Complete Ethical Hacking Course 2023 | Zero To Professional
Published 8/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 18.60 GB | Duration: 32h 50m
Published 8/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 18.60 GB | Duration: 32h 50m
Learn 20+ Ethical Hacking Modules ! 130+ Labs and Realtime scenarios with lab activities | Enterprise pentesting tools
What you'll learn
20+ Ethical hacking modules with practical explanation and hands-on labs
Complete kali linux commands, architecture, file-system, and Servers
kali Communication commands and filter commands
Web Application penetration testing with OWASP top 10
Understanding SQL injection with real-time explanation
Discover CSRF & SSRF attacks
Working with NMAP and latest firewall evasion techniques and tactics
Using wireshark to sniff the traffic and gather plain text passwords, and understand MITM attacks
Real-time practical sessions with advanced tools and techniques
Working with Session hijacking to understand session exploitation techniques and process
Understand DOS and DDOS attacks using wireshark and HPING3
working with System hacking to understand how systems are exploited and countermeasures
understand nessus and web application scanning using nessus
Shell scripting with pentest automation scripts and loops, operators, and shell code
Vulnerability assessment using automation tools and manual tools as well
Understanding Android hacking with root and backdoor to gain unauthorized access
database hacking and gain unauthorized access
Complete ethical hacking bootcamp and ethical hacking course
Requirements
No prior experience needed, This course designed from scratch to mastery
Description
Hi Techies..! Welcome this Latest tactics, techniques of Complete Ethical Hacking course 2023 | This course Designed from scratch to professional with latest tools and techniques and ethical hacking concepts along with Web application, network, wireless, cloud, server, and system/endpoint based pentesting. in this course you'll learn 20+ ethical hacking modules with NO prior Experience & knowledge and end of this course you'll become a Security Expert & Pentesting Professional This course is both theory and practical sessions. first, we explain Kali Linux's complete setup, architecture, File-systems, and effective usage of commands and servers in Linux machines, then we'll dive you to an ethical hacking theory party along with practical hands-on sessions and each session Tools are attached, you can learn how to install tool and practical while learning also.You'll learn web applications, network scanning & exploitations, wireless, servers, system hacking & endpoint exploitation and cloud pentesting also. We understand student view thats why we divided this course into two sections (Theory and practical). End of the course you will learn latest ethical hacking tactics, techniques and tools used for hacking and penetration testing in various levels. Topics covered in this course: 1. Lab Setup (Kali linux & windows VMware installation and configuration) 2. Complete kali Linux course (commands, architecture, file-system, services, and servers) 3. Practical Shell scripting & Pentesting automation scripts (you'll learn how to create automation scripts using shell scripting) 4. Understand Ethical hacking overview & Footprinting 5. Understanding network security and network scanning techniques (using NMAP, angryip-scanner, Ping, HPING3 other 10+ tools) 6. Understanding