40% OFF HACKING COURSES

Advanced Ethical Hacking Level 1

Instructor
Raj Kishore Panda
Last Update January 17, 2024
4.38 /5
(8)
0 already enrolled

About This Course

elcome this comprehensive Ethical Hacking course! This course assumes you have NO prior knowledge and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts!

This course is highly practical but it won't neglect the theory; we'll start with ethical hacking basics, breakdown the different penetration testing fields and install the needed software (on Windows, Linux and Mac OS X), then we'll dive and start hacking straight away. You'll learn everything by example, by analysing and exploiting different systems such as networks, servers, clients, websites .....etc. We'll never have any boring dry theoretical lectures.

The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses to hack this system.

By the end of the course you will have a strong foundation in most hacking or penetration testing fields and you'll also learn how to detect, prevent and secure systems and yourself from the discussed attacks. 

Curriculum

12 Lessons 1 Month
Teaser - Hacking Windows 11 & Accessing the Webcam
Course Introduction & Overview
What Is Hacking & Why Learn It ?
Lab Overview
Initial Preparation
Installing Kali Linux as a VM on Windows
Installing Kali Linux as a VM on Apple Computers (Intel & Apple Silicon)
Installing Kali Linux as a VM on Linux
Basic Overview of Kali Linux
The Terminal & Linux Commands
Introduction to Network Hacking / Penetration Testing
Networks Basics
Connecting a Wireless Adapter To Kali
What is MAC Address & How To Change It
Wireless Modes (Managed & Monitor)
Packet Sniffing Basics
WiFi Bands - 2.4Ghz & 5Ghz Frequencies
Targeted Packet Sniffing
Deauthentication Attack (Disconnecting Devices From Networks)
Gaining Access Introduction
Theory Behind Cracking WEP Encryption
WEP Cracking Basics
Fake Authentication Attack
ARP Request Replay Attack
Introduction to WPA and WPA2 Cracking
Hacking WPA & WPA2 Without a Wordlist
Capturing The Handshake
Creating a Wordlist
Cracking WPA & WPA2 Using a Wordlist Attack
Securing Your Network From Hackers
Configuring Wireless Settings for Maximum Security
Introduction to Post-Connection Attacks
Installing Windows As a Virtual Machine
Installing Windows as a Virtual Machine on Apple Silicon
Discovering Devices Connected to the Same Network
Gathering Sensitive Info About Connected Devices (Device Name, Ports, etc.)
Gathering More Sensitive Info (Running Services, Operating System, etc.)
What is ARP Poisoning ?
Intercepting Network Traffic
Bettercap Basics
ARP Spoofing Using Bettercap
Spying on Network Devices (Capturing Passwords, Visited Websites...etc)
Creating Custom Spoofing Script
Bypassing HTTPS
Bypassing HSTS
Bypassing HSTS Recap - Firefox
Bypassing HSTS Recap - Chrome
DNS Spoofing - Controlling DNS Requests on The Network
Injecting Javascript Code
Doing All of The Above Using a Graphical Interface
Wireshark - Basic Overview & How To Use It With MITM Attacks
Wireshark - Sniffing & Analysing Data
Wireshark - Using Filters, Tracing & Dissecting Packets
Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network
Creating a Fake Access Point (Honeypot) - Theory
Creating a Fake Access Point (Honeypot) - Practical
Detecting ARP Poisoning Attacks
Detecting suspicious Activities In The Network
Preventing MITM Attacks - Method 1
Preventing MITM Attacks - Method 2

Your Instructors

instructor

Raj Kishore Panda

4.75 /5
8 Courses 4 Reviews 73 Students
See more

Student Feedback

Reviews (3)

Write a review

Live Chat Section