Companies Home Search Profile

Certified Ethical Hacker Course 2023 | Zero to Professional

Focused View

SiemHunters Academy

32:49:29

119 View
  • 1.1 Download Kali linux from official site (verify hash values before downloading).html
  • 1. Kali linux Virtual Machine setup.mp4
    17:00
  • 2. Windows virtual machine setup.mp4
    11:44
  • 3. Important tools in Ethical Hacking.mp4
    26:15
  • 1. Directories in Kali Linux.mp4
    13:05
  • 2. Services in Kali Linux.mp4
    03:44
  • 3. Servers in kali Linux.mp4
    06:12
  • 4. Users management.mp4
    09:53
  • 5. Metasploit Framework.mp4
    23:19
  • 6. Important Tools in Cyber Security.mp4
    26:15
  • 7. Cat Command.mp4
    07:48
  • 8. Cal Command (calendar).mp4
    04:29
  • 9. CD Command.mp4
    07:00
  • 10. cmp diff Command.mp4
    06:28
  • 11. cp command (copy files).mp4
    07:07
  • 12. Date command.mp4
    06:06
  • 13. Egrep Command.mp4
    08:51
  • 14. File Permissions.mp4
    06:35
  • 15. Find command.mp4
    04:21
  • 16. Find files by names command.mp4
    05:38
  • 17. Find files by type and perm.mp4
    05:18
  • 18. grep command.mp4
    09:47
  • 19. ls command (List).mp4
    05:24
  • 20. Mkdir command (make the directory).mp4
    06:05
  • 21. Modes command.mp4
    05:46
  • 22. Paste command.mp4
    06:15
  • 23. pwd command (present working directory).mp4
    02:33
  • 24. rm command (to remove the files).mp4
    05:53
  • 25. Sort command.mp4
    06:20
  • 26. touch command.mp4
    05:01
  • 27. tr command (translate).mp4
    07:38
  • 28. Uname command.mp4
    05:41
  • 29. uniq command.mp4
    07:47
  • 30. Users last command.mp4
    06:17
  • 31. w command (who).mp4
    08:31
  • 32. wc command (word count).mp4
    06:39
  • 33. whereis command.mp4
    03:15
  • 34. whoami command.mp4
    05:03
  • 35. who command.mp4
    06:16
  • 36. who-is-logged command.mp4
    03:57
  • 37. Vi editor.mp4
    09:41
  • 38. Filter commands.mp4
    20:09
  • 39. Communication commands.mp4
    12:51
  • 40. Shell Scripting introduction.mp4
    09:01
  • 41. Shell Scripting Command line Arguments.mp4
    05:51
  • 42. Shell Scripting operators.mp4
    35:20
  • 43. Shell scripting functions.mp4
    12:53
  • 44. Shell Scripting Control Statements.mp4
    10:46
  • 45. Shell Scripting Loops.mp4
    06:19
  • 46. Pentest automate - Project 1.mp4
    13:42
  • 47. Pentest automate - Project 2.mp4
    14:43
  • 48. Pentest automate - Project 3.mp4
    14:22
  • 1. Information Security Overview.mp4
    03:43
  • 2. Information Security Threats and Attack Vectors.mp4
    05:55
  • 3. Hacking Concepts.mp4
    05:19
  • 4. Ethical Hacking Concepts.mp4
    03:02
  • 5. Penetration Testing Concepts.mp4
    06:06
  • 1. Footprinting Concepts.mp4
    02:21
  • 2. Footprinting through Search Engines.mp4
    12:05
  • 3. Footprinting through Social Networking Sites.mp4
    02:58
  • 4. Email Footprinting.mp4
    04:26
  • 5. Competitive Intelligence.mp4
    05:43
  • 6. Who is Footprinting.mp4
    04:36
  • 7. DNS Footprinting.mp4
    03:04
  • 8. Network Footprinting.mp4
    06:01
