Get $1 credit for every $25 spent!

How to Hack from Beginner to Ethical Hacking Certification

Ending In:
Add to Cart - $39
Add to Cart ($39)
$1,649
97% off
wishlist
(115)
Courses
8
Lessons
989
Enrolled
1,148

What's Included

Product Details

Access
Lifetime
Content
29 hours
Lessons
320

The Complete Ethical Hacking Course

Learn Penetration Testing & Build Security & Coding Tools with Python

By Rob Percival | in Online Courses

This is one of the most comprehensive Ethical Hacking Courses ever created online! Across 30 hours of instructor-led content, you’ll learn how to diagnose different kinds of cybersecurity attacks and how to defeat them. You'll practice all the skills and techniques in real-time using an ethical hacking lab so you can put your learning to the test. You'll experience real-time hacking examples while learning how to protect yourself against them.

  • Access 320 lectures & 29 hours of content 24/7
  • Learn how hackers launch attacks on different systems, computers, users, websites & wireless networks
  • Discover what tools hackers use, why, & how they work
  • Understand how to protect yourselves (or your clients) against these attacks
  • Build your own security & hacking tools with Python
  • Create your own Ethical Hacking tool portfolio

Instructor

Rob Percival has a degree in Mathematics from Cambridge University. After building websites for friends and family for fun, he soon learned that web development was a very lucrative career choice. He gave up a successful job as a teacher to work part time and today, couldn't be happier. He's passionate about teaching kids to code, so every summer he runs Code School in the beautiful city of Cambridge. He also runs the popular web hosting and design service, Eco Web Hosting which leaves him free to share my secrets with people like you.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Requirements

