Companies Home Search Profile

Complete Real-World Ethical Hacking 2022

Focused View

Hamed Mehdi

4:30:27

118 View
  • 1 - Introduction.mp4
    02:25
  • 2 - Terms.mp4
    09:34
  • 3 - MITRE ATT&CK Framework.mp4
    17:40
  • 4 - DeTT&CT.mp4
    13:05
  • 5 - Atomic Purple Team.mp4
    02:50
  • 6 - Threat Hunting Tahiti.mp4
    06:53
  • 7 - Other MITRE Frameworks.mp4
    03:30
  • 8 - OSINT Introduction.mp4
    07:30
  • 9 - Search Engines.mp4
    15:08
  • 10 - Dark Web.mp4
    02:53
  • 11 - Search Engine Clustering.mp4
    03:49
  • 12 - Whois.mp4
    06:07
  • 13 - Reverse Whois.mp4
    03:07
  • 14 - Spiderfoot.mp4
    05:37
  • 15 - DNS.mp4
    08:19
  • 16 - Wireless.mp4
    06:12
  • 17 - Email Reconng.mp4
    09:41
  • 18 - People.mp4
    03:48
  • 19 - Image.mp4
    05:55
  • 20 - OCR.mp4
    02:54
  • 21 - Sock Puppet.mp4
    07:50
  • 22 - Twitter.mp4
    07:24
  • 23 - Facebook.mp4
    03:07
  • 24 - Maltego.mp4
    08:00
  • 25 - Website Analysis using Maltego.mp4
    06:10
  • 26 - Footprint Machine Levels in Maltego.mp4
    04:31
  • 27 - Documentation.mp4
    02:53
  • 28 - Layer 2 Attacks Definitions CDP Attack Lab.mp4
    09:43
  • 29 - CAM Table Overflow Attack.mp4
    01:15
  • 30 - ARP Spoofing Attack.mp4
    04:12
  • 31 - Switch Spoofing Attack.mp4
    02:00
  • 32 - Double Tagging Attack.mp4
    04:14
  • 33 - STP Attack.mp4
    03:09
  • 34 - Cisco Password Decryption Attacks.mp4
    04:47
  • 35 - Layer 3 Attacks Definitions DHCP Starvation Attack.mp4
    11:37
  • 36 - HSRP Attack.mp4
    02:20
  • 37 - Log Spoofing Attack.mp4
    04:47
  • 38 - Log DDoS Attack.mp4
    02:56
  • 39 - DNS Attacks Definitions DNS Spoofing Attack.mp4
    03:41
  • 40 - DNS Amplification Attack.mp4
    01:40
  • 41 - Firewall.mp4
    06:25
  • 42 - Metasploit Framework ServerSide Exploitation UAC Bypass.mp4
    19:56
  • 43 - ClientSide Exploitation Privilege Escalation.mp4
    06:22
  • 44 - Remote Target Sniffing.mp4
    02:29
  • 45 - HostBased DNS Poisoning.mp4
    02:02
  • Description


    Learn and review many modern courses just in one course as fast as possible

    What You'll Learn?


    • 45 Real World Ethical Hacking Videos
    • Start from ground up to the Sky
    • Latest & Newest Methods in Real World Ethical Hacking
    • Learn Latest Tools for Real World Ethical Hacking
    • Understand What Happened in Ethical Hacking Process
    • Modern Case Studies and Current Events
    • MITRE ATT&CK Framework
    • DeTT&CT Framework
    • Atomic Purple Team
    • Threat Hunting (Tahiti)
    • MITRE D3FEND Framework
    • MITRE RE&CT
    • MITRE Engage Framework
    • MITRE ENGENUITY Framework
    • MITRE Cyber Analytics Repository (CAR) Framework
    • Search Engines for OSINT
    • Whois
    • Reverse Whois
    • Dark Web OSINT
    • Search Engine Clustering
    • DNS OSINT
    • Wireless OSINT
    • Email OSINT
    • Recon-ng For OSINT
    • People OSINT
    • Spiderfoot for OSINT
    • Image OSINT
    • OCR for OSINT
    • Sock Puppet
    • Social Networks OSINT
    • Maltego
    • Maltego Website Analysis
    • Maltego Footprint Machines
    • Documentation
    • CDP Recon
    • ARP Spoofing Attack
    • CAM Table OverFlow Attack
    • Switch Spoofing Attack
    • Double Tagging Attack
    • STP Attack
    • Cisco Password Attacks (Type 5 & Type 7)
    • DHCP Starvation Attack
    • HSRP Attack
    • Syslog Spoofing Attack
    • Syslog DDoS Attack
    • DNS Spoofing Attack
    • DNS Amplification Attack
    • Discover Live Hosts in Restricted Networks
    • Learn Metasploit Framework
    • Server-Side Exploitation Attack
    • Client-Side Exploitation Attack
    • Bypass User Access Control
    • Remote Sniffing Attack
    • Host-Based DNS Poisoning Attack

    Who is this for?


