Companies Home Search Profile

Ethical Hacking from Scratch: Complete Bootcamp 2023

Focused View

Andrei Dumitrescu,Crystal Mind Academy

14:49:45

144 View
  • 1 - Why Ethical Hacking Why Now.mp4
    01:43
  • 2 - IMPORTANT Please read.html
  • 3 - How to Get the Most Out of This Course.mp4
    04:15
  • 4 - Getting Course Resources.html
  • 5 - Join Our Online Community.html
  • 6 - The Hacking Lab Environment.mp4
    04:14
  • 6 - should i use kali linux.zip
  • 6 - what is kali linux.zip
  • 7 - Installing Kali Linux in a VM.mp4
    06:28
  • 7 - get kali.zip
  • 8 - Kali and Linux Mint Download Links OVA Files.html
  • 9 - Things to Do After Installing Kali.mp4
    08:56
  • 10 - Installing Metasploitable and Setting the Penetration Testing Lab.mp4
    07:30
  • 11 - Updating and Starting Metasploit.mp4
    03:53
  • 12 - Hacking Anything Metasploit Demo.mp4
    06:39
  • 13 - Using msfconsole.mp4
    06:46
  • 14 - The Metasploit Workflow.mp4
    07:33
  • 15 - Commands Metasploit.html
  • 16 - Hacking Routers and IoT Devices using RouterSploit.mp4
    07:19
  • 16 - RouterSploit.pdf
  • 17 - Exploiting the Default Gateway Using RouterSploit.mp4
    07:03
  • 18 - Commands RouterSploit.html
  • 19 - Hacking Linux Running a DoS Attack Without root Access.mp4
    05:44
  • 20 - Scanning for Rootkits rkhunter and chkrootkit.mp4
    08:57
  • 21 - Commands rkhunter chkrootkit.html
  • 22 - Challenges RouterSploit.html
  • 23 - Challenges Metasploit.html
  • 24 - Intro to Hashes.mp4
    08:03
  • 24 - checksum utility for windows.zip
  • 25 - Commands Hashes.html
  • 26 - Slides-Hash-Properties.pdf
  • 26 - The Properties of Hash Algorithms.mp4
    08:25
  • 27 - Slides-Hash-Applications.pdf
  • 27 - The Application of Hash Algorithms.mp4
    07:28
  • 28 - Attacks on Cryptographic Hash Algorithms.mp4
    06:54
  • 28 - Slides-Attacks-on-Hashes.pdf
  • 28 - hash-collisions.zip
  • 28 - the first collision for full sha1.zip
  • 29 - Intro to Full Disk Encryption.mp4
    05:04
  • 30 - Full Disk Encryption Using dmcrypt and LUKS.mp4
    12:04
  • 30 - dm-crypt-and-luks.pdf
  • 31 - Unlocking LUKS Encrypted Drives With A Keyfile.mp4
    04:20
  • 32 - Commands Full Disk Encryption.html
  • 33 - Full Disk Encryption Solution using VeraCrypt Windows Mac and Linux.mp4
    10:35
  • 34 - Intro to GnuPG.mp4
    03:11
  • 35 - Symmetric Encryption Using GnuPG.mp4
    09:45
  • 35 - the gnu privacy handbook.zip
  • 36 - GnuPG Key Management.mp4
    09:12
  • 37 - GnuPG Key Servers.mp4
    05:22
  • 38 - Asymmetric Encryption Using GnuPG.mp4
    13:11
  • 38 - Asymmetric-Encryption-and-Digital-Signatures.pdf
  • 39 - Digital Signing using GnuPG.mp4
    11:03
  • 39 - Slides-Digital-Signature.pdf
  • 40 - Asymmetric Encryption and Digital Signing using GnuPG.mp4
    05:08
  • 41 - Commands GnuPG gpg.html
  • 42 - EncryptPad-and-GPG.pdf
  • 42 - Using an Encrypted Text Editor EncryptPad.mp4
    07:41
  • 43 - Slides-Steganography.pdf