  • 9. Footprinting through Social Engineering.mp4
    02:01
  • 10. Footprinting Tools.mp4
    07:27
  • 11. Footprinting Countermeasures.mp4
    02:00
  • 12. Footprinting Penetration Testing.mp4
    04:51
  • 13. lab1 - Open Source Information Gathering Using Windows Command Line Utilities.mp4
    05:34
  • 14. lab 2 - Collecting Information About a Target Website Using Firebug.mp4
    06:01
  • 15. lab 3 - Mirroring Website Using HTTrack Web Site Copier.mp4
    05:31
  • 16. lab 4 - Advanced Network Route Tracing Using Path Analyzer Pro.mp4
    05:23
  • 17. lab 5 - Information Gathering Using Metasploit.mp4
    10:39
  • 1. Network Scanning Concepts.mp4
    06:15
  • 2. Scanning Techniques part 1.mp4
    10:20
  • 3. Scanning Techniques part 2.mp4
    05:03
  • 4. Scanning Beyond IDS and Firewall part 1.mp4
    09:12
  • 5. Scanning Beyond IDS and Firewall.mp4
    04:01
  • 6. Banner Grabbing.mp4
    04:54
  • 7. Draw Network Diagrams.mp4
    02:06
  • 8. Scanning Pen Testing.mp4
    02:46
  • 9. lab 1 - UDP and TCP Packet Crafting Techniques using HPING3.mp4
    06:39
  • 10. lab 2 - Scanning The Network Using The Colasoft Packet Builder.mp4
    04:05
  • 11. lab 3 - Basic Network Troubleshooting Using MegaPing.mp4
    04:18
  • 12. lab 4 - Understanding Network Scanning Using Nmap.mp4
    06:53
  • 13. lab 5 - Exploring Various Network Scanning Techniques.mp4
    06:33
  • 14. lab 6 - Scanning a Network Using NetScan Tools Pro.mp4
    06:37
  • 15. lab 7 - Avoiding Scanning Detection using Multiple Decoy IP Addresses.mp4
    04:23
  • 16. lab 8 - Drawing Network Diagrams Using Network Topology Mapper.mp4
    08:08
  • 17. lab 9 - Checking for Live Systems Using Angry IP Scanner.mp4
    04:05
  • 18. lab 10 - Scanning for Network Traffic Going Through a Computers Adapter Using I.mp4
    05:22
  • 19. lab 11 - Identify Target System OS with TTL and TCP Window Sizes using Wireshark.mp4
    03:41
  • 20.1 Scanning Tools.zip
  • 20. Scanning network Practical Tools.html
  • 1. Enumeration Concepts.mp4
    02:55
  • 2. NetBIOS Enumeration.mp4
    06:16
  • 3. SNMP Enumeration.mp4
    05:46
  • 4. LDAP Enumeration.mp4
    02:26
  • 5. NTP Enumeration.mp4
    03:44
  • 6. Other Enumeration Techniques.mp4
    03:48
  • 7. Enumeration Countermeasures.mp4
    02:50
  • 8. Enumeration Pen Testing.mp4
    03:29
  • 9. lab 1 - NetBIOS Enumeration Using Global Network Inventory.mp4
    06:39
  • 10. lab 2 - Enumerating Network Resources Using Advanced IP Scanner.mp4
    04:44
  • 11. lab 3 - Performing Network Enumeration Using SuperScan.mp4
    03:57
  • 12. lab 4 - Enumerating Resources in a Local Machine Using Hyena.mp4
    03:01
  • 13. lab 5 - Performing Network Enumeration Using NetBIOS Enumerator.mp4
    02:35
  • 14. lab 6 - Enumerating a Network Using SoftPerfect Network Scanner.mp4
    03:25
  • 15. lab 7 - Enumerating a Target Network using Nmap and Net Use.mp4
    06:29
  • 16. lab 8 - Enumerating Services on a Target Machine.mp4
    05:34
  • 17. lab 9 - SNMP Enumeration Using snmp enum.mp4
    06:17
