Companies Home Search Profile

Learn Computer Hacking and Security From Scratch

Focused View

Shubham Pareek

8:10:19

88 View
  • 1. Introduction.html
  • 2. Oracle VirtualBox.mp4
    07:00
  • 3. Win 7 Installation.mp4
    05:49
  • 4. Win 10 Installation.mp4
    06:40
  • 5. Kali Installation.mp4
    08:42
  • 6. Server 2012 Installation.mp4
    07:58
  • 7. Metasploitable.mp4
    04:46
  • 8. Snapshots.mp4
    03:20
  • 1. Hacking Overview.mp4
    06:02
  • 2. Types of Hackers.mp4
    01:47
  • 3. Network Configuration in VirtualBox.mp4
    01:53
  • 4. Fast Hacking- II.mp4
    11:06
  • 5. Fast Hacking- I.mp4
    07:27
  • 6. Fast Hacking- III.mp4
    07:28
  • 7. Nmap and Hping3- I.mp4
    02:29
  • 8. Nmap and Hping3- II.mp4
    01:33
  • 9. Nmap and Hping3- III.mp4
    01:48
  • 10. Nmap and Hping3- IV.mp4
    02:02
  • 11. Nmap and Hping3- V.mp4
    02:17
  • 12. Zenmap.mp4
    05:01
  • 13. Detecting Target OS.mp4
    03:57
  • 14. Detecting Topology.mp4
    02:36
  • 15. Email Spoofing.mp4
    07:33
  • 16. Steganography- I.mp4
    04:58
  • 17. Steganography- II.mp4
    02:07
  • 18. Finding hidden files using ADS Spy.mp4
    01:58
  • 19. Best Keylogger.mp4
    09:10
  • 1. System Hacking.mp4
    09:38
  • 2. Gaining Remote Access.mp4
    10:33
  • 3. Trojan Creation and Hacking.mp4
    06:48
  • 4. ARP Spoofing.mp4
    05:01
  • 5. ARP Poisoning.mp4
    02:36
  • 6. Win 10 Password Breaking.mp4
    05:21
  • 7. Social Engineering- I.mp4
    06:54
  • 8. Social Engineering- II.mp4
    04:33
  • 9. Social Engineering- III.mp4
    03:11
  • 10. Social Engineering- IV.mp4
    02:41
  • 11. Netcraft Toolbar.mp4
    03:33
  • 12. PhishTank.mp4
    01:57
  • 1. Overview.mp4
    03:14
  • 2. What is a website.mp4
    03:25
  • 3. How to access a website.mp4
    01:50
  • 4. Website Footprinting- I.mp4
    05:53
  • 5. Website Footprinting- II.mp4
    02:49
  • 6. Website Footprinting- III.mp4
    03:04
  • 7. SQL.mp4
    04:19
  • 8. SQL Injection- I.mp4
    08:09
  • 9. SQL Injection- II.mp4
    04:43
  • 10. SQL Injection- III.mp4
    05:38
  • 11. What is XSS.mp4
    02:48
  • 12. XSS Practical.mp4
    05:32
  • 1. Lesson 1.mp4
    09:15
  • 2. Lesson 2.mp4
    06:30
  • 3. Lesson 3.mp4
    06:32
  • 4. Lesson 4.mp4
    06:07
  • 5. Lesson 5.mp4
    02:47
  • 6. Lesson 6.mp4
    04:00
  • 7. Lesson 7.mp4
    03:34
  • 8. Lesson 8.mp4
    05:16
  • 9. Lesson 9.mp4
    04:28
  • 10. Lesson 10.mp4
    05:59
  • 11. Lesson 11.mp4
    02:15
  • 12. Lesson 12.mp4
    03:22
  • 13. Lesson 13.mp4
    11:18
  • 1. Chapter 1.mp4
    05:22
  • 2. Chapter 2.mp4
    07:46
  • 3. Chapter 3.mp4
    06:46
  • 4. Chapter 4.mp4
    11:57
  • 5. Chapter 5.mp4
    09:40
  • 6. Chapter 6.mp4
    10:24
  • 7. Chapter 7.mp4
    07:49
  • 8. Chapter 8.mp4
    05:38
  • 9. Chapter 9.mp4
    16:26
  • 10. Chapter 10.mp4
    04:02
  • 11. Chapter 11.mp4
    05:45
  • 12. Chapter 12.mp4
    07:45
  • 13. Chapter 13.mp4
    03:35
  • 14. Chapter 14.mp4
    01:46
  • 15. Chapter 15.mp4
    06:38
  • 16. Chapter 16.mp4
    05:36
  • 17. Chapter 17.mp4
    04:29
  • 1. Add. Lecture 1.mp4
    06:09
  • 2. Add. Lecture 2.mp4
    04:31
  • 3. Add. Lecture 3.mp4
    04:38
  • 4. Add. Lecture 4.mp4
    10:49
  • 5. Add. Lecture 5.mp4
    05:32
  • 6. Add. Lecture 6.mp4
    05:55
  • 7. Add. Lecture 7.mp4
    03:50
  • 8. Add. Lecture 8.mp4
    07:45
  • 9. Add. Lecture 9.mp4
    04:43
  • 10. Add. Lecture 10.mp4
    02:03
  • Description


