Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Complete Ethical Hacking Course 2023 | Zero To Professional

Posted By: ELK1nG
Complete Ethical Hacking Course 2023 | Zero To Professional

Complete Ethical Hacking Course 2023 | Zero To Professional
Published 8/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 18.60 GB | Duration: 32h 50m

Learn 20+ Ethical Hacking Modules ! 130+ Labs and Realtime scenarios with lab activities | Enterprise pentesting tools

What you'll learn

20+ Ethical hacking modules with practical explanation and hands-on labs

Complete kali linux commands, architecture, file-system, and Servers

kali Communication commands and filter commands

Web Application penetration testing with OWASP top 10

Understanding SQL injection with real-time explanation

Discover CSRF & SSRF attacks

Working with NMAP and latest firewall evasion techniques and tactics

Using wireshark to sniff the traffic and gather plain text passwords, and understand MITM attacks

Real-time practical sessions with advanced tools and techniques

Working with Session hijacking to understand session exploitation techniques and process

Understand DOS and DDOS attacks using wireshark and HPING3

working with System hacking to understand how systems are exploited and countermeasures

understand nessus and web application scanning using nessus

Shell scripting with pentest automation scripts and loops, operators, and shell code

Vulnerability assessment using automation tools and manual tools as well

Understanding Android hacking with root and backdoor to gain unauthorized access

database hacking and gain unauthorized access

Complete ethical hacking bootcamp and ethical hacking course

Requirements

No prior experience needed, This course designed from scratch to mastery

Description

Hi Techies..! Welcome this Latest tactics, techniques of Complete Ethical Hacking course 2023 | This course Designed from scratch to professional with latest tools and techniques and ethical hacking concepts along with Web application, network, wireless, cloud, server, and system/endpoint based pentesting. in this course you'll learn 20+ ethical hacking modules with NO prior Experience & knowledge and end of this course you'll become a Security Expert & Pentesting Professional This course is both theory and practical sessions. first, we explain Kali Linux's complete setup, architecture, File-systems, and effective usage of commands and servers in Linux machines, then we'll dive you to an ethical hacking theory party along with practical hands-on sessions and each session Tools are attached, you can learn how to install tool and practical while learning also.You'll learn web applications, network scanning & exploitations, wireless, servers, system hacking & endpoint exploitation and cloud pentesting also. We understand student view thats why we divided this course into two sections (Theory and practical). End of the course you will learn latest ethical hacking tactics, techniques and tools used for hacking and penetration testing in various levels. Topics covered in this course: 1. Lab Setup (Kali linux & windows VMware installation and configuration) 2. Complete kali Linux course (commands, architecture, file-system, services, and servers) 3. Practical Shell scripting & Pentesting automation scripts (you'll learn how to create automation scripts using shell scripting) 4. Understand Ethical hacking overview & Footprinting 5. Understanding network security and network scanning techniques (using NMAP, angryip-scanner, Ping, HPING3 other 10+ tools) 6. Understanding enumeration process and create active connections 7. System hacking (Windows, Unix using latest tools and techniques) 8. Understanding Sniffing and MITM attacks (Wireshark) 9. Understanding Social Engineering and Phising, Smishing, and Spear-phishing attacks 10. Understanding Vulnerability analysis using automation and manual 11. Denial of service and distributed denial of service attacks and mitigation process12. Session hijacking in web applications and mitigation steps and counter attacks 13. understanding Web application pentesting and OWASP top 1014. Learn Practical SQL Injection (error, boolean, time based, union, and blind Injections) 15. Understanding server exploitations and mitigation steps 16. Understanding Wireless attacks and latest tools with countermeasures 17. Understanding Andriod and IOS exploitation and working with backdoors to gain unauthorized access 18. Understanding Cloud attacks and deployments 19, Cryptography techniques Who this course is for:1. Ethical hacking professionals 2. Student who wants to learn cyber security3. Cyber security interested students4. Security experts and professionals

