| Learn Ethical Hacking From A-Z: Beginner To Expert | |||
| Course Introduction | |||
| Course Overview | 00:08:00 | ||
| About Your Instructors | 00:03:00 | ||
| Section Overview | 00:03:00 | ||
| Current Cybersecurity Market | 00:09:00 | ||
| The 3 Types of Hackers | 00:05:00 | ||
| The 4 Elements of Security | 00:04:00 | ||
| Ethical Hacker Terminology | 00:04:00 | ||
| Common Methods of Hacking | 00:08:00 | ||
| Cybersecurity & Ethical Hacking Overview | 00:03:00 | ||
| Ethical Hacking vs Penetration Testing | 00:06:00 | ||
| Job Opportunities in Cybersecurity | 00:01:00 | ||
| Who is This Course is For? | 00:01:00 | ||
| Networking Basics | |||
| Networking Section Overview | 00:12:00 | ||
| How Data Travels Across The Internet | 00:02:00 | ||
| Understanding Ports and Protocols | 00:08:00 | ||
| Understanding IP Addresses: Public & Private | 00:02:00 | ||
| What Are Subnets? | 00:03:00 | ||
| The Average Network vs Remote Based | 00:06:00 | ||
| Setting Up Your Hacking Lab | |||
| Hacking Lab Section Overview | 00:09:00 | ||
| Understanding Virtual Machines | 00:03:00 | ||
| Setup Your Kali Linux Machine | 00:10:00 | ||
| VN Setup & Testing Vulnerable Systems | 00:23:00 | ||
| Linux/Python/Bash & PowerShell Basics | |||
| Linux+Python+Bash+Powershell Section Overview | 00:06:00 | ||
| Linux Basics | 00:11:00 | ||
| Working With Directories & Moving Files | 00:03:00 | ||
| Installing & Updating Application Files | 00:02:00 | ||
| Linux Text Editors | 00:04:00 | ||
| Searching For Files | 00:02:00 | ||
| Bash Scripting Basics | 00:09:00 | ||
| Python Basics | 00:11:00 | ||
| How To Remain Anonymous On The Web | |||
| Remaining Anonymous Section Overview | 00:06:00 | ||
| TOR Browser Overview | 00:06:00 | ||
| Anonsurf Overview | 00:03:00 | ||
| Changing Mac Addresses | 00:03:00 | ||
| Using a Virtual Private Network/Server (VPN, VPS) | 00:04:00 | ||
| How To Hack Into WIFI | |||
| WiFi Hacking Section Overview | 00:06:00 | ||
| WiFi Hacking System Setup | 00:09:00 | ||
| WEP Hacking Attack #1 | 00:09:00 | ||
| WEP Hacking Attack #2 | 00:04:00 | ||
| WPA/WPA2 Hacking | 00:10:00 | ||
| Passive & Active Reconnaissance (Information Gathering) | |||
| Reconnaissance Section Overview | 00:04:00 | ||
| Passive Recon vs Active Recon | 00:01:00 | ||
| Recon-ng Overview | 00:15:00 | ||
| Whois Enumeration | 00:02:00 | ||
| DNS Enumeration Overview | 00:02:00 | ||
| Netcraft.com DNS Information | 00:03:00 | ||
| Google Hacking | 00:05:00 | ||
| Shodan.io Overview | 00:02:00 | ||
| Securityheaders.com (Analyze HTTPS Headers of website) | 00:02:00 | ||
| Ssllabs.com/ssltest (Look for SSL issues on website) | 00:02:00 | ||
| Pastebin.com (Sensitive Information) | 00:01:00 | ||
| NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.) | 00:15:00 | ||
| Netcat Overview + SMB/NFSEnumeration | 00:14:00 | ||
| Nikto & Sparta Web Application Scanner | 00:06:00 | ||
| SMPT Enumeration + Nessus/Openvas Scanners | 00:05:00 | ||
| Launching Attacks | |||
| Launching Attacks Overview | 00:10:00 | ||
| Analyzing Information Gathered | 00:04:00 | ||
| Taking Advantage of Telenet | 00:06:00 | ||
| Searching & Understanding Exploits | 00:06:00 | ||
| Copy Exploits From Searchsploit | 00:03:00 | ||
| Understanding Exploits | 00:04:00 | ||
| Launching Exploits | 00:24:00 | ||
| Brute Force Attacks | 00:07:00 | ||
| How To Crack Passwords | 00:04:00 | ||
| ARP Spoofing Overview | 00:21:00 | ||
| Introduction To Cryptography | 00:14:00 | ||
| Post Exploitation | |||
| Post Exploitation Section Overview | 00:03:00 | ||
| Privilege Escalation | 00:29:00 | ||
| Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus | 00:27:00 | ||
| Installing a Keylogger | 00:03:00 | ||
| Installing a Backdoor | 00:07:00 | ||
| Website & Web Application Hacking | |||
| Website & Web Application Hacking Overview | 00:06:00 | ||
| Web Application Scanning | 00:08:00 | ||
| Directory Buster Hacking Tool | 00:03:00 | ||
| Nikto Web App Hacking Tool | 00:03:00 | ||
| SQLmap and SQL Ninja Overview | 00:01:00 | ||
| How To Execute Brute Force Attacks | 00:13:00 | ||
| Using Command Injection | 00:03:00 | ||
| Malicious File Upload | 00:10:00 | ||
| Local & Remote File Inclusion | 00:10:00 | ||
| SQL Injection Overview | 00:19:00 | ||
| Using Cross Site Request Forgery | 00:11:00 | ||
| Cross Site Scripting Overview | 00:12:00 | ||
| Mobile Phone Hacking & Security | |||
| Mobile Phone Hacking Section Overview | 00:11:00 | ||
| Mobile Attack Vectors | 00:02:00 | ||
| Mobile Hacking Using URLs | 00:02:00 | ||
| Jail Breaking and Rooting Considerations | 00:01:00 | ||
| Privacy Issues (Geo Location) | 00:01:00 | ||
| Mobile Phone Data Security | 00:02:00 | ||
| Getting Your Name Out There As An Ethical Hacker | |||
| Getting Your Name Out There Section Overview | 00:02:00 | ||
| Building A Brand | 00:09:00 | ||
| Personal Branding | 00:13:00 | ||
| Setup Your Website and Blog | 00:11:00 | ||
| Writing a Book | 00:10:00 | ||
| Starting a Podcast | 00:08:00 | ||
| Networking Overview | 00:06:00 | ||
| How To Make Money As An Ethical Hacker | |||
| Making Money Section Overview | 00:02:00 | ||
| Bug Bounty Programs | 00:04:00 | ||
| How To Start Freelancing | 00:11:00 | ||
| How To Start Client Consulting | 00:09:00 | ||
| How To Start A Career In Cybersecurity | |||
| Potential Salary & Cybersecurity Roadmap | 00:10:00 | ||
| Books Recommendations | 00:03:00 | ||
| Places to Practice Hacking for Free | 00:03:00 | ||
| Resources | |||
| Resources – Learn Ethical Hacking From A-Z: Beginner To Expert | 00:00:00 | ||
| Assignment | |||
| Assignment -Learn Ethical Hacking From A-Z: Beginner To Expert | 3 weeks, 3 days | ||