Description
In this course, you will :
- Learn Ethical Hacking from the ground up, as well as all five phases of Penetration Testing.
- Learn Python from the ground up so you can create your own ethical hacking tools.
- Creating a Hacking Lab: Kali Linux and Virtual Machines (compatible with Windows, Mac, and Linux).
- Make more virtual *vulnerable* devices for us to practise our attacks on.
- For ethical hacking, create trojans, viruses, and keyloggers.
- Learn how to use Advanced Scanning to circumvent firewalls and intrusion detection systems.
- Discover how to decrypt Wireless Access Point passwords.
- Bounty for Bugs: Find all forms of Web Application Bugs that may pose a concern.
- Discover how to obtain access to any machine: Windows/Linux/MacOS.
- Using Man In The Middle attacks, sniff credentials over the local area network.
- SQL Injection, XSS, Command Injection, and other techniques are available.
- Learn how to use social engineering to persuade individuals into opening your programme.
- Learn how to use the Advanced Metasploit Framework.
- Learn the fundamentals of Linux and the Linux Terminal.
- Master Data Collection and Footprinting.
- Discover how to do a vulnerability analysis.
- Perform comprehensive network scanning.
- Deauthentication Attack should be used to disconnect everyone from the Wireless Access Point.
- Learn the fundamentals of website application penetration testing.
- Discover Advanced Nmap Usage.
- Create your own Advanced Backdoor to utilise in Penetration Tests.
- Persistence should be created on the target machines.
- Execute the most recent Windows 7 and 10 exploits and attacks.
- Discover numerous methods for gaining access to a router.
- Learn Networking & different Networking Protocols
- Combine programming knowledge and ethical hacking knowledge so you can mix techniques and adapt them to different situations
Syllabus :
- Setting Up Our Hacking Lab
- Linux Operating System
- Reconnaissance & Information Gathering
- Scanning
- Python Coding Project #1 - Portscanner
- Vulnerability Analysis
- Exploitation & Gaining Access
- SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
- Gaining Access (Viruses, Trojans, Payloads ...)
- Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers ..
- Python Coding Project #2 - Backdoor
- Website Application Penetration Testing
- Python Coding Project #3 - Login Bruteforce, Directory Discovery
- Man In The Middle - MITM
- Extra: Wireless Access Point Cracking
- Extra: Gaining Access To An Android Device
- Extra: Introduction To Anonymity
- Extra: Hacking Active Directory
- Where To Go From Here ?
- Learn Python Basics
- Learn Python Intermediate
- Learn Python 3: Error Handling
- Learn Python 4: File I/O