  • Internet required

Course Outline

  • Introduction
    • 01-01.Introduction - 1:27
    • 01-02.Course Manual - 4:55
  • Hacking Lab Setup
    • 02-00.Hacking Lab Setup Intro - 0:45
    • 02-01.What is Virtual Machine - 2:10
    • 02-02.Installing Virtualbox (Windows) - 7:58
    • 02-03.Installing Virtualbox (MAC) - 9:13
    • 02-04.Installing Kali Linux - 15:54
    • 02-06.Snapshots - 9:19
    • 02-07.Hacking Lab Setup Outro - 0:17
    • 02-08.Reminder Lecture - 2:25
  • Kali Linux 101
    • 03-00.Kali Linux 101 Intro - 0:58
    • 03-01.Kali Overview - 7:57
    • 03-02.Linux Terminal - 14:06
    • 03-03.Changing Kali Password - 4:06
    • 03-04.Kali Linux 101 Outro - 0:48
  • Anonymity Online
    • 04-01.How Networks Work - 5:07
    • 04-00.Anonymity Online Intro - 0:32
    • 04-02.Anonymity Online Outro - 0:37
    • 04-03.Changing DNS Servers - 9:18
    • 04-04.Using VPN Books - 8:56
    • 04-05.DNS Usage - 3:42
  • Dark Web
    • 05-00.Dark Web Intro - 1:10
    • 05-01.What is Dark Web - 3:56
    • 05-02.Installing Tor On Kali - 15:40
    • 05-03.Browsing Dark Web - 10:47
    • 05-04.Dark Web Outro - 0:41
  • Network Pentesting
    • 06-00.Network Penetration Introduction - 1:17
    • 06-01.What is Network Pentesting - 4:32
    • 06-02.Chipsets - 6:49
    • 06-03.Connecting WiFi Card - 8:23
    • 06-04.MAC Address - 5:19
    • 06-05.Monitor vs Managed - 8:33
  • Gathering Information From Networks
    • 07-00.Information Gather Intro - 0:40
    • 07-01.Network Sniffing - 8:08
    • 07-02.Airodump Specific Target - 8:24
    • 07-03.Deauthentication Attacks - 8:50
    • 07-04.Realtime Deauth Attack - 3:03
    • 07-05.Info Gathering Outro - 0:24
  • Wireless Attacks
    • 08-00.Network Attacks Intro - 0:36
    • 08-01.Encryption Models - 5:10
    • 08-02.Cracking Wep - 12:33
    • 08-03.Fake Authentication - 8:16
    • 08-04.Packet Injection - 8:11
    • 08-05.How WPA Works_ - 2:50
    • 08-06.Capturing Handshakes - 5:35
    • 08-07.Creating Wordlists - 4:14
    • 08-08.WPA Live Cracking - 2:29
    • 08-09.Safe Routers - 4:36
    • 08-10.Network Attacks Outro - 0:42
  • Post Connection Attacks
    • 09-00.Post Connection Intro - 0:58
    • 09-01.Post Connection Settings - 2:49
    • 09-02.Netdiscover - 5:23
    • 09-03.nMap - 12:52
    • 09-04.Man In The Middle - 4:56
    • 09-05.Manual Arp Poison - 8:40
    • 09-06.MITM Framework - 9:44
    • 09-07.Using SSLStrip - 4:58
    • 09-08.What is HSTS_ - 4:14
    • 09-09.DNS Spoofing - 12:34
    • 09-10.Taking Screenshot Of Target - 5:07
    • 09-11.Injecting a Keylogger - 3:18
    • 09-13.Wireshark Setup - 4:49
    • 09-14.Wireshark Analysis - 7:39
    • 09-15.How to Make Yourself Safe - 3:53
    • 09-16.Post Connection Outro - 0:29
  • System Pentesting
    • 10-00.System Pentest Intro - 1:18
    • 10-01.Gaining Access - 3:01
    • 10-02.Installing Metasploitable - 6:54
    • 10-03.Finding Vulnerabilities - 7:41
    • 10-04.Exploiting First Vulnerability - 9:24
    • 10-05.Exploiting Username Map Script - 5:46
    • 10-06.Exploiting PostgreSQL Vulnerability - 5:22
    • 10-07.System Pentesting Outro - 0:46
  • Attacks On Users
    • 11-00.Attack On Users Intro - 1:07
    • 11-01.Attacks to Users - 2:56
    • 11-02.Installing Veil - 7:11
    • 11-03.Veil Overview - 5:45
    • 11-04.Creating First Backdoor - 6:42
    • 11-05.Bypassing Antivirus Solutions - 9:29
    • 11-06.Using Multi Handler - 4:34
    • 11-07.Testing Backdoor - 6:31
    • 11-08.Attack Users Outro - 0:32
  • Social Engineering
    • 12-00.Social Engineering Intro - 0:50
    • 12-01.What is Maltego_ - 4:00
    • 12-02.Maltego Overview - 8:00
    • 12-03.Strategy - 7:56
    • 12-04.Downloading Combiner - 5:47
    • 12-05.Combining Files - 7:01
    • 12-06.More Convincing File - 6:48
    • 12-07.Messing with Characters - 6:20
    • 12-08.Faking Mails - 6:52
    • 12-09.Social Engineering Outro - 0:43
  • Social Media Security
    • 13-00.Social Media Intro - 0:49
    • 13-01.Instagram Brute Force Attacks - 8:49
    • 13-02.Instagram Social Engineering - 10:59
    • 13-03.How to Protect Ourselves - 3:07
    • 13-04.Social Media Outro - 0:23
  • Beef
    • 14-00.Beef Intro - 0:49
    • 14-01.Browser Exploitation - 4:07
    • 14-02.Hooking Target - 6:51
    • 14-03.Injecting JavaScript - 5:23
    • 14-04.Basic Commands - 5:20
    • 14-05.Stealing Social Media Passwords - 3:41
    • 14-06.Backdoor Injection - 7:16
    • 14-07.How to Protect Yourself_ - 2:34
    • 14-08.Beef Outro - 0:28
  • External Network Attacks
    • 15-00.External Network Attacks Intro - 0:35
    • 15-01.How Outside Network Attacks Work_ - 2:29
    • 15-02.External Backdoor - 7:15
    • 15-03.Port Forwarding - 4:46
  • Fake Game Website Attacks
    • 16-00.Fake Game Website Intro - 1:02
    • 16-01.External Beef Attack - 7:22
    • 16-02.Ubuntu Server Creation - 7:00
    • 16-03.Creating Game Website - 11:56
    • 16-04.Installing Beef - 5:23
    • 16-05.Beef in Ubuntu - 7:38
    • 16-06.Embedding JavaScript - 5:34
    • 16-07.What is NoIP_ - 6:59
    • 16-08.Hooking iPhone - 3:14
    • 16-09.How to Stay Safe - 3:10
    • 16-10.Fake Game Website Attack Outro - 0:29
  • Post Hacking Sessions
    • 17-00.Post Hacking Section Intro - 0:32
    • 17-01.Meterpreter Sessions - 7:16
    • 17-02.Migration - 4:55
    • 17-03.Downloading Files - 4:54
    • 17-04.Capturing Keylogs - 2:38
    • 17-05.Sustaining The Session - 9:02
    • 17-06.Post Hacking Outro - 0:18
  • Hacker Methodology
    • 18-00.Hacker Method Intro - 1:00
    • 18-01.Ethical Hacker_s Steps - 3:49
    • 18-02.Detailed Explanation of Methodology - 5:57
    • 18-03.Hacker Method Outro - 0:38
  • Website Reconnaissance
    • 19-00.Website Recon Intro - 0:25
    • 19-01.Website Pentesting Setup - 5:00
    • 19-02.Maltego One More Time - 8:38
    • 19-03.Netcraft - 5:28
    • 19-04.Reverse DNS Lookup - 4:22
    • 19-05.Whois Lookup - 4:01
    • 19-06.Robots - 6:25
    • 19-07.Subdomains - 5:52
    • 19-08.Website Recon Outro - 0:30
  • Website Pentesting
    • 20-00.Website Pentesting Intro - 0:20
    • 20-01.Code Execution Vulnerability - 6:07
    • 20-02.Reverse TCP Commands - 8:49
    • 20-03.File Upload Vulnerability - 7:36
    • 20-04.File Inclusion - 6:37
    • 20-05.Website Pentesting Outro - 0:20
  • Cross Site Scripting
    • 21-00.XSS Intro - 0:45
    • 21-01.What is XSS_ - 3:32
    • 21-02.Reflected XSS - 4:03
    • 21-03.Stored XSS - 3:25
    • 21-04.Real Hacking With XSS - 5:54
    • 21-05.How to Protect Yourself_ - 3:38
    • 21-06.XSS Outro - 0:19
  • SQL 101
    • 22-00.SQL Intro - 0:52
    • 22-01.Database and SQL - 1:46
    • 22-02.Database Structure - 4:36
    • 22-03.Adding a New Value - 5:50
    • 22-04.Updating and Deleting Values - 4:55
    • 22-05.Filtering - 4:36
    • 22-06.SQL Outro - 0:21
  • SQL Injection
    • 23-00.SQLi Intro - 0:48
    • 23-01.Metasploitable Databases - 5:30
    • 23-02.Working with Mutillidae - 7:47
    • 23-03.Vulnerability Test - 5:21
    • 23-04.Post Method SQLi - 4:01
    • 23-05.Get Method SQLi - 4:08
    • 23-06.Every Password On Database - 3:26
    • 23-07.Learning Database Name - 5:38
    • 23-08.Finding Out More - 5:16
    • 23-09.Retrieving Everything - 4:20
    • 23-10.SQLi Outro - 0:26
  • Website Pentesting Tools
    • 24-00.Tools Intro - 0:35
    • 24-01.Sqlmap - 10:11
    • 24-02.Zap - 5:10
    • 24-03.Zap Analysis - 5:00
    • 24-04.Tools Outro - 0:25
  • Ethical Hacking Certifications
    • 25-00.Certifications Intro - 0:40
    • 25-01.Options For Certification - 2:28
    • 25-02.Certified Ethical Hacker - 6:37
    • 25-03.OSCP - 6:13
    • 25-04.Certifications Outro - 1:08
  • Python For Ethical Hacking Setup
    • 26-01.Anaconda Installation (Windows) - 13:00
    • 26-00.Anaconda Intro - 0:43
    • 26-02.Anaconda Installation (Mac) - 11:45
    • 26-01.Anaconda Outro - 0:23
  • Python Data Types & Structures
    • 27-00.Python Intro - 0:42
    • 27-01.Numbers - 8:35
    • 27-02.Variables - 11:31
    • 27-03.Downloading Notebooks - 4:08
    • 27-04.String - 7:53
    • 27-05.String Advanced - 13:57
    • 27-06.Variable Attributes - 14:07
    • 27-07.Lists - 10:54
    • 27-08.Lists Advanced - 5:07
    • 27-09.Dictionary - 11:41
    • 27-10.Sets - 9:11
    • 27-11.Tuples - 5:50
    • 27-12.Boolean - 4:08
    • 27-01.Python Outro - 0:56
  • Control Statements & Loops
    • 28-00.Control Statements Intro - 0:34
    • 28-01.Logical Comparisons - 6:30
    • 28-02.If Statements - 8:34
    • 28-03.If Statements Continued - 9:52
    • 28-04.If Statements Practical Usage - 5:06
    • 28-05.For Loop - 9:06
    • 28-06.For Loop Practical Usages - 5:51
    • 28-07.Break Continue Pass - 7:43
    • 28-08.While Loop - 11:33
    • 28-00.Control Statements Outro - 0:27
  • Essentials
    • 29-00.Essentials Intro - 0:28
    • 29-01.Useful Methods - 10:39
    • 29-02.Zip and Random - 8:01
    • 29-03.Lists Advanced - 5:20
    • 29-04.Sublime Text (Windows) - 7:08
    • 29-05.Command Prompt (Windows) - 3:40
    • 29-06.Sublime Text (MAC) - 6:19
    • 29-07.Terminal (MAC) - 3:47
    • 29-01.Essentials Outro - 0:31
  • Functions
    • 30-01.Functions Intro - 0:39
    • 30-01.Functions Explained - 9:09
    • 30-02.Input and Output - 11:38
    • 30-03.Functions Advanced - 9:57
    • 30-04.Functions Practical Usage - 10:53
    • 30-05.Scope - 13:49
    • 30-01.Functions Outro - 0:25
  • Object Oriented Programming
    • 31-00.OOP Intro - 0:27
    • 31-01.Class - 13:33
    • 31-02.Methods - 5:57
    • 31-03.Class Practical Usage - 7:06
    • 31-04.Inheritance - 7:37
    • 31-05.Special Methods - 8:25
    • 31-06.Error Handling - 11:05
    • 31-01.OOP Outro - 0:29
  • Modules
    • 32-00.Modules Intro - 0:24
    • 32-01.Using Libraries - 12:38
    • 32-02.Writing Our Own Modules - 5:53
    • 32-03.Imported vs Direct - 6:54
    • 32-01.Modules Outro - 0:22
  • MAC Changer
    • 33-00.MAC Changer Intro - 0:48
    • 33-01.Installing PyCharm On Kali - 16:16
    • 33-02.MAC and IP Address - 6:44
    • 33-03.Changing MAC Manually - 7:48
    • 33-04.Using Subprocess - 7:13
    • 33-05.Introducing Variables - 9:42
    • 33-06.Processing Tuples - 12:02
    • 33-07.Beautifying the Code - 8:01
    • 33-08.Saving Subprocess - 4:59
    • 33-09.Regex 101 - 6:46
    • 33-10.New MAC Control - 6:34
    • 33-11.Python3 Compatibility - 4:02
    • 33-01.MAC Changer Outro - 0:24
  • Network Scanner
    • 34-00.Network Scanner Intro - 0:28
    • 34-01.ARP Refreshed - 4:44
    • 34-02.How Network Scanners Work - 5:58
    • 34-03.ARP Request - 9:47
    • 34-04.Broadcast Request - 8:56
    • 34-05.Processing Response - 5:32
    • 34-06.Adding Features - 8:21
    • 34-07.Python 3 Compatibility - 0:51
    • 34-01.Network Scanner Outro - 0:32
  • Man In The Middle
    • 35-00.MITM Intro - 0:36
    • 35-01.MITM Refreshed - 4:30
    • 35-02.ARP Response Creation - 7:43
    • 35-03.ARP Poison - 7:14
    • 35-04.Getting MAC Address - 13:46
    • 35-05.Looping Continuously - 9:37
    • 35-06.Displaying Better Logs - 4:02
    • 35-07.Handling Specific Error - 10:01
    • 35-08.Getting User Input - 8:05
    • 35-01.MITM Outro - 0:21
  • Packet Listener
    • 36-00.Packet Listener Intro - 0:25
    • 36-01.Wireshark Refreshed - 7:28
    • 36-02.Wireshark Analysis - 7:32
    • 36-03.Gathering Packets - 8:41
    • 36-04.Working With Layers - 6:41
    • 36-05.Downgrading HTTPS - 15:15
    • 36-06.Protecting Ourselves - 2:51
    • 36-01.Packet Listener Outro - 0:35
  • Keylogger
    • 37-00.Keylogger Intro - 0:26
    • 37-01.Setting Up Windows - 13:34
    • 37-02.Working With Files - 13:54
    • 37-03.Logging Keyboard - 8:45
    • 37-04.Saving Logs - 6:14
    • 37-05.Handling Errors - 7:36
    • 37-06.Sending Email - 9:12
    • 37-07.Reason Behind Threading - 8:52
    • 37-08.Threading Library - 5:45
    • 37-09.Testing On Windows - 4:16
    • 37-01.Keylogger Outro - 0:27
  • Backdoor
    • 38-00.Backdoor Intro - 0:23
    • 38-01.How To Write A Backdoor - 6:42
    • 38-02.Opening A Connection - 7:38
    • 38-03.Running Commands - 8:35
    • 38-04.Writing Listener - 9:10
    • 38-05.Sending Commands With Listener - 6:10
    • 38-06.Class Structure - 9:19
    • 38-07.Finishing Classes - 5:37
    • 38-08.What Is JSON_ - 10:25
    • 38-09.Processing JSON - 8:28
    • 38-10.Sending Commands With List - 12:35
    • 38-11.Cd Command Implementation - 8:42
    • 38-12.Getting Contents - 6:59
    • 38-13.Saving Files - 6:18
    • 38-14.Encoding Downloads - 7:08
    • 38-15.Upload Functionality - 8:53
    • 38-16.Handling Errors - 7:10
    • 38-17.Python3 Compatibility - 12:13
    • 38-01.Backdoor Outro - 0:35
  • Packaging & Malicious Files
    • 39-00.Malicisous Files Intro - 0:27
    • 39-01.Malicious Files - 6:00
    • 39-02.Creating Executables - 5:27
    • 39-03.What is Regedit_ - 6:34
    • 39-04.Copying Files - 7:52
    • 39-05.Running Executables On Startup - 5:31
    • 39-06.Adding PDF to File - 8:37
    • 39-07.Changing Icons - 7:24
    • 39-08.Changing Extensions - 6:34
    • 39-01.Malicious Files Outro - 0:36
  • Closing & Ethical Hacker's Handbook
    • 40-01.Closing - 2:38