Overview

Section 1: Ethical Hacking Lab Setup

Lecture 1 Kali linux Virtual Machine setup

Lecture 2 Windows virtual machine setup

Lecture 3 Important tools in Ethical Hacking

Section 2: Complete Kali Linux Command-Line & Shell Scripting

Lecture 4 Directories in Kali Linux

Lecture 5 Services in Kali Linux

Lecture 6 Servers in kali Linux

Lecture 7 Users management

Lecture 8 Metasploit Framework

Lecture 9 Important Tools in Cyber Security

Lecture 10 Cat Command

Lecture 11 Cal Command (calendar)

Lecture 12 CD Command

Lecture 13 cmp diff Command

Lecture 14 cp command (copy files)

Lecture 15 Date command

Lecture 16 Egrep Command

Lecture 17 File Permissions

Lecture 18 Find command

Lecture 19 Find files by names command

Lecture 20 Find files by type and perm

Lecture 21 grep command

Lecture 22 ls command (List)

Lecture 23 Mkdir command (make the directory)

Lecture 24 Modes command

Lecture 25 Paste command

Lecture 26 pwd command (present working directory)

Lecture 27 rm command (to remove the files)

Lecture 28 Sort command

Lecture 29 touch command

Lecture 30 tr command (translate)

Lecture 31 Uname command

Lecture 32 uniq command

Lecture 33 Users_last command

Lecture 34 w command (who)

Lecture 35 wc command (word count)

Lecture 36 whereis command

Lecture 37 whoami command

Lecture 38 who command

Lecture 39 who-is-logged command

Lecture 40 Vi editor

Lecture 41 Filter commands

Lecture 42 Communication commands

Lecture 43 Shell Scripting introduction

Lecture 44 Shell Scripting Command line Arguments

Lecture 45 Shell Scripting operators

Lecture 46 Shell scripting functions

Lecture 47 Shell Scripting Control Statements

Lecture 48 Shell Scripting Loops

Lecture 49 Pentest automate - Project 1

Lecture 50 Pentest automate - Project 2

Lecture 51 Pentest automate - Project 3

Section 3: Introduction to Ethical Hacking & Threat vectors

Lecture 52 Information Security Overview

Lecture 53 Information Security Threats and Attack Vectors

Lecture 54 Hacking Concepts

Lecture 55 Ethical Hacking Concepts

Lecture 56 Penetration Testing Concepts

Section 4: Understanding Footprinting and Information gathering

Lecture 57 Footprinting Concepts

Lecture 58 Footprinting through Search Engines

Lecture 59 Footprinting through Social Networking Sites

Lecture 60 Email Footprinting

Lecture 61 Competitive Intelligence

Lecture 62 Who is Footprinting

Lecture 63 DNS Footprinting

Lecture 64 Network Footprinting

Lecture 65 Footprinting through Social Engineering

Lecture 66 Footprinting Tools

Lecture 67 Footprinting Countermeasures

Lecture 68 Footprinting Penetration Testing

Lecture 69 lab1 - Open Source Information Gathering Using Windows Command Line Utilities