enumeration process and create active connections 7. System hacking (Windows, Unix using latest tools and techniques) 8. Understanding Sniffing and MITM attacks (Wireshark) 9. Understanding Social Engineering and Phising, Smishing, and Spear-phishing attacks 10. Understanding Vulnerability analysis using automation and manual 11. Denial of service and distributed denial of service attacks and mitigation process12. Session hijacking in web applications and mitigation steps and counter attacks 13. understanding Web application pentesting and OWASP top 1014. Learn Practical SQL Injection (error, boolean, time based, union, and blind Injections) 15. Understanding server exploitations and mitigation steps 16. Understanding Wireless attacks and latest tools with countermeasures 17. Understanding Andriod and IOS exploitation and working with backdoors to gain unauthorized access 18. Understanding Cloud attacks and deployments 19, Cryptography techniques Who this course is for:1. Ethical hacking professionals 2. Student who wants to learn cyber security3. Cyber security interested students4. Security experts and professionals
Overview
Section 1: Ethical Hacking Lab Setup
Lecture 1 Kali linux Virtual Machine setup
Lecture 2 Windows virtual machine setup
Lecture 3 Important tools in Ethical Hacking
Section 2: Complete Kali Linux Command-Line & Shell Scripting
Lecture 4 Directories in Kali Linux
Lecture 5 Services in Kali Linux
Lecture 6 Servers in kali Linux
Lecture 7 Users management
Lecture 8 Metasploit Framework
Lecture 9 Important Tools in Cyber Security
Lecture 10 Cat Command
Lecture 11 Cal Command (calendar)
Lecture 12 CD Command
Lecture 13 cmp diff Command
Lecture 14 cp command (copy files)
Lecture 15 Date command
Lecture 16 Egrep Command
Lecture 17 File Permissions
Lecture 18 Find command
Lecture 19 Find files by names command
Lecture 20 Find files by type and perm
Lecture 21 grep command
Lecture 22 ls command (List)
Lecture 23 Mkdir command (make the directory)
Lecture 24 Modes command
Lecture 25 Paste command
Lecture 26 pwd command (present working directory)
Lecture 27 rm command (to remove the files)
Lecture 28 Sort command
Lecture 29 touch command
Lecture 30 tr command (translate)
Lecture 31 Uname command
Lecture 32 uniq command
Lecture 33 Users_last command
Lecture 34 w command (who)
Lecture 35 wc command (word count)
Lecture 36 whereis command
Lecture 37 whoami command
Lecture 38 who command
Lecture 39 who-is-logged command
Lecture 40 Vi editor
Lecture 41 Filter commands
Lecture 42 Communication commands
Lecture 43 Shell Scripting introduction
Lecture 44 Shell Scripting Command line Arguments
Lecture 45 Shell Scripting operators
Lecture 46 Shell scripting functions
Lecture 47 Shell Scripting Control Statements
Lecture 48 Shell Scripting Loops
Lecture 49 Pentest automate - Project 1
Lecture 50 Pentest automate - Project 2
Lecture 51 Pentest automate - Project 3
Section 3: Introduction to Ethical Hacking & Threat vectors
Lecture 52 Information Security Overview
Lecture 53 Information Security Threats and Attack Vectors
Lecture 54 Hacking Concepts
Lecture 55 Ethical Hacking Concepts
Lecture 56 Penetration Testing Concepts
Section 4: Understanding Footprinting and Information gathering
Lecture 57 Footprinting Concepts
Lecture 58 Footprinting through Search Engines
Lecture 59 Footprinting through Social Networking Sites
Lecture 60 Email Footprinting
Lecture 61 Competitive Intelligence
Lecture 62 Who is Footprinting
