Full Ethical Hacking Course
Learn all about ethical hacking and penetration testing.
Full Ethical Hacking Course udemy course free download
Learn all about ethical hacking and penetration testing.
What you'll learn:
-
Ethical hacking and cybersecurity
-
Penetration testing
Requirements:
-
Basic computer knowledge
Description:
Introduction to cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.
Introduction to cyber-security
- Cyber-attack chain
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions on Objective
Virtualization on VirtualBox
- Kali Linux
- Install, deploy and run Kali Linux
- Installation and deployment of vulnerable server for testing
Reconnaissance
Information gathering
Assess security vulnerabilities
Scanning engines
- Nmap scanning
Search engine scanners
Internet scanners
- Google search engine
Open source intelligence
- Recon-ng scanning
Security standards
Center for Internet Security (CIS)
Hardening checks for systems
Exploitation
Metasploit framework for ethical hacking
- Basic commands and usage
- Module exploration
- Search for vulnerabilities from scanning results
- Exploitation of systems
- Post-exploitation for privilege escalation and scanning
Security hardening and configuration
Social engineering
- Dark Web with Tor
- Hacking groups and forums
- Wireless security assessment with WiFi PineApple
- Wireless vulnerabilities
- Social Engineering Toolkit (SET) attacks
- Direct attacks into Windows 10 with Macros and Powershell
Web, application and database vulnerabilities
Open Web Application Security Project (OWASP) top 10
- Injection
- Broken authentication
- Sensitive data exposure
- XML External Entities
- Broken access control
- Security misconfiguration
- Cross-Site Scripting
- Insecure Deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
Full SQLMAP tutorial for web penetration testing
BurpSuite tutorial for manual injection on web penetration testing
Payload testing with custom load
Creation of payload
- Payloads package on injection
- Fully undetected payloads
- Buffer overflow for shell
Come join thousands of students who has learned from the top ethical hacking and penetration testing instructor, Loi Liang Yang, now!
Who this course is for:
- Beginners to pros interested in learning ethical hacking
- Spring Framework: Spring Boot And Spring Hibernate
- Next.Js Dev To Deployment
- The Comprehensive 2021 Android Development Masterclass
- Microservices Architecture And Implementation On .NET 5
Course Details:
-
13.5 hours on-demand video
-
Full lifetime access
-
Access on mobile and TV
-
Certificate of completion
Full Ethical Hacking Course udemy courses free download
Learn all about ethical hacking and penetration testing.
Demo Link: https://www.udemy.com/course/full-ethical-hacking-course/