  • 43 - Steganography Explained.mp4
    10:02
  • 44 - Steganography In Depth.mp4
    07:18
  • 45 - Hide Secret Messages Through Steganography with Steghide.mp4
    09:07
  • 46 - Commands Steganography.html
  • 47 - Challenges Hashes.html
  • 48 - Challenges GPG.html
  • 49 - Challenges Steganography steghide.html
  • 50 - Understanding etcpasswd and etcshadow files.mp4
    08:51
  • 50 - salted password hashing.zip
  • 51 - Intro to Cracking Passwords.mp4
    04:05
  • 51 - Slides-Cracking-Passwords.pdf
  • 52 - Cracking Linux Passwords Using John the Ripper.mp4
    07:31
  • 52 - Slides-JTR.pdf
  • 53 - John the Ripper Advanced.mp4
    06:47
  • 54 - Commands John the Ripper JTR.html
  • 55 - Cracking Passwords Countermeasures.mp4
    03:41
  • 55 - Slides-Cracking-Passwords-Countermeasures.pdf
  • 56 - Cracking Service Passwords with Hydra.mp4
    06:18
  • 57 - Commands Hydra.html
  • 58 - Rainbow Tables Explained.mp4
    07:26
  • 59 - Cracking Hashes Using RainbowCrack rtgen rcrack.mp4
    09:10
  • 60 - Cracking Hashes Countermeasures.mp4
    03:16
  • 60 - Slides-Rainbow-Tables-Countermeasures.pdf
  • 61 - Commands Cracking Hashes Using Rainbow Tables.html
  • 62 - Challenges John the Ripper and Hydra.html
  • 63 - Challenges Rainbow Tables.html
  • 64 - How Does Online Tracking Really Work.mp4
    10:07
  • 64 - Slides-Web-Tracking.pdf
  • 64 - browser uniquenes fingerprinting.zip
  • 64 - how much information do they store about you.zip
  • 65 - Slides-Staying-Anonymous.pdf
  • 65 - Staying Anonymous Online Incognito vs VPNProxy vs Tor vs Tails.mp4
    09:48
  • 66 - Using Disposable Email Addresses.mp4
    05:08
  • 67 - Protecting Your Phone Number.mp4
    04:04
  • 68 - Intro to Onion Routing and Tor.mp4
    06:41
  • 68 - Slides-Tor-Overview.pdf
  • 69 - Onion Routing and Tor In Depth.mp4
    10:02
  • 69 - Slides-How-Tor-Works.pdf
  • 69 - the new guide to running a tor relay.zip
  • 70 - Installing and Running the Tor Browser.mp4
    10:22
  • 70 - what to do when tor is blocked.zip
  • 71 - Slides-Tor-vs-VPN.pdf
  • 71 - Tor vs VPN.mp4
    01:46
  • 71 - vpn leak.zip
  • 72 - Slides-The-Web.pdf
  • 72 - The Layers of the Web Surface Web Deep Web and Dark Web.mp4
    06:51
  • 73 - Surface Web vs Dark Web Anonymity.mp4
    08:40
  • 74 - Through the Dark Web Is it worth it.mp4
    04:22
  • 75 - Slides-Tor-Best-Practices.pdf
  • 75 - Tor Weaknesses and Security Best Practices.mp4
    07:39
  • 75 - check tor.zip
  • 75 - how https and tor work together.zip
  • 75 - traffic confirmation attack operation onymous.zip
  • 76 - Intro to Reconnaissance.mp4
    03:28
  • 76 - Reconnaissance.pdf
  • 77 - Scanning Networks with Nmap.mp4
    09:39
  • 77 - nmap.pdf
  • 77 - nmap reference guide.zip
  • 78 - Nmap Advanced.mp4
    09:25
  • 79 - Commands Nmap.html
  • 80 - Nmap Scripting Engine NSE.mp4
    05:47
  • 81 - Commands NSE.html
  • 82 - Zenmap.mp4
    07:08
  • 83 - Comparing Nmap Scan Results.mp4
    03:36