Lecture 63 DNS Footprinting
Lecture 64 Network Footprinting
Lecture 65 Footprinting through Social Engineering
Lecture 66 Footprinting Tools
Lecture 67 Footprinting Countermeasures
Lecture 68 Footprinting Penetration Testing
Lecture 69 lab1 - Open Source Information Gathering Using Windows Command Line Utilities
Lecture 70 lab 2 - Collecting Information About a Target Website Using Firebug
Lecture 71 lab 3 - Mirroring Website Using HTTrack Web Site Copier
Lecture 72 lab 4 - Advanced Network Route Tracing Using Path Analyzer Pro
Lecture 73 lab 5 - Information Gathering Using Metasploit
Section 5: Understanding Scanning Networks
Lecture 74 Network Scanning Concepts
Lecture 75 Scanning Techniques part 1
Lecture 76 Scanning Techniques part 2
Lecture 77 Scanning Beyond IDS and Firewall part 1
Lecture 78 Scanning Beyond IDS and Firewall
Lecture 79 Banner Grabbing
Lecture 80 Draw Network Diagrams
Lecture 81 Scanning Pen Testing
Lecture 82 lab 1 - UDP and TCP Packet Crafting Techniques using HPING3
Lecture 83 lab 2 - Scanning The Network Using The Colasoft Packet Builder
Lecture 84 lab 3 - Basic Network Troubleshooting Using MegaPing
Lecture 85 lab 4 - Understanding Network Scanning Using Nmap
Lecture 86 lab 5 - Exploring Various Network Scanning Techniques
Lecture 87 lab 6 - Scanning a Network Using NetScan Tools Pro
Lecture 88 lab 7 - Avoiding Scanning Detection using Multiple Decoy IP Addresses
Lecture 89 lab 8 - Drawing Network Diagrams Using Network Topology Mapper
Lecture 90 lab 9 - Checking for Live Systems Using Angry IP Scanner
Lecture 91 lab 10 - Scanning for Network Traffic Going Through a Computer’s Adapter Using I
Lecture 92 lab 11 - Identify Target System OS with TTL and TCP Window Sizes using Wireshark
Lecture 93 Scanning_network Practical Tools
Section 6: Working Enumeration & Exploit services at network level
Lecture 94 Enumeration Concepts
Lecture 95 NetBIOS Enumeration
Lecture 96 SNMP Enumeration
Lecture 97 LDAP Enumeration
Lecture 98 NTP Enumeration
Lecture 99 Other Enumeration Techniques
Lecture 100 Enumeration Countermeasures
Lecture 101 Enumeration Pen Testing
Lecture 102 lab 1 - NetBIOS Enumeration Using Global Network Inventory
Lecture 103 lab 2 - Enumerating Network Resources Using Advanced IP Scanner
Lecture 104 lab 3 - Performing Network Enumeration Using SuperScan
Lecture 105 lab 4 - Enumerating Resources in a Local Machine Using Hyena
Lecture 106 lab 5 - Performing Network Enumeration Using NetBIOS Enumerator
Lecture 107 lab 6 - Enumerating a Network Using SoftPerfect Network Scanner
Lecture 108 lab 7 - Enumerating a Target Network using Nmap and Net Use
Lecture 109 lab 8 - Enumerating Services on a Target Machine
Lecture 110 lab 9 - SNMP Enumeration Using snmp_enum
Lecture 111 lab 10 - LDAP Enumeration Using Active Directory Explorer (ADExplorer)
Lecture 112 lab 11 - Enumerating information from Windows and Samba host using Enum4linux
Lecture 113 Enumeration Practical Tools
Section 7: Understanding Network based Vulnerability Analysis
Lecture 114 Vulnerability Assessment Concepts
Lecture 115 Vulnerability Assessment Solutions
Lecture 116 Vulnerability Scoring Systems
Lecture 117 Vulnerability Assessment Tools
Lecture 118 Vulnerability Assessment Reports
Lecture 119 lab1 - Vulnerability Analysis Using Nessus
Lecture 120 lab2 - CGI Scanning with Nikto
Lecture 121 VA practical Tools
Section 8: Understanding System Hacking & Endpoint Exploitation
Lecture 122 System Hacking Concepts