Lecture 70 lab 2 - Collecting Information About a Target Website Using Firebug

Lecture 71 lab 3 - Mirroring Website Using HTTrack Web Site Copier

Lecture 72 lab 4 - Advanced Network Route Tracing Using Path Analyzer Pro

Lecture 73 lab 5 - Information Gathering Using Metasploit

Section 5: Understanding Scanning Networks

Lecture 74 Network Scanning Concepts

Lecture 75 Scanning Techniques part 1

Lecture 76 Scanning Techniques part 2

Lecture 77 Scanning Beyond IDS and Firewall part 1

Lecture 78 Scanning Beyond IDS and Firewall

Lecture 79 Banner Grabbing

Lecture 80 Draw Network Diagrams

Lecture 81 Scanning Pen Testing

Lecture 82 lab 1 - UDP and TCP Packet Crafting Techniques using HPING3

Lecture 83 lab 2 - Scanning The Network Using The Colasoft Packet Builder

Lecture 84 lab 3 - Basic Network Troubleshooting Using MegaPing

Lecture 85 lab 4 - Understanding Network Scanning Using Nmap

Lecture 86 lab 5 - Exploring Various Network Scanning Techniques

Lecture 87 lab 6 - Scanning a Network Using NetScan Tools Pro

Lecture 88 lab 7 - Avoiding Scanning Detection using Multiple Decoy IP Addresses

Lecture 89 lab 8 - Drawing Network Diagrams Using Network Topology Mapper

Lecture 90 lab 9 - Checking for Live Systems Using Angry IP Scanner

Lecture 91 lab 10 - Scanning for Network Traffic Going Through a Computer’s Adapter Using I

Lecture 92 lab 11 - Identify Target System OS with TTL and TCP Window Sizes using Wireshark

Lecture 93 Scanning_network Practical Tools

Section 6: Working Enumeration & Exploit services at network level

Lecture 94 Enumeration Concepts

Lecture 95 NetBIOS Enumeration

Lecture 96 SNMP Enumeration

Lecture 97 LDAP Enumeration

Lecture 98 NTP Enumeration

Lecture 99 Other Enumeration Techniques

Lecture 100 Enumeration Countermeasures

Lecture 101 Enumeration Pen Testing

Lecture 102 lab 1 - NetBIOS Enumeration Using Global Network Inventory

Lecture 103 lab 2 - Enumerating Network Resources Using Advanced IP Scanner

Lecture 104 lab 3 - Performing Network Enumeration Using SuperScan

Lecture 105 lab 4 - Enumerating Resources in a Local Machine Using Hyena

Lecture 106 lab 5 - Performing Network Enumeration Using NetBIOS Enumerator

Lecture 107 lab 6 - Enumerating a Network Using SoftPerfect Network Scanner

Lecture 108 lab 7 - Enumerating a Target Network using Nmap and Net Use

Lecture 109 lab 8 - Enumerating Services on a Target Machine

Lecture 110 lab 9 - SNMP Enumeration Using snmp_enum

Lecture 111 lab 10 - LDAP Enumeration Using Active Directory Explorer (ADExplorer)

Lecture 112 lab 11 - Enumerating information from Windows and Samba host using Enum4linux

Lecture 113 Enumeration Practical Tools

Section 7: Understanding Network based Vulnerability Analysis

Lecture 114 Vulnerability Assessment Concepts

Lecture 115 Vulnerability Assessment Solutions

Lecture 116 Vulnerability Scoring Systems

Lecture 117 Vulnerability Assessment Tools

Lecture 118 Vulnerability Assessment Reports

Lecture 119 lab1 - Vulnerability Analysis Using Nessus

Lecture 120 lab2 - CGI Scanning with Nikto

Lecture 121 VA practical Tools

Section 8: Understanding System Hacking & Endpoint Exploitation

Lecture 122 System Hacking Concepts

Lecture 123 Cracking Passwords part 1

Lecture 124 Cracking Passwords part 2

Lecture 125 Cracking Passwords part 3

Lecture 126 Escalating Privileges

Lecture 127 Steganography

Lecture 128 Hiding Files part 2

Lecture 129 Hiding Files part 3

Lecture 130 Covering Tracks

Lecture 131 Penetration Testing

Lecture 132 lab1 - Dumping and Cracking SAM Hashes to Extract Plaintext Passwords

Lecture 133 lab2 - Creating and Using Rainbow Tables

Lecture 134 lab3 - Auditing System Passwords Using L0phtCrack

Lecture 135 lab5 - Escalating Privileges by Exploiting Client Side Vulnerabilities

Lecture 136 lab6 - Hacking Windows 10 using Metasploit, and Post-Exploitation Using Meterpre

Lecture 137 lab7 - User System Monitoring and Surveillance Using Spytech SpyAgent