  • 84 - ARP Scanning arpscan and netdiscover.mp4
    06:32
  • 85 - Commands ARP Scanning.html
  • 86 - Intro to Vulnerability Assessment Systems VAS.mp4
    06:08
  • 87 - Hacking Google Searches Google Dorks.mp4
    06:50
  • 87 - google hacking database.zip
  • 88 - Hacking Google Searches In Depth.mp4
    08:08
  • 88 - google dorks.zip
  • 89 - Finding Webcams Using Google Dorks.mp4
    04:00
  • 90 - Using Shodan The Search Engine For the Internet of Things.mp4
    08:48
  • 91 - The Shodan Algorithm.mp4
    04:01
  • 92 - Using Shodan Filters.mp4
    03:48
  • 93 - Shodan CLI.mp4
    04:56
  • 94 - Challenges Nmap and ARP Scanning.html
  • 95 - Intro to Sniffing.mp4
    02:43
  • 95 - Sniffing.pdf
  • 96 - Using Wireshark for Packet Sniffing and Analyzing.mp4
    08:07
  • 97 - Wireshark Filters.mp4
    07:08
  • 97 - wireshark display filters.zip
  • 98 - Capture Traffic Using tcpdump.mp4
    08:36
  • 98 - tcpdump examples.zip
  • 99 - Commands tcpdump.html
  • 100 - Challenges Wireshark and tcpdump.html
  • 101 - Slides-WiFi-Cards.pdf
  • 101 - WiFi Cards for Hacking WiFi Networks Monitor Mode Packet Injection.mp4
    08:33
  • 102 - Choosing the Right External USB WiFi Card.mp4
    03:37
  • 102 - Slides-Choosing-the-righ-twifi-card.pdf
  • 103 - Connecting a USB WiFi Card to Kali Linux in a VM.mp4
    01:59
  • 104 - Slides-wifi-modes.pdf
  • 104 - Wireless Modes Managed and Monitor RFMON.mp4
    11:15
  • 105 - Commands WiFi Monitor Mode.html
  • 106 - Sniffing Wireless Traffic using airodumpng.mp4
    07:03
  • 107 - Commands Sniffing WiFi Traffic using airodumpng.html
  • 108 - Slides-wifi-deauth-attack.pdf
  • 108 - Wireless Injection Deauthentication Attack.mp4
    09:54
  • 109 - Commands Deauthentication Attack.html
  • 110 - Hacking WPA2 Capture the Handshake.mp4
    07:01
  • 110 - Slides-hacking-wpa2.pdf
  • 111 - Hacking WPA2 Cracking the WiFi Password.mp4
    05:28
  • 111 - new attack on wpawpa2 using pmkid.zip
  • 111 - pwning wpawpa2 networks with bettercap and the pmkid clientless attack.zip
  • 112 - Commands Capturing the Handshake and Cracking the Password.html
  • 113 - Configuring the WiFi Network for Maximum Security.mp4
    07:09
  • 113 - Slides-wifi-for-maximum-security.pdf
  • 114 - Challenges WiFi Monitor Mode.html
  • 115 - Challenges Hacking WPA2.html
  • 116 - The ARP Protocol.mp4
    08:04
  • 117 - Hacking ARP MITM and ARP Poisoning.mp4
    05:00
  • 117 - arp spoofing.zip
  • 118 - Hacking ARP HandsOn Attack Using Ettercap.mp4
    09:45
  • 119 - Commands ARP Poisoning using Ettercap.html
  • 120 - Bettercap The Swiss Army Knife for Attacks and Monitoring.mp4
    06:36
  • 120 - Compiling-and-Installing-Bettercap.pdf
  • 120 - Slides-Bettercap.pdf
  • 121 - Hacking ARP HandsOn Attack using Bettercap.mp4
    10:09
  • 122 - Commands Bettercap.html
  • 123 - Hacking ARP DoS Attack using Bettercap.mp4
    04:35
  • 124 - Hacking ARP Countermeasures.mp4
    08:54
  • 124 - Slides-ARP-Hacking-Countermeasures.pdf
