Companies Home Search Profile

Learn Ethical Hacking and Pentesting - Hands-on

Focused View

Prof. K

10:20:24

93 View
  • 1.1 Course Overview - Ethical Hacking.pptx.html
  • 1. Video - Course Overview.mp4
    01:47
  • 1. Video - Section Overview.mp4
    00:44
  • 2.1 Direct links for Windows 10.docx
  • 2. Video - Downloading ISO and OVA Files for VirtualBox.mp4
    10:09
  • 3.1 Lab - Creating a Virtual Install of Kali Using VirtualBox.pdf
  • 3. Video and lab - Creating a Virtual install of Kali using VirtualBox.mp4
    12:11
  • 4.1 Lab - Create a Virtual Install of Windows 10 Using VirtualBox.pdf
  • 4. Video and Lab - Create a Virtual Install of Windows 10 Pro Using VirtualBox.mp4
    08:17
  • 5.1 Lab Creating a Virtual Install of Metasploitable2 Using VirtualBox.pdf
  • 5. Video and lab - Installing Metasploitable2 Using VirtualBox.mp4
    10:01
  • 6.1 Lab - Create a Virtual Install of Metasploitable3 w2k8 Using VirtualBox.pdf
  • 6. Video and lab - Creating an Install of Metasplotable3-w2k8.mp4
    07:32
  • 7.1 Lab - Creating a Virtual Install of CSI Linux.pdf
  • 7. Video and Lab - Creating a Virtual Install of CSI Linux 2021.2.mp4
    11:44
  • 1. Video - Adding a NAT Network in VirtualBox 7.0.2.mp4
    02:12
  • 2. Video - Installing the VirtualBox Extension Pack.mp4
    02:18
  • 3. Video - Fix Duplicate IP Address Issue With VirtualBox.mp4
    01:48
  • 4. Video - Taking a Snapshot of Your Current Configuration.mp4
    03:51
  • 1. Video - Section Overview.mp4
    01:39
  • 2.1 Lab - Gathering Information Using Maltego.pdf
  • 2. Video and Lab - Gathering Information Using Maltego.mp4
    09:30
  • 3.1 Lab - Gathering Information Using CSI Linux.pdf
  • 3. Video and Lab - Gathering Information Using CSI Linux Investigator.mp4
    08:23
  • 4.1 Lab Preparing CSI Linux to Use Shodan.pdf
  • 4. Video and Lab - Preparing CSI Linux to Use Shodan.mp4
    05:03
  • 5.1 Lab Using Shodan to Find Vulnerable Devices Connected to the Internet.pdf
  • 5. Video and Lab - Using Shodan to Find Vulnerable Devices.mp4
    15:33
  • 6.1 Lab Using Shodan to Search for Vulnerable Databases.pdf
  • 6. Video and lab - Using Shodan to Search for Vulnerable Databases.mp4
    08:07
  • 1. Video - Section Overview.mp4
    01:50
  • 2.1 Lab - Introduction to Nmap.pdf
  • 2. Video and Lab - Introduction to Nmap.mp4
    16:35
  • 3. Video - Service and Open Port scan.mp4
    04:38
  • 4. Video - OS Detection.mp4
    08:44
  • 5. Video - Host Discovery.mp4
    08:41
  • 6. Video - Analyzing NMap Results.mp4
    08:37
  • 7.1 Lab - Using the Nmap Scripting Engine (NSE).pdf
  • 7. Video and lab - NMap Scripting Engine (NSE).mp4
    18:35
  • 8.1 Lab Scanning for WannaCry Ransomware.pdf
  • 8. Video and lab - Scanning for WannaCry Ransomware.mp4
    14:14
  • 1.1 Lab - Installing NESSUS Using Docker.pdf
  • 1. Video and Lab - Installing NESSUS Using Docker.mp4
    11:03
  • 2.1 Lab - Scanning for Vulnerabilities Using Nessus.pdf
  • 2. Video and lab - Scanning for Vulnerabilities Using Nessus.mp4
    10:02
  • 3. Video - Using Your Nessus Scan Results.mp4
    11:51
  • 1.1 Lab - Installing OpenVAS Using Docker.pdf
  • 1. Video and Lab - Installing OpenVAS Using Docker.mp4
    09:01
  • 2.1 Lab - Scanning for Vulnerabilities Using OpenVAS .pdf
  • 2. Video and Lab - Scanning for Vulnerabilities Using OpenVAS.mp4
    10:25
  • 1.1 Lab - Dumping Wi-Fi Credentials Using netsh - DF.pdf
  • 1. Video and Lab - Dumping Wi-Fi Credentials Using netsh.mp4
    04:30
  • 2.1 Lab Post-Exploitation Meterpreter Scripts.pdf
  • 2. Video and Lab - Post-Exploitation of Microsoft Windows.mp4
    13:41
  • 3.1 Lab - Performing an RDP Brute Force Attack.pdf
  • 3. Video and Lab - Performing an RDP Brute Force Attack.mp4
    13:53
  • 1.1 Lab - Use Msfvenom to Create a BIND Shell.pdf
