knowledge and skills required to identify vulnerabilities in computer systems and networks, assess security risks, and implement countermeasures to protect against cyber threats.

 

Who Needs This Course

This course is valuable for:

Aspiring Ethical Hackers: Individuals looking to start a career in ethical hacking and cybersecurity.

IT Professionals: IT administrators, network engineers, and system administrators seeking to enhance their security skills.

Security Enthusiasts: Hobbyists and enthusiasts interested in understanding how cybersecurity professionals protect computer systems.

Developers: Developers who want to learn about common security vulnerabilities and how to secure their applications.

Security Analysts: Security analysts aiming to gain practical experience in penetration testing.

Cybersecurity Students: Students pursuing cybersecurity degrees or certifications.

 

Benefits for Learners

Enrolling in the “Ethical Hacking” course provides learners with several important benefits:

Practical Ethical Hacking Skills: Gain hands-on experience in ethical hacking techniques and methodologies.

Understanding Security Concepts: Learn the fundamental concepts of cybersecurity, network security, and information security.

Setting Up a Hacking Lab: Learn how to create a secure virtual hacking lab environment for safe and controlled experimentation.

Information Gathering: Understand how to gather information about potential targets, including IP addresses and email addresses.

Scanning and Enumeration: Learn how to scan for open ports, vulnerabilities, and enumerate system information.

Vulnerability Analysis: Discover vulnerabilities using tools like Nmap and Nessus and understand how to assess their impact.

Exploitation and Access: Gain practical experience in exploiting vulnerabilities, gaining unauthorized access, and maintaining persistence.

Python Coding Projects: Develop your programming skills by working on Python coding projects related to ethical hacking.

Website Application Penetration Testing: Learn how to test web applications for common vulnerabilities like SQL injection and cross-site scripting (XSS).

Wireless Hacking: Explore wireless network security, including cracking WEP and WPA/WPA2 keys.

Post Exploitation and Privilege Escalation: Understand post-exploitation techniques, privilege escalation, and maintaining access.

Anonymity and Privacy: Learn about tools and techniques for maintaining anonymity and privacy online.

Error Handling, File I/O, and Python Basics: Brush up on Python programming basics, error handling, and file input/output.

 

By the end of this course, learners will have the knowledge and skills to conduct ethical hacking and penetration testing activities ethically and responsibly. This course equips individuals with the expertise required to pursue a career in cybersecurity or enhance their existing IT and security roles.

SECTION 1: INTRODUCTION

1
Introduction To Ethical Hacking
6 Min 37 Sec
2
Join Our Online Classroom!
4 Min 1 Sec
3
What Is Ethical Hacking
8 Min 9 Sec

SECTION 2: SETTING UP OUR HACKING LAB

1
What Is A Virtual Machine
6 Min 3 Sec
2
Why Linux
3 Min 13 Sec
3
Downloading Virtual Box & Kali Linux
4 Min 31 Sec
4
Important - New Kali Linux Categories
1 Min 26 Sec
5
Creating Our First Virtual Machine
8 Min 46 Sec
6
Installing Kali Linux Operating System
11 Min 57 Sec
7
New & Old Versions Of Kali Linux
2 Min 6 Sec
8
Full Screen Mode & Network Settings
12 Min 6 Sec
9
5 Stages Of A Penetration Test
7 Min 35 Sec

SECTION 3: LINUX OPERATING SYSTEM

1
Navigating Through Linux System
11 Min 26 Sec
2
Creating Files & Managing Directories
12 Min 40 Sec
3
Network Commands & Sudo Privileges In Kali
11 Min 22 Sec

SECTION 4: RECONNAISSANCE & INFORMATION GATHERING

1
What Is Information Gathering
4 Min 40 Sec
2
Obtaining IP Address, Physical Address Using Whois Tool
9 Min 58 Sec
3
Whatweb Stealthy Scan
8 Min 21 Sec
4
Aggressive Website Technology Discovering On IP Range
9 Min 51 Sec
5
Gathering Emails Using The Harvester & Hunter.io
9 Min 59 Sec
6
How To Download Tools Online
10 Min 35 Sec
7
Finding Usernames With Sherlock
7 Min 50 Sec
8
Bonus - Email Scraper Tool In Python 3
6 Min 35 Sec

