Complete Ethical Hacking and Cybersecurity Course

Complete Ethical Hacking and Cybersecurity Course

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 119 lectures (20h 36m) | 14.51 GB

Learn Ethical Hacking and Cybersecurity in a practical way and become an expert in Ethical Hacking and Cybersecurity!

Welcome to this course where you will learn everything you need to become an expert in Ethical Hacking and Cybersecurity!

My name is Santiago Hernández, and I will be your instructor throughout this training program. If you’d like to know more about me, I recommend checking out the “Course Introduction” video available publicly on this page.

The first thing you should know about this course is that it has a highly practical focus. 95% of the course hours are dedicated to real-world use cases that demonstrate how to execute the most popular hacking techniques using Kali Linux and the most widely used tools today.

This course is designed for anyone who wants to start in the world of Hacking and Cybersecurity, beginning from a very basic level and advancing as the course progresses to advanced levels. These include techniques such as real-time network traffic manipulation and Machine Learning applications in Hacking.

After completing this course, you will have all the necessary knowledge to conduct a security audit or perform Ethical Hacking for an organization and identify various security vulnerabilities. Additionally, if your interest lies in defensive cybersecurity, this course will provide you with the insights needed to understand the most common attack techniques today and design effective defenses against them.

Cybersecurity, and specifically Ethical Hacking, is one of the most in-demand fields with excellent working conditions today. This course is designed so that anyone with enough interest can become a professional in this field. Enroll now and see for yourself.

Course Syllabus

  • Setting Up the Learning Environment: Installing VMware, Installing Kali Linux
  • Introduction to Ethical Hacking and Penetration Testing: Ethical Hacking Methodologies: OSSTMM, PTEST, ISSAF, OTP, Kali Linux
  • Passive Information Gathering: Google Hacking, Shodan, Censys, Whois, Archive, TheHarvester, Maltego, Recon-ng, Kali Linux
  • Semi-Passive Information Gathering: FOCA, CentralOps, DNSDumpster, Wireshark, TCPdump, Kali Linux
  • Active Information Gathering: Metasploitable 3, DNSrecon, Nmap, Amap, Kali Linux
  • Vulnerability Analysis: CVE, CVSS, CPE, Nessus, Kali Linux
  • Exploiting Vulnerabilities on Hosts: Metasploit, Msfvenom, Armitage, Kali Linux
  • Exploiting Vulnerabilities in Web Applications: Mutillidae, Spidering, Crawling, Burp Suite, SQL Injection, SQLmap, Path Traversal, WebShells, Cross-Site Scripting (XSS), HTML Injection, CSRF, XSStrike, Kali Linux
  • Exploiting Network Vulnerabilities: Bettercap, MITM, ARP Spoofing, DNS Spoofing, Social Engineering Toolkit (SET), Polymorph, Kali Linux
  • Post-Exploitation: Meterpreter, Procdump, John the Ripper, Hashcat, Backdoors in binaries, srm, Kali Linux
  • Machine Learning Applied to Hacking: Batea, Pesidious, Deep Fake, Kali Linux

What you’ll learn

  • The most relevant Hacking techniques today
  • The fundamentals of Offensive Cybersecurity
  • The main Hacking tools
  • Performing an Ethical Hacking exercise in a real environment
  • Using Kali Linux and many of its built-in tools
  • Exploiting and gaining remote access on Windows and Linux machines
  • The application of Machine Learning techniques to Hacking
Table of Contents

Wellcome to the Course
1 Course Presentation
2 Context and Motivation

Setting Up the Learning Environment
3 How to get the most out of this course
4 Set the video speed to your preference
5 Virtualization Software VMware
6 Kali Linux Installation

Introduction to Ethical Hacking and Penetration Testing
7 Introduction to the section
8 Ethical Hacking Methodologies
9 Examples of Ethical Hacking and Security Audit Reports

Passive Information Gathering
10 Introduction to the Information Gathering Phase
11 Passive Information Gathering
12 Hacking with Search Engines Google Hacking
13 Google Hacking Database
14 Google Hacking Commands and Boolean Operators
15 Shodan
16 Shodan Main Commands
17 Censys
18 Whois
19 Archive Analysis of Historical Information
20 TheHarvester
21 Temporary Public IP Address Blocking
22 Installing Maltego on Kali Linux
23 Maltego
24 Reconng