    Learn the Art of System Hacking, Website Hacking, Mobile Hacking and Kali Linux Course, Cyber Sec Pro, Ethical Hacking..

    What You'll Learn?


    • You will learn all the important aspects of Ethical Hacking
    • Practical Approach and Live Training
    • You will also learn about Website Penetration Testing
    • Live Website Hacking
    • Learn Kali the Ethical way
    • Both Defensive and Offensive attacks included

    Who is this for?


  • People want to become a Cyber Security Expert
  • Anyone who want to learn Internet Security
  • More details


    Description

    Learn Computer Hacking and Security From Scratch:

    1. Computer Hacking and Security

    Footprinting > Scanning > Gaining Access > Maintaining Access > Clearing Tracks > Generating Reports

    • Footprinting: It is a technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.

    • Scanning: It can be considered a logical extension of active reconnaissance since the attacker uses details gathered during reconnaissance to identify specific vulnerabilities. Attackers can gather critical network information such as the mapping of systems, routers, and firewalls with simple tools like Traceroute. Port scanners can be used to detect listening ports to find information about the nature of services running on the target machine.

    • Gaining Access: In this phase, hacker designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2. The hacker has finished enumerating and scanning the network and now decide that they have some options to gain access to the network.

    • Maintaining Access: Once a hacker has gained access, they want to keep that access for future exploitation and attacks. Once the hacker owns the system, they can use it as a base to launch additional attacks. The longer a Hacker is able to maintain access the more information He may able to gather.

    • Clearing Tracks: No thief wants to get caught, Prior to the attack, the attacker would change their MAC address and run the attacking machine through at least one VPN to help cover their identity, So no one can reach them.

    • Generating Reports: Reports are a summary of your work deliver to management. You have to include what tools or techniques you have used during pen-testing and what results you got. You have t include screenshots if possible and classify threats on the basis of severity.

    2. Website Hacking:

    Basics to Advanced Attacks= SQL + XSS + DoS & DDoS

    3. Mobile Hacking:

    Learn the art of recovering deleted data and also learn about mobile forensics

    4. Linux for Beginners:

    Course Provided to help you learn Kali Linux.

    After Completing all of the above courses you will become a Cyber Security Professional.

    Learn how Black Hat attacks and How you can Defend, as well as fight back.

    5. Additional content:

    Learn to create a website in 30 seconds using AI

    New lectures will be added every month


    Who this course is for:

    • People want to become a Cyber Security Expert
    • Anyone who want to learn Internet Security

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Shubham Pareek
    Shubham Pareek
    Instructor's Courses
    I have expertise in Linux,Ethical Hacking,Cloud Computing,Hardware and Networking. I have 6+ years of Teaching Experience. I am a Ex Senior Trainer at one of India's top Computer Institute. I have many Certifications to prove my knowledge- RHCSA,RHCE,Openstack,Hybrid Cloud Storage,EC-COUNCIL CEH, CCAS CEH, CompTIA Strata, Virtualization, CHNA and many more other Certifications
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 90
    • duration 8:10:19
    • Release Date 2023/05/17