Learn Ethical Hacking From A-Z: Beginner To Expert |
Course Introduction |
|
Course Overview |
|
00:08:00 |
|
About Your Instructors |
|
00:03:00 |
|
Section Overview |
|
00:03:00 |
|
Current Cybersecurity Market |
|
00:09:00 |
|
The 3 Types of Hackers |
|
00:05:00 |
|
The 4 Elements of Security |
|
00:04:00 |
|
Ethical Hacker Terminology |
|
00:04:00 |
|
Common Methods of Hacking |
|
00:08:00 |
|
Cybersecurity & Ethical Hacking Overview |
|
00:03:00 |
|
Ethical Hacking vs Penetration Testing |
|
00:06:00 |
|
Job Opportunities in Cybersecurity |
|
00:01:00 |
|
Who is This Course is For? |
|
00:01:00 |
Networking Basics |
|
Networking Section Overview |
|
00:12:00 |
|
How Data Travels Across The Internet |
|
00:02:00 |
|
Understanding Ports and Protocols |
|
00:08:00 |
|
Understanding IP Addresses: Public & Private |
|
00:02:00 |
|
What Are Subnets? |
|
00:03:00 |
|
The Average Network vs Remote Based |
|
00:06:00 |
Setting Up Your Hacking Lab |
|
Hacking Lab Section Overview |
|
00:09:00 |
|
Understanding Virtual Machines |
|
00:03:00 |
|
Setup Your Kali Linux Machine |
|
00:10:00 |
|
VN Setup & Testing Vulnerable Systems |
|
00:23:00 |
Linux/Python/Bash & PowerShell Basics |
|
Linux+Python+Bash+Powershell Section Overview |
|
00:06:00 |
|
Linux Basics |
|
00:11:00 |
|
Working With Directories & Moving Files |
|
00:03:00 |
|
Installing & Updating Application Files |
|
00:02:00 |
|
Linux Text Editors |
|
00:04:00 |
|
Searching For Files |
|
00:02:00 |
|
Bash Scripting Basics |
|
00:09:00 |
|
Python Basics |
|
00:11:00 |
How To Remain Anonymous On The Web |
|
Remaining Anonymous Section Overview |
|
00:06:00 |
|
TOR Browser Overview |
|
00:06:00 |
|
Anonsurf Overview |
|
00:03:00 |
|
Changing Mac Addresses |
|
00:03:00 |
|
Using a Virtual Private Network/Server (VPN, VPS) |
|
00:04:00 |
How To Hack Into WIFI |
|
WiFi Hacking Section Overview |
|
00:06:00 |
|
WiFi Hacking System Setup |
|
00:09:00 |
|
WEP Hacking Attack #1 |
|
00:09:00 |
|
WEP Hacking Attack #2 |
|
00:04:00 |
|
WPA/WPA2 Hacking |
|
00:10:00 |
Passive & Active Reconnaissance (Information Gathering) |
|
Reconnaissance Section Overview |
|
00:04:00 |
|
Passive Recon vs Active Recon |
|
00:01:00 |
|
Recon-ng Overview |
|
00:15:00 |
|
Whois Enumeration |
|
00:02:00 |
|
DNS Enumeration Overview |
|
00:02:00 |
|
Netcraft.com DNS Information |
|
00:03:00 |
|
Google Hacking |
|
00:05:00 |
|
Shodan.io Overview |
|
00:02:00 |
|
Securityheaders.com (Analyze HTTPS Headers of website) |
|
00:02:00 |
|
Ssllabs.com/ssltest (Look for SSL issues on website) |
|
00:02:00 |
|
Pastebin.com (Sensitive Information) |
|
00:01:00 |
|
NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.) |
|
00:15:00 |
|
Netcat Overview + SMB/NFSEnumeration |
|
00:14:00 |
|
Nikto & Sparta Web Application Scanner |
|
00:06:00 |
|
SMPT Enumeration + Nessus/Openvas Scanners |
|
00:05:00 |
Launching Attacks |
|
Launching Attacks Overview |
|
00:10:00 |
|
Analyzing Information Gathered |
|
00:04:00 |
|
Taking Advantage of Telenet |
|
00:06:00 |
|
Searching & Understanding Exploits |
|
00:06:00 |
|
Copy Exploits From Searchsploit |
|
00:03:00 |
|
Understanding Exploits |
|
00:04:00 |
|
Launching Exploits |
|
00:24:00 |
|
Brute Force Attacks |
|
00:07:00 |
|
How To Crack Passwords |
|
00:04:00 |
|
ARP Spoofing Overview |
|
00:21:00 |
|
Introduction To Cryptography |
|
00:14:00 |
Post Exploitation |
|
Post Exploitation Section Overview |
|
00:03:00 |
|
Privilege Escalation |
|
00:29:00 |
|
Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus |
|
00:27:00 |
|
Installing a Keylogger |
|
00:03:00 |
|
Installing a Backdoor |
|
00:07:00 |
Website & Web Application Hacking |
|
Website & Web Application Hacking Overview |
|
00:06:00 |
|
Web Application Scanning |
|
00:08:00 |
|
Directory Buster Hacking Tool |
|
00:03:00 |
|
Nikto Web App Hacking Tool |
|
00:03:00 |
|
SQLmap and SQL Ninja Overview |
|
00:01:00 |
|
How To Execute Brute Force Attacks |
|
00:13:00 |
|
Using Command Injection |
|
00:03:00 |
|
Malicious File Upload |
|
00:10:00 |
|
Local & Remote File Inclusion |
|
00:10:00 |
|
SQL Injection Overview |
|
00:19:00 |
|
Using Cross Site Request Forgery |
|
00:11:00 |
|
Cross Site Scripting Overview |
|
00:12:00 |
Mobile Phone Hacking & Security |
|
Mobile Phone Hacking Section Overview |
|
00:11:00 |
|
Mobile Attack Vectors |
|
00:02:00 |
|
Mobile Hacking Using URLs |
|
00:02:00 |
|
Jail Breaking and Rooting Considerations |
|
00:01:00 |
|
Privacy Issues (Geo Location) |
|
00:01:00 |
|
Mobile Phone Data Security |
|
00:02:00 |
Getting Your Name Out There As An Ethical Hacker |
|
Getting Your Name Out There Section Overview |
|
00:02:00 |
|
Building A Brand |
|
00:09:00 |
|
Personal Branding |
|
00:13:00 |
|
Setup Your Website and Blog |
|
00:11:00 |
|
Writing a Book |
|
00:10:00 |
|
Starting a Podcast |
|
00:08:00 |
|
Networking Overview |
|
00:06:00 |
How To Make Money As An Ethical Hacker |
|
Making Money Section Overview |
|
00:02:00 |
|
Bug Bounty Programs |
|
00:04:00 |
|
How To Start Freelancing |
|
00:11:00 |
|
How To Start Client Consulting |
|
00:09:00 |
How To Start A Career In Cybersecurity |
|
Potential Salary & Cybersecurity Roadmap |
|
00:10:00 |
|
Books Recommendations |
|
00:03:00 |
|
Places to Practice Hacking for Free |
|
00:03:00 |
Resources |
|
Resources – Learn Ethical Hacking From A-Z: Beginner To Expert |
|
00:00:00 |
Assignment |
|
Assignment -Learn Ethical Hacking From A-Z: Beginner To Expert |
|
3 weeks, 3 days |