The Complete Ethical Hacking Course: Beginner to Advanced!
Created by Joseph Delgadillo, Last Updated 05-Sep-2020, Language:English
The Complete Ethical Hacking Course: Beginner to Advanced!
Learn how to do ethical hacking, penetration testing, web testing, and WiFi hacking using Kali Linux!
Created by Joseph Delgadillo, Last Updated 05-Sep-2020, Language:English
What Will I Get ?
- Ethical hacking fundamentals
- Network penetration testing
- Kali Linux
- Linux terminal
- Footprinting with nmap
- Attacking wireless networks
- Signal jamming and denial of service
- Evil twin
- Post authentication exploitation
- Bruteforcing passwords
- Reverse shells for remote control of devices
Requirements
- Access to a personal computer or equivalent system
- Internet access to download the necessary software
Description
Gain the ability to do ethical hacking and penetration testing by taking this course! Get answers from an experienced IT expert to every single question you have related to the learning you do in this course including installing Kali Linux, using VirtualBox, basics of Linux, Tor, Proxy chains, VPN, Macchanger, Nmap, cracking WiFi, aircrack, DoS attacks, SLL strip, known vulnerabilities, SQL injections, cracking Linux passwords, and more!
We will cover the following topics in this course:
- Introduction to ethical hacking
- Building a secure hacking environment with Kali Linux
- Linux terminal usage
- Using Tor to stay anonymous online
- Proxy chains
- Macchanger
- Foot printing with Nmap
- Attacking wireless networks
- WiFi hacking
- Signal jamming and denial of service
- SSL strips
- Evil twin
- Attacking routers
- SQL injections
- Brute-forcing methods for cracking passwords
- Using reverse shells to gain remote control of a device
Upon purchase, you will receive lifetime access to the course and a certificate of completion.
Course Content
-
Introduction to Ethical Hacking
4 Lectures 00:45:47-
Introduction to ethical hacking. What is it in detail?
Preview00:08:02 -
Prerequisites for getting the most out of this course
00:07:28 -
Basic terminology - white hat, gray hat, and black hat hacking
00:11:59 -
Basic terminology - SQL injections, VPN, proxy, VPS, and keyloggers
00:18:18
-
-
Build your hacking environment!
8 Lectures 01:25:42-
Updated Kali Linux installation guide
-
Installing VirtualBox with RPM and why use a virtual machine
00:08:57 -
Installing VirtualBox using the default package manager from repositories
00:14:59 -
Creating the virtual environment
00:13:34 -
Installing VirtualBox on Windows
00:05:15 -
Kali Linux installation within a virtual environment
00:15:59 -
Booting up Kali Linux for the first time
00:12:18 -
Installing VirtualBox Guest Additions
00:14:40
-
-
Linux Terminal including basic functionalities and CLI
3 Lectures 00:39:00-
Introduction to the Linux terminal
00:09:31 -
Linux command line interface (CLI) basics
00:14:03 -
Linux CLI explained in greater detail
00:15:26
-
-
What is Tor? How can you use it to protect your anonymity online?
2 Lectures 00:26:02-
Using Tor to protect your anonymity online
00:10:57 -
Tor continued
00:15:05
-
-
ProxyChains for using proxy servers, hiding your ip, and obtaining access
3 Lectures 00:39:12-
Proxychains part 1
00:12:00 -
Proxychains part 2
00:14:14 -
Proxychains part 3
00:12:58
-
-
What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN?
2 Lectures 00:18:24-
Staying anonymous with a virtual private network (VPN)
00:06:07 -
VPN continued
00:12:17
-
-
What is a macchanger? How can you use it to change your mac address?
2 Lectures 00:23:14-
Macchanger part 1
00:12:23 -
Macchanger part 2
00:10:51
-
-
Footprinting with Nmap and external resources
3 Lectures 00:47:06-
Footprinting with Nmap
00:17:33 -
Nmap continued
00:19:22 -
External resources using public listings of known vulnerabilities
00:10:11
-
-
Attacking wireless networks. Overview of the tools.