  • 18. lab 10 - LDAP Enumeration Using Active Directory Explorer (ADExplorer).mp4
    03:34
  • 19. lab 11 - Enumerating information from Windows and Samba host using Enum4linux.mp4
    04:10
  • 20.1 Enumeration Tools.zip
  • 20. Enumeration Practical Tools.html
  • 1. Vulnerability Assessment Concepts.mp4
    04:54
  • 2. Vulnerability Assessment Solutions.mp4
    05:46
  • 3. Vulnerability Scoring Systems.mp4
    02:13
  • 4. Vulnerability Assessment Tools.mp4
    03:29
  • 5. Vulnerability Assessment Reports.mp4
    00:54
  • 6. lab1 - Vulnerability Analysis Using Nessus.mp4
    11:21
  • 7. lab2 - CGI Scanning with Nikto.mp4
    03:44
  • 8.1 VA tools.zip
  • 8. VA practical Tools.html
  • 1. System Hacking Concepts.mp4
    01:56
  • 2. Cracking Passwords part 1.mp4
    05:36
  • 3. Cracking Passwords part 2.mp4
    05:47
  • 4. Cracking Passwords part 3.mp4
    08:03
  • 5. Escalating Privileges.mp4
    09:05
  • 6. Steganography.mp4
    08:55
  • 7. Hiding Files part 2.mp4
    06:30
  • 8. Hiding Files part 3.mp4
    06:43
  • 9. Covering Tracks.mp4
    07:02
  • 10. Penetration Testing.mp4
    04:16
  • 11. lab1 - Dumping and Cracking SAM Hashes to Extract Plaintext Passwords.mp4
    09:43
  • 12. lab2 - Creating and Using Rainbow Tables.mp4
    04:43
  • 13. lab3 - Auditing System Passwords Using L0phtCrack.mp4
    05:06
  • 14. lab5 - Escalating Privileges by Exploiting Client Side Vulnerabilities.mp4
    13:57
  • 15. lab6 - Hacking Windows 10 using Metasploit, and Post-Exploitation Using Meterpre.mp4
    13:49
  • 16. lab7 - User System Monitoring and Surveillance Using Spytech SpyAgent.mp4
    08:58
  • 17. lab8 - Web Activity Monitoring and Recording using Power Spy.mp4
    04:53
  • 18. lab9 - Hiding Files Using NTFS Streams.mp4
    06:26
  • 19. lab10 - Hiding Data Using White Space Steganography.mp4
    04:57
  • 20. lab11 - Image Steganography Using OpenStego.mp4
    06:04
  • 21. lab12 - Image Steganography Using Quick Stego.mp4
    05:21
  • 22. lab13 - Viewing, Enabling, and Clearing Audit Policies Using Auditpol.mp4
    03:45
  • 23. lab14 - Hacking Windows Server 2012 with a Malicious Office Document Using TheFa.mp4
    12:13
  • 24. lab15 - Active Online Attack using Responder.mp4
    04:09
  • 25.1 Practical Tools - System Hacking.zip
  • 25. Practical Tools - System hacking.html
  • 1. Malware Concepts.mp4
    03:45
  • 2. Trojan Concepts part 1.mp4
    07:46
  • 3. Trojan Concepts part 2.mp4
    07:10
  • 4. Trojan Concepts part 3.mp4
    05:47
  • 5. Virus and Worm Concepts part 1.mp4
    05:54
  • 6. Virus and Worm Concepts part 2.mp4
    06:48
  • 7. Virus and Worm Concepts part 3.mp4
    02:59
  • 8. Malware Analysis part 1.mp4
    07:12
  • 9. Malware Analysis part 2.mp4
    08:17
  • 10. Malware Analysis part 3.mp4
    06:00
  • 11. Countermeasures.mp4
    02:37
  • 12. Anti-Malware Software.mp4
    01:11
  • 13. Malware Penetration Testing.mp4
    01:58
  • 14. lab1 - Creating an HTTP Trojan and Remotely Controlling a Target Machine Using H.mp4
    06:59
  • 15. lab2 - Creating a Trojan Server Using the GUI Trojan MoSucker.mp4
    08:48
