Ethical Hacking

  • Home
  • /
  • Single Course

Learn Ethical Hacking From Scratch

  • Categories

    Ethical Hacking
  • Feedback

    4.5

Welcome this comprehensive Ethical Hacking course! This course assumes you have NO prior knowledge and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts!


This course is highly practical but it won't neglect the theory; we'll start with ethical hacking basics, breakdown the different penetration testing fields and install the needed software (on Windows, Linux and Mac OS X), then we'll dive and start hacking straight away. You'll learn everything by example, by analysing and exploiting different systems such as networks, servers, clients, websites .....etc. We'll never have any boring dry theoretical lectures.


The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses to hack into this system.


Topics Include:
  • Learn ethical hacking, its fields & the different types of hackers.
  • Hack secure systems using client-side & social engineering.
  • Learn Network Hacking / Penetration Testing.
  • Learn linux commands & how to interact with the terminal.
  • Crack WEP/WPA/WPA2 encryptions using a number of methods.
  • Hack servers using server side attacks.
Curriculum for the Course
  • 141 Lectures
  • 15 Hours
  • Teaser - Hacking a Windows 10 Computer & Accessing Webcam 06:32 preview
  • Course Introduction & Overview 02:53 preview
  • What Is Hacking & Why Lear It ? 03:09 preview
  • Lab Overview & Needed Software 07:48 preview
  • Installing Kali 2020 As a Virtual Machine 11:13 preview
  • Creating & Using Snapshots 05:36 preview
  • Basic Overview of Kali Linux 05:10 preview
  • The Terminal & Linux Commands 13:06 preview
  • Introduction To Network Penetration Testing / Hacking 02:21 preview
  • Networks Basics 04:28 preview
  • Connecting a Wireless Adapter To Kali 05:09 preview
  • What is MAC Address & How To Change It 08:20 preview
  • Wireless Modes (Managed & Monitor) 06:57 preview
  • Packet Sniffing Basics 06:40 preview
  • WiFi Bands - 2.4Ghz & 5Ghz Frequencies 07:54 preview
  • Targeted Packet Sniffing 10:30 preview
  • Deauthentication Attacks (Disconnecting Any Device From The Network) 08:09 preview
  • Gaining Access Introduction 01:09 preview
  • Theory Behind Cracking WEP Encryption 05:47 preview
  • WEP Cracking Basics 06:17 preview
  • Fake Authentication Attack 06:45 preview
  • ARP Request Replay Attack 06:09 preview
  • Introduction to WPA and WPA2 Cracking 02:21 preview
  • Hacking WPA & WPA2 Without a Wordlist 04:28 preview
  • Capturing The Handshake 05:09 preview
  • Creating a Wordlist 08:20 preview
  • Cracking WPA & WPA2 Using a Wordlist Attack 06:57 preview
  • Gaining Access Introduction 04:14 preview
  • Introduction - What Is A Website ? 04:16 preview
  • How To Hack a Website? 03:51 preview
  • Gathering Basic Information Using Whois Lookup 05:36 preview
  • Discovering Technologies Used On The Website 06:03 preview
  • Gathering Comprehensive DNS Information 10:23 preview
  • Discovering Websites On The Same Server 03:42 preview
  • Discovering Subdomains 05:05 preview
  • Discovering Sensitive Files 07:25 preview
  • Analysing Discovered Files 04:17 preview
  • Introduction to Cross Site Scripting? 03:09 preview
  • Discovering Reflected XSS 03:46 preview
  • Discovering Stored XSS 02:56 preview
  • Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF 05:31 preview
  • Preventing XSS Vulnerabilities 05:13 preview
Test & Certificate