SECTION 5: SCANNING

1
Theory Behind Scanning
7 Min 19 Sec
2
TCP & UDP
4 Min 21 Sec
3
Installing Vulnerable Virtual Machine
6 Min 1 Sec
4
Netdiscover
6 Min 2 Sec
5
Performing First Nmap Scan
8 Min 52 Sec
6
Different Nmap Scan Types
10 Min 41 Sec
7
Discovering Target Operating System
6 Min 1 Sec
8
Detecting Version Of Service Running On An Open Port
7 Min 13 Sec
9
Filtering Port Range & Output Of Scan Results
11 Min 54 Sec
10
What Is A Firewall IDS
2 Min 29 Sec
11
Using Decoys And Packet Fragmentation
12 Min 25 Sec
12
Security Evasion Nmap Options
5 Min 28 Sec

SECTION 6: PYTHON CODING PROJECT #1 - PORTSCANNER

1
Coding A Port-scanner In Python 3
25 Min 3 Sec

SECTION 7: VULNERABILITY ANALYSIS

1
Finding First Vulnerability With Nmap Scripts
16 Min 58 Sec
2
Manual Vulnerability Analysis & Searchsploit
7 Min 42 Sec
3
Nessus Installation
5 Min 35 Sec
4
Discovering Vulnerabilities With Nessus
14 Min 56 Sec
5
Scanning Windows 7 Machine With Nessus
4 Min 14 Sec
6
Let's Cool Down For A Bit!
1 Min 15 Sec

SECTION 8: EXPLOITATION & GAINING ACCESS

1
What Is Exploitation
7 Min 8 Sec
2
What Is A Vulnerability
5 Min 24 Sec
3
Reverse Shells, Bind Shells
2 Min 42 Sec
4
Metasploit Framework Structure
13 Min 53 Sec
5
Msfconsole Basic Commands
16 Min 53 Sec
6
Our First Exploit - Vsftp 2.3.4 Exploitation
9 Min 13 Sec
7
Misconfigurations Happen - Bindshell Exploitation
4 Min 41 Sec
8
Information Disclosure - Telnet Exploit
4 Min 6 Sec
9
Software Vulnerability - Samba Exploitation
9 Min 23 Sec
10
Attacking SSH - Bruteforce Attack
11 Min 56 Sec
11
Exploitation Challenge - 5 Different Exploits
17 Min 52 Sec
12
Explaining Windows 7 Setup
8 Min 46 Sec
13
Eternal Blue Attack - Windows 7 Exploitation
12 Min 33 Sec
14
Double Pulsar Attack - Windows Exploit
15 Min 4 Sec
15
Blue Keep Vulnerability - Windows Exploit
9 Min 35 Sec
16
Update 2 – Routersploit
6 Min 25 Sec
17
Update 3 - Router Default Credentials
7 Min 2 Sec
18
Exercise Imposter Syndrome
2 Min 56 Sec

SECTION 9: SMBGHOST CVE 2020-0796 - WINDOWS 10 MANUAL EXPLOITATION

1
Setting Up Vulnerable Windows 10
7 Min 52 Sec
2
Crashing Windows 10 Machine Remotely
6 Min 53 Sec
3
Exploiting Windows 10 Machine Remotely
14 Min

SECTION 10: GAINING ACCESS (VIRUSES, TROJANS, PAYLOADS)

1
Generating Basic Payload With Msfvenom
11 Min 31 Sec
2
Advance Msfvenom Usage Part 1
9 Min 48 Sec
3
Advance Msfvenom Usage Part 2
7 Min 30 Sec
4
Generating Powershell Payload Using Veil
14 Min 37 Sec
5
The Fat Rat Payload Creation
7 Min 44 Sec
6
Hexeditor & Antiviruses
7 Min 9 Sec
7
Making Our Payload Open An Image
8 Min 10 Sec

SECTION 11: POST EXPLOITATION - ELEVATING PRIVILEGES, EXTRACTING DATA, RUNNING KEYLOGGERS

1
Post Exploitation Theory
4 Min 26 Sec
2
Meterpreter Basic Commands Part 1
11 Min 3 Sec
3
Meterpreter Basic Commands Part 2
10 Min 21 Sec
4
Elevating Privileges With Different Modules
8 Min 55 Sec
5
Creating Persistence On The Target System
7 Min 57 Sec
6
Post Exploitation Modules
8 Min 6 Sec
7
Exploitation Recap
4 Min 1 Sec