View Full Curriculum


Access
Lifetime
Content
7 hours
Lessons
92

A to Z Ethical Hacking Course

Learn Ethical Hacking, From Basics to Advanced Skills

By Amit Huddar | in Online Courses

From basics to advanced techniques, this course leaves no stone unturned as you explore the complex world of ethical hacking. Security professionals are in greater demand than ever, and this course will give you hands-on practice in a variety of techniques. By course's end, you'll be ready to score high-paying ethical hacking jobs.

  • Access 92 lectures & 7 hours of content 24/7
  • Learn how to make money as an ethical hacker
  • Explore bug bounty programs, viruses, & worms
  • Cover SQL injections, phishing, cross site scripting, & email hacking
  • Understand tools like Metasploit, Keylogger, Wire Shark, & more

Instructor

Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company "Softdust," which develops products for new technologies like wearables and other gadgets. He opted for computer science engineering in 2013 at SSIT and started his software company in his first year of engineering.

His skills include: Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, Building Custom Linux OS, Cloud Computing. Penetration testing, Kali Linux and Hacking.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Basics
    • Disclaimer - 0:54
    • Introduction - 2:50
    • Hacker vs Cracker - 2:44
    • Types of Hacker - 5:15
    • Steps Performed by Hackers - 3:23
    • Working of an Ethical Hacker - 4:14
    • Information Gathering - 3:08
    • Introduction to Linux - 5:22
    • Pen Testing - 4:46
    • How an Ethical Earns - 7:07
    • Brief Introduction of Bug Bounty - 5:53
    • Learn Bug Bounty - 4:57
    • Installing Kali Linux - 3:01
    • Dual boot Kali Linux with Windows - 5:45
    • Live Boot of Kali Linux - 2:44
    • Setting up Kali Linux in virtual box - 8:57
    • Introduction to Virus, Trojan, Worm etc - 4:56
    • Trojans Brief - 3:44
    • Tips to Maintain a Virus free PC - 6:36
    • Virus to different OS - 7:05
    • How to create harmless virus - 3:42
    • IP address - 4:36
    • Changing IP address in windows - 4:06
    • Changing IP From the Command Line in Linux - 1:53
    • Web Proxy - 3:57
    • VPN - 3:45
    • Web Development 1 - 1:32
    • Web Development 2 - 3:12
    • Web Development 3 - 4:31
    • Web Development 4 - 3:04
    • Web Development 5 - 6:58
    • Web Development 6 - 4:40
    • Web Development 7 - 5:17
    • Introduction to Web Server - 3:25
    • DVWA 1 - 3:58
    • DVWA 2 - 5:50
    • Installing DVWA on Windows - 5:11
    • Programming - 5:26
    • C Programming - 8:08
    • C++ Program - 6:51
    • Java Program - 6:38
    • Python - 5:56
  • Web Hacking
    • Login Process and SQL Injections - 1:57
    • SQL Injection Introduction - 5:01
    • SQL Injection finding Web Sites - 4:38
    • SQL Injection using Kali Linux - 6:25
    • SQL Injection using Havij - 6:25
    • SQL in DVWA - 7:50
    • Cross site scripting [XXS] 1 - 4:50
    • Cross site scripting [XXS] 2 - 5:18
    • Cross site scripting [XXS] 3 - 5:25
    • XXS in DVWA - 5:43
    • Phishing Introduction - 2:08
    • Phishing Page Development Introduction - 1:54
    • Creating Phishing Page using Kali Linux - 3:30
    • Developing Phishing Site - 2:54
    • Phishing- Facebook Hacking AdWords - 1:54
    • Website cloning- Social Engineering Tool - 7:01
    • Email Spoofing - 2:03
  • Miscellaneous
    • Encryption - 4:25
    • Keylogger - 2:36
    • Demonstration Free Keylogger - 9:23
    • Top Keyloggers - 11:14
    • Email Hacking - 6:00
    • Email Tracing - 2:11
    • Check Gmail Account is Hacked or not - 2:03
    • Windows Hacking and Security - 5:49
    • Windows Password Cracking - 6:03
  • Wireless Hacking
    • Wireless Hacking - 4:46
    • Wireless Hacking continue - 2:20
    • before WEP - 2:52
    • Wep Kali 2.0 - 5:37
    • MAC Address - 5:33
    • MAC Address filtering - 2:01
    • Changing MAC Address on Windows, Linux and Mac - 2:51
    • wifi hacking using reaver - 4:18
    • Reaver in Depth - 8:12
    • Sniffers Introduction - 2:57
    • Wireshark - 4:38
    • wireshark to Capture Filter and Inspect Packets - 6:08
    • Meta Sploit - 7:11
    • Meta Sploit 2 - 6:45
    • Meta Sploit 3 - 4:48
    • Search targets in metasploit - 2:26
    • Windows hacking - 2:42
    • Hacking android - 2:17
    • Robots - 2:12
    • Guessing - 4:51
    • Recover Deleted Files - 6:37
    • Team Viewer - 10:25
    • DOS Attack Introducton - 5:02
    • DOC attack tools - 1:46
    • DOC Counter Measure - 1:22
    • Social Engineering Introduction - 3:48
    • Prevention From Hackers - 4:10
    • Top Hackers - 7:13

View Full Curriculum


Access
Lifetime
Content
15 hours
Lessons
35

The Complete Ethical Hacking 2019 Course: Beginner to Advanced

Everything You Need to Know About the Art of Ethical Hacking

By Ermin Kreponic | in Online Courses

If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or elevate your IT career, this is the course for you. Here, you'll learn from experienced network security professionals while covering the most important topics in ethical hacking today.