Semipassive Information Gathering
25 Semipassive Information Gathering
26 Installation of Windows 1011 Virtual Machine
27 FOCA Metadata Analysis
28 Other Tools for Metadata Analysis
29 Introduction to the DNS Protocol
30 CentralOps and DNSdumpster
31 Sniffers Wireshark
32 Sniffers TCPdump
33 Anonymity on the Internet
34 Differences Between Network Adapter Modes Bridge NAT and HostOnly

Active Information Gathering
35 Active Information Gathering
36 Introduction to the Vulnerable Environment Metasploitable3
37 Installation and configuration of Metasploitable3
38 Installing Metasploitable3 on MAC ARM
39 DNSRecon and Zone Transfer
40 Nmap Host Discovery Part 1
41 Nmap Host Discovery Part 2
42 Nmap Port Scanning
43 Nmap Port States
44 Nmap Service Discovery
45 Amap Service Discovery
46 Nmap Operating System Identification
47 Nmap SMB Enumeration
48 Nmap SNMP Enumeration

Vulnerability Analysis
49 Introduction to the Vulnerability Analysis Phase
50 Vulnerability Analysis
51 CVE CVSS CPE Common Vulnerabilities and Exposures
52 Vulnerability Analysis with Nmap
53 Nessus Introduction and Installation
54 Nessus Basic Vulnerability Analysis
55 Nessus Advanced Vulnerability Analysis
56 Other Vulnerability Analysis Tools

Hacking and Exploitation of Host Vulnerabilities
57 Introduction to the Vulnerability Exploitation Phase
58 Vulnerability Exploitation
59 Manual Exploitation of Host Vulnerabilities
60 Exercise Modify the New Payload to Make it Work
61 Metasploit Introduction
62 Metasploit Basic Exploitation
63 Metasploit Advanced Exploitation
64 Msfvenom Creating Custom Payloads
65 Metasploit Importing Nessus Results
66 Armitage Metasploit Graphical Interface

Hacking and Exploitation of Web Application Vulnerabilities
67 Installing Ubuntu Virtual Machine
68 Installing Vulnerable Web Application Mutillidae II
69 Learning Environment in NAT Mode
70 Burp Suite Introduction
71 Spidering and Crawling with Burp Suite and Skipfish
72 Code and Context Injections
73 Introduction to SQL Injection
74 Blind SQL Injection
75 SQLmap Advanced SQL Injections
76 Path Traversal
77 WebShells
78 Unrestricted File Upload
79 HTML Injection and CrossSite Scripting XSS
80 CSRF
81 XSStrike
82 Other Exploitation Techniques Cookie Tampering Command Injection
83 Advanced Content on Burp Suite

Hacking and Exploitation of Network Vulnerabilities
84 Man in the Middle MITM
85 Bettercap Introduction and Installation
86 ARP Spoofing
87 DNS Spoofing
88 Social Engineering Toolkit SET
89 RealTime Network Traffic Manipulation
90 Polymorph ICMP Network Traffic Manipulation
91 Polymorph MQTT Network Traffic Manipulation
92 BONUS Exploiting a Security Flaw in Windows 10
93 DEMO Advanced WINREG Exploitation
94 ANNEX Conference on WINREG Exploitation Part 1
95 ANNEX Conference on WINREG Exploitation Part 2

PostExploitation Techniques
96 Introduction to the PostExploitation Phase
97 PostExploitation Techniques
98 Linux Meterpreter for PostExploitation
99 Windows Meterpreter for PostExploitation
100 Privilege Escalation UAC Bypass
101 Memory Dumping with Mimikatz
102 Procdump and lsassexe
103 Password Cracking John the Ripper and Hashcat
104 Backdoors in Binaries
105 Meterpreter Process Migration
106 Evidence Wiping
107 Relevant Files to Delete

Machine Learning Applied to Hacking and Cybersecurity
108 Introduction to the Section
109 Machine Learning Applied to Cybersecurity
110 BATEA Installation Error
111 BATEA Host Recognition with ML
112 Pesidious Mutations with Deep Learning
113 Social Engineering Deep Fake
114 Artificial IntelligenceCreated Fake Obama
115 ANNEX Conference Network Attack Detection through Image Recognition Part 1
116 ANNEX Conference Network Attack Detection through Image Recognition Part 2

Farewell to the Complete Ethical Hacking and Cybersecurity Course
117 Ideas for Ethical Hacking Exercises MITRE ATTCK
118 Course Farewell
119 Extra Class Next Steps

Homepage