SECTION 12: PYTHON CODING PROJECT #2 - BACKDOOR

1
What Are We Creating
2 Min 48 Sec
2
Connecting Server And Backdoor
10 Min 22 Sec
3
Processing Instructional Commands
6 Min 28 Sec
4
Sending And Receiving Data
6 Min 23 Sec
5
Executing Commands And Compiling The Program
12 Min 8 Sec
6
Changing Directory Inside Of Our Backdoor
6 Min 2 Sec
7
Uploading & Downloading Files
10 Min 59 Sec
8
Testing All The Commands
8 Min 56 Sec

SECTION 13: WEBSITE APPLICATION PENETRATION TESTING

1
Website Penetration Testing Theory
11 Min 37 Sec
2
HTTP Request & Response
4 Min 3 Sec
3
Information Gathering & Dirb Tool
8 Min 11 Sec
4
Burp-suite Configuration
7 Min 57 Sec
5
ShellShock Exploitation
15 Min 51 Sec
6
Command Injection Exploitation
11 Min 56 Sec
7
Getting Meterpreter Shell With Command Execution
9 Min 18 Sec
8
Reflected XSS & Cookie Stealing
16 Min 16 Sec
9
Stored XSS
9 Min 7 Sec
10
HTML Injection
7 Min 12 Sec
11
SQL Injection
21 Min 32 Sec
12
CSRF Vulnerability
12 Min 49 Sec
13
Hydra Bruteforce Attack Example 1
10 Min 57 Sec
14
Hydra Bruteforce Attack Example 2
7 Min 7 Sec
15
Burp-suite Intruder
7 Min 35 Sec

SECTION 14: PYTHON CODING PROJECT #3 - LOGIN BRUTEFORCE, DIRECTORY DISCOVERY

1
Creating 2 Programs
1 Min 47 Sec
2
Bruteforcer In Python
27 Min 9 Sec
3
Hidden Directory Discover
12 Min 10 Sec

SECTION 15: MAN IN THE MIDDLE - MITM

1
Theory - Man In The Middle Attack
8 Min 4 Sec
2
Bettercap ARP Spoofing
11 Min 30 Sec
3
Ettercap Password Sniffing
8 Min 59 Sec
4
Manually Poisoning Targets ARP Cache With Scapy
12 Min 22 Sec

SECTION 16: EXTRA WIRELESS ACCESS POINT CRACKING

1
Wireless Cracking Theory
5 Min 49 Sec
2
Putting Wireless Card In Monitor Mode
3 Min 43 Sec
3
Deauthenticating Devices & Grabbing Password
11 Min 25 Sec
4
Aircrack Password Cracking
7 Min 36 Sec
5
Hashcat Password Cracking
9 Min 42 Sec

SECTION 17: EXTRA GAINING ACCESS TO ANDROID DEVICE

1
Android Hacking Theory
3 Min 32 Sec
2
Android VM Install
5 Min 50 Sec
3
Gaining Access With Android Meterpreter
10 Min 16 Sec
4
Evil Droid
7 Min 52 Sec
5
Is It Flappy Bird Or Malware
12 Min 49 Sec
6
Hack Any Device On Any Network With Ngrok
11 Min 47 Sec

SECTION 18: EXTRA INTRODUCTION TO ANONYMITY

1
Anonymity Theory
4 Min 22 Sec
2
Tor Browser
8 Min 48 Sec
3
Proxychains With Nmap
7 Min 31 Sec
4
Installing VPN In Kali Linux
5 Min 50 Sec
5
Who Am I Anonymity Tool
8 Min 42 Sec

SECTION 19: WHERE TO GO FROM HERE

1
What Is Next
2 Min 34 Sec

SECTION 20: LEARN PYTHON BASICS

1
What Is A Programming Language
6 Min 24 Sec
2
Python Interpreter
7 Min 4 Sec
3
How To Run Python Code
4 Min 53 Sec
4
Our First Python Program
7 Min 44 Sec
5
Latest Version Of Python
1 Min 58 Sec
6
Python 2 vs Python 3
6 Min 41 Sec
7
Exercise How Does Python Work
2 Min 10 Sec

