10% OFF HACKING COURSES

Basic Ethical hacking

Instructor
Raj Kishore Panda
Last Update January 16, 2024
4.38 /5
(8)
0 already enrolled

About This Course

Just updated with all modern ethical hacking tools and best practices for 2023! Join a live online community of over 900,000+ students and a course taught by industry experts. This course will take you from absolute beginning of setting up your own hacking lab (like Kali Linux) on your machine, all the way to becoming a security expert that is able to use all the hacking techniques used by hackers and defend against them!

Whether you are a complete beginner looking to become an ethical hacker, or you’re a student looking to learn about securing computer systems, or you are a programmer who is looking to improve their security online and prevent attacks from hackers on your website, this course will dive you into the world of hacking and penetration testing. We even teach you Python programming from scratch for those that want to learn to program their own tools for hacking and penetration testing.


This course is focused on learning by doing. We are going to teach you how hacking works by actually practicing the techniques and methods used by hackers today. We will start off by creating our hacking lab to make sure we keep your computers safe throughout the course, as well as doing things legally, and once we have our computers set up for ethical hacking, then we dive into topics.

 

Who this course is for:

  • Anybody interested in learning ethical hacking and penetration testing
  • Anybody interested in learning python and ethical hacking
  • Anybody looking to go beyond a normal "beginner" tutorial that doesn't give you a chance to practice
  • Anybody looking to learn how hackers hack computer systems
  • Any developer looking to secure their computer systems from hackers

Curriculum

20 Lessons 3 Month
What Is Ethical Hacking ?
ZTM Resources
What is A Virtual Machine ?
Why Linux
Downloading Virtual Box & Kali Linux
Creating Our First Virtual Machine
Installing Kali Linux Operating System
Update 1 - New & Old Versions of Kali Linux
Networking Basics
Full Screen Mode & Network Settings
Troubleshooting Network Connection in Kali Linux
Getting Familiar With Kali Linux!
5 Stages Of A Penetration Test
Navigating Through Linux System
Creating Files & Managing Directories
Network Commands & Sudo Privileges In Kali
Linux File System & Additional Commands
Endorsements On LinkedIN
What is Information Gathering ?
Obtaining IP Address, Physical Address Using Whois Tool
Whatweb Stealthy Scan
Aggressive Website Technology Discovering on IP Range
Gathering Emails Using theHarvester & Hunter.io
How To Download Tools Online
Finding Usernames With Sherlock
Email Scraper Tool In Python 3
More About Information Gathering
More About Information Gathering
Theory Behind Scanning
TCP & UDP
Installing Vulnerable Machine
Installing Vulnerable Virtual Machine
Netdiscover
Performing First Nmap Scan
Different Nmap Scan Types
ZTM Nmap
Discovering Target Operating System
Detecting Version Of Service Running On An Open Port
Filtering Port Range & Output Of Scan Results
What is a Firewall/IDS ?
Using Decoys and Packet Fragmentation
Security Evasion Nmap Options
Finding First Vulnerability With Nmap Scripts
Manual Vulnerability Analysis & Searchsploit
Nessus Installation
Discovering Vulnerabilities With Nessus
Scanning Windows 7 Machine With Nessus
What is Exploitation ?
What is a Vulnerability ?
Reverse Shells, Bind Shells ...
Metasploit Framework Structure
Msfconsole Basic Commands
Misconfigurations Happen - Bindshell Exploitation
Information Disclosure - Telnet Exploit
Software Vulnerability - Samba Exploitation
Attacking SSH - Bruteforce Attack
Exploitation Challenge - 5 Different Exploits
Explaining Windows 7 Setup
Eternal Blue Attack - Windows 7 Exploitation
DoublePulsar Attack - Windows Exploit
BlueKeep Vulnerability - Windows Exploit
Update 2 - Routersploit
Update 3 - Router Default Credentials
Exercise: Imposter Syndrome
Setting Up Vulnerable Windows 10
Crashing Windows 10 Machine Remotely
Exploiting Windows 10 Machine Remotely
Generating Basic Payload With Msfvenom
Advance Msfvenom Usage
Generating Powershell Payload Using Veil
TheFatRat Payload Creation
My Payloads Are Getting Detected By An Antivirus!
Hexeditor & Antiviruses
Making Our Payload Open An Image
Post Exploitation Theory
Meterpreter Basic Commands
Elevating Privileges With Different Modules
Creating Persistence On The Target System
Post Exploitation Modules
Exploitation
Website Penetration Testing Theory
HTTP Request & Response
Information Gathering & Dirb Tool
Burpsuite Configuration
ShellShock Exploitation
Command Injection Exploitation
Getting Meterpreter Shell With Command Execution
Reflected XSS & Cookie Stealing
Stored XSS
HTML Injection
SQL Injection
CSRF Vulnerability
Hydra Bruteforce Attack
Burpsuite Intruder
Theory - Man In The Middle Attack
Bettercap ARP Spoofing
Ettercap Password Sniffing
Manually Poisoning Targets ARP Cache With Scapy
Wireless Cracking Theory
Putting Wireless Card In Monitor Mode
Deauthenticating Devices & Grabbing Password
Aircrack Password Cracking
Hashcat Password Cracking
Android Hacking Theory
Android VM Install
Gaining Access With Android Meterpreter
Evil Droid
Is it Flappy Bird or Malware
Hack Any Device On Any Network With Ngrok
Anonymity Theory
Tor Browser
Proxychains With Nmap
Installing VPN in Kali Linux
WhoAmI Anonymity Tool
Enumerating Active Directory
Exploiting Active Directory
Escalating Privileges on the Domain
What Is A Programming Language
Python Interpreter
How To Run Python Code
Our First Python Program
Latest Version Of Python
Python 2 vs Python 3
How Does Python Work?
Parameters and Arguments
Learning Python
Python Data Types
Numbers
Math Functions
DEVELOPER FUNDAMENTALS: I
Operator Precedence
Optional: bin() and complex
Variables
Expressions vs Statements
Augmented Assignment Operator
Strings
String Concatenation
Type Conversion
Escape Sequences
Formatted Strings
String Indexes
Immutability
Built-In Functions + Methods
Booleans
Type Conversion
Lists
List Slicing
Matrix
List Methods
Common List Patterns
List Unpacking
None
Dictionaries
Dictionary Keys
Dictionary Methods
Tuples
Sets
Breaking The Flow
Conditional Logic
Indentation In Python
Truthy vs Falsey
Ternary Operator
Short Circuiting
Logical Operators
is vs ==
For Loops
Iterables
range()
enumerate()
While Loops
break, continue, pass
Functions
Default Parameters and Keyword Arguments
return
Methods vs Functions
Docstrings
Clean Code
*args and **kwargs
Scope
Scope Rules
global Keyword
nonlocal Keyword
Why Do We Need Scope?
Modules in Python
Optional: PyCharm
Packages in Python
Different Ways To Import
Errors in Python
Error Handling
Exercises: Error Handling
Working With Files In Python
File Paths
File IO Errors
Read, Write, Append
Exercise: Translator

Your Instructors

instructor

Raj Kishore Panda

4.75 /5
8 Courses 4 Reviews 73 Students
See more

Student Feedback

Reviews (3)

Write a review

Live Chat Section