  • Access 35 lectures & 15 hours of content 24/7
  • Get an introduction to ethical hacking
  • Learn how to install Linux, terminal basics, & Wireshark setup
  • Understand how to stay anonymous online & access the dark web using TOR
  • Explore aircark-ng, HashCat, & WiFi hacking
  • Defend your own networks from attacks
  • Clone websites

Instructor

Arsalan Saleem is a Security Expert and Software Developer with 7+ years of experience. He loves to work on innovative offensive security ideas. He has developed many web applications and mobile applications and has also worked on the security of industrial software.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • EHIntro - 16:23
  • Setup
    • Create a USB for Installation - 10:10
    • Installation Procedure Part 1 - 11:17
    • Installation Procedure Part 2 - 6:22
    • Improve safety and anonymity of your browser - 7:08
    • General Orientation - 14:44
    • Terminal Basics Part 1 - 16:03
    • Terminal Basics Part 2 - 11:46
    • Wireshark Setup Part 1 - 5:02
    • Wireshark Setup Part 2 - 7:54
  • Anonymity Online
    • How to connect to the Internet via proxy Part 1 - 17:47
    • How to connect to the Internet via proxy Part 2 - 2:50
    • How to set up a proxy server for traffic monitoring Part 1 - 19:52
    • How to setup a proxy server for traffic monitoring Part 2 - 9:55
    • How to setup a proxy server for traffic monitoring Part 3 - 14:39
    • How to setup a proxy server for traffic monitoring Part 4 - 19:04
    • How to setup a proxy server for traffic monitoring Part 5 - 9:23
    • How to connect to a VPN - 7:48
    • How to setup your own VPN server Part 1 - 10:14
    • How to setup your own VPN server Part 2 - 9:23
    • How to setup your own VPN server Part 3 - 13:33
    • How to setup your own VPN server Part 4 - 5:58
    • Monitor VPN server traffic - 9:45
    • Tor Browser - 11:21
    • How to setup a tor relay Part 1 - 18:32
    • How to setup a tor relay Part 2 - 5:44
  • Wireless
    • Installing aircrack-ng - 16:20
    • Capturing WPA2 Handshake - 12:55
    • Crunch password generator installation - 9:18
    • Crunch password generator rule sets - 18:50
    • Crunch password generator in combination with aircrack-ng - 13:51
    • Installing NVIDIA Drivers - 15:11
    • Installing HashCat - 8:39
    • Preparing the capture file for HashCat - 2:09
    • HashCat Part 1 - 13:15
    • HashCat Part 2 - 14:13
    • Changing your mac address - 13:32
    • Set up a sandboxed environment for our hotspot Part 1 - 18:16
    • Set up a sandboxed environment for our hotspot Part 2 - 11:52
    • Setting up an open wireless hotspot Part 1 - 8:39
    • Setting up an open wireless hotspot Part 2 - 3:40
    • Setting up the fake DNS resolutions Part 1 - 5:51
    • Setting up the fake DNS resolutions Part 2 - 3:08
    • Fighting against HTTPS, site cloning and credentials harvesting Part 1 - 7:48
    • Fighting against HTTPS, site cloning and credentials harvesting Part 2 - 8:51
    • Fighting against HTTPS, site cloning and credentials harvesting Part 3 - 5:04
    • Fighting against HTTPS, site cloning and credentials harvesting Part 4 - 13:07
    • Fighting against HTTPS, site cloning and credentials harvesting Part 5 - 10:48
    • Fighting against HTTPS, site cloning and credentials harvesting Part 6 - 19:47
    • Fighting against HTTPS, site cloning and credentials harvesting Part 7 - 3:36
    • Disconnect clients from a Wireless Access Point - 13:37
  • Site Cloning
    • How to clone websites - 6:45
  • Bitsquatting
    • BitSquatting part 1 - 14:20
    • BitSquatting part 2 - 19:59
    • BitSquatting part 3 - 18:08
    • BitSquatting part 4 - 19:34
    • BitSquatting part 5 - 9:59
  • Bad USB (USB Keylogger Deployment)
    • Overview - 3:58
    • Requirements - 5:15
  • Setting up Windows Virtual Machine
    • Installing Windows VM Part 1 - 10:01
    • Installing Windows VM Part 2 - 7:03
    • Install CodeBlocks with a Compiler - 4:18
    • Download and Compile the Keylogger - 9:00
  • Server Setup
    • Set up a Server for Keylogger - 15:51
    • Upload the Keylogger to the Server - 14:02
  • Arduino USB Programming
    • Download Arduino - 2:36
    • Set up Arduino and Teensyduino - 5:44
    • Confirm that Everything Works - 8:43
    • Gaining Admin Access on Windows 7, 8, 8.1 and 10 Part 1 - 9:33
    • Gaining Admin Access on Windows 7, 8, 8.1 and 10 Part 2 - 5:39
    • Generate Files in System32 - 9:58
    • Sets of Commands to be Executed Part 1 - 11:54
    • Sets of Commands to be Executed Part 2 - 9:21
    • Call Functions and Run Commands - 4:29
  • Windows Scripts
    • Powershell Script Part 1 - 8:57
    • Powershell Script Part 2 - 11:13
    • Powershell Script Part 3 - 14:23
    • Visual Basic Script - 14:00
    • Compile and Load - 1:05
  • Decryption for the Keylogger Files
    • Decrypt Part 1 - 18:37
    • Decrypt Part 2 - 12:46
    • Decrypt Part 3 - 16:20
  • Live Demo
    • Live Demo Part 1 - 4:32
    • Live Demo Part 2 - 2:57
  • Chapter Recap
    • Recap - 5:41

View Full Curriculum


Access
Lifetime
Content
7 hours
Lessons
59

Learn Python & Ethical Hacking from Scratch

Learn Python & Ethical Hacking By Writing More Than 20 Hacking Programs

By Zaid Sabih | in Online Courses

In this hands-on course, you'll learn by doing! Through an example-driven process, you'll go from zero to hero in Python and discover how you can use it to write programs that can be used to counter cyberattacks. The Ethical Hacking industry is booming and Python is an invaluable asset in breaking into this lucrative field.

  • Access 59 lectures & 7 hours of content 24/7
  • Learn Python programming & Ethical Hacking
  • Write over 20 ethical hacking & security programs
  • Model problems, design solutions & implement them using Python
  • Write cross-platform programs that work on Windows, OS X, & Linux
  • Gain a deep understanding of how computer systems work
  • Convert evil files into Trojans that work & function just like any other file type like an image or a PDF
  • Understand how websites work, the technologies used & how to test them for weaknesses
  • Extract & submit forms from Python

Instructor

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • Introduction - 6:31
    • Teaser - 7:29
    • What is Programming, What is Hacking & Why Learn Them - 6:13
    • Lab Overview & Needed Software - 7:48
    • Installing Kali 2019 as a virtual Machine - 10:13
    • Basic Overview of Kali Linux - 5:10
    • The Terminal & Linux Commands - 11:21
    • Python 2 VS Python 3 & Writing Our First Program - 9:08
    • Installing & Using a Python IDE - 9:32
  • Writing a MAC Address Changer - Python Basics
    • What is MAC Address & How To Change it - 7:41
    • Using Python Modules & Executing System Commands - 9:18
    • Implementing a Very Basic MAC Changer - 5:16
    • Variables & Strings - 10:12
    • Using Variables in MAC Changer - 4:36
    • Getting Input From The User - 6:18
    • Handling User Input - 9:40
    • Handling Command-line Arguments - 9:44
    • Initialising Variables Based on Command-line Arguments - 7:51
    • Functions - 9:40
    • Returning Values From Functions - 6:55
    • Decision Making - Theory - 6:53
    • Using Conditional Statements in MAC Changer - 9:05
  • MAC Changer - Algorithm Design
    • What is an Algorithm - 3:15
    • Reading Output Returned By System Commands - 6:24
    • Regular Expressions (Regex) - 8:14
    • Extracting a Substring Using Regex - 6:39
    • Refactoring & Housekeeping - 10:59
    • Implementing The Algorithm to Check The Mac Did Change - 6:11
  • Programming a Network Scanner
    • Introduction & Teaser - 10:11
    • Installing Windows as a Virtual Machine - 3:32
    • What is ARP & What its Used For? - 9:43
    • Designing an Algorithm To Discover Clients Connected To The Same Network - 4:00
    • Using Scapy To Create an ARP Request - 6:48
    • Combining Frames To Broadcast Packets - 9:37
    • Sending & Receiving Packets - 6:57
    • Lists - 8:20
    • Iterating Over Lists & Analysing Packet - 10:09
    • Using Escape Characters To Enhance Program Output - 6:29
    • Dictionaries - 9:37
    • Improving the Program Using a List of Dictionaries - 8:55
    • Iterating Over Nested Data Structures - 7:18
    • Python 3 Compatibility - 6:55
  • Writing an ARP Spoofer
    • What is ARP Spoofing? - 6:20
    • Redirecting the Flow of Packets in a Network Using arpspoof - 5:08
    • Sending ARP Responses - 5:34
    • Extracting MAC Address From Responses - 6:59
    • Loops - 8:53
    • More on Loops & Counters - 7:56
    • Dynamic Printing - 6:54
    • Handling Exceptions - 5:16
    • Implementing a Restore Function - 11:55
    • Restoring ARP Tables When an Exception Occures - 5:33
  • Writing a Packet Sniffe
    • Introduction & Teaser - 4:39
    • Sniffing Packets Using Scapy - 7:20
    • Extracting data From a Specific Layer - 6:50
    • Analysing Sniffed Packets & Extracting Fields From Layers - 12:21
    • Analysing Fields & Extracting Passwords - 11:05
    • Extracting URLs - 8:00
    • Capturing Passwords From Any Computer Connected to the Same Network - 8:03