  • 16. lab3 - Gaining Control over a Victim Machine Using njRAT.mp4
    06:34
  • 17. lab4 - Obfuscating a Trojan Using SwayzCryptor and Making it Undetectable to Var.mp4
    05:24
  • 18. lab5 - Creating a Server Using the ProRat Tool.mp4
    09:20
  • 19. lab6 - Creating a Trojan Server Using Theef.mp4
    04:45
  • 20. lab7 - Creating a Virus Using the JPS Virus Maker Tool.mp4
    04:17
  • 21. lab8 - Creating a Worm Using Internet Worm Maker Thing.mp4
    06:54
  • 22. lab9 - Virus Analysis using IDA.mp4
    05:30
  • 23. lab10 - Virus Analysis Using OllyDbg.mp4
    04:13
  • 24. lab11 - Detecting Trojans.mp4
    12:57
  • 25. lab12 - Monitoring TCPIP Connections Using the CurrPorts.mp4
    07:13
  • 26. lab13 - Removing Malware using Clamwin.mp4
    05:08
  • 27. lab14 - Performing Registry Entry Monitoring.mp4
    06:47
  • 28. lab15 - Startup Program Monitoring Tool.mp4
    05:31
  • 29.1 Malware Practical Tools.zip
  • 29. Practical Tools.html
  • 1. Sniffing Techniques part 1.mp4
    07:39
  • 2. Sniffing Techniques part 2.mp4
    07:11
  • 3. Sniffing Techniques part 3.mp4
    04:04
  • 4. Sniffing tools.mp4
    03:47
  • 5. Countermeasures.mp4
    02:09
  • 6. Sniffing Detection Techniques.mp4
    02:43
  • 7. Sniffing Pen Testing.mp4
    01:43
  • 8. lab1 - Sniffing Passwords using Wireshark.mp4
    14:18
  • 9. lab2 - Analyzing a Network Using Capsa Network Analyzer.mp4
    08:27
  • 10. lab3 - Spoofing MAC Address Using SMAC.mp4
    06:23
  • 11. lab4 - Performing Man-in-the-Middle Attack using Cain & Abel.mp4
    08:25
  • 12. lab5 - Detecting ARP Poisoning in a Switch Based Network.mp4
    08:26
  • 13. lab6 - Detecting ARP Attacks with XArp Tool lab duration.mp4
    05:25
  • 14.1 Sniffing Practical tools.zip
  • 14. Sniffing Practical Tools.html
  • 1. Social Engineering Concepts.mp4
    02:10
  • 2. Social Engineering Techniques.mp4
    09:03
  • 3. Insider Threats.mp4
    02:15
  • 4. Impersonation on Social Networking Sites.mp4
    01:09
  • 5. Identity Theft.mp4
    02:09
  • 6. Countermeasures.mp4
    03:51
  • 7. Social Engineering Pen Testing.mp4
    03:20
  • 8. lab1 - Sniffing Website Credentials Using Social Engineering Toolkit (SET).mp4
    06:48
  • 1. DOSDDoS Concepts.mp4
    01:15
  • 2. DOSDDOS Attack Techniques.mp4
    06:33
  • 3. Botnets.mp4
    03:05
  • 4. DDoS Case Study.mp4
    02:08
  • 5. DoSDDOS Attack Tools.mp4
    01:20
  • 6. Countermeasures.mp4
    05:34
  • 7. DoSDDoS Protection Tools.mp4
    00:48
  • 8. DoSDDoS Penetration Testing.mp4
    01:08
  • 9. lab1 - SYN Flooding a Target Host Using Metasploit.mp4
    11:24
  • 10. lab2 - SYN Flooding a Target Host Using hping3.mp4
    05:35
  • 11. lab3 - Performing Distributed Denial of Service Attack Using HOIC.mp4
    10:12
  • 1. Session Hijacking Concepts.mp4
    02:53
  • 2. Application Level Session Hijacking.mp4
    05:53
  • 3. Network Level Session Hijacking.mp4
    03:49
  • 4. Session Hijacking Tools.mp4
    00:32
  • 5. Countermeasures.mp4
    02:53
  • 6. Countermeasures - 2.mp4
    02:53
  • 7. Penetration Testing.mp4
    01:21
