Tutorialspoint

Ethical Hacking Essential Training 2022

Zero To Mastery

Course Description

Welcome to the present comprehensive course on Network Hacking! during this course, you'll start as a beginner with no previous knowledge about penetration testing or hacking and by the top of it you will be at an intermediate level having the ability to hack into networks and connected devices like black-hat hackers and secure them like security experts. 

This course is concentrated on the practical side of penetration testing without neglecting the idea . Before jumping into hacking you'll first find out how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured during a way which will take you thru the fundamentals of linux, computer systems, networks and the way devices communicate with one another , then you'll find out how to take advantage of this method of communication to hold out variety of powerful attacks. 

The Course is divided into three main sections: 

Pre-connection attacks: in this section you'll find out how networks work, how devices communicate with one another and the way the knowledge is transferred during a wireless networks. you'll also learn some basic terminology, what's a channel ? MAC address ? what's managed mode ? what's monitor mode and the way to enable it ? what's sniffing and what's it limited to ? so during this section we still do not know much about penetration testing , all we've may be a computer and a wireless card connected thereto , you'll find out how to start out gathering information using your wi-fi card (packet sniffing) and you'll learn the way to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network. 

Gaining Access: Now that you simply gathered information about the networks around you, during this section you'll learn variety of methods to crack the key and obtain the password to your target network whether it uses WEP, WPA or maybe WPA2. 

Post Connection attacks: Now that you simply have the key, you'll hook up with the target network, during this section you'll learn variety of powerful techniques that allow you to collect comprehensive information about the connected devices, see anything they are doing on the web (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and 

Goals

  • Start from 0 up to a high-intermediate level.

  • Learn Network Hacking / Penetration Testing.

  • Web application pentesting

  • Mobile Hacking

Prerequisites

  • Basic IT Skills

  • No Linux, programming or hacking knowledge required.

  • Computer with a minimum of 4GB ram/memory.

  • Operating System: Windows / OS X / Linux.

Show More

Curriculum

  • Course Introduction
    04:07
    Preview
  • Ethical Hacking Introduction
    04:35
    Preview
  • Virtual lab setup and installation of Kali
    06:14
    Preview
  • Windows 10 installation on Virtual lab
    03:38
  • Metasploitable 2 Installation
    02:12
  • Setup Lamp Server
    03:21
Tutorialspoint
Tutorialspoint
Tutorialspoint
Tutorialspoint
Tutorialspoint
Tutorialspoint
Tutorialspoint
Tutorialspoint
Tutorialspoint
Tutorialspoint
Tutorialspoint
Tutorialspoint
Tutorialspoint
Tutorialspoint
Feedbacks
5.0
Course Rating
100%
0%
0%
0%
0%

    Feedbacks (1)

  • Saint Eloi Saint Jean
    Saint Eloi Saint Jean

Ethical Hacking Essential Training 2022
This Course Includes
  • 3.5 hours
  • 54 Lectures
  • Completion Certificate Sample Certificate
  • Lifetime Access Yes
  • Language English
  • 30-Days Money Back Guarantee

Sample Certificate

Use your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

We have 30 Million registered users and counting who have advanced their careers with us.

X

Sample Certificate