  • 124 - understanding and configuring dynamic arp inspection.zip
  • 125 - Hacking Automation Bettercap Caplets.mp4
    06:52
  • 126 - Hacking DNS DNS Spoofing.mp4
    10:44
  • 126 - Slides-DNS-Spoofing.pdf
  • 127 - HTTP HTTPS HSTS.mp4
    04:52
  • 128 - HTTPS-HSTS-SSL-Stripping.pdf
  • 128 - SSL Sniffing and SSL Stripping.mp4
    04:16
  • 129 - Hacking HTTPS SSL Sniffing Lab.mp4
    05:10
  • 130 - Hacking HTTPS SSL Stripping Lab.mp4
    05:37
  • 131 - HTTP-Stay-safe-on-the-web.pdf
  • 131 - Hacking HTTPS Countermeasures How to Stay Safe on the Web.mp4
    07:39
  • 132 - Hacking Switches Mac Flooding.mp4
    09:26
  • 133 - Hacking Switches Mac Flooding Countermeasures.mp4
    08:27
  • 133 - PortSecurity.pdf
  • 133 - port security.zip
  • 134 - Hacking DHCP Protocol and Attacks.mp4
    09:08
  • 134 - Slides-DHCP-Protocol-and-Attacks.pdf
  • 135 - Hacking DHCP Discover Flooding Attack using Yersinia DoS.mp4
    05:32
  • 136 - Hacking DHCP Starvation Attack using DHCPig DoS.mp4
    04:36
  • 137 - Hacking DHCP Countermeasures.mp4
    04:26
  • 137 - Slides-DHCP-Attacks-Countermeasures.pdf
  • 138 - Hacking Cisco Devices CDP Flooding.mp4
    07:50
  • 138 - cisco discovery protocol.zip
  • 139 - Hacking Cisco Devices CDP Flooding Countermeasures.mp4
    03:47
  • 140 - Hacking Switches STP Attack.mp4
    10:11
  • 140 - how stp works.zip
  • 141 - Hacking Switches STP Attack Countermeasures BPDU Guard Root Guard.mp4
    11:04
  • 141 - Slides-STP-Security.pdf
  • 142 - Introduction to Netfilter and Iptables.mp4
    02:33
  • 143 - Chain Traversal in a Nutshell.mp4
    01:38
  • 144 - Iptables Basic Usage.mp4
    10:02
  • 145 - Iptables Options Flags Part 1.mp4
    07:28
  • 146 - Iptables Options Flags Part 2.mp4
    06:39
  • 147 - Where Do We Write Iptables Rules.mp4
    11:03
  • 148 - Setting the Default Policy.mp4
    06:29
  • 149 - Deleting the Firewall.mp4
    03:15
  • 150 - Filter by IP Address.mp4
    10:17
  • 151 - Filter by Port.mp4
    14:02
  • 152 - Intro to Stateful Firewalls Connection Tracking.mp4
    03:33
  • 153 - Implementing Stateful Firewalls with Iptables.mp4
    07:37
  • 154 - Filter by MAC Address.mp4
    07:49
  • 155 - Match by Date and Time.mp4
    08:16
  • 156 - The ACCEPT and DROP Targets.mp4
    05:29
  • 157 - The LOG Target.mp4
    06:22
  • 158 - Challenges Netfilter and Iptables.html
  • 159 - SSH Public Key Authentication Overview.mp4
    04:25
  • 160 - Generating SSH Key Pair on Windows.mp4
    04:58
  • 161 - What about MacOS.html
  • 162 - Generating SSH Key Pair on Linux.mp4
    03:59
  • 163 - Configuring SSH Public Key Authentication on Cisco IOS Part 1 Windows.mp4
    10:12
  • 164 - Configuring SSH Public Key Authentication on Cisco IOS Part 2 Linux.mp4
    05:15
  • 165 - Configuring SSH Public Key Authentication on Linux.mp4
    11:29
  • 166 - Whats Next.html
  • 167 - Congratulations.html
  • 168 - BONUS THANK YOU GIFT.html
  • Description