  • 8. lab1 - Session Hijacking Using the Zed Attack Proxy (ZAP).mp4
    11:34
  • 9.1 Practical Session Hijacking Tools.zip
  • 9. Session Hijacking Practical Tools.html
  • 1. IDS, Firewall and Honeypot Concepts.mp4
    07:29
  • 2. IDS, Firewall and Honeypot Solutions- 1.mp4
    05:01
  • 3. IDS, Firewall and Honeypot Solutions - 2.mp4
    05:00
  • 4. Evading IDS.mp4
    07:08
  • 5. Evading Firewalls.mp4
    07:33
  • 6. IDSFirewall Evading Tools.mp4
    00:52
  • 7. Detecting Honeypots.mp4
    03:29
  • 8. IDSFirewall Evasion Countermeasures.mp4
    02:05
  • 9. Penetration Testing.mp4
    03:07
  • 10. lab1 - Detecting Intrusions Using Snort.mp4
    32:19
  • 11. lab2 - Detecting Malicious Network Traffic Using HoneyBOT.mp4
    07:44
  • 12. lab3 - Bypassing Windows Firewall Using Nmap Evasion Techniques.mp4
    06:52
  • 13. lab 4 - Bypassing Firewalls using HTTPFTP Tunneling.mp4
    19:50
  • 14. lab 5 - Bypassing Windows Firewall using Metasploit.mp4
    14:56
  • 15.1 Bypassing firewall, IDS, and honeypots.zip
  • 15. Practical Tools.html
  • 1. Web Server Concepts.mp4
    04:04
  • 2. Web Server Attacks.mp4
    08:02
  • 3. Web Server Attack Methodology.mp4
    06:30
  • 4. Web Server Attack Tools.mp4
    01:25
  • 5. Countermeasures.mp4
    06:11
  • 6. Patch Management.mp4
    02:43
  • 7. Web Server Security Tools.mp4
    01:29
  • 8. Web Server Pen Testing.mp4
    01:12
  • 9. lab1 - Performing Web Server Reconnaissance using Skipfish.mp4
    06:38
  • 10. lab 2 - Footprinting a Web Server Using the httprecon Tool.mp4
    04:40
  • 11. lab3 - Footprinting a Web Server Using ID Serve.mp4
    02:30
  • 12. lab4 - Cracking FTP Credentials Using Dictionary Attack.mp4
    07:01
  • 13. lab5 - Uniscan Web Server Fingerprinting in Kali Linux.mp4
    07:05
  • 14.1 Practical tools webserver.zip
  • 14. Practical Web server Tools.html
  • 1. Introduction of Web Application hacking.mp4
    03:53
  • 2. Web Application Threats.mp4
    14:01
  • 3. Web Application pentesting tools.mp4
    01:34
  • 4. Countermeasures.mp4
    04:31
  • 5. Web Application security tools.mp4
    08:00
  • 6. lab1 - Exploiting Parameter Tampering and XSS Vulnerabilities in Web Application.mp4
    09:38
  • 7. lab2 - Enumerating and Hacking a Web Application Using WPScan and Metasploit.mp4
    14:28
  • 8. lab3 - Exploiting Remote Command Execution Vulnerability to Compromise a Target.mp4
    11:25
  • 9. lab4 - Auditing Web Application Framework Using Vega.mp4
    06:35
  • 10. lab5 - Website Vulnerability Scanning Using Acunetix WVS.mp4
    10:44
  • 11. lab6 - Exploiting File Upload Vulnerability at Different Security Levels.mp4
    11:53
  • 12. lab7 - Performing Cross-Site Request Forgery (CSRF) Attack.mp4
    13:04
  • 1. SQL Injection Concepts.mp4
    07:27
  • 2. Types of SQL Injection.mp4
    06:15
  • 3. SQL Injection Methodology part 1.mp4
    04:23
  • 4. SQL Injection Methodology part 2.mp4
    08:27
  • 5. SQL Injection Tools.mp4
    00:42
  • 6. Evasion Techniques.mp4
    03:53
  • 7. Countermeasures.mp4
    05:40
  • 8. lab1 - SQL Injection Attacks on an MS SQL Database.mp4