View Full Curriculum


Access
Lifetime
Content
27 hours
Lessons
144

Master Ethical Hacking from Beginner Lab Setup to Coding Advanced Backdoors

Unlock a Career in Penetration Testing from Kali Linux Installation to Creating a Custom Keylogger

By Jerry Banfield | in Online Courses

Ethical hacking is an extremely valuable job skill for which the demand just keeps growing. Looking for a steady career opportunity? You could do a lot worse than ethical hacking. In this comprehensive course, you'll get down to brass tacks with the basics before advancing through to eventually coding your own advanced tools. You'll code your own command and control center that can receive many connections from other PCs, and learning how to use these tools for good.

  • Access 144 lectures & 27 hours of content 24/7
  • Cover basic, intermediate, & advanced ethical hacking tools
  • Learn Python & C
  • Explore assembly language to use for exploit development
  • Cover Kali Linux & Virtual Box installation

Instructor

Jerry Banfield has been an online entrepreneur since 2011, having served hundreds of clients in over 20 countries and managed billions of Facebook ads. He has learned how to drive large amounts of organic Google and YouTube traffic to his website, and teaches online courses sharing his experience with students worldwide. A member of the MENSAsociety, Jerry holds degrees from the University of South Carolina and the University of South Florida.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction and Installation!
    • Before We Begin! - 4:43
    • Virtual Box Install Tutorial - 15:37
    • Kali Linux Install Tutorial - 13:57
    • Going Full Screen in Kali Linux! - 18:17
  • Basic Commands!
    • Basic Commands Part 1 - 9:41
    • Basic Commands Part 2 - 21:06
    • Basic Commands Part 3 - 12:48
  • Prepare Your Lab!
    • Changing IP address and setting up Wireless Adapter - 4:53
    • Creating Bootable Kali USB - 5:00
    • Important Networking Terms - 10:18
    • Important Hacking Terms - 18:05
    • Few Things to Do After Installing Kali Linux - 8:32
    • Changing Our Mac Address - Macchanger - 6:27
  • Footprinting!
    • Google Hacking - 13:11
    • Nikto Basics - 10:55
    • Whois Tool - 6:40
    • Email Harvesting - 6:08
    • Shodan - 10:25
    • Zone Transfer With Dig - 7:09
  • Scanning!
    • Installing Metasploitable - 7:00
    • Nmap Part 1 - 15:34
    • Nmap Part 2 - 11:43
    • Nmap Part 3 - 12:25
    • Zenmap - 7:55
    • TCP scans - 15:52
    • Nmap Bypassing Defences - 17:24
    • Nmap Scripts 1 - 9:30
    • Nmap Scripts 2 - 14:00
  • Web Penetration Testing!
    • Installing Owasp - 8:27
    • HTTP request - 10:01
    • HTTP Response - 10:30
    • Burpsuite Configuration - 12:51
    • Editing Packets in Burpsuite - 12:21
    • Whatweb & Dirb - 10:12
    • Password Recovery Attack - 15:35
    • Burpsuite Login Bruteforce - 11:06
    • Hydra Login Bruteforce - 8:48
    • Session Fixation - 13:55
    • Injection Attacks - 5:35
    • Simple Command Injection - 11:10
    • Exploiting Command Injection Vulnerability - 7:44
    • Finding Blind Command Injection - 13:46
    • Basics Of SQL - 10:27
    • Manual SQL Injection Part 1 - 13:17
    • Manual SQL Injection Part 2 - 21:00
    • SQLmap basics - 16:37
    • XML Injection - 16:00
    • Installing XCAT and Preventing Injection Attacks - 5:53
    • Reflected XSS - 10:52
    • Stored XSS - 12:01
    • Changing HTML Code with XSS - 7:34
    • XSSer & XSSsniper - 13:40
  • WPA2 Cracking
    • Wireless Attacks Theory - 10:52
    • Putting Network Card in Monitor Mode - 4:41
    • Capturing Handshake With Airodump - 14:40
    • RockYou.txt - 14:00
    • Cracking with Aircrack - 15:35
    • Cracking with Hashcat - 15:00
    • Making Password Lists With Crunch - 18:22
    • Making Password Lists With Cupp - 7:12
    • Rainbowtables Part 1 - 16:36
    • Rainbowtables Part 2 - 5:40
    • Installing Fluxion - 6:20
    • Finding and Cracking Hidden Network - 8:22
    • Preventing Wireless Attacks - 8:00
  • Man In The Middle
    • ARP Protocol Basics - 10:30
    • MITM Attack Theory - 7:22
    • Installing MITMf - 6:38
    • Manual Arpspoofing - 12:50
    • Problems While Installing MITMf - 6:21
    • HTTP Traffic Sniffing - 8:32
    • DNS Spoofing and HTTPS Password Sniffing - 24:20
    • Hooking Browsers With BEEF - 16:04
    • Screenshotting Targets Browser - 11:03
    • Cloning Any Webpage - 8:56
    • Ettercap Basics - 7:00
  • System Hacking
    • MSFconsole Enviroment - 16:10
    • Metasploit Modules Explained - 12:14
    • Bruteforcing SSH with Metasploit - 15:20
    • Attacking Tomcat With Metasploit - 8:53
    • Getting Meterpreter With Command Injection - 25:08
    • PHP Code Injection - 5:46
    • 2 Metasploitable Exploits - 7:00
    • Wine installation - 12:04
    • Crafting Windows Payloads With Msfvenom - 10:04
    • Encoders & Hexeditor - 18:45
    • Windows 10 Meterpreter Shell - 12:01
    • Meterpreter Enviroment - 11:30
    • Windows 10 Privilege Escalation - 11:30
    • Preventing Privilege Escalation - 6:23
    • Post Exploitation Modules - 14:13
    • Getting Meterpreter Over Internet With Port Forwarding - 10:43
    • Eternalblue Exploit - 20:20
    • Persistence Module - 13:19
    • Hacking Over Internet With Ngrok - 10:26
    • Android Device Attack With Venom - 9:55
    • Real Hacking Begins Now! - 2:26
  • Python Basics
    • Variables - 13:45
    • Raw_input - 10:49
    • IF ELSE statement - 10:20
    • FOR loop - 6:33
    • WHILE loop - 8:24
    • Python Lists - 8:07
    • Functions - 14:33
    • Classes - 10:25
    • Importing Libraries - 7:01
    • Files in Python - 11:44
    • Try and Except rule - 5:14
  • Coding Advance Backdoor
    • Theory Behind Reverse Shell - 6:50
    • Simple Server Code - 12:43
    • Connection With Reverse Shell - 7:10
    • Sending and Receiving Messages - 10:49
    • Sending Messages With While True Loop - 7:54
    • Executing Commands On Target System - 9:37
    • Fixing Backdoor Bugs & Adding Functions - 20:10
    • Installing Pyinstaller - 2:26
    • First Performance Test of Our Backdoor - 18:01
    • Trying to Connect Every 20 seconds - 12:26
    • Creating Persistence Part 1 - 6:12
    • Creating Persistence Part 2 - 16:50
    • Changing Directory - 11:55
    • Uploading & Downloading Files - 22:32
    • Downloading Files From Internet - 22:45
    • Starting Programs From Our Backdoor - 6:47
    • Capturing Screenshot On Target PC - 18:46
    • Embedding Backdoor In Image Part 1 - 13:29
    • Embedding Backdoor In Image Part 2 - 8:40
    • Checking For Administrator Privileges - 12:11
    • Adding Help Option - 8:52
  • Creating Keylogger For Backdoor
    • Importing Pynput - 10:24
    • Simple Keylogger - 10:00
    • Adding Report Function - 10:36
    • Writing Keystrokes To a File - 14:00
    • Adding Keylogger To Our Reverse Shell Part 1 - 23:01
    • Adding Keylogger To Our Reverse Shell Part 2 - 7:42
    • Final Project Test - 14:26
  • Basic Authentication Bruteforcer
    • Printing Banner - 11:21
    • Adding Available Options - 11:16
    • Starting Threads For Bruteforce - 8:26
    • Making Function To Run The Attack - 11:05
    • Bruteforcing Router Login - 9:40
    • Bypassing Antivirus With All Your Future Programs - 13:43
    • Sending Malware With Spoofed Email - 15:16
    • Whats Next - 4:15