  • 1. Video and Lab - Use MSFVENOM to Create a BIND Shell Payload.mp4
    09:52
  • 2.1 Lab - Use Msfvenom to Create a Reverse TCP Payload.pdf
  • 2. Video and Lab - Use MSFVENOM to Create a Reverse TCP Payload.mp4
    09:30
  • 3.1 Lab - Use Msfvenom to Create an HTTPS Payload.pdf
  • 3. Video and Lab - Use MSFVENOM to Create a HTTPS Payload.mp4
    09:01
  • 4.1 Lab - Use Msfvenom to Create Hidden Bind TCP Payload.pdf
  • 4. Video and Lab - Use MSFVENOM to Create a Hidden Bind TCP Payload.mp4
    07:17
  • 5.1 Lab - HTML Smuggling Attack.pdf
  • 5. Video and Lab - HTML Smuggling Attack.mp4
    13:30
  • 1. Video - Section Overview.mp4
    00:39
  • 2.1 Lab - Learning to Hack Linux Using Metasploitable2.pdf
  • 2. Lab - Learning to Hack Linux Using Metasploitable2.html
  • 3.1 Lab - Exploring Endpoint Attacks.pdf
  • 3. Lab - Exploring Endpoint Attacks.html
  • 4. Video - Exploiting the UNIXLinux rlogin Vulnerability.mp4
    04:18
  • 5. Video - Exploiting VSFTPD v2.3.4 Using Metasploit.mp4
    04:01
  • 1.1 Lab - Social Engineering with ZPhisher.pdf
  • 1. Video and lab - Lab - Social Engineering with ZPhisher.mp4
    06:50
  • 1.1 Lab Introduction to BASH Scripting.pdf
  • 1. Video and Lab - Introduction to BASH Scripting.mp4
    15:11
  • 2.1 Lab B - Creating a BASH Script for Scanning Vulnerable Ports.pdf
  • 2. Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports.mp4
    16:09
  • 3.1 Lab -Linux BASH Shell Scripting -Task Scheduling.pdf
  • 3. Lab -Linux BASH Shell Scripting -Task Scheduling.html
  • 1.1 Lab - Using Hydra to Brute Force a Password.pdf
  • 1. Video and Lab - Password Cracking Using Hydra.mp4
    04:40
  • 2.1 Lab Password Cracking Using Medusa.pdf
  • 2. Video and Lab Password Cracking Using Medusa.mp4
    05:58
  • 3.1 Lab - Password Cracking Using Mimikatz.pdf
  • 3. Video and Lab - Passwords Cracking Using Mimikatz.mp4
    11:00
  • 1.1 Lab Installing a Wireless Adapter in Kali.pdf
  • 1. Video and Lab - Installing a Wireless Adapter in Kali.mp4
    09:06
  • 2.1 Lab Hacking a Wireless Network Using Kali Linux.pdf
  • 2. Video and Lab - Hacking a Wireless Network Using Kali Linux.mp4
    14:12
  • 3.1 Lab - Wireless Deauthentication Using Kali Linux.pdf
  • 3. Video and Lab - Wireless Deauthentication Attack.mp4
    06:44
  • 4.1 Lab PMKID Client-less Wireless Attack Using Bettercap.pdf
  • 4. Video and Lab - PMKID Client-less Wireless Attack Using Bettercap.mp4
    10:16
  • 1.1 Lab - Installing w3af in Kali Linux Using Docker.pdf
  • 1. Video and Lab - Installing w3af in Kali Linux Using Docker.mp4
    07:32
  • 2.1 Lab Conducting A Website Vulnerability Scan Using w3af.pdf
  • 2. Video and Lab Conducting A Website Vulnerability Scan Using w3af.mp4
    05:10
  • 3.1 Lab - Performing a Browser Based Attack.pdf
  • 3. Video and Lab Performing a Browser Based Attack.mp4
    11:56
  • 4.1 Lab - SQL Injection Attack using SQLMap.pdf
  • 4. Video and lab - SQL Injection Attack Using SQLmap.mp4
    12:19
  • 1. Video - Configure Kali for Exploitation the WAN.mp4
    16:26
  • 2.1 Lab - Browser Exploitation Framework (BeEF) - Client-Side Attacks.pdf
  • 2. Video and lab - The Browser Exploitation Framework (BeEF).mp4
    19:03
  • 1.1 Lab Anonymize Kali Using Whonix.pdf
  • 1. Video and Lab - Anonymize Kali Using Whonix.mp4
    10:09
  • 1.1 Lab - CTF - mrRobot.pdf
  • 1. Lab file - Capture the Flag (CTF) Mr. Robot.html
  • 2. Video Walk Through -Key #1.mp4
    13:17
  • 3. Video Walk through - Key #2.mp4
    19:20
  • 4. Video Walk Through - Key #3.mp4
    07:31
  • 1.1 Lab - CTF - Stapler.pdf
  • 1. Lab File - Walkthrough - CTF Stapler.html
  • 2. Video - Capture the Flag - Stapler Part 1.mp4
    18:06
  • 3. Video - Capture the Flag - Stapler Part 2.mp4
    17:06
  • 4. Video - Capture the Flag - Stapler Part 3.mp4
    17:06
  • Description


