- Introduction to the course
- VirtualBox installation
- Kali Linux installation
- Enabling full-screen
Online
₹ 455 3,499
Quick facts
particular | details | |
---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course overview
Joseph Delgadillo, Certified Ethical Hacker & Instructor, developed the Learn Ethical Hacking: Beginner to Advanced certification course, which is accessible on Udemy and is aimed at candidates who want to master ethical hacking and secure a career in the cyber security industry. Learn Ethical Hacking: Beginner to Advanced online course by Udemy focuses on teaching candidates how to use Python to practice ethical hacking and penetration testing.
Learn Ethical Hacking: Beginner to Advanced online classes incorporates more than 28 hours of digital learning resources, which teach how to build up a safe and private pen-testing environment, teach basic hacking tools in Kali Linux, and conclude with programming the tools in Python. Candidates will learn about wireless cracking, system hacking, footprinting, scanning, and Linux commands as part of this course, which also includes an interactive element in which candidates will be taken through employment options in the ethical hacking and cyber security domain.
The highlights
- Certificate of completion
- Self-paced course
- 28.5 hours of pre-recorded video content
- Learning resources
Program offerings
- Online course
- Learning resources. 30-day money-back guarantee
- Unlimited access
- Accessible on mobile devices and tv
Course and certificate fees
Fees information
certificate availability
certificate providing authority
What you will learn
After completing the Learn Ethical Hacking: Beginner to Advanced online certification, candidates will gain a solid understanding of the principles of ethical hacking and cyber security using python programming. Candidates will learn the basics of Kali Linux as well as the capabilities of Linux commands. Candidates will learn the mythologies associated with penetration testing, scanning, network security, wireless cracking, and system hacking. Candidates will also learn how to construct a secure environment, how to use custom coding penetration tools, and how to work with keyloggers and authentication brute-forcers.
The syllabus
Introduction and Installation
Basic Linux Commands
- Basic commands part 1
- Basic commands part 2
- Basic commands part 3
Creating a Secure Hacking Environment
- Changing IP address and wireless adapter setup
- Creating a bootable Kali USB drive
- Essential networking terms
- Essential hacking terms
- Additional Kali tools to install
- Changing our MAC address with macchanger
Footprinting
- Google hacking
- Nikto basics
- Whois tool
- Email harvesting
- Shodan
- Zone transfer with Dig
Scanning
- Installing Metasploitable
- Nmap part 1
- Nmap part 2
- Nmap part 3
- Zenmap
- TCP scans
- Nmap bypassing defenses
- Nmap scripts part 1
- Nmap scripts part 2
Website Penetration Testing
- Installing OWASP
- HTTP request
- HTTP response
- Burpsuite configuration
- Editing packets in Burpsuite
- Whatweb and Dirb
- Password recovery attack
- Burpsuite login bruteforce
- Hydra login bruteforce
- Session fixation
- Injection attacks
- Simple command injection
- Exploiting command injection vulnerability
- Finding blind command injection
- SQL basics
- Manual SQL injection part 1
- Manual SQL injection part 2
- SQLmap basics
- XML injection
- Installing XCAT and preventing injection attacks
- Reflected XSS
- Stored XSS
- Changing HTML code with XSS
- XSSer and XSSsniper
Wireless Cracking
- Wireless attacking theory
- Enabling monitor mode
- Capturing handshake with airodump
- RockYou.txt
- Cracking with Aircrack
- Cracking with Hashcat
- Creating password lists with Crunch
- Creating password lists with Cupp
- Rainbow tables part 1
- Rainbow tables part 2
- Installing Fluxion
- Finding and cracking hidden networks
- Preventing wireless attacks
Man in the Middle Attacks
- ARP protocol basics
- Man in the middle attack theory
- Installing MITMf
- Manual ARP spoofing
- Problems while installing MITMf
- HTTP traffic sniffing
- DNS spoofing and HTTPS password sniffing
- Hooking browsers with BEEF
- Screenshotting targets browser
- Cloning any webpage
- Ettercap basics
System Hacking with Metasploit
- MSFconsole environment
- Metasploit modules explained
- Bruteforcing SSH with Metasploit
- Attacking Tomcat with Metasploit
- Getting Meterpreter with command injection
- PHP code injection
- 2 Metasploitable exploits
- Wine installation
- Creating Windows payloads with Msfvenom
- Encoders and Hex editor
- Windows 10 Meterpreter shell
- Meterpreter environment
- Windows 10 privilege escalation
- Preventing privilege escalation
- Post exploitation modules
- Getting Meterpreter over Internet with port forwarding
- Eternalblue exploit
- Persistence module
- Hacking over the internet with Ngrok
- Android device attack with Venom
- The real hacking begins now!
Python Crash Course
- Variables
- Raw input
- If-else statements
- For loops
- While loops
- Python lists
- Functions
- Classes
- Importing libraries
- Files in Python
- Try and except rule
Coding an Advanced Backdoor
- Theory behind reverse shells
- Simple server code
- Connection with reverse shell
- Sending and receiving messages
- Sending messages with while true loop
- Executing commands on target system
- Fixing backdoor bugs and adding functions
- First test using our backdoor
- Trying to connect every 20 seconds
- Creating persistence part 1
- Creating persistence part 2
- Changing directory
- Uploading and downloading files
- Downloading files from the internet
- Starting programs using our backdoor
- Capturing screenshot on the target PC
- Embedding backdoor in an image part 1
- Embedding backdoor in an image part 2
- Checking for administrator privileges
- Adding help option
Creating a Keylogger for the Backdoor
- Importing Pynput
- Simple keylogger
- Adding report function
- Writing keystrokes to a file
- Adding the keylogger to our reverse shell part 1
- Adding the keylogger to our reverse shell part 2
- Final project test
Basic Authentication Bruteforcer
- Printing banner
- Adding available options
- Starting threads for bruteforce
- Writing function to run the attack
- Bruteforcing router login
- Bypassing antivirus with your future programs
- Sending malware with spoofed email
BONUS - Building a Career in Cyber Security
- What will you learn in this section?
- Why is ethical hacking a valuable skill?
- What is the best ethical hacking certification?
- Tips for getting your first job as an ethical hacker
- How I started my career as an ethical hacker
- How to price your work
Instructors
Mr Joseph Delgadillo
Instructor
Eduonix