Beginners guide to ethical hacking and penetration testing
A step by step course to ethical hacking for beginners
Updated on Nov, 2023
Language - English
Duration -7.5 hours
Hacking (both good and bad) seems to be in the news on a daily basis now. Large data breaches, phishing attacks, voter registration hacked, Smartphones hacked, etc. In this course we go over the basics for ethical hacking and penetration testing. We go step by step building a virtual lab, loading various tools and learning how a malicious hacker thinks and operates. Phishing, password hacking, methodology, OSINT, DDOS attacks, and much more is covered in this course. Learn how a hacker thinks, their methodology and tools in order to help defend from them. You don't need to have a high technical knowledge. In this course I try to break things down in order for you to follow along and understand. As with any course that I offer. If you have any questions during or even after you finish? Feel free to message me and I will do my best to get back to you and help you out.
What will you learn in this course:
- Understand hacking methodology
- Understanding various attack vectors
- Understanding the ethical do's and don'ts
- Understanding how to protect yourself and your network from malicious attacks
What are the prerequisites for this course?
A computer (prefered), smartphone, or tablet with a internet connection. 8 gb memory and 50 gb of hdd to follow along with the VM
Check out the detailed breakdown of what’s inside the course
- Introduction 04:01 04:01
- What will you need? 02:46 02:46
- Disclaimer 02:05 02:05
Types of hackers
Notation and Agreements
Virtual Machine Setup
The Internet never forgets and More
Passwords and Credential Harvesting
Wireless and Man in the Middle Attacks
Over 23 years of IT experience
Designed, programmed and published games on: Android, Chrome, PC, Windows phone, Windows OS, OSX, and Linux
I've been through the CEH 8, 9, 11, 12 courses, digital forensics and more.
C|OSINT Certified, CWA, Certified Accredited Configuration Engineer (ACE), CISP, Metasploit certified, SOC Level 1 among other engineering, network security, and other certifications.
Published Security articles on Cybrary , Hackin9, and eForensics Magazine and published contracted courses for EC Council Code Red.
After years of experience in the IT industry and a long time gamer we got together and said, "Hey why don't we start making our own mobile and PC games?" and thus Disposable Games Studio was born back in 2010. We set out on a mission to build games and apps for gamers, IT professionals, and every day people. Apps and games that we ourselves would use. As things progressed we decided to share our knowledge and started teaching Game development, OSINT, network security, and ethical hacking. We have also given talks and training on OSINT and ethical hacking. We are passionate about training and security.
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.
Our students work
with the Best
Related Video CoursesView More
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video CoursesSubscribe now
Master prominent technologies at full length and become a valued certified professional.Explore Now