Lecture 123 Cracking Passwords part 1
Lecture 124 Cracking Passwords part 2
Lecture 125 Cracking Passwords part 3
Lecture 126 Escalating Privileges
Lecture 127 Steganography
Lecture 128 Hiding Files part 2
Lecture 129 Hiding Files part 3
Lecture 130 Covering Tracks
Lecture 131 Penetration Testing
Lecture 132 lab1 - Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
Lecture 133 lab2 - Creating and Using Rainbow Tables
Lecture 134 lab3 - Auditing System Passwords Using L0phtCrack
Lecture 135 lab5 - Escalating Privileges by Exploiting Client Side Vulnerabilities
Lecture 136 lab6 - Hacking Windows 10 using Metasploit, and Post-Exploitation Using Meterpre
Lecture 137 lab7 - User System Monitoring and Surveillance Using Spytech SpyAgent
Lecture 138 lab8 - Web Activity Monitoring and Recording using Power Spy
Lecture 139 lab9 - Hiding Files Using NTFS Streams
Lecture 140 lab10 - Hiding Data Using White Space Steganography
Lecture 141 lab11 - Image Steganography Using OpenStego
Lecture 142 lab12 - Image Steganography Using Quick Stego
Lecture 143 lab13 - Viewing, Enabling, and Clearing Audit Policies Using Auditpol
Lecture 144 lab14 - Hacking Windows Server 2012 with a Malicious Office Document Using TheFa
Lecture 145 lab15 - Active Online Attack using Responder
Lecture 146 Practical Tools - System hacking
Section 9: Working with Malware Threats and Gaining Access & Maintaining Access
Lecture 147 Malware Concepts
Lecture 148 Trojan Concepts part 1
Lecture 149 Trojan Concepts part 2
Lecture 150 Trojan Concepts part 3
Lecture 151 Virus and Worm Concepts part 1
Lecture 152 Virus and Worm Concepts part 2
Lecture 153 Virus and Worm Concepts part 3
Lecture 154 Malware Analysis part 1
Lecture 155 Malware Analysis part 2
Lecture 156 Malware Analysis part 3
Lecture 157 Countermeasures
Lecture 158 Anti-Malware Software
Lecture 159 Malware Penetration Testing
Lecture 160 lab1 - Creating an HTTP Trojan and Remotely Controlling a Target Machine Using H
Lecture 161 lab2 - Creating a Trojan Server Using the GUI Trojan MoSucker
Lecture 162 lab3 - Gaining Control over a Victim Machine Using njRAT
Lecture 163 lab4 - Obfuscating a Trojan Using SwayzCryptor and Making it Undetectable to Var
Lecture 164 lab5 - Creating a Server Using the ProRat Tool
Lecture 165 lab6 - Creating a Trojan Server Using Theef
Lecture 166 lab7 - Creating a Virus Using the JPS Virus Maker Tool
Lecture 167 lab8 - Creating a Worm Using Internet Worm Maker Thing
Lecture 168 lab9 - Virus Analysis using IDA
Lecture 169 lab10 - Virus Analysis Using OllyDbg
Lecture 170 lab11 - Detecting Trojans
Lecture 171 lab12 - Monitoring TCP/IP Connections Using the CurrPorts
Lecture 172 lab13 - Removing Malware using Clamwin
Lecture 173 lab14 - Performing Registry Entry Monitoring
Lecture 174 lab15 - Startup Program Monitoring Tool
Lecture 175 Practical Tools
Section 10: Understanding Sniffing and MITM attacks
Lecture 176 Sniffing Techniques part 1
Lecture 177 Sniffing Techniques part 2
Lecture 178 Sniffing Techniques part 3
Lecture 179 Sniffing tools
Lecture 180 Countermeasures
Lecture 181 Sniffing Detection Techniques
Lecture 182 Sniffing Pen Testing
Lecture 183 lab1 - Sniffing Passwords using Wireshark
Lecture 184 lab2 - Analyzing a Network Using Capsa Network Analyzer
Lecture 185 lab3 - Spoofing MAC Address Using SMAC
Lecture 186 lab4 - Performing Man-in-the-Middle Attack using Cain & Abel
Lecture 187 lab5 - Detecting ARP Poisoning in a Switch Based Network