    An Introduction to the Hacking Techniques of Hackers, Ethical Hackers, Pentesters and Cyber Security Professionals

    What You'll Learn?


    • Use virtualization as it applies to penetration testing.
    • Discover, scan, and exploit network vulnerabilities.
    • Demonstrate the ability to perform an entry-level penetration test.
    • Hack and secure wired networks
    • Hack secure systems using client-side and social engineering attacks
    • Create a virtual install of Kali Linux
    • Learn linux fundamentals

    Who is this for?


  • Anyone a wanting pure 100% hands-on learning experinece.
  • Anyone wanting to learn the basics network penetration.
  • Anyone wanting to apply basic hacking concepts.
  • Anybody wanting to learn how hackers hack computer systems
  • Anybody wanting to learn how to secure their systems from hackers
  • What You Need to Know?


  • Complete Module 01 - Virtual Network Lab Build
  • A laptop or desktop capable of running two simultaneous virtual installs in conjunction with their host operating system.
  • Basic networking skills, IP addressing, familiarization with ports and services, configure a network adapter, use PING, IFCONFIG, IPCONFIG
  • Reliable LAN or cable connection for Internet access.
  • A host machine running Windows 7, 8.1 or 10 (preferred). MAC and Apple machines will work but a Windows host is preferred.
  • A minimum of 4 GB of RAM (8 GB preferred)
  • Basic computer fundamentals.
  • Basic operating system fundamentals.
  • More details


    Description

    Course Overview

    This course provides learners with real practical hands-on learning to gain real-world experience as a penetration tester or an ethical hacker (white, grey, or black).