View Full Curriculum


Access
Lifetime
Content
17 hours
Lessons
89

Python Hacking for Cybersecurity from Basic Scripts to Coding Custom Tools

Advance Your Career In Cybersecurity

By Jerry Banfield | in Online Courses

If you want to take your ethical hacking career to the next level, you'll need to learn how to use Python for ethical hacking. In this course, you'll dive into Python's ethical hacking applications, learn how to install Kali Linux, and even discover how to code your own ethical hacking tools.

  • Access 89 lectures & 17 hours of content 24/7
  • Discuss port & vulnerability scanning
  • Cover SSH & FTP attacks
  • Learn about password cracking, network analysis, & more

Instructor

Jerry Banfield has been an online entrepreneur since 2011, having served hundreds of clients in over 20 countries and managed billions of Facebook ads. He has learned how to drive large amounts of organic Google and YouTube traffic to his website, and teaches online courses sharing his experience with students worldwide. A member of the MENSAsociety, Jerry holds degrees from the University of South Carolina and the University of South Florida.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction to Python for ethical hacking!
    • Welcome to Python for ethical hacking! - 5:16
    • VirtualBox 6.0.4 installation - 11:41
    • Kali Linux 2019.1a installation - 17:07
    • Guest additions installation - 15:08
    • Python in Kali terminal - 13:33
  • Port and vulnerability scanning
    • Making simple port scanner - 15:33
    • Adding raw_input to our port scanner - 9:24
    • Scanning first 1000 ports - 4:47
    • Coding advance port scanner - part 1 - 13:13
    • Coding advance port scanner - part 2 - 8:51
    • Finishing and testing advance port scanner - 9:00
    • Configuring IP address and installing Metasploitable - 8:14
    • Returning banner from open port - 14:46
    • Coding vulnerability scanner - part 1 - 11:57
    • Coding vulnerability scanner - part 2 - 7:21
  • SSH & FTP attacks
    • Automating SSH login - part 1 - 9:55
    • Automating SSH login - part 2 - 9:21
    • Testing SSH login program - 8:37
    • Coding SSH Bruteforcer - 10:38
    • Executing command on target after brute forcing SSH - 10:11
    • Anonymous FTP login attack - 9:55
    • Username & password list attack on FTP - 17:32
  • Password cracking
    • SHA256, SHA512 and MD5 - 8:37
    • Cracking SHA1 hash with online dictionary - 16:41
    • Getting password from MD5 hash - 13:26
    • Cracking crypt password with Salt - 24:02
  • Sniffers, flooders, and spoofers
    • Changing MAC address manually - 8:35
    • Coding MAC changer - 17:00
    • Theory behind ARP spoofing - 4:43
    • Crafting malicious ARP packet - 19:28
    • Coding ARP spoofer - 13:33
    • Forwarding packets and restoring ARP tables - 8:07
    • Spoofing our IP address and sending message with TCP payload - 12:02
    • Running SynFlooder with changed source IP address - 11:22
    • Getting source and destination MAC address from received packets - 24:46
    • Sniffing FTP username and password - part 1 - 8:12
    • Sniffing FTP username and password - part 2 - 12:12
    • Getting passwords from HTTP websites - 14:04
  • Coding DNS spoofer
    • Cloning any webpage - 10:37
    • Printing DNS queries - 10:01
    • Redirecting response to cloned page - 16:48
    • Setting IP table rules and running DNS spoofer - 10:40
  • Network analysis
    • Analyzing Ethernet header - 16:10
    • Analyzing IP header - part 1 - 10:27
    • Analyzing IP header - part 2 - 25:35
    • Analyzing TCP header - 15:15
    • Analyzing UDP header - 13:21
  • Multi functioning reverse shell
    • Theory behind socket programming - 7:20
    • Wine & Pyinstaller installation - 7:45
    • Setting up listener - 8:19
    • Establishing connection between target and server - 6:32
    • Implementing send & recv functions - 11:30
    • Executing commands on target system - 11:44
    • Importing JSON library to parse data - 8:21
    • Converting Python backdoor to .exe - 8:15
    • Using OS library to change directory - 10:00
    • Downloading & uploading files to target PC - 19:07
    • Hiding our backdoor and creating persistence - 13:50
    • Trying to connect to server every 20 seconds - 7:55
    • Downloading files to target PC - 11:51
    • Capturing screenshot on target PC - 23:08
    • Administrator privilege check - 8:15
    • Starting other programs with our shell - 10:47
    • Running our shell as an image, audio, Pdf... - 20:09
  • Coding keylogger
    • Installing Pynput - 6:21
    • Printing space character - 8:50
    • Calling timer on our keylogger - 9:58
    • Adding keylogger to our backdoor - 13:00
  • Command and control center
    • What is a threaded server - 5:07
    • Accepting connections with a thread - 13:14
    • Managing multiple sessions - 8:41
    • Testing threaded server with Windows 10 target - 9:05
    • Fixing Q command - 11:14
    • Coding exit function - 13:53
    • Attacking multiple targets and gathering botnet - 16:29
  • Website penetration testing with Python
    • Saving passwords to a file - 22:00
    • Saving passwords to a file - 3:03
    • Bruteforcing Gmail - 10:15
    • Bruteforcing any login page - part 1 - 13:01
    • Bruteforcing any login page - part 2 - 10:11
    • Finding hidden directories - part 1 - 5:12
    • Finding hidden directories - part 2 - 6:40
    • Discovering subdomains - 11:33
    • Changing HTTP headers - 14:00
    • Starting basic and digest authentication bruteforcer - 10:25
    • Controlling threads - 8:37
    • Coding run function - 10:10
    • Printing usage and testing our program - 12:38
    • Taking a look at ransomware - 8:22

View Full Curriculum


Access
Lifetime
Content
52 hours
Lessons
172

How to Hack from Beginner to Hacking Professional

Prepare to Certify Your Ethical Hacking Know-How

By Jerry Banfield | in Online Courses

Start your ethical hacking journey today with this beginner-friendly course that's aimed at helping you certify your ethical hacking skills. Doing so will help you score high-paying jobs and carve out a career in the ethical hacking industry.