Lecture 188 lab6 - Detecting ARP Attacks with XArp Tool|| lab duration
Lecture 189 Sniffing Practical Tools
Section 11: Understanding Social Engineering attacks and countermeasures
Lecture 190 Social Engineering Concepts
Lecture 191 Social Engineering Techniques
Lecture 192 Insider Threats
Lecture 193 Impersonation on Social Networking Sites
Lecture 194 Identity Theft
Lecture 195 Countermeasures
Lecture 196 Social Engineering Pen Testing
Lecture 197 lab1 - Sniffing Website Credentials Using Social Engineering Toolkit (SET)
Section 12: Denial-Of-Service & DDOS attacks
Lecture 198 DOS/DDoS Concepts
Lecture 199 DOS/DDOS Attack Techniques
Lecture 200 Botnets
Lecture 201 DDoS Case Study
Lecture 202 DoS/DDOS Attack Tools
Lecture 203 Countermeasures
Lecture 204 DoS/DDoS Protection Tools
Lecture 205 DoS/DDoS Penetration Testing
Lecture 206 lab1 - SYN Flooding a Target Host Using Metasploit
Lecture 207 lab2 - SYN Flooding a Target Host Using hping3
Lecture 208 lab3 - Performing Distributed Denial of Service Attack Using HOIC
Section 13: Working with Session Hijacking
Lecture 209 Session Hijacking Concepts
Lecture 210 Application Level Session Hijacking
Lecture 211 Network Level Session Hijacking
Lecture 212 Session Hijacking Tools
Lecture 213 Countermeasures
Lecture 214 Countermeasures - 2
Lecture 215 Penetration Testing
Lecture 216 lab1 - Session Hijacking Using the Zed Attack Proxy (ZAP)
Lecture 217 Session Hijacking Practical Tools
Section 14: Understanding Bypassing IDS, Firewalls, and Honeypots at perimeter level
Lecture 218 IDS, Firewall and Honeypot Concepts
Lecture 219 IDS, Firewall and Honeypot Solutions- 1
Lecture 220 IDS, Firewall and Honeypot Solutions - 2
Lecture 221 Evading IDS
Lecture 222 Evading Firewalls
Lecture 223 IDS/Firewall Evading Tools
Lecture 224 Detecting Honeypots
Lecture 225 IDS/Firewall Evasion Countermeasures
Lecture 226 Penetration Testing
Lecture 227 lab1 - Detecting Intrusions Using Snort
Lecture 228 lab2 - Detecting Malicious Network Traffic Using HoneyBOT
Lecture 229 lab3 - Bypassing Windows Firewall Using Nmap Evasion Techniques
Lecture 230 lab 4 - Bypassing Firewalls using HTTP/FTP Tunneling
Lecture 231 lab 5 - Bypassing Windows Firewall using Metasploit
Lecture 232 Practical Tools
Section 15: Hacking Web Servers and footprinting web servers
Lecture 233 Web Server Concepts
Lecture 234 Web Server Attacks
Lecture 235 Web Server Attack Methodology
Lecture 236 Web Server Attack Tools
Lecture 237 Countermeasures
Lecture 238 Patch Management
Lecture 239 Web Server Security Tools
Lecture 240 Web Server Pen Testing
Lecture 241 lab1 - Performing Web Server Reconnaissance using Skipfish
Lecture 242 lab 2 - Footprinting a Web Server Using the httprecon Tool
Lecture 243 lab3 - Footprinting a Web Server Using ID Serve
Lecture 244 lab4 - Cracking FTP Credentials Using Dictionary Attack
Lecture 245 lab5 - Uniscan Web Server Fingerprinting in Kali Linux
Lecture 246 Practical Web server Tools
Section 16: Hacking Web Applications & OWASP TOP 10 attacks
Lecture 247 Introduction of Web Application hacking
Lecture 248 Web Application Threats
Lecture 249 Web Application pentesting tools
Lecture 250 Countermeasures
Lecture 251 Web Application security tools
Lecture 252 lab1 - Exploiting Parameter Tampering and XSS Vulnerabilities in Web Application
Lecture 253 lab2 - Enumerating and Hacking a Web Application Using WPScan and Metasploit
Lecture 254 lab3 - Exploiting Remote Command Execution Vulnerability to Compromise a Target
