English | MP4 | AVC 1920×1080 | AAC 48KHz 2ch | 7h 19m | 1.43 GB
Your certification guide to ethical hacking
Security is the foremost concern for all organizations both big and small. Hacking doesn’t always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. This action-packed course provides information on all the latest hacking tools in one place. You’ll learn all the latest tools and features such as network pentesting, website pentesting, and Android pentesting. By the end of the course you’ll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker.
A step-by-step, hands-on approach that teaches you to work with all the latest tools and techniques to help you master Ethical Hacking.
What You Will Learn
- Setting up your latest Ethical Hacking Lab Environment.
- Learning Network Pentesting Steps and gather Network Based Vulnerabilities Details
- Working with websites and web Scanning Process to tackle attacks on Network Devices
- Learning latest website based attack e.g. – sql injection , xss attack , csrf attack etc and ways to tackle them
- Preventing Brute Force Attack, Shell upload Attack , Buffer Overflow Attack Learning latest Android Based Vulnerabilities and way to exploit them Practicing questions to crack Global Ethical hacking Exam .
Table of Contents
Ethical Hacking Course Introduction
1 The Course Overview
2 Course Overview – How to Get the Most Out of This Course
3 Teaser – Bypass Antivirus in Windows 10 and Hack Windows 10 Completely
4 Ethical Hacking – Latest Terminologies
Network Pentesting Lab Setup and Overview
5 Download and Install VMware Workstation
6 Download Windows 10 and Kali Linux 2018
7 Installation of Windows 10 and Kali Linux in VMware Workstation
8 Update and Upgrade the Kali Linux Operating System
9 What Is Network Pentesting
10 Various Components of Network Pentesting
Network Pentetsing – Network Scanning Techniques
11 IP Scanners in Network
12 Port Scanning in Network Using Nmap
13 Nessus Installation
14 Vulnerability Scanning Using Nessus
Network Pentesting – Network Host Exploitation with the AV Bypass Mechanism
15 Installation of Antivirus Bypass Frameworks
16 Bypass Windows 10 Defender and Hack Windows 10 from Kali Linux
17 Bypass Windows 10 Antivirus and Hack Windows 10 from Kali Linux
18 Various Meterpreter Commands
Network Pentesting – Network IoT Devices Exploitation
19 About Router Pentesting
20 Download and Install VyOS on a VMware Workstation (Virtual Router)
21 Start Services in Router
22 Password Cracking (Brute Forcing) Using the Hydra and Medusa Tools
Other Major Network Attacks
23 Man-in-the-Middle Attack Overview
24 Man-in-the-Middle Attack (MITM) Using Wireshark and Ettercap
25 Social Engineering Attack Overview
26 Social Engineering Attack Using Social Engineering Toolkit
27 About the Browser Exploitation Framework
28 Browser Exploitation Attack Using BeEF
Website Pentesting Lab Setup and Overview
29 Download and Install Xampp Server in Kali Linux
30 Download and Install a Buggy Web Application
31 Website Introduction
32 Website Pentesting Overview
Website Pentesting – Scanning Websites
33 Acunetix Web Vulnerability Scanner
34 Burp Suite Community Edition
35 Zed Attack Proxy Tool (ZAP)
36 Report Creation and Analysis
Website Pentesting – SQL Injection Attack
37 SQL Injection Attack Overview
38 SQL Injection Attack on Buggy Web Application
39 HTML Injection Attack on a Buggy Web Application
40 SQL Injection on a Live Website Using Sqlmap Kali Linux
Website Pentesting – XSS and CSRF Attacks
41 About XSS Attack and Types
42 Persistent XSS Attack on a Buggy Web Application
43 Non-Persistent XSS Attack on a Buggy Web Application
44 DOM-Based XSS Attack
45 About CSRF Attacks
46 CSRF Attack on a Buggy Web Application
Website Pentesting – Other Major Web Attacks
47 Shell Upload Attack on a Buggy Web Application
48 Buffer Overflow Attack on a Web Application
49 Brute-Force Attack on the Login Panel of a Web Application
50 Local File Inclusion Attack on a Web Application
Android Pentesting Lab Setup and Overview
51 Download and Install Android Studio
52 Start Android Phone in Android Studio
53 Download and Install APK File in Android Phone
54 About Android Pentesting
55 Scope of Android Pentesting
Android Pentesting – Analyze Log Files and Find Secret Information
56 About Android Log Files
57 Information About Task
58 Open Log Files Using Logcat
59 Analyze Log Files and Find Secret Code
Android Pentesting – Reverse Engineering Process
60 About the Reverse Engineering Process in Android
61 Information About Task
62 Download and Install the Dex2jar Tool
63 Download and Install the JD-Gui Tool
Android Pentesting – Break Encryption in Android
64 Encryption Process in Android
65 Information About Task
66 Analyze the Code and Find the Encryption Algorithm
67 Complete the Task
Android Pentesting – SQL Injection Attack on Android
68 About SQL Injection Attack on Android
69 Download and Install Drozer and Drozer-Agent.apk
70 Drozer Commands
71 Perform an SQL Injection Attack on Android Using Drozer
Ethical Hacking Exam Preparation
72 Overview of Major Ethical Hacking Exams
73 Ethical Hacking Exam Practice Questions – Part 1 (MCQ)
74 Ethical Hacking Exam Practice Questions – Part 2 (MCQ)
75 Ethical Hacking Exam Practice Questions – Part 3 (MCQ)
76 Ethical Hacking Exam Practice Questions – Part 4 (MCQ)
77 Ethical Hacking Exam Practice Questions – Part 5 (MCQ)
Resolve the captcha to access the links!