• No products in the basket.

Ethical Hacking with Kali Linux

0( 0 REVIEWS )
183 STUDENTS
course-image

To claim CPD Accredited Certificate for this course, please go to the certificate section & collect your certificate.

Course Curriculum

Unit 01: Introduction and Installation
Introduction to the course 00:05:00
Virtual box installation 00:16:00
Kali linux installation 00:14:00
Enabling full screen 00:18:00
Unit 02: Basic Linux Commands
Basic commands part 1 00:10:00
Basic commands part 2 00:21:00
Basic commands part 3 00:13:00
Unit 03: Creating a Secure Hacking Environment
Changing ip address and wireless adapter setup 00:05:00
Creating a bootable Kali USB drive 00:05:00
Essential networking terms 00:10:00
Essential hacking terms 00:18:00
Additional kali tools to install 00:09:00
Changing our MAC address with mac changer 00:06:00
Unit 04: Footprinting
Google hacking 00:13:00
Nikto basics 00:11:00
Whois tools 00:07:00
Email harvesting 00:06:00
Shodan 00:10:00
Zone transfer with Dig 00:07:00
Unit 05: Scanning
Installing Metasploitable 00:07:00
Nmap part 1 00:16:00
Nmap part 2 00:12:00
Nmap part 3 00:12:00
Zen map 00:08:00
TCP scans 00:16:00
Nmap by passing defenses 00:17:00
Nmap scripts part 1 00:09:00
Nmap scripts part 2 00:14:00
Unit 06: Website Penetration Testing
Installing OWASP 00:08:00
HTTP request 00:10:00
HTTP response 00:10:00
Burpsuite configuration 00:13:00
Editing packets in Burpsuite 00:12:00
Whatweb and Dirb 00:10:00
Password recovery attack 00:16:00
Burpsuite login bruteforce 00:11:00
Hydra login bruteforce 00:09:00
Session fixation 00:14:00
Injection attacks 00:06:00
Simple command injection 00:11:00
Exploiting command injection vulnerability 00:08:00
Finding blind command injection 00:14:00
SQL basics 00:10:00
Manual SQL injection part 1 00:13:00
Manual SQL injection part 2 00:21:00
SQL map basics 00:17:00
XML injection 00:16:00
Installing XCAT and preventing injection attacks 00:06:00
Reflected XSS 00:11:00
Stored XSS 00:12:00
Changing HTML code with XSS 00:07:00
XSSer and XSS sniper 00:14:00
Unit 07: Wireless Cracking
Wireless attacking theory 00:11:00
Enabling monitor mode 00:05:00
Capturing handshake with airodump 00:15:00
Rockyou.txt 00:14:00
Cracking with aircrack 00:16:00
Cracking with hashcat 00:15:00
Creating password lists with crunch 00:18:00
Creating password lists with cup 00:07:00
Rainbow tables part 1 00:17:00
Rainbow tables part 2 00:06:00
Installing fluxion 00:06:00
Finding and cracking hidden networks 00:08:00
Preventing wireless attacks 00:08:00
Unit 08: Man in the Middle Attacks
ARP protocol basics 00:10:00
Man in the middle attack theory 00:07:00
Installing MITMf 00:07:00
Manual ARP spoofing 00:13:00
Problems while installing MITMf 00:06:00
HTTP traffic sniffing 00:08:00
DNS spoofing and HTTPS password sniffing 00:24:00
Hooking browser with BEEF 00:16:00
Screenshotting targets browser 00:11:00
Cloning any webpage 00:09:00
Ettercap basics 00:07:00
Unit 09: System Hacking with Metasploit
MFS console environment 00:16:00
Metasploit modules explained 00:12:00
Bruteforcing SSH with Metasploit 00:15:00
Attacking tomcat with metasploit 00:09:00
Getting meterpreter with command injection 00:25:00
PHP code injection 00:06:00
Metasploitable exploits 00:07:00
Wine installation 00:12:00
Creating windows payloads with Msfvenom 00:10:00
Encoders and Hex editors 00:19:00
Windows 10 meterpreter shell 00:12:00
Meterpreter environment 00:11:00
Windows 10 privilege escalation 00:11:00
Preventing privilege escalation 00:06:00
Post exploitation modules 00:14:00
Getting Meterpreter over Internet with port forwarding 00:11:00
Eternalblue exploit 00:20:00
Persistence module 00:13:00
Hacking over the internet with Ngrok 00:10:00
Android device hacking with venom 00:10:00
The real hacking begins now! 00:02:00
Unit 10: Python Crash Course
Variables 00:14:00
Raw input 00:11:00
If else statements 00:10:00
For loops 00:07:00
While loops 00:08:00
Python lists 00:08:00
Functions 00:15:00
Classes 00:10:00
Importing libraries 00:07:00
Files in python 00:12:00
Try and except the rule 00:05:00
Unit 11: Coding an Advanced Backdoor
Theory behind reverse shells 00:07:00
Simple server code 00:13:00
Connection with reverse shell 00:07:00
Sending and receiving messages 00:11:00
Sending messages with while true loop 00:08:00
Executing commands on target system 00:10:00
Fixing backdoor bugs and adding functions 00:20:00
First test using our backdoor 00:18:00
Trying to connect every 20 seconds 00:12:00
Creating persistence part 1 00:06:00
Creating persistence part 2 00:17:00
Changing directory 00:12:00
Uploading and downloading files 00:22:00
Downloading files from the internet 00:23:00
Starting programs using our backdoor 00:07:00
Capturing screenshots on the target PC 00:19:00
Embedding backdoor in an image part 1 00:13:00
Embedding backdoor in an image part 2 00:09:00
Checking for administrator privileges 00:12:00
Adding help option 00:09:00
Unit 12: Creating a Key logger for the Backdoor
Importing Pynput 00:10:00
Simple keylogger 00:10:00
Adding report function 00:11:00
Writing key strokes to a file 00:14:00
Adding the keylogger to our reverse shell part 1 00:23:00
Adding the keylogger to our reverse shell part 2 00:08:00
Final project test 00:14:00
Unit 13: Basic Authentication Bruteforcer
Printing banner 00:11:00
Adding available options 00:11:00
Starting threads for bruteforce 00:08:00
Writing function to run the attack 00:11:00
Bruteforcing router login 00:10:00
Bypassing antivirus with your future programs 00:14:00
Sending malware with spoofed email 00:15:00
Unit 14: BONUS - Building a Career in Cyber Security
What will you learn in this section? 00:03:00
Why is ethical hacking a valuable skill? 00:23:00
What is the best ethical hacking certification? 00:17:00
Tips for getting your first job as an ethical hacker 00:18:00
How I started my career as an ethical hacker 00:14:00
How to price your work 00:11:00
Unit 15: Additional Content: Grand Finale
Bonuses. Enjoy the Benefits 01:05:00
Assignment
Assignment -Ethical Hacking with Kali Linux 00:00:00

Certificate of Achievement

Upon completion, you will receive a CPD-accredited certificate recognised globally. Choose from:

Pdf Certificate & Transcript  £7.99
Hardcopy Certificate & Transcript  £17.99

This certification validates your knowledge and skills, boosting your employability in healthcare.

Thames-College-Certificate
Thames-college-logo-white-2021

We are a business that specialises in providing CPD & QLS accredited courses for anyone looking to advance their professional career.

Address : 78 Ilford Lane, Ilford, England, IG1 2LA

Email : info@thamescollege.org

Phone Number : ​020 8124 5465

Useful Links

Payment Methods

lead-payment-logos

Copyright © 2024 Thames College. All Right Reserved.

top