Lecture 255 lab4 - Auditing Web Application Framework Using Vega
Lecture 256 lab5 - Website Vulnerability Scanning Using Acunetix WVS
Lecture 257 lab6 - Exploiting File Upload Vulnerability at Different Security Levels
Lecture 258 lab7 - Performing Cross-Site Request Forgery (CSRF) Attack
Section 17: Understanding SQL Injection attacks
Lecture 259 SQL Injection Concepts
Lecture 260 Types of SQL Injection
Lecture 261 SQL Injection Methodology part 1
Lecture 262 SQL Injection Methodology part 2
Lecture 263 SQL Injection Tools
Lecture 264 Evasion Techniques
Lecture 265 Countermeasures
Lecture 266 lab1 - SQL Injection Attacks on an MS SQL Database
Lecture 267 lab2 - Scanning Web Applications Using N-Stalker Tool
Lecture 268 lab3 - Performing SQL Injection attack against MSSQL to extract Databases and We
Lecture 269 Practical Tools - SQL Injection
Section 18: Working with Hacking Wireless Networks
Lecture 270 Wireless Concepts
Lecture 271 Wireless Encryption
Lecture 272 Wireless Threats
Lecture 273 Wireless Hacking Methodology part 1
Lecture 274 Wireless Hacking Methodology part 2
Lecture 275 Wireless Hacking Tools
Lecture 276 Countermeasures
Lecture 277 Wireless Security Tools
Lecture 278 Wireless Pen Testing
Lecture 279 lab1 - WiFi Packet Analysis using Wireshark
Lecture 280 lab2 - Cracking a WEP with Aircrack-ng
Lecture 281 lab3 - Cracking a WPA (Wi-Fi Protected Access) with Aircrack-ng
Lecture 282 Practical Tools - Wireless
Section 19: Working with Hacking Mobile platforms (Android & IOS)
Lecture 283 Mobile Platform Attack Vectors
Lecture 284 Hacking Android OS part 1
Lecture 285 Hacking Android OS part 2
Lecture 286 Hacking iOS
Lecture 287 Mobile Spyware
Lecture 288 Mobile Device Management
Lecture 289 Mobile Security Guidelines and Tools
Lecture 290 Mobile Pen Testing
Lecture 291 lab 1 - Creating Binary Payloads using Kali Linux to Hack Android
Lecture 292 lab 2- Harvesting the user's credentials using the Social Engineering
Lecture 293 Practical Tools - Android
Section 20: Understanding Cloud Computing overview and attacks
Lecture 294 Cloud Computing Concepts
Lecture 295 Cloud Computing Threats
Lecture 296 Cloud Computing Attacks
Lecture 297 Cloud Security
Lecture 298 Cloud Security Tools
Lecture 299 Cloud Penetration Testing
Lecture 300 lab1 - Creating User Accounts and Assigning User Rights in ownCloud
Lecture 301 lab2 - Securing ownCloud from Malicious File uploads using ClamAV
Lecture 302 lab3 - Bypassing ownCloud Antivirus and Hacking the Host using Kali Linux
Lecture 303 lab4 - Implementing DoS Attack on Linux Cloud Server Using Slowloris Script
Section 21: Working with advanced Cryptography techniques and tactics
Lecture 304 Cryptography Concepts
Lecture 305 Encryption Algorithms
Lecture 306 Cryptography Tools
Lecture 307 Public Key Infrastructure (PKI)
Lecture 308 Email Encryption
Lecture 309 Disk Encryption
Lecture 310 Cryptanalysis
Lecture 311 Countermeasures
Lecture 312 lab1 - Calculating One-Way Hashes Using HashCalc
Lecture 313 lab2 - Calculating MD5 Hashes Using MD5 Calculator
Lecture 314 lab3 - Understanding File and Text Encryption Using CryptoForge
Lecture 315 lab4 - Encrypting and Decrypting the Data Using BCTextEncoder
Lecture 316 lab5 - Creating and Using Self-Signed Certificate
Lecture 317 lab6 - Basic Disk Encryption Using VeraCrypt
Lecture 318 lab7 - Basic Data Encryption Using CrypTool
VAPT professionals,Cyber security experts,Students who are interested in cyber security domain,Ethical hacker