Ethical Hacking – Become Certified Ethical Hacker
About This Course
Become Certified Ethical Hacker This course assumes you have NO basic knowledge and by the end of it you’ll be able to penetrate the system, web application and server like cybersecurity expert or a black hat hacker’s choice is yours!
In this course, you will learn highly practical but it won’t neglect theory we will start ethical hacking from very basics to advance. You will learn everything for example exploiting different systems such as networks, servers, client host, websites.. etc.
The course is divided into a number of sections, each section covers a penetration testing/hacking field, in each of these sections you’ll first learn how the target system works, the weaknesses of this system, and how to practically exploit these weaknesses to hack into this system.
Ethical Hacking – Become Certified Ethical Hacker
The course is divided into four main sections:
1. Network Hacking: –
In this section, you will learn how to intrude any network, hacking wifi, hacking network, this section divided into three categories :
- Pre Connection Attack – In this subsection, you will learn how to gather basic information before the attack
- Gaining Access – In this subsection you will learn how to hack wifi and intrude any network remotely
- Post Connection Attacks – Once you intrude on any network then you will learn the most common network attack like IP spoofing, mac spoofing, sniffing, arp spoofing. … etc.
2. Gaining Access:
In this section, you will learn how to gain full access to computer systems without user interaction. You will learn how to gather useful information about a target computer system such as its operating system, open ports, installed service.
Then use this information to discover weaknesses and vulnerabilities and exploit them to gain full control over the target. Finally you will learn how to automatically scan servers for vulnerabilities and generate different types of reports with your discoveries.
3. Post Exploitation:
In this section, you will learn how to interact with the systems you compromised so far. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, spy on the target (capture key strikes, turn on the webcam, take screenshots….etc) and even use the target computer as a pivot to hack other systems.
4. Website / Web Application Penetration Testing:
In this section, you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ….etc).
And how to discover and exploit the following dangerous vulnerabilities to hack into websites:
- File Upload.
- Code Execution.
- Local File Inclusion.
- Remote File Inclusion.
- SQL Injection.
- Cross Site Scripting (XSS).
At the end of each section, you will learn how to detect, prevent and secure systems and yourself from the discussed attacks.
By the end of the course, you’ll be able to modify these techniques to launch more powerful attacks and adapt them to suit different situations and different scenarios.
Learning Objectives
Curriculum
Introduction of Hacking
Introduction of hacking and ethical hacking11:44
Phases of Hacking4:57
Ethical Hacking Terminology00:00:00
Setting up a Hacking Lab
Linux Basics
Basic Networking
Network Hacking
Network Hacking – Pre Connection Attacks
Network Hacking Gaining Access – Security
Networking Hacking – Post Connection Attacks
Module 9 Network Network Hacking – Post Connection Attack – Information Gathering
Network Hacking – Post Connection Attacks – MITM Attacks
Network Hacking – Detection & Security
Gaining Access to Computers
Gaining Access Server Side Attacks
Gaining Access -Client Side Attacks
Gaining Access – Post Exploitation
Gaining Access – Client Side Attacks- Social enginnering and browser exploitation
Gaining Access – Mail Spoofing
Web Application Penetration Testing
Website Hacking -Information Gathering
Website Hacking -File Upload, code Execution & File Inclusion
Website Hacking -SQL Injection Vulnerabilities
Website Hacking – Cross Site Scripting Vulnerabilities
Cryptography & Steganography
Firewall and Honeypots
Your Instructors
Shivam Giri
Founder & CEO