Ethical Hacking From Scratch

Discussion in 'Free Courses - Promo Codes & Deals' started by admin, Sep 20, 2020.

    
  1. admin

    admin Administrator Staff Member


    [​IMG]
    Learn Ethical Hacking From Scratch

    ★★★★★
    $99.99
    $14.00 in stock
    Enroll Now
    [​IMG] Udemy.com
    as of

    Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts.

    [​IMG]
    Created by: Zaid Sabih
    Ethical Hacker, Computer Scientist & CEO of zSecurity
    [​IMG]
    Created by: z Security
    Leading provider of ethical hacking and cyber security training,
    Rating: 4.55 (83754 reviews) 374831 students enrolled
    What Will I Learn?

    • 135+ ethical hacking & security videos.
    • Start from 0 up to a high-intermediate level.
    • Learn ethical hacking, its fields & the different types of hackers.
    • Install a hacking lab & needed software (on Windows, OS X and Linux).
    • Hack & secure both WiFi & wired networks.
    • Understand how websites work, how to discover & exploit web application vulnerabilities to hack websites.
    • Use 30+ hacking tools such as Metasploit, Aircrack-ng, SQLmap.....etc.
    • Discover vulnerabilities & exploit them to hack into servers.
    • Hack secure systems using client-side & social engineering.
    • Secure systems from all the attacks shown.
    • Install & use Kali Linux - a penetration testing operating system.
    • Learn linux basics.
    • Learn linux commands & how to interact with the terminal.
    • Learn Network Hacking / Penetration Testing.
    • Network basics & how devices interact inside a network.
    • Run attacks on networks without knowing its key.
    • Control Wi-Fi connections without knowing the password.
    • Create a fake Wi-Fi network with internet connection & spy on clients.
    • Gather detailed information about networks & connected clients like their OS, ports ...etc.
    • Crack WEP/WPA/WPA2 encryptions using a number of methods.
    • ARP Spoofing / ARP Poisoning.
    • Launch various Man In The Middle attacks.
    • Access any account accessed by any client on the network.
    • Sniff network traffic & analyse it to extract important info such as: passwords, cookies, urls, videos, images ..etc.
    • Intercept network traffic & modify it on the fly.
    • Discover devices connected to the same network.
    • Inject Javascript in pages loaded by clients connected to the same network.
    • Redirect DNS requests to any destination (DNS spoofing).
    • Secure networks from the discussed attacks.
    • Edit router settings for maximum security.
    • Discover suspicious activities in networks.
    • Encrypt traffic to prevent MITM attacks.
    • Discover open ports, installed services and vulnerabilities on computer systems.
    • Hack servers using server side attacks.
    • Exploit buffer over flows & code execution vulnerabilities to gain control over systems.
    • Hack systems using client side attacks.
    • Hack systems using fake updates.
    • Hack systems by backdooring downloads on the fly.
    • Create undetectable backdoors.
    • Backdoor normal programs.
    • Backdoor any file type such as pictures, pdf's ...etc.
    • Gather information about people, such as emails, social media accounts, emails and friends.
    • Hack secure systems using social engineering.
    • Send emails from ANY email account without knowing the password for that account.
    • Analyse malware.
    • Manually detect undetectable malware.
    • Read, write download, upload and execute files on compromised systems.
    • Capture keystrokes on a compromised system.
    • Use a compromised computer as a pivot to hack other systems.
    • Understand how websites & web applications work.
    • Understand how browsers communicate with websites.
    • Gather sensitive information about websites.
    • Discover servers, technologies & services used on target website.
    • Discover emails & sensitive data associated with a specific website.
    • Discover subdomains associated with a website.
    • Discover unpublished directories & files associated with a target website.
    • Discover websites hosted on the same server as the target website.
    • Exploit file upload vulnerabilities to gain control over target website.
    • Discover, exploit and fix code execution vulnerabilities.
    • Discover, exploit & fix local file inclusion vulnerabilities.
    • Discover, exploit & fix SQL injection vulnerabilities.
    • Bypass login forms and login as admin using SQL injections.
    • Exploit SQL injections to find databases, tables & sensitive data such as usernames, passwords...etc
    • Read / Write files to the server using SQL injections.
    • Learn the right way to write SQL queries to prevent SQL injections.
    • Discover reflected XSS vulnerabilities.
    • Discover Stored XSS vulnerabilities.
    • Hook victims to BeEF using XSS vulnerabilities.
    • Fix XSS vulnerabilities & protect yourself from them as a user.
    • Discover MITM & ARP Spoofing attacks.
    Requirements

    • Basic IT Skills
    • No Linux, programming or hacking knowledge required.
    • Computer with a minimum of 4GB ram/memory.
    • Operating System: Windows / OS X / Linux.
    • For WiFi cracking (10 lectures ONLY) - Wireless adapter that supports monitor mode (more info provided in the course).
    Target audience

    • Anybody interested in learning ethical hacking / penetration testing
    • Anybody interested in learning how hackers hack computer systems
    • Anybody interested in learning how to secure systems from hackers

    Continue reading...
     


Share This Page