    Learn how black hat hackers hack networks and how to secure them like an expert. Learn ethical hacking from scratch!

    What You'll Learn?


    • Learn how Black Hat Hackers think and behave.
    • Practical Ethical Hacking and Penetration Testing skills.
    • Learn how to set up a hacking lab (Kali Linux, Metasploitable, VMs).
    • You will MASTER Ethical Hacking and Cyber Security key concepts (reconnaissance, sniffing, exploitation ...).
    • Acquire the skills to MITIGATE ALL THE ATTACKS presented in the course like an expert.
    • Learn how to hack routers and IoT devices using RouterSploit like a black hat hacker.
    • Learn how to hack systems using Metasploit like a black hat hacker.
    • Learn how to hack WiFi networks (traffic sniffing and injection, deauthentication attack, WPA2 cracking).
    • Learn how to secure a WiFi network and stay safe and anonymous while browsing the Web.
    • Learn how to implement Full Disk Encryption.
    • Learn how to hack ARP (poisoning, Ettercap, Bettercap, Caplets, Ban, ...).
    • Learn how to hack STP.
    • Learn how to hack CDP.
    • Learn how to hack switches.
    • Acquire an in-depth understanding of Steganography and how to hide secret data.
    • Learn about the tools used for cracking passwords (John the Ripper, Hydra, Rainbow Tables, rcrack).
    • Acquire an in-depth understanding of GnuPG (symmetric and asymmetric encryption, key management, digital signatures).
    • Acquire an in-depth understanding of hashes and how to break them.
    • Learn how to hack HTTPS (SSL Sniffing, SSL Stripping, HTTPS Downgrade).
    • Learn how to hack DHCP (flooding, starvation, rogue server).
    • Learn how to hack Google searches (Google dorks).
    • Learn how to use Shodan to discover and hack IoT devices.
    • Acquire in-depth sniffing techniques (Wireshark, Filters, tcpdump, airodump-ng).
    • Acquire in-depth scanning techniques using Nmap, Nmap Scripting Engine, Zenmap, arp-scan and netdiscover.
    • Acquire an in-depth understanding of Netfilter/Iptables Linux Firewall (chains, tables, matches, targets).

    Who is this for?


  • Network and System Administrators.
  • Anyone interested in learning Ethical Hacking and Penetration Testing.
  • Anyone interested in learning how to secure systems from hackers.
  • Programmers
  • More details


    Description

    ***Fully updated for 2023***  This course IS NOT like any other Ethical Hacking or  Penetration Testing course you can take online. At the end of this course, you will MASTER all the key concepts to become an effective Ethical Hacker and a Network Security Expert.

    This new Ethical Hacking course is constantly updated to teach you the skills required for the future that comes.

    This course is focused on learning by doing!

    Course Updates:

    • Update: November 2022- Updates to be 2023 ready.

    • Update: Summer 2022 - Updates to the latest version (Metasploit, RouterSploit, Kali Linux etc).

    • Update: November 2022 - NEW Video: Hacking Linux by running DoS attacks without root access (Fork Bomb)

    • Update: June 2021 - NEW Section: Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services - Dark Web, Deep Web).

    • Course Launch: April 2020

    The world is changing, constantly, and at a fast pace! The technology-driven future in which we’ll live is filled with promise but also challenges. This Ethical Hacking course is really different! You’ll learn what really matters and you’ll get the skills to get ahead and gain an edge.


    I won’t teach you how to run an exploit on a vulnerable application that will be patched in a few days and will not work anymore. Instead, I’ll teach you the cyber security and penetration testing principles that will last for years to come using a practical approach but without neglecting the theory which is the base of a deep understanding.

    Do you want to learn a new valuable skill, get hired, get a promotion, or simply prepare for the future that comes? Well, then this course is for you! By enrolling in this course now, you make the best investment in your career!


    Given the surge in cyber-security threats, millions of new jobs will open across the industry and the global digital security spending on hardening and penetration testing will exceed hundreds of billions of dollars in the years to come.


    After this course, you'll have an in-depth understanding of how  black hat hackers think and behave.


    This course is for you if you want to learn Ethical Hacking and Penetration Testing to the real-world.

    It’s specially designed for you whether you have no experience in Cyber Security, you’ve taken other related courses and you want to level up your skills, or you are coming from other fields like Network and System administration or Programming.