Lecture 138 lab8 - Web Activity Monitoring and Recording using Power Spy

Lecture 139 lab9 - Hiding Files Using NTFS Streams

Lecture 140 lab10 - Hiding Data Using White Space Steganography

Lecture 141 lab11 - Image Steganography Using OpenStego

Lecture 142 lab12 - Image Steganography Using Quick Stego

Lecture 143 lab13 - Viewing, Enabling, and Clearing Audit Policies Using Auditpol

Lecture 144 lab14 - Hacking Windows Server 2012 with a Malicious Office Document Using TheFa

Lecture 145 lab15 - Active Online Attack using Responder

Lecture 146 Practical Tools - System hacking

Section 9: Working with Malware Threats and Gaining Access & Maintaining Access

Lecture 147 Malware Concepts

Lecture 148 Trojan Concepts part 1

Lecture 149 Trojan Concepts part 2

Lecture 150 Trojan Concepts part 3

Lecture 151 Virus and Worm Concepts part 1

Lecture 152 Virus and Worm Concepts part 2

Lecture 153 Virus and Worm Concepts part 3

Lecture 154 Malware Analysis part 1

Lecture 155 Malware Analysis part 2

Lecture 156 Malware Analysis part 3

Lecture 157 Countermeasures

Lecture 158 Anti-Malware Software

Lecture 159 Malware Penetration Testing

Lecture 160 lab1 - Creating an HTTP Trojan and Remotely Controlling a Target Machine Using H

Lecture 161 lab2 - Creating a Trojan Server Using the GUI Trojan MoSucker

Lecture 162 lab3 - Gaining Control over a Victim Machine Using njRAT

Lecture 163 lab4 - Obfuscating a Trojan Using SwayzCryptor and Making it Undetectable to Var

Lecture 164 lab5 - Creating a Server Using the ProRat Tool

Lecture 165 lab6 - Creating a Trojan Server Using Theef

Lecture 166 lab7 - Creating a Virus Using the JPS Virus Maker Tool

Lecture 167 lab8 - Creating a Worm Using Internet Worm Maker Thing

Lecture 168 lab9 - Virus Analysis using IDA

Lecture 169 lab10 - Virus Analysis Using OllyDbg

Lecture 170 lab11 - Detecting Trojans

Lecture 171 lab12 - Monitoring TCP/IP Connections Using the CurrPorts

Lecture 172 lab13 - Removing Malware using Clamwin

Lecture 173 lab14 - Performing Registry Entry Monitoring

Lecture 174 lab15 - Startup Program Monitoring Tool

Lecture 175 Practical Tools

Section 10: Understanding Sniffing and MITM attacks

Lecture 176 Sniffing Techniques part 1

Lecture 177 Sniffing Techniques part 2

Lecture 178 Sniffing Techniques part 3

Lecture 179 Sniffing tools

Lecture 180 Countermeasures

Lecture 181 Sniffing Detection Techniques

Lecture 182 Sniffing Pen Testing

Lecture 183 lab1 - Sniffing Passwords using Wireshark

Lecture 184 lab2 - Analyzing a Network Using Capsa Network Analyzer

Lecture 185 lab3 - Spoofing MAC Address Using SMAC

Lecture 186 lab4 - Performing Man-in-the-Middle Attack using Cain & Abel

Lecture 187 lab5 - Detecting ARP Poisoning in a Switch Based Network

Lecture 188 lab6 - Detecting ARP Attacks with XArp Tool|| lab duration

Lecture 189 Sniffing Practical Tools

Section 11: Understanding Social Engineering attacks and countermeasures

Lecture 190 Social Engineering Concepts

Lecture 191 Social Engineering Techniques

Lecture 192 Insider Threats

Lecture 193 Impersonation on Social Networking Sites

Lecture 194 Identity Theft

Lecture 195 Countermeasures

Lecture 196 Social Engineering Pen Testing

Lecture 197 lab1 - Sniffing Website Credentials Using Social Engineering Toolkit (SET)