3 Lectures 00:39:30-
Introduction to WiFi cracking WPA/WPA2
00:15:13 -
Aircrack and reaver installation
00:12:43 -
Installing aircrack-ng on Windows and crunch on Linux
00:11:34
-
-
Breaking WPA/WPA2 encryption. WiFi hacking and WiFi hacker training.
6 Lectures 01:24:36-
Aircrack-ng and crunch usage example pt.1
00:11:04 -
Aircrack-ng and crunch usage example pt.2
00:10:25 -
Aircrack-ng and crunch usage example pt.3
00:20:39 -
Cracking WPS pins with reaver pt.1
00:15:22 -
Cracking WPS pins with reaver pt.2
00:10:41 -
Cracking WPS pins with reaver pt.3
00:16:25
-
-
Signal jamming and denial of service
2 Lectures 00:31:08-
Signal jamming and denial of service
00:13:14 -
Signal jamming and denial of service continued
00:17:54
-
-
SSL strips
3 Lectures 00:37:37-
SSL strip part 1
00:08:49 -
SSL strip part 2
00:10:36 -
SSL strip part 3
00:18:12
-
-
Let's have a bit of fun!
3 Lectures 00:37:34-
Funny things part 1
00:07:02 -
Funny things part 2
00:12:11 -
Funny things part 3
00:18:21
-
-
Evil twin method! Clone wireless access points to steal data.
3 Lectures 00:29:19-
Evil twin part 1
00:10:32 -
Evil twin part 2
00:07:28 -
Evil twin part 3
00:11:19
-
-
Attacking routers to give you free reign over the entire network!
3 Lectures 00:37:52-
Using known vulnerabilities part 1
00:09:39 -
Using know vulnerabilities part 2
00:09:20 -
Using known vulnerabilities part 3
00:18:53
-
-
DNS setting hacking to redirect users with post authentication exploitation
3 Lectures 00:35:39-
Post authentication exploitation (DNS) part 1
00:09:36 -
Post authentication exploitation (DNS) part 2
00:12:22 -
Post authentication exploitation (DNS) part 3
00:13:41
-
-
Website attacks with SQL injections
5 Lectures 01:08:56-
SQL injection part 1
00:12:32 -
SQL injection part 2
00:14:46 -
SQL injection part 3
00:13:21 -
SQL injection part 4
00:11:23 -
SQL injection part 5
00:16:54
-
-
Brute-forcing methods for cracking passwords
6 Lectures 01:28:33-
Cracking hashes
00:12:03 -
Cracking Linux passwords with john the ripper part 1
00:12:43 -
Cracking Linux passwords with john the ripper part 2
00:08:49 -
Cracking windows passwords with john the ripper
00:19:25 -
Hydra usage part 1
00:17:13 -
Hydra usage part 2
00:18:20
-
-
Denial of Service (DoS) attacks demonstrated and explained
3 Lectures 00:36:39-
DoS attack demo part 1 introduction to denial of service attacks
00:18:36 -
DoS attack demo part 2 combine slowloris.pl with nmap
00:08:19 -
DoS attack demo part 3 featuring ha.ckers.org
00:09:44
-
-
Reverse shells - Gain remote control of any device!
6 Lectures 01:40:54-
Intro to metasploit and reverse shells
00:18:27 -
Metasploit continued
00:18:24 -
Making reverse shells persistent on another system and escalating privileges
00:16:34 -
Creating a persistent reverse shell with Metasploit
00:10:56 -
Netcat
00:20:00 -
How to upload a reverse shell onto a web server
00:16:33
-

Joseph Delgadillo
Best-Selling Instructor
Joseph Delgadillo is the founder of JTDigital Courses, an education technology company. He has been active in the online learning community since 2015 and has worked with multiple startups. As of 2020, over 800,000 students across the globe have enrolled in his courses covering ethical hacking, Python programming, web development and more.
He graduated with honors from Central Washington University.