SECTION 21: LEARN PYTHON INTERMEDIATE

1
Learning Python
2 Min 5 Sec
2
Python Data Types
4 Min 46 Sec
3
Numbers
11 Min 9 Sec
4
Math Functions
4 Min 29 Sec
5
Developer Fundamentals I
4 Min 7 Sec
6
Operator Precedence
3 Min 10 Sec
7
Optional Bin() And Complex
4 Min 2 Sec
8
Variables
13 Min 13 Sec
9
Expressions Vs Statements
1 Min 37 Sec
10
Augmented Assignment Operator
2 Min 49 Sec
11
Strings
5 Min 30 Sec
12
String Concatenation
1 Min 16 Sec
13
Type Conversion
3 Min 3 Sec
14
Escape Sequences
4 Min 24 Sec
15
Formatted Strings
8 Min 24 Sec
16
String Indexes
8 Min 57 Sec
17
Immutability
3 Min 14 Sec
18
Built-In Functions + Methods
10 Min 4 Sec
19
Booleans
3 Min 22 Sec
20
Exercise Type Conversion
8 Min 23 Sec
21
Developer Fundamentals II
4 Min 42 Sec
22
Exercise Password Checker
7 Min 21 Sec
23
Lists
5 Min 1 Sec
24
List Slicing
7 Min 48 Sec
25
Matrix
4 Min 11 Sec
26
List Methods I
10 Min 28 Sec
27
List Methods II
4 Min 24 Sec
28
List Methods III
4 Min 52 Sec
29
Common List Patterns
5 Min 57 Sec
30
List Unpacking
2 Min 41 Sec
31
None
1 Min 51 Sec
32
Dictionaries
6 Min 21 Sec
33
Developer Fundamentals III
2 Min 40 Sec
34
Dictionary Keys
3 Min 37 Sec
35
Dictionary Methods I
4 Min 37 Sec
36
Dictionary Methods II
7 Min 4 Sec
37
Tuples I
4 Min 47 Sec
38
Tuples II
3 Min 15 Sec
39
Sets I
7 Min 24 Sec
40
Sets II
8 Min 45 Sec
41
Breaking The Flow
2 Min 35 Sec
42
Conditional Logic
13 Min 18 Sec
43
Indentation In Python
4 Min 39 Sec
44
Truthy Vs Falsey
5 Min 18 Sec
45
Ternary Operator
4 Min 14 Sec
46
Short Circuiting
4 Min 2 Sec
47
Logical Operators
6 Min 56 Sec
48
Exercise Logical Operators
7 Min 48 Sec
49
Is Vs ==
7 Min 36 Sec
50
For Loops
7 Min 1 Sec
51
Iterables
6 Min 44 Sec
52
Exercise Tricky Counter
3 Min 23 Sec
53
Range()
5 Min 39 Sec
54
Enumerate()
4 Min 37 Sec
55
While Loops I
6 Min 28 Sec
56
While Loops II
5 Min 50 Sec
57
Break, Continue, Pass
4 Min 16 Sec
58
Our First GUI
8 Min 49 Sec
59
Developer Fundamentals IV
6 Min 34 Sec
60
Exercise Find Duplicates
3 Min 55 Sec
61
Functions
7 Min 41 Sec
62
Parameters And Arguments
4 Min 25 Sec
63
Default Parameters And Keyword Arguments
5 Min 41 Sec
64
Return
13 Min 11 Sec
65
Methods Vs Functions
4 Min 33 Sec
66
Docstrings
3 Min 47 Sec
67
Clean Code
4 Min 38 Sec
68
Args And Kwargs
7 Min 57 Sec
69
Exercise Functions
4 Min 18 Sec
70
Scope
3 Min 38 Sec
71
Scope Rules
6 Min 55 Sec
72
Global Keyword
6 Min 13 Sec
73
Nonlocal Keyword
3 Min 21 Sec
74
Why Do We Need Scope
3 Min 39 Sec
75
Modules In Python
11 Min 48 Sec
76
Optional Py Charm
8 Min 19 Sec
77
Packages In Python
10 Min 45 Sec
78
Different Ways To Import
7 Min 4 Sec

SECTION 22: LEARN PYTHON 3 ERROR HANDLING

1
Errors In Python
6 Min 11 Sec
2
Error Handling I
8 Min 31 Sec
3
Error Handling II
6 Min 1 Sec
4
Exercises Error Handling
4 Min 58 Sec
5
Error Handling III
3 Min 6 Sec

SECTION 23: LEARN PYTHON 4 FILE IO

1
Working With Files In Python
8 Min 32 Sec
2
File Paths
6 Min 53 Sec
3
File IO Errors
2 Min 24 Sec
4
Read, Write, Append
7 Min 23 Sec
5
Exercise Translator
9 Min 56 Sec

Be the first to add a review.

Please, login to leave a review
Price:
₦10,000 ₦3,000
Layer 1
Login Categories