Mastering Ethical Hacking

Mastering Ethical Hacking

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 5h 52m | 1.01 GB

Hack your way to a secure and threat-free environment using best-in-class tools and techniques.

Security is the foremost concern for all organizations both big and small, and thus companies and people are ready to invest in enhanced security, pentesting, and Ethical Hacking. Security is a major issue that organizations are now facing. Cyber threats are on the increase with the rising growth of technology, thus giving rise to the need for ethical hacking and advanced security.

This course takes your Ethical Hacking skills to the next level to help you address various security threats, whether in information, networks, and other security concerns. This course will start by showing you how to install Kali Linux on your system and how to work with it. The course will then show you how to gather information using different methods such as fingerprinting and open ports.

The course will then help you check your system’s vulnerability using Nessus and OpenVAS. You will then learn to exploit your vulnerability with different parameters to reveal all the gaps in your system. You’ll then escalate privileges in your system to improve your design and program, and prevent password attacks using different methods. Finally, you will learn to prevent wireless attacks on your system.

By the end of the course, you will be a Master of Ethical Hacking and will have learned to prevent unwanted hackers from hacking into your system.

This course is a seamless blend of text, videos, code examples, and assessments that will help you, master Ethical Hacking efficiently as you progress through the course. The course has a perfect blend of theory and practical knowledge. It is also example-heavy so that it is easier to relate to.

What You Will Learn

  • Install and set up Kali Linux
  • Install Kali Linux on VirtualBox and VMware
  • Installing Broadcom drivers
  • Implement encryption in your system
  • Explore your information and how to gather it
  • Implement an anonymous encrypted email service
  • Prevent password attacks on your system
  • Use the NVIDIA Compute Unified Device Architectures
  • Use dictionary attacks and rainbow tables
Table of Contents

01 The Course Overview
02 Downloading Kali Linux
03 Downloading and Installing VMware
04 Downloading and Installing VirtualBox
05 Installing Kali Linux
06 Installing VMware Tools
07 Updating Kali Linux
08 Setting Up Proxychains
09 Starting Network Services
10 DNS Enumeration
11 Information Gathering – Whois Lookup and Subdomain Enumeration
12 Finding Open Ports with Nmap
13 OS and Service Fingerprinting
14 Exploring Maltego
15 Installing and Configuring Nessus
16 Finding Local Vulnerabilities Using Nessus
17 Checking for Linux Specific Vulnerabilities with Nessus
18 Checking for Windows Specific Vulnerabilities with Nessus
19 Installing and Configuring OpenVAS
20 Checking for Linux and Windows Vulnerabilities with OpenVAS
21 Mastering Metasploit – Metasploit Console MSFconsole
22 Exploring Armitage – The Metasploit Graphical User Interface
23 MySQL Database Exploitation with Metasploit
24 Client Side Attacks – BeEF Browser Exploitation
25 Client Side Attacks – Using the Social Engineering Toolkit (SET)
26 Generating Wordlists with Crunch
27 Password Cracking with John the Ripper
28 Password Cracking with Hydra
29 Password Cracking with Medusa
30 Network Discovery with Netdiscover
31 Network Sniffing with Tcpdump
32 Network Sniffing with Wireshark
33 ARP Spoofing with arpspoof
34 MITM with Ettercap