Section 12: Denial-Of-Service & DDOS attacks

Lecture 198 DOS/DDoS Concepts

Lecture 199 DOS/DDOS Attack Techniques

Lecture 200 Botnets

Lecture 201 DDoS Case Study

Lecture 202 DoS/DDOS Attack Tools

Lecture 203 Countermeasures

Lecture 204 DoS/DDoS Protection Tools

Lecture 205 DoS/DDoS Penetration Testing

Lecture 206 lab1 - SYN Flooding a Target Host Using Metasploit

Lecture 207 lab2 - SYN Flooding a Target Host Using hping3

Lecture 208 lab3 - Performing Distributed Denial of Service Attack Using HOIC

Section 13: Working with Session Hijacking

Lecture 209 Session Hijacking Concepts

Lecture 210 Application Level Session Hijacking

Lecture 211 Network Level Session Hijacking

Lecture 212 Session Hijacking Tools

Lecture 213 Countermeasures

Lecture 214 Countermeasures - 2

Lecture 215 Penetration Testing

Lecture 216 lab1 - Session Hijacking Using the Zed Attack Proxy (ZAP)

Lecture 217 Session Hijacking Practical Tools

Section 14: Understanding Bypassing IDS, Firewalls, and Honeypots at perimeter level

Lecture 218 IDS, Firewall and Honeypot Concepts

Lecture 219 IDS, Firewall and Honeypot Solutions- 1

Lecture 220 IDS, Firewall and Honeypot Solutions - 2

Lecture 221 Evading IDS

Lecture 222 Evading Firewalls

Lecture 223 IDS/Firewall Evading Tools

Lecture 224 Detecting Honeypots

Lecture 225 IDS/Firewall Evasion Countermeasures

Lecture 226 Penetration Testing

Lecture 227 lab1 - Detecting Intrusions Using Snort

Lecture 228 lab2 - Detecting Malicious Network Traffic Using HoneyBOT

Lecture 229 lab3 - Bypassing Windows Firewall Using Nmap Evasion Techniques

Lecture 230 lab 4 - Bypassing Firewalls using HTTP/FTP Tunneling

Lecture 231 lab 5 - Bypassing Windows Firewall using Metasploit

Lecture 232 Practical Tools

Section 15: Hacking Web Servers and footprinting web servers

Lecture 233 Web Server Concepts

Lecture 234 Web Server Attacks

Lecture 235 Web Server Attack Methodology

Lecture 236 Web Server Attack Tools

Lecture 237 Countermeasures

Lecture 238 Patch Management

Lecture 239 Web Server Security Tools

Lecture 240 Web Server Pen Testing

Lecture 241 lab1 - Performing Web Server Reconnaissance using Skipfish

Lecture 242 lab 2 - Footprinting a Web Server Using the httprecon Tool

Lecture 243 lab3 - Footprinting a Web Server Using ID Serve

Lecture 244 lab4 - Cracking FTP Credentials Using Dictionary Attack

Lecture 245 lab5 - Uniscan Web Server Fingerprinting in Kali Linux

Lecture 246 Practical Web server Tools

Section 16: Hacking Web Applications & OWASP TOP 10 attacks

Lecture 247 Introduction of Web Application hacking

Lecture 248 Web Application Threats

Lecture 249 Web Application pentesting tools

Lecture 250 Countermeasures

Lecture 251 Web Application security tools

Lecture 252 lab1 - Exploiting Parameter Tampering and XSS Vulnerabilities in Web Application

Lecture 253 lab2 - Enumerating and Hacking a Web Application Using WPScan and Metasploit

Lecture 254 lab3 - Exploiting Remote Command Execution Vulnerability to Compromise a Target

Lecture 255 lab4 - Auditing Web Application Framework Using Vega

Lecture 256 lab5 - Website Vulnerability Scanning Using Acunetix WVS

Lecture 257 lab6 - Exploiting File Upload Vulnerability at Different Security Levels

