Real-World Ethical Hacking: Hands-on Cybersecurity

Real-World Ethical Hacking: Hands-on Cybersecurity

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 8 Hours | 2.34 GB

Protect yourself, gain the hottest new job skills, and learn the tricks the bad guys use – with Kali Linux & Metasploit!

Learn Ethical Hacking, one of the fastest-growing and highest-paying careers, with over 1 Million cybersecurity job openings available this year! Learn practical, useful cybersecurity step-by-step from Computer Science Professor Dr. Bryson Payne, a Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP), and author of the Amazon #1 New Release and Top 10 Best Seller in Children’s Programming Books, Teach Your Kids to Code (2015, No Starch Press). Dr. Payne is also the Director of the Center for Cyber Operations Education at the University of North Georgia and directs the National Cyber Warrior Academy summer program.

Give Yourself a Huge Advantage in a High-Tech World

  • Quickly master new hands-on skills in Linux, Windows and Android hacking and cybersecurity.
  • Set up your own safe, FREE virtual network and VM (virtual machine) lab for Ethical Hacking on your PC, Mac, and Linux.
  • Protect yourself from viruses, phishing, ransomware, and other attacks by learning how the bad guys work, and how to stop them.
  • Includes Mobile Hacking on your own Android VM, plus Car Hacking using can-utils and ICSim on Kali Linux.
  • Great for beginners, or for capable computer users who want to learn both how and why to secure their data.
  • Learn to fix vulnerabilities, and how to stop 85% of attacks by doing just four things.

This is the security course everyone should take

Packed with real-world, practical examples, real hacking techniques, and easy-to-follow plain English instruction, Real-World Ethical Hacking is the course for the new generation of cyber heroes, as they build one of the top job skills of the 21st century! With over 1,000,000 cybersecurity jobs posted in the U.S. this year alone, and over 6 Million openings expected worldwide over the next few years, now is the time to skill up in cyber!

I designed this course to be easily understood by beginners, with examples I use in my college information security courses and in high-school cyber summer camps. Whether you’re retooling for a career change, adding skills to your resume for a raise, or just getting started, Real-World Ethical Hacking is the course for you!

Quick, 4- to 10-minute lessons will get you performing real ethical hacking exercises in minutes. Over 75 video lectures and more than 8 hours of content will give you the practice you need to develop powerful new skills in cybersecurity and penetration testing! Protect your identity, your computer, your information, and your life – avoid social engineering, phishing, online attacks, ransomware and more! Plus, practical skills like:

  • Retrieve files from an old computer (Mac or PC, laptop or desktop), even if you’ve forgotten the password
  • Set up a virtual “sandbox” to safely open suspicious files without exposing your “real” computer
  • Learn command-line short-cuts and power tools that make you look like a computer wizard!
  • Understand how viruses and backdoors infect your computer AND phone, and how to stop them!
Table of Contents

Real-World Ethical Hacking 1_ Hacking Windows!
1 Introduction
2 Overview_ What is Ethical Hacking_
3 Hacking Windows
4 The Sticky Keys Hack
5 Burning a Legal Windows 10 Install Disc
6 The Hack_ First Reboot and Exploit
7 The Hack (cont_)_ Second Reboot and Compromise
8 Hack Finale_ Logging in as Administrator!
9 Review
10 BONUS_ Mac Root Hack!

Create Your Own Virtual Hacking Lab!
11 VM Lab Introduction and Virtual Box Installation
12 Building a Kali Linux 2_0 Virtual Machine
13 Create a Windows 10 VM
14 Add a Windows 7 or 8 Virtual Machine
15 Create an Android Phone_Tablet VM for Mobile Hacking!
16 The Ultimately Hackable Metasploitable!

Important Linux and Windows Terminal Commands
17 Intro to Command-Line Linux and Windows
18 Basic Linux Commands
19 Command-Line Linux File Magic!
20 Advanced Linux Commands
21 Basic Command-Line Commands for Windows
22 Windows File Commands
23 Advanced Windows Command-Line Commands
24 Command-Line Review for Linux and Windows

Create a Virtual Network for Ethical Hacking!
25 Virtual Networking in VirtualBox
26 Creating the Private_ Host-Only 10_0_3_x Network
27 Connecting Your VMs to the Host-Only Network
28 Creating and Using a Public NAT Network in VBox

Social Engineering_ Capturing Usernames and Passwords via Phishing
29 Intro to Social Engineering
30 The Social Engineer’s Toolkit in Kali Linux
31 Cloning Facebook and Harvesting User Passwords
32 Intro to Spear-Phishing
33 Advanced IP Address Masking_ Hiding Your Real URL
34 Crafting the Perfect Spear-Phishing Email
35 Capturing the User’s Login and Password in Kali
36 Review_ Social Engineering Techniques
37 Stopping Phishing at Work and at Home

BONUS Section_ Car Hacking in Kali Linux!
38 Intro to Car Hacking!
39 Installing the CAN-utils on Kali
40 Using git to Install ICSim Instrument Cluster Simulator
41 Running the ICSimulator
42 Capturing CAN Traffic with CanSniffer
43 The Replay Attack_ Replaying CAN Packets with CANplayer
44 Car Hacking Review
45 BONUS_ Hacking the Car Hacking Software_ to 1000 mph!
46 Car Hacking LIVE on Dr_ Payne’s VW Jetta_ Facebook Live Video from NCWA E7

Hacking Windows 7 with Metasploit!
47 Intro to Metasploit
48 Setting up Guest Additions in VirtualBox
49 Creating an Exploit Payload with Metasploit
50 Sharing the Exploit over the Web
51 Running the Exploit to Hack Windows 7
52 Intro to Meterpreter_ Your Remote Attack Shell!
53 Privilege Escalation_ Gaining Root Access and Dumping Password Hashes
54 Metasploit & Meterpreter Review

Hacking Windows 10 with Metasploit and Meterpreter in Kali Linux
55 Hacking Windows 10 with Metasploit
56 Viewing and Downloading Files from a Victim Computer in Meterpreter
57 Grabbing Screenshots_ Logging Keystrokes_ and Shutting Down Windows 10 Remotely

Password Problems – Everybody’s Got ‘Em_ Hacking_ Cracking_ Snacking & Hijacking
58 Six Problems with Passwords
59 Hijacking Stored Passwords from Chrome and Firefox
60 Sniffing the Network_ Installing Wireshark
61 Sniffing Unencrypted Passwords with Wireshark
62 Cracking Passwords with Kali and Online Tools
63 Seven Things You Can Do for Safer Passwords

Web Hacking – Testing and Securing Web Applications
64 Intro to Web Hacking
65 Hands-on Cross-Site Scripting (XSS) Attacks That Work!
66 SQL (Structured Query Language) Injection_ Messing with Databases
67 Advanced SQLi Attacks
68 Securing Web Applications from XSS_ SQLi and More

Mobile Hacking on Android
69 Intro to Hacking Android with Metasploit
70 Creating the Meterpreter Payload for Android
71 Exploiting Android from Kali Linux using Meterpreter
72 Advanced Android Exploits_ Accessing Storage_ Downloading and Uploading Files

Bonus Videos_ National Cyber Warrior Academy_ Interviews and More
73 Bonus videos from the National Cyber Warrior Academy
74 NCWA E6
75 NCWA E7 Facebook Live Video on Car Hacking and Drone Programming
76 WDUN Radio Interview July E7 on Cybersecurity Jobs and NCWA