  • people who want to learn quickly
  • people who want review Ethical Hacking Techniques
  • people Who want to learn more than standard courses
  • all ethical hacking lovers
  • What You Need to Know?


  • Networking Fundamentals
  • More details


    Description

    Welcome to this comprehensive Ethical Hacking course...!
    This course assumes you have prior Networking knowledge. This course is practical but it won't neglect the theory. You'll learn everything Practically by exploiting everything such as Network Infrastructure Devices (Switch & Router) and Client (Windows 10) and you will never waste your time theoretical lectures

    This course is divided into 4 main sections

    1- MITRE Frameworks

    In this Section, you will Learn MITRE Frameworks Such as :
    MITRE ATT&CK Framework and how it really works and how to use MITRE ATT&CK Navigator.
    You will learn DETT&CT Framework for Blue Teams and Investigators and how to use it
    you will learn Threat Hunting Methodology (TaHiTI) for Threat Hunting, and how it works and introduction to MaGMa Use Case (UCS) Framework.

    and I will introduce MITRE Cyber Analytics Repository (CAR) Framework, MITRE D3FEND Framework, MITRE ENGENUITY Framework, MITRE Engage Framework, and MITRE RE&CT Framework.

    2- Open-source intelligence (OSINT)

    This Section is ideal for Ethical Hackers, Investigators and Researchers


    You will learn Search Engines, Dark Web For OSINT

    You will learn Search Engine Clustering

    You will Learn Whois and Reverse Whois

    You will learn Spiderfoot for Website Analysis.

    You will learn DNS Records and DNS Analysis Tools

    You will learn Wireless OSINT

    You will learn Email OSINT with Tools such as Recon-ng and Websites

    You will learn People OSINT

    You will learn Image OSINT Techniques such as Reverse Image Search

    You will learn OCR Technology for Image OSINT

    You will learn Sock Puppet for Social Networks

    You will learn Social Networks OSINT such as Twitter and Facebook

    You will learn Maltego and how it works.

    You will learn Maltego Basics

    You will learn Website analysis with Maltego

    You will learn Footprint Machine Levels with maltego

    You will learn documentation and see document template

    3- Network Penetration Testing

    in This section, You will learn Layer 2 Attacks such as :

    CDP/LLDP Recon and CDP Flooding

    CAM Table Overflow Attack

    ARP Spoofing Attack

    Vlan Hopping Attack (Switch Spoofing)

    Vlan Hopping Attack (Double Tagging)

    Spanning-Tree Protocol (STP) Attack

    You will learn Layer 3 Attacks such as :

    Cisco Password Decryption Attacks (Type 5 & Type 7)

    DHCP Starvation Attack

    FHRP Protocol Attacks (HSRP Attack)

    You will learn Monitoring Attacks such as :

    Log Spoofing Attack

    Log DDoS Attack

    you will learn DNS Attacks such as :

    DNS Spoofing Attack

    DNS Amplification Attack

    Firewall Pentesting Steps

    4- Client Penetration Testing

    You will learn Metasploit Framework Components

    You will learn Server-Side Exploitation using Metasploit

    You will learn Client-Side Exploitation using Metasploit

    You will learn Privilege Escalation using Bypass User Access Control (UAC)

    You will learn Post-Exploitation Attacks such as Remote Sniffing

    You will learn Post-Exploitation Attacks such as Host-Based DNS Poisoning

    All the techniques in this comprehensive course are highly practical and at the end of this course, expected you to become an expert in Ethical Hacking

    Notes :
    This course is created for educational purposes only. all the attacks are launched in my own lab. This course is a product of Hamed Mehdi and no other organization is associated with it or a certification exam but you will receive a Course Completion Certification from Udemy

    Who this course is for:

    • people who want to learn quickly
    • people who want review Ethical Hacking Techniques
    • people Who want to learn more than standard courses
    • all ethical hacking lovers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Hamed is a Cybersecurity Researcher, Sr.Full-Stack Software Engineer, UX Designer, and Instructor with more than 11 years of experience in Ethical Hacking, Programming, and NetworkingNetworking Skills :Cisco Infrastructure Devices such as L2 and L3 DevicesHardware Firewalls such as Cisco ASA, FortiGate, and Sophos XGOpen-Source Firewalls such as OPNSense, PFSense and IPTablesMonitoring Softwares such as SolarWinds and Manage EngineLinux Server Configuration, Maintenance and SecurityWindows Server Configuration, Maintenance and SecurityProgramming Skills :PythonJavaScript (NodeJS)RustAndroid (Java)Secure CodingSQL DBs such as MySQL and PostgreSQLNoSQL DBs such as MongoDB, Elasticsearch, Cassandra and InfluxDBLinux Web Servers such as Nginx and OpenliteSpeedPenetration Testing Skills :Network PentestingWireless PentestingIOT PentestingWeb PentestingMobile Pentesting
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 45
    • duration 4:30:27
    • English subtitles has
    • Release Date 2022/11/20