    14:36
  • 9. lab2 - Scanning Web Applications Using N-Stalker Tool.mp4
    05:55
  • 10. lab3 - Performing SQL Injection attack against MSSQL to extract Databases and We.mp4
    11:23
  • 11.1 Practical Tools - SQL Injection.zip
  • 11. Practical Tools - SQL Injection.html
  • 1. Wireless Concepts.mp4
    07:43
  • 2. Wireless Encryption.mp4
    07:45
  • 3. Wireless Threats.mp4
    07:12
  • 4. Wireless Hacking Methodology part 1.mp4
    05:44
  • 5. Wireless Hacking Methodology part 2.mp4
    03:19
  • 6. Wireless Hacking Tools.mp4
    02:32
  • 7. Countermeasures.mp4
    04:44
  • 8. Wireless Security Tools.mp4
    02:19
  • 9. Wireless Pen Testing.mp4
    04:48
  • 10. lab1 - WiFi Packet Analysis using Wireshark.mp4
    04:39
  • 11. lab2 - Cracking a WEP with Aircrack-ng.mp4
    05:20
  • 12. lab3 - Cracking a WPA (Wi-Fi Protected Access) with Aircrack-ng.mp4
    05:58
  • 13.1 Practical Hacking Wireless Networks.zip
  • 13. Practical Tools - Wireless.html
  • 1. Mobile Platform Attack Vectors.mp4
    06:44
  • 2. Hacking Android OS part 1.mp4
    07:44
  • 3. Hacking Android OS part 2.mp4
    04:23
  • 4. Hacking iOS.mp4
    06:16
  • 5. Mobile Spyware.mp4
    01:11
  • 6. Mobile Device Management.mp4
    02:25
  • 7. Mobile Security Guidelines and Tools.mp4
    03:16
  • 8. Mobile Pen Testing.mp4
    01:15
  • 9. lab 1 - Creating Binary Payloads using Kali Linux to Hack Android.mp4
    15:49
  • 10. lab 2- Harvesting the users credentials using the Social Engineering.mp4
    06:37
  • 11.1 Practical Andriod.zip
  • 11. Practical Tools - Android.html
  • 1. Cloud Computing Concepts.mp4
    06:59
  • 2. Cloud Computing Threats.mp4
    06:19
  • 3. Cloud Computing Attacks.mp4
    06:18
  • 4. Cloud Security.mp4
    07:38
  • 5. Cloud Security Tools.mp4
    01:10
  • 6. Cloud Penetration Testing.mp4
    04:18
  • 7. lab1 - Creating User Accounts and Assigning User Rights in ownCloud.mp4
    17:10
  • 8. lab2 - Securing ownCloud from Malicious File uploads using ClamAV.mp4
    04:41
  • 9. lab3 - Bypassing ownCloud Antivirus and Hacking the Host using Kali Linux.mp4
    11:53
  • 10. lab4 - Implementing DoS Attack on Linux Cloud Server Using Slowloris Script.mp4
    07:50
  • 1. Cryptography Concepts.mp4
    01:43
  • 2. Encryption Algorithms.mp4
    11:04
  • 3. Cryptography Tools.mp4
    01:15
  • 4. Public Key Infrastructure (PKI).mp4
    02:02
  • 5. Email Encryption.mp4
    01:40
  • 6. Disk Encryption.mp4
    01:37
  • 7. Cryptanalysis.mp4
    11:23
  • 8. Countermeasures.mp4
    01:20
  • 9. lab1 - Calculating One-Way Hashes Using HashCalc.mp4
    04:20
  • 10. lab2 - Calculating MD5 Hashes Using MD5 Calculator.mp4
    02:35
  • 11. lab3 - Understanding File and Text Encryption Using CryptoForge.mp4
    02:59
  • 12. lab4 - Encrypting and Decrypting the Data Using BCTextEncoder.mp4
    03:22
  • 13. lab5 - Creating and Using Self-Signed Certificate.mp4
    08:06
  • 14. lab6 - Basic Disk Encryption Using VeraCrypt.mp4
    06:43
  • 15. lab7 - Basic Data Encryption Using CrypTool.mp4
    07:02
  • Description


