Description
In this course, you will :
- 
	Learn ethical hacking, its fields & the different types of hackers.
 - 
	Start from 0 up to a high-intermediate level.
 - 
	Install a hacking lab & needed software (on Windows, OS X and Linux).
 - 
	Understand how websites work, how to discover & exploit web application vulnerabilities to hack websites.
 - 
	Discover different Website Protocols
 - 
	how to take care of such things
 - 
	Use hacking tools such as Metasploit, Aircrack-ng, SQLmap.....etc.
 - 
	Hack secure systems using client-side & social engineering.
 - 
	Discover and learn how phishing is perform
 - 
	Install & use Kali Linux - a penetration testing operating system.
 - 
	Learn linux commands & how to interact with the terminal.
 - 
	Learn linux basics.
 - 
	Discover vulnerabilities & exploit them to hack into servers.
 - 
	Secure systems from all the attacks shown.
 - 
	Learn Network Hacking / Penetration Testing.
 - 
	Crack WEP/WPA/WPA2 encryptions using a number of methods.
 - 
	Run attacks on networks without knowing its key.
 - 
	Sniff network traffic & analyse it to extract important info such as: passwords, cookies, urls, videos, images ..etc.
 - 
	Discover devices connected to the same network.
 - 
	Hack servers using server side attacks.
 - 
	Hack systems using client side attacks.
 - 
	Backdoor normal programs.
 - 
	Gather information about people, such as emails, social media accounts, emails and friends.
 - 
	Send emails from ANY email account without knowing the password for that account.
 - 
	Understand how websites & web applications work.
 - 
	Exploit file upload vulnerabilities to gain control over target website.
 - 
	Bypass login forms and login as admin using SQL injections.
 - 
	Discover and learn various Network Protocols
 - 
	Discover reflected XSS vulnerabilities.
 - 
	Read / Write files to the server using SQL injections.
 - 
	Backdoor any file type such as pictures, pdf's ...etc.
 - 
	Discover and learn Different Security Paradigms and parameters
 - 
	Hack secure systems using social engineering.
 - 
	Read, write download, upload and execute files on compromised systems.
 - 
	Discover websites hosted on the same server as the target website.
 









