Welcome this comprehensive Ethical Hacking course! This course assumes you have NO prior knowledge in hacking and by the end of it you’ll be able to hack systems like black-hat hackers and secure them like security experts!
Ethical hacking This course is highly practical but it won’t neglect the theory; we’ll start with ethical hacking basics, breakdown the different penetration testing fields and install the needed software (on Windows, Linux and Mac OS X), then we’ll dive and start hacking straight away. From here onwards you’ll learn everything by example, by analyzing and exploiting different systems such as networks, servers, clients, websites …..etc., so we’ll never have any boring dry theoretical lectures.
The course is divided into a number of sections, each section covers a penetration testing/hacking field, in each of these sections you’ll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses to hack into this system, not only that but you’ll also learn how to secure systems from the discussed attacks. By the end of the course, you will have a strong foundation in most hacking or penetration testing fields.
Introduction to Basics of Ethical Hacking
Foot-printing Active (Tool Based Practical)
Foot-printing Passive (Passive Approach)
In-depth Network Scanning
Enumeration User Identification
System Hacking Password Cracking & Bypassing
Viruses and Worms
Trojan and Back door
Bots and Botnets
Sniffers MITM with Kali
Sniffers MITM with Windows
Social Engineering Techniques Theoretical Approach
Social Engineering Toolkit Practical Based Approach
Denial of Service DOS & DDOS Attacks
Web Session Hijacking
SQL Injection Manual Testing
SQL Injection Automated Tool Based Testing
Basics of Web App Security
Hacking Web servers Server Rooting
Hacking Wireless Networks Manual CLI Based
Hacking Wireless Network
Evading IDS, Firewall
Penetration Testing: Basics
Internet of Things (IOT) Hacking
Cloud Security and many more.