  • Access 172 lectures & 52 hours of content 24/7
  • Cover key topics on ethical hacking
  • Learn how to scan networks
  • Hack web servers & web applications
  • Discuss cloud computing & cryptography

Instructor

Jerry Banfield has been an online entrepreneur since 2011, having served hundreds of clients in over 20 countries and managed billions of Facebook ads. He has learned how to drive large amounts of organic Google and YouTube traffic to his website, and teaches online courses sharing his experience with students worldwide. A member of the MENSAsociety, Jerry holds degrees from the University of South Carolina and the University of South Florida.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Welcome to ethical hacking!
    • Prepare to pass the CEH Version 10 exam with this class starting with ethical hacking basis! - 9:01
  • Footprinting and reconnaissance!
    • Passive information gathering theory for ethical hackers preparing for the CEH version 10 exam! - 18:40
    • Active and passive information gathering in Kali Linux! A practice exercise to prepare for CEH v10! - 15:59
    • DNSDUMSTER, OSINT framework, and THATSTHEM for passive search engine recon in Kali Linux! - 27:47
  • Scanning networks!
    • Network scanning theory: Fundamentals for ethical hackers preparing for CEH version 10 exam! - 31:54
    • Network scanning commands in Kali Linux for Certified Ethical Hacking Exam Preparation! - 10:33
    • Port forwarding and host visibility in networks with Kali Linux. - 11:37
    • Network scanning using Nmap Netdiscover and Bettercap - 10:06
  • Enumeration
    • Enumeration fundamentals for Ethical Hackers preparing for CEH exam! - 19:33
    • Basics of enumeration using Kali Linux - 15:02
    • Advanced enumeration using Nmap and Kali Linux - 14:46
    • Enumeration with wpscan and Kali Linux - 18:32
    • Enumeration implementation - 9:34
  • Vulnerability analysis
    • Vulnerability analysis fundamentals and theory - 29:08
    • Vulnerability analysis demonstration including how to check manually - 17:53
    • Basic Nessus installation on Windows 7 - 10:07
    • Basics of Nessus and automated vulnerability scans - 23:13
    • Nessus installation on Kali Linux - 10:54
  • System hacking
    • Fundamentals of system hacking and remote shells - 30:34
    • Basic Linux commands and fundamentals of file structure - 18:45
    • Fundamentals of processes and nano - 12:49
    • Basics of VIM - 11:41
    • Linux processes and permissions - 17:28
    • Armitage basics with Kali Linux - 7:20
    • Metasploit basics with Kali Linux - 13:54
    • Attacking Windows 7 with Eternalblue and Kali Linux - 13:15
    • Attacking Windows 7 with msfvenom and Kali Linux - 17:07
    • Command prompt powershell and permission basics in Windows - 11:45
  • Malware threats
    • Malware fundamentals - 15:45
    • C fundamentals of hacking programming and files using Kali Linux - 29:31
    • Basics of Python coding for networking and hacking with Kali Linux - 11:45
    • Generating payloads with TheFatRat and Kali Linux - 9:18
  • Sniffing
    • Fundamentals of sniffing and sniffing tools - 18:03
    • Netsniff - ng - Ettercap - Wireshark - 10:42
    • TcpDump - 13:39
    • WireShark - 16:47
  • Social Engineering
    • Social engineering fundamentals - 19:44
    • Social engineering Facebook attack using setoolkit and Kali Linux - 13:36
    • Social engineering attacks using BEEF and Kali Linux - 15:15
    • SET SpearFish - 13:54
    • SET Payload - 8:24
  • Denial of Service
    • Denial of Service fundamentals - 18:12
    • Basics of DoS with Kali Linux - 7:48
    • DoS trough tor network with Kali Linux - 8:50
    • How to connect Kali Linux in tor network - 17:59
    • How to create a script which connects you to tor network with bash and Kali Linux - 25:50
    • DoS with LOIC and Kali Linux - 6:50
  • Session hijacking
    • Session hijacking fundamentals - 19:37
    • Becoming man in the middle with Kali Linux - 11:15
    • Sniffing with Bettercap and Kali Linux - 11:29
    • Basics of Burp with Kali Linux - 9:37
    • Session hijacking with Kali Linux - 8:11
  • Evading IDS, firewalls, and honeypots
    • Evading fundamentals - 33:47
    • Installing snort IDS on Windows 7 - 23:55
    • How to create snort rules on Windows 7 - 29:50
    • Snort on Linux - 40:12
    • Setting up vulnerable Windows 7 honeypot - 12:32
    • Honeypots - 21:48
    • Evading firewalls with Nmap and Kali Linux - 11:35
  • Hacking web servers
    • Hacking web servers fundamentals - 32:15
    • Installing Python 3 on Windows 7 and setting up simple Python HTTP server - 13:23
    • Installing XAMPP on Windows 7 - 13:33
    • Installing Apache and working with simple web server on Kali Linux - 11:08
    • Working with web servers on Kali Linux - 8:04
    • Installing and playing around with Bee-Box and Kali Linux - 15:38
    • Working with beebox on Kali Linux - 22:42
    • Hacking web servers with Kali Linux - 18:46
    • ShellShock - 14:08
  • Hacking web applications
    • Web application hacking fundamentals - 40:35
    • HTML injection with Kali Linux - 18:03
    • Basics of burp and requests with Kali Linux - 14:38
    • Iframe injection with Kali Linux - 9:19
    • Remote commands injection with Kali Linux - 13:34
    • PHP arbitrary code injection with Kali Linux - 7:33
    • Broken authentication - 11:45
    • HeatBleed - 17:14
    • XSS - 21:10
    • XSS - Stored - GET - 10:51
    • XSS - Reflected - POST - 9:11
    • XSS - Reflected - GET - 9:16
    • XSS - Json - 10:13
    • XSS - Ajax - Json - 10:02
    • Exploiting unencrypted communication with Bettercap - 8:16
    • Fundamentals of robots.txt file - 14:34
    • Arbitrary files upload - 22:47
    • Cross Site Request Forgery - 8:48
    • CSRF transfer hacking - 9:00
    • PHPinfo fundamentals - 9:21
    • Directory traversal with Kali Linux - 19:15
    • Fuzzing with OWASP Zap - 8:42
    • Cookie encoding fundamentals - 16:26
  • SQL injection
    • SQL injection fundamentals part 1 - 22:35
    • SQL injection fundamentals part 2 - 21:51
    • SQL injection with Kali Linux - 21:59
    • Post SQL injection with Kali Linux - 9:28
    • Login SQL injection with Kali Linux - 6:02
    • SQLite injection with Kali Linux - 13:52
    • SQL injection in user agent - 10:36
  • Hacking wireless networks
    • Wireless network theory - 36:06
    • Hacking wireless networks theory - 33:44
    • Wifi hacking tools theory - 35:20
    • Encryption and cryptography theory - 23:29
    • Wardriving theory - 15:08
    • Wardriving examples - 8:05
    • WiFiPhisher - 20:18
    • Aircrack suite - 17:47
    • WireShark - 15:52
    • Hacking with wifiphisher part 1 - 20:05
    • Hacking with wifiphisher (part2) and wifipumpkin - 23:13
    • Fake AP attacks with airgeddon and Kali Linux - 43:35
    • Hacking wireless WPA networks with aircrack-ng package - 26:00
    • Hacking wireless networks with fluxion and Kali Linux - 36:57
  • Hacking mobile platforms
    • Mobile devices theory - 37:16
    • Mobile hacking theory - 23:30
    • Android hacking tools - 40:11
    • Hacking mobile devices engagement - 6:06
    • IOS security controls theory - 30:33
    • Android security controls theory - 22:07
    • How to protect your Android smartphone - 17:31
    • How to install Android emulator - 17:48
    • Android emulators - 14:31
    • How to install Android as a virtual machine - 24:15
    • Hacking Android devices with metasploit - 37:27
    • Metasploit Android - 14:37
    • Becoming persistent in Android system - 17:09
  • IoT hacking
    • IoT 1 - 14:57
    • IoT 2 - 18:59
    • IoT hacking tools - 34:58
    • Hacking IoT part 2 - 30:21
    • IoT scenario part 1 - 23:17
    • IoT scenario part 2 - 24:47
    • Smart devices - 32:34
    • AWS basics - 36:56
  • Cloud computing
    • Cloud computing theory part 1 - 25:01
    • Cloud computing theory part 2 - 17:05
    • Cloud vulnerabilities theory - 28:28
    • Cloud security controls - 22:07
    • Data centers - 31:33
    • Cloud solutions - 36:56
    • Using Google Drive plus tips and tricks - 27:36
    • Using Drive for hacking - 18:56
    • Azure basics - 36:31
    • Hacking into data center stories - 17:08
    • Software as a Service - 24:05
    • Infrastructure as a Service - 11:02
    • Platform as a Service - 13:14
    • Remote code execution vulnerability - 38:38
    • Real life hacking example - 11:26
  • Cryptography
    • Cryptographic theory - part 1 - 23:05
    • Cryptography theory - part 2 - 28:08
    • Asymmetric encryption - 21:59
    • Symmetric encryption - 17:09
    • Secure Socket Layer (SSL) - 17:55
    • Pretty Good Privacy (PGP) - 10:23
    • Advanced Encryption Standard (AES) - 10:31
    • Wifi security - WPA2 - 8:43
    • Wifi security - WPA3 - 12:14
    • Vulnerabilities - TLS1.3 - 10:36
    • Hashing algorythms - 32:29
    • Breaking the hash - 8:46
    • Hashing analysis and basic encryption - 10:24
    • Creating password dictionary - 14:17
    • Networking and encrypting with Python - 27:42
    • File encryptor with C - 28:18
    • Brute forcing SSH service using Hydra - 10:59
    • Linux MAC passwords - theory - 10:47
    • Linux MAC passwords - practical - 9:31
    • How Windows manages passwords - 14:28
    • Windows passwords management - 7:25
    • Cracking passwords theory - 19:07
    • Cracking offline passwords with John - 9:58
    • Digital certificates - 20:03

