GREAT
Beginners guide to ethical hacking and penetration testing
A step by step course to ethical hacking for beginners
Ethical Hacking,Network & Security
Lectures -80
Quizzes -2
Duration -7.5 hours
30-days Money-Back Guarantee
Get your team access to 8,500+ top Tutorials Point courses anytime, anywhere.
Course Description
Hacking (both good and bad) seems to be in the news on a daily basis now. Large data breaches, phishing attacks, voter registration hacked, Smartphones hacked, etc. In this course we go over the basics for ethical hacking and penetration testing. We go step by step building a virtual lab, loading various tools and learning how a malicious hacker thinks and operates. Phishing, password hacking, methodology, OSINT, DDOS attacks, and much more is covered in this course. Learn how a hacker thinks, their methodology and tools in order to help defend from them. You don't need to have a high technical knowledge. In this course I try to break things down in order for you to follow along and understand. As with any course that I offer. If you have any questions during or even after you finish? Feel free to message me and I will do my best to get back to you and help you out.
Goals
What will you learn in this course:
- Understand hacking methodology
- Understanding various attack vectors
- Understanding the ethical do's and don'ts
- Understanding how to protect yourself and your network from malicious attacks
Prerequisites
What are the prerequisites for this course?
A computer (prefered), smartphone, or tablet with a internet connection. 8 gb memory and 50 gb of hdd to follow along with the VM

Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
3 Lectures
-
Introduction 04:01 04:01
-
What will you need? 02:46 02:46
-
Disclaimer 02:05 02:05
Types of hackers
3 Lectures

Hacking basics
5 Lectures

Notation and Agreements
2 Lectures

Browser Plugins
3 Lectures

Virtual Machine Setup
4 Lectures

The Internet never forgets and More
2 Lectures

Basic Searches
5 Lectures

Breaches
2 Lectures

Getting Sneaky
8 Lectures

Scanning
6 Lectures

Passwords and Credential Harvesting
5 Lectures

Hiding
7 Lectures

Virus
4 Lectures

Misc
6 Lectures

Wireless and Man in the Middle Attacks
9 Lectures

Wrapping up
6 Lectures

Instructor Details

Jeff Minakata
Over 23 years of IT experience
Designed, programmed and published games on: Android, Chrome, PC, Windows phone, Windows OS, OSX, and Linux
I've been through the CEH 8, 9, 11, 12 courses, digital forensics and more.
C|OSINT Certified, CWA, Certified Accredited Configuration Engineer (ACE), CISP, Metasploit certified, SOC Level 1 among other engineering, network security, and other certifications.
Published Security articles on Cybrary , Hackin9, and eForensics Magazine and published contracted courses for EC Council Code Red.
After years of experience in the IT industry and a long time gamer we got together and said, "Hey why don't we start making our own mobile and PC games?" and thus Disposable Games Studio was born back in 2010. We set out on a mission to build games and apps for gamers, IT professionals, and every day people. Apps and games that we ourselves would use. As things progressed we decided to share our knowledge and started teaching Game development, OSINT, network security, and ethical hacking. We have also given talks and training on OSINT and ethical hacking. We are passionate about training and security.
Course Certificate
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

Our students work
with the Best


































Feedbacks
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now