    You'll have access to my closed and exclusive online Group in order to provide you with improved, faster, and better support for your course-related questions.


    This course is taught by me, a Senior Network Engineer and Professional Trainer. Why should you learn from me?

    • I'm a Practitioner and an Enthusiast. Welcome to the real world! I entered the Cyber Security world 15 years ago. I’m not just a random guy that teaches Ethical Hacking and Cyber Security. Just imagine that during this time I’ve learned and applied more and more almost on a daily basis. And now I’m giving everything to you!

    • I'm an Educator and I know how to make a Curriculum. I know exactly what is important and what is not. For the last 10 years, I've trained thousands of people on Ethical Hacking, Cyber Security, Networking, and Programming.

    • You'll learn not only some commands and tools but also advanced concepts for real-world jobs that will last. After this course, you'll be an effective Ethical Hacker!

    You'll have lifetime access and you can return and look for a specific hack or countermeasure anytime you want. And let's not forget, if you don't like the course, you are covered by a 30-day money-back guarantee, full refund, no questions asked!


    The topics covered in this hands-on Ethical Hacking course are:

    • Setting the Hacking Environment (Kali Linux, Metasploitable, VMs)

    • Use Kali to Hack Networks and Devices

    • Hacking Routers and IoT Devices using RouterSploit

    • Hacking anything with Metasploit

    • Hacking Linux

    • Cryptography In-Depth (Hashes, Digital Signature, Encryption)

    • Attacks on Hash Algorithms

    • Full Disk Encryption (Data at rest protection)

    • GnuPG In Depth

    • Steganography In Depth

    • Hiding files in other files

    • Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services - Dark Web, Deep Web)

    • Cracking Passwords (John & Hydra)

    • Rainbow Tables

    • Information Gathering (Reconnaissance)

    • Nmap & Zenmap, Nmap Scripting Engine (NSE)

    • arp-scan & net-discover

    • Hacking Google Searches In Depth

    • Shodan

    • Vulnerability Assessment Systems - OpenVAS

    • Sniffing Traffic (Wireshark & tcpdump)

    • Hacking WiFi Networks

    • Hacking WPA2

    • Hacking ARP (Ettercap & Bettercap)

    • Hacking HTTPS

    • Hacking DNS

    • Hacking DHCP

    • Hacking Cisco Devices

    • Hacking Switches

    • Hacking STP

    • Mitigating all attacks presented in the course

    Every topic includes many live examples on Kali Linux, a command section, quizzes, slides, and many practice challenges.

    The skills you’ll learn will broaden your horizons and could change your life.

    See you in th course!

    Who this course is for:

    • Network and System Administrators.
    • Anyone interested in learning Ethical Hacking and Penetration Testing.
    • Anyone interested in learning how to secure systems from hackers.
    • Programmers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Andrei Dumitrescu
    Andrei Dumitrescu
    Instructor's Courses
    I've been a Network and Software Engineer for over 15 years, the typical profile of a DevOps Engineer.I've co-founded Crystal Mind Academy, a Cisco Academy and professional training center in Romania, that focuses on teaching cutting-edge technologies to students.I have contributed to education in the areas of programming, information security, and operating systems. During the last 15 years, more than 200,000 students have participated in in-person or online training programs at Crystal Mind Academy.I have developed documentation, labs, and case studies for many training programs such as Cisco CCNA, CCNA Security, CCNP, Linux Administration, Information Security, Python Programming, Network Automation with Python or Blockchain Programming (Ethereum/Solidity) which have been successfully attended by thousands over the years.When I'm not working, I crossfit, read a good book, enjoy a good time or travel with my wife and children.
    Crystal Mind Academy
    Crystal Mind Academy
    Instructor's Courses
    The Academy’s goal is to teach hundreds of thousands of people cutting-edge technologies in the fields of Programming and Networking.Our philosophy is that courses should be taught by real professionals with substantial experience in the industry, who are also great teachers. Courses are provided by Andrei Dumitrescu, a software engineer with over 15 years experience in the industry and in teaching offline and online course.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 128
    • duration 14:49:45
    • English subtitles has
    • Release Date 2023/04/26