Course Highlights
  • Answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional!
  • Tips for remaining anonymous in hacking and penetration testing activities.
  • A guide to using these skills to get a better job and make money online as a freelancer.
  • The ability to secure and protect any network from hackers and loss of data.
  • A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords.
  • Step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux.
Curriculum

3 Topics
Introduction to Ethical Hacking. What is it in detail?
Thank you for taking this course! What is the most it can do for you?
Prerequisites success tips for getting the most out of this course.

2 Topics
Basic terminology such as white hat grey hat and black hat hacking.
Basic terminology including SQL injections VPN proxy VPS and Key loggers

8 Topics
Getting started successfully PDF with common questions answered and helpful tips
Installing VirtualBox with rpm plus why use a virtual machine.
Installing VirtualBox using the default package manager from repositories.
Creating the virtual environment.
Installing VirtualBox in a Windows 8.1 environment.
Kali Linux installation within a virtual environment.
Kali Linux installation after it is running and getting starting using it.
Installing VirtualBox Guest Additions

8 Topics
Installing VirtualBox on a Mac
Setting up Kali Linux with VirtualBox part 1
Setting up Kali Linux with VirtualBox part 2
How to set up a USB passthrough on a Mac part 1
How to set up a USB passthrough on a Mac part 2
Kali Linux Live USB on a MacBook Pro part 1 ( OPTIONAL )
Kali Linux Live USB on a MacBook Pro part 2 ( OPTIONAL )
Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL )

4 Topics
How to create a bootable USB of Kali with persistent storage > 4 GB part 1
How to create a bootable USB of Kali with persistent storage > 4 GB part 2
How to create a bootable USB of Kali with persistent storage > 4 GB part 3
How to create a bootable USB of Kali with persistent storage > 4 GB part 4

3 Topics
Fedroa 22 VirtualBox set up
Kali Sana virtual machine installation
How to install VBox GuestAdditions in Kali Sana

3 Topics
Introduction to the Linux terminal.
Linux Command-Line Interface (CLI) basics.
The Linux CLI explained in greater detail to give you a good understanding.

2 Topics
Tor part 1.
Tor part 2.

3 Topics
Proxychains part 1.
Proxychains part 2.
Proxychains part 3.

2 Topics
VPN part 1.
VPN part 2.

2 Topics
Macchanger part 1 (updated)
Macchanger part 2 (updated)

3 Topics
Nmap part 1.
Nmap part 2.
External resources using public listings of known vulnerabilities.

5 Topics
Intro to wifi hacker cracking WPA⁄WPA2.
Aircrack and reaver installation.
Installing aircrack-ng on Windows + crunch on Linux.
For Windows Users. How To Set Up USB wireless Adapter with Virtualbox Part 1.
For Windows Users. How To Set Up USB wireless Adapter with VirtualBox part 2.

6 Topics
Aircrack-ng _ crunch usage example_1
Aircrack-ng _ crunch usage example_2
Aircrack-ng _ crunch usage example_3
Cracking WPS pins with reaver part 1.
Cracking WPS pins with reaver part 2.
Cracking WPS pins with reaver part 3.

2 Topics
Performing denial of service on wireless networks part 1.
Performing denial of service on wireless networks part 2.

3 Topics
SSL strip part 1.
SSL strip part 2.
SSL strip part 3.

3 Topics
Funny things part 1.
Funny things part 2.
Funny things part 3.

3 Topics
Evil twin part 1.
Evil twin part 2
Evil twin part 3.

3 Topics
Using known vulnerabilities part 1.
Using known vulnerabilities part 2.
Using known vulnerabilities part 3.

3 Topics
Post authentication exploitation ( DNS ) part 1.
Post authentication exploitation ( DNS ) part 2.
Post authentication exploitation ( DNS ) part 3.

5 Topics
sql-injection-part-1
sql-injection-part-2
sql-injection-part-3
sql-injection-part-4
sql-injection-part-5

6 Topics
cracking-hashes
cracking-linux-password-with-john-the-ripper-part-1
cracking-linux-password-with-john-the-ripper-part-2
cracking-windows-password-with-john-the-ripper
hydra-usage-part-1
hydra-usage-part-2

3 Topics
DoS attack demonstration part 1. Introduction to Denial of Service attacks.
DoS attack demonstration part 2. Combine slowloris.pl with nmap.
DoS attack demonstration part 3 featuring ha.ckers.org.

6 Topics
Intro to Metasploit and reverse shells. What are reverse shells and why use them
Metasploit ( reverse shell ) part 2 starting from a two terminal setup.
Making reverse shells persistent on another system and escalating privileges.
Creating a persistent reverse shell with Metasploit.
Using NetCat to make any kind of connection you might need.
How to upload a reverse shell onto a web server.

15 Topics
General stuff
Setting up the Environment part 1
Setting up the Environment part 2
Programming basics part 1
Programming basics part 2
Programming basics part 3
Programming basics part 4
Programming basics part 5
Basic Keylogger part 1
Basic Keylogger part 2
Upper and lowercase letters
Encompassing other characters part 1
Encompassing other characters part 2
Encompassing other characters part 3
Hide keylogger console window

7 Topics
How can you earn money legally with your ethical hacking skills online?
What is hacking? Here is the definition we use in the course.
What do you hope to gain from learning about hacking?
How to get answers to your questions and help with problems?
Unlock your certificate and upgrade your LinkedIn profile using this course!
How can you become intermediate and advanced with this course?
Bonus lecture with 50% off coupons to all the rest of our courses!

  Write a Review

The Complete Ethical Hacking Course: Beginner to Advanced!

Go to Paid Course