    Learn 20+ Ethical Hacking Modules ! 130+ Labs and Realtime scenarios with lab activities | Enterprise pentesting tools

    What You'll Learn?


    • 20+ Ethical hacking modules with practical explanation and hands-on labs
    • Complete kali linux commands, architecture, file-system, and Servers
    • kali Communication commands and filter commands
    • Web Application penetration testing with OWASP top 10
    • Understanding SQL injection with real-time explanation
    • Discover CSRF & SSRF attacks
    • Working with NMAP and latest firewall evasion techniques and tactics
    • Using wireshark to sniff the traffic and gather plain text passwords, and understand MITM attacks
    • Real-time practical sessions with advanced tools and techniques
    • Working with Session hijacking to understand session exploitation techniques and process
    • Understand DOS and DDOS attacks using wireshark and HPING3
    • working with System hacking to understand how systems are exploited and countermeasures
    • understand nessus and web application scanning using nessus
    • Shell scripting with pentest automation scripts and loops, operators, and shell code
    • Vulnerability assessment using automation tools and manual tools as well
    • Understanding Android hacking with root and backdoor to gain unauthorized access
    • database hacking and gain unauthorized access
    • Complete ethical hacking bootcamp and ethical hacking course

    Who is this for?


  • VAPT professionals
  • Cyber security experts
  • Students who are interested in cyber security domain
  • Ethical hacker
  • What You Need to Know?


  • No prior experience needed, This course designed from scratch to mastery
  • More details


    Description

    Hi Techies..!

    Welcome this Latest tactics, techniques of Complete Ethical Hacking course 2023 | This course Designed from scratch to professional with latest tools and techniques and ethical hacking concepts along with Web application, network, wireless, cloud, server, and system/endpoint based pentesting. in this course you'll learn 20+ ethical hacking modules with NO prior Experience & knowledge and end of this course you'll become a Security Expert & Pentesting Professional

    This course is both theory and practical sessions. first, we explain Kali Linux's complete setup, architecture, File-systems, and effective usage of commands and servers in Linux machines, then we'll dive you to an ethical hacking theory party along with practical hands-on sessions and each session Tools are attached, you can learn how to install tool and practical while learning also.


    You'll learn web applications, network scanning & exploitations, wireless, servers, system hacking & endpoint exploitation and cloud pentesting also. We understand student view thats why we divided this course into two sections (Theory and practical).


    End of the course you will learn latest ethical hacking tactics, techniques and tools used for hacking and penetration testing in various levels.


    Topics covered in this course:


    1. Lab Setup (Kali linux & windows VMware installation and configuration)

    2. Complete kali Linux course (commands, architecture, file-system, services, and servers)

    3. Practical Shell scripting & Pentesting automation scripts (you'll learn how to create automation scripts using shell scripting)

    4. Understand Ethical hacking overview & Footprinting

    5. Understanding network security and network scanning techniques (using NMAP, angryip-scanner, Ping, HPING3 other 10+ tools)

    6. Understanding enumeration process and create active connections

    7. System hacking (Windows, Unix using latest tools and techniques) 

    8. Understanding Sniffing and MITM attacks (Wireshark)

    9. Understanding Social Engineering and Phising, Smishing, and Spear-phishing attacks

    10. Understanding Vulnerability analysis using automation and manual

    11. Denial of service and distributed denial of service attacks and mitigation process

    12. Session hijacking in web applications and mitigation steps and counter attacks

    13. understanding Web application pentesting and OWASP top 10

    14. Learn Practical SQL Injection (error, boolean, time based, union, and blind Injections)

    15. Understanding server exploitations and mitigation steps

    16. Understanding Wireless attacks and latest tools with countermeasures

    17. Understanding Andriod and IOS exploitation and working with backdoors to gain unauthorized access

    18. Understanding Cloud attacks and deployments

    19, Cryptography techniques


    Who this course is for:

    1. Ethical hacking professionals

    2. Student who wants to learn cyber security

    3. Cyber security interested students

    4. Security experts and professionals

    Who this course is for:

    • VAPT professionals
    • Cyber security experts
    • Students who are interested in cyber security domain
    • Ethical hacker

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    SiemHunters Academy
    SiemHunters Academy
    Instructor's Courses
    We are SiemHunters leading cyber security and SOC training and certification provider, we are specialized in SOC/SIEM trainings along with real-time lab scenarios and enterprise based learning. We have 14+ Certified Enterprise instructor team to deliver cyber courses with latest tactics and techniques. We are authorized Eccouncil and Comptia ATC in hyderabad.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 306
    • duration 32:49:29
    • Release Date 2023/09/10