View Full Curriculum


Access
Lifetime
Content
7 hours
Lessons
78

Learn Hacking Using Raspberry Pi From Scratch

Improve Your Ethical Hacking Skills By Using Your Portable Raspberry Pi Device

By Saad Sarraj | in Online Courses

In this beginner-friendly course, you'll learn how black hat hackers use the Raspberry Pi to implement remotely advanced hacking techniques to crack WEP/WPA2 Wi-Fi encryption keys and to compromise Windows, Linux, and Mac OS X operating systems. You'll discover how to set up the Raspberry Pi 3 as a server and Raspberry Pi Zero as the hacking hardware so you can perform more ethical hacking techniques on the go.

  • Access 78 lectures & 7 hours of content 24/7
  • Learn what Raspberry Pi is & what it's used for
  • Discover multiple ways to connect to your Raspberry Pi using your laptop, Android, & iPhone
  • Explore networking basics you need to know for WiFi hacking
  • Discuss pre-connection attacks, password cracking, & more
  • Hack any WiFi access point or operating system using Raspberry Pi

Instructor

Saad Sarraj has been an Ethical Hacker since 2012. He founded the website iSecurityPro and has been educating people in Linux and Windows security tips through his YouTube channel over that time. He is always focused on the practical side in his teaching, and the theory behind every attack.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Configure Raspberry Pi
    • Introduction - 0:53
    • What is Raspberry Pi? - 1:45
    • Raspberry Pi Review - 4:34
    • The Required Hardware - 3:22
    • Enabling SSH (Secure Shell) on Raspberry Pi - 8:22
    • Connect to Raspberry Pi via SSH on Windows, Linux, Mac - 6:29
    • Use the Entire Capacity of the SD card - 5:00
    • Upgrading and Installing all Kali tools - 4:26
    • Installing Kali Linux on Raspberry Pi 3 - 2:58
    • Change the default Password - 5:29
    • Set a static IP address - 7:45
    • Connect to any Wi-Fi AP through terminal - 6:45
    • Automatically connect a Raspberry Pi to a WI-FI network - 10:29
    • Setup LCD display to Raspberry Pi - 6:27
  • Connecting to Raspberry Pi
    • Introduction - 1:34
    • Connect to Raspberry Pi Desktop (GUI) - 10:28
    • Connect to Raspberry Pi using your smartphone (1st method) - 5:57
    • Connect To Raspberry Pi Wirelessly Using Your Smartphone (2nd Method) - 7:50
    • Connect to Raspberry Pi over WAN - 9:37
    • Take Your Raspberry Pi Everywhere - 3:52
  • Network Basics
    • What is the MAC Address & How To Change It - 5:43
    • Wireless Modes (Managed & Monitor mode) Preview - 1:14
    • Enabling Monitor Mode - 4:29
  • Pre-Connection Attacks
    • Introduction - 1:12
    • Capturing all Wi-Fi packets in the Range (5/2.4 GHz) - 6:05
    • Capturing a Specific Wi-Fi access point packets - 6:31
    • Disconnect any Device from any Wi-Fi access point - 5:49
    • Jamming any WiFi access point - 6:03
    • Detecting the Hidden Wi-Fi Networks (ESSIDs) - 3:20
  • Cracking WEP Wi-Fi Key using Raspberry Pi
    • Introduction - 1:11
    • Cracking WEP Encryption (Theory) - 2:10
    • The Used Methods to Crack WEP Wi-Fi Encryption - 1:40
    • Cracking WEP Wi-Fi key (Basic) - 6:20
    • Fake Authentication Attack - 4:29
    • Korek Chopchop Attack - 8:52
    • ARP Request Replay Attack - 4:07
  • Cracking WPA/WPA2 Wi-Fi key Using Raspberry Pi
    • Cracking WPA/WPA2 Wi-Fi key Using Raspberry Pi Introduction - 2:11
    • Cracking WPA/WPA2 Theory - 0:55
  • Hacking Wi-Fi Access point by Cracking the Password
    • Capture the Handshake - 4:19
    • Generating a Wordlist in Raspberry Pi - 8:47
    • Generating a Wordlist in Windows + Online Wordlists - 8:44
    • Cracking the key using Aircrack-ng (Basic) - 7:47
    • Cracking the key using your PC (CPU method) - 5:37
    • Cracking the key Much Faster Using GPU - 6:15
  • Hacking any Wi-Fi access point using Raspberry Pi (Without Wordlist)
    • Demonstration - 3:31
    • The Theory - 1:41
    • Installing the Required Tools Hardware - 7:12
    • Hacking any Wi-Fi AP using your Computer - 6:23
    • Stealing Social Network accounts - 10:54
    • Hacking any Wi-Fi AP using your Smartphone - 2:42
  • Hacking Windows, Linux, Mac OSX
    • Hacking Windows, Linux, Mac OSX Introduction - 1:47
  • Setup Raspberry Pi 3 to Hack Windows, Linux, Mac OSX
    • The Purpose of using Raspberry Pi 3 - 1:39
    • Install Empire Project - 3:57
    • Creating An Empire Listener - 7:41
    • Creating Windows Powershell Stager & Hacking Windows 10 - 11:10
    • Creating a Linux Bash Stager & Hacking Linux - 6:41
    • Creating a Linux Bash Stager & Hacking Mac OSX - 4:37
    • Hacking With Raspberry Pi 3 over WAN - 8:34
  • Setup Raspberry Pi Zero
    • Installing Raspbian on Raspberry Pi - 3:25
    • Connect to Raspberry Pi Zero via SSH - 4:56
    • Set a Static IP address & Connect to the Internet - 5:08
  • Hacking Windows/Linux just by plugging Raspberry Pi Zero
    • Hacking Windows Linux just by plugging Raspberry Pi Zero (Teaser) - 2:50
    • Install the Required Tools - 9:53
    • Basic Shell (Part 1) - 7:20
    • Basic Shell (Part 2) - 7:31
    • Hacking Windows 10 by Plugging RP Zero - 16:34
    • Hacking Linux by Plugging RP Zero - 7:29
    • Stealing Locked Windows login Credential - 2:58
    • Crack Windows login Hash - 4:44
  • Post Exploitation Windows, Linux and Mac OSX
    • Post Exploitation Windows, Linux and Mac OSX Introduction - 1:56
  • Interact with the Target Operating System
    • Basic Commands - 9:31
    • File System Commands - 6:31
    • Download Upload files Execute Shell Commands - 6:28
  • Post Exploitation (Windows)
    • Escalate your Privileges to an Administrator - 6:26
    • Maintain your Access - 9:32
  • Post Exploitation (Linux/Mac OSX)
    • Maintaining Access (Linux) - 4:07
    • Escalate your Privileges to Root (Mac OSX) - 3:14
    • Maintain your Access (Mac OSX) - 3:44

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 15 days of purchase. Once your license is redeemed, all sales are final.
×
Your Ad Blocker Is On!
Sadly, recent updates to your Ad Blocker are preventing crucial parts of our shop from loading. Frustrating. We know. We hate to nag, but please turn off your Ad Blocker or whitelist us to continue exploring our shop.