Lecture 258 lab7 - Performing Cross-Site Request Forgery (CSRF) Attack

Section 17: Understanding SQL Injection attacks

Lecture 259 SQL Injection Concepts

Lecture 260 Types of SQL Injection

Lecture 261 SQL Injection Methodology part 1

Lecture 262 SQL Injection Methodology part 2

Lecture 263 SQL Injection Tools

Lecture 264 Evasion Techniques

Lecture 265 Countermeasures

Lecture 266 lab1 - SQL Injection Attacks on an MS SQL Database

Lecture 267 lab2 - Scanning Web Applications Using N-Stalker Tool

Lecture 268 lab3 - Performing SQL Injection attack against MSSQL to extract Databases and We

Lecture 269 Practical Tools - SQL Injection

Section 18: Working with Hacking Wireless Networks

Lecture 270 Wireless Concepts

Lecture 271 Wireless Encryption

Lecture 272 Wireless Threats

Lecture 273 Wireless Hacking Methodology part 1

Lecture 274 Wireless Hacking Methodology part 2

Lecture 275 Wireless Hacking Tools

Lecture 276 Countermeasures

Lecture 277 Wireless Security Tools

Lecture 278 Wireless Pen Testing

Lecture 279 lab1 - WiFi Packet Analysis using Wireshark

Lecture 280 lab2 - Cracking a WEP with Aircrack-ng

Lecture 281 lab3 - Cracking a WPA (Wi-Fi Protected Access) with Aircrack-ng

Lecture 282 Practical Tools - Wireless

Section 19: Working with Hacking Mobile platforms (Android & IOS)

Lecture 283 Mobile Platform Attack Vectors

Lecture 284 Hacking Android OS part 1

Lecture 285 Hacking Android OS part 2

Lecture 286 Hacking iOS

Lecture 287 Mobile Spyware

Lecture 288 Mobile Device Management

Lecture 289 Mobile Security Guidelines and Tools

Lecture 290 Mobile Pen Testing

Lecture 291 lab 1 - Creating Binary Payloads using Kali Linux to Hack Android

Lecture 292 lab 2- Harvesting the user's credentials using the Social Engineering

Lecture 293 Practical Tools - Android

Section 20: Understanding Cloud Computing overview and attacks

Lecture 294 Cloud Computing Concepts

Lecture 295 Cloud Computing Threats

Lecture 296 Cloud Computing Attacks

Lecture 297 Cloud Security

Lecture 298 Cloud Security Tools

Lecture 299 Cloud Penetration Testing

Lecture 300 lab1 - Creating User Accounts and Assigning User Rights in ownCloud

Lecture 301 lab2 - Securing ownCloud from Malicious File uploads using ClamAV

Lecture 302 lab3 - Bypassing ownCloud Antivirus and Hacking the Host using Kali Linux

Lecture 303 lab4 - Implementing DoS Attack on Linux Cloud Server Using Slowloris Script

Section 21: Working with advanced Cryptography techniques and tactics

Lecture 304 Cryptography Concepts

Lecture 305 Encryption Algorithms

Lecture 306 Cryptography Tools

Lecture 307 Public Key Infrastructure (PKI)

Lecture 308 Email Encryption

Lecture 309 Disk Encryption

Lecture 310 Cryptanalysis

Lecture 311 Countermeasures

Lecture 312 lab1 - Calculating One-Way Hashes Using HashCalc

Lecture 313 lab2 - Calculating MD5 Hashes Using MD5 Calculator

Lecture 314 lab3 - Understanding File and Text Encryption Using CryptoForge

Lecture 315 lab4 - Encrypting and Decrypting the Data Using BCTextEncoder

Lecture 316 lab5 - Creating and Using Self-Signed Certificate

Lecture 317 lab6 - Basic Disk Encryption Using VeraCrypt

Lecture 318 lab7 - Basic Data Encryption Using CrypTool

VAPT professionals,Cyber security experts,Students who are interested in cyber security domain,Ethical hacker