Description
In this course, you will learn:-
- On Windows, Mac, and Linux, step-by-step instructions for installing VirtualBox and setting up your virtual environment
- An overview of network attacks and password cracking
- Tips on how to be anonymous while hacking and penetration testing
- A firm grasp on the concepts of ethical hacking and penetration testing
Syllabus:-
-
Ethical hacking and penetration testing. What is it and how can you use it?
-
Prerequisites for this course
-
Basic terminologies such as white hat, grey hat, and black hat hacking
-
Basic terminology including SQL injections, VPN, proxy, VPS, and key loggers
-
How to get the most out of this course and practice what you learn.
-
Three key ideas for success using this course
-
Installing VirtualBox with rpm plus why use a virtual machine
-
Installing VirtualBox using the default package manager from repositories
-
Creating the virtual environment
-
Installing VirtualBox Guest Additions
-
Introduction to the Linux terminal
-
Linux Command-Line Interface (CLI) basics
-
The Linux CLI explained in greater detail to give you a good understanding
-
Tor part 1.
-
proxychains part 1
-
VPN part 1
-
macchanger part 1
-
Nmap part 1
-
Intro to wifi hacker cracking WPA⁄WPA2
-
Aircrack and reaver installation.
-
Aircrack-ng crunch usage example 1.
-
Performing denial of service on wireless networks part 1.