    This course provides a fundamental look at offensive security concepts and techniques using a virtual install of Kali Linux and three different target victims, Windows XP, Windows 7, Server 2008, and Linux (Metesploitable2).  This course provides a practical 100% hands-on approach to becoming an ethical hacker or a pentester.

    How is the course structured?

    The course uses short video tutorials and lab files that provide a practical step-by-step learning experience of ethical hacking methodologies. Students will use the same tools and open-source software used by professional penetration testers and ethical hackers and hackers.

    This course provides videos, lab files, and links for downloading the free and open-source software used throughout this course.

    You will build a virtual install of Kali Linux and Windows XP for the virtual lab environment. You should complete the first lab of this course before enrolling.  Starting with lab 2, we will begin scanning and attacking a Windows XP  victim. If a learner cannot complete the labs in section 2 of the course, there is no need to enroll since all labs followed are dependent on the first lab being completed.

    You will learn how intruders escalate privileges and what steps can be taken to stop them, the importance of a strong firewall, keeping systems and software updated, and the use of complex passwords.

    You will also learn how to launch DDoS Attacks, Buffer Overflows, keylogging, and password hacking.  Completing the course will help prepare an individual for an entry-level position as a pen-tester or ethical hacker. On completing this course,  you will receive a course completion.

    If you would like to discuss ethical hacking or watch someone talk theory, there are plenty of lecture courses on Udemy. However, to complete this course, students must demonstrate the practical concepts of offensive hacking. In other words, learners will learn by doing.

    Course Objectives

    1. Demonstrate the use of offensive security tools and techniques.

    2. Proficiency in the use of the CLI (Command Line Interface) of Linux.

    3. Use Linux as a hacking platform.

    Who should take this course?

    Network administrators, cybersecurity students, entry-level penetration testers, anyone who wants to be an ethical hacker, concerned parents,  concerned spouses, law enforcement, and anyone with a solid background in technology.

    Who should not take this course?

    Anyone who has technophobia (the fear of learning new technology).  Anyone not having a good understanding of the OSI model or the TCP/IP  suite.

    What are the course requirements, Knowledge level?

    • A  good understanding of basic networking concepts, the TCPI/IP stack, how devices communicate, and basic troubleshooting of network connectivity issues.

    • How to use a computer, a mouse and a keyboard.

    • How to configure a static IP address on a Network adapter.

    • How to check for connectivity using PING, IPCONFIG, and IFCONFIG.

    • This course will not cover the OSI model, discuss IP addressing, or any basic networking concepts. However, students are expected to have these skills when they enroll.

    ​Hardware

    • Desktop or laptop capable of virtualization. (Virtualization enabled BIOS).

    • A minimum of 4 GB of RAM (8 GB or more of RAM recommended).

    • Administrative access to the host operating system. (You own the machine).

    • Good, reliable Internet access.

    Software

    • Any 64-bit Windows operating system. (Windows 10 preferred)

    • A current 64-bit version of Mac or a Linux operating system.

    • An installation of Virtualbox (Links provided in the lab).

    • An installation of 7zip (Links provided in the lab).

    • Copy of Kali ISO or Kali VMWare or Virtualbox image. (Links provided in the lab).

    • Copy of Windows XP SP2 (Links provided in the lab).

    • Copy of Server 2008 SPI 32 bit (Links provided in the lab).

    • Copy of Metesploitable2 (Links provided in the lab).

     

    Who this course is for:

    • Anyone a wanting pure 100% hands-on learning experinece.
    • Anyone wanting to learn the basics network penetration.
    • Anyone wanting to apply basic hacking concepts.
    • Anybody wanting to learn how hackers hack computer systems
    • Anybody wanting to learn how to secure their systems from hackers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Prof. K comes to Udemy with a Master of Science in Cyber Security from UMUC (2015) and a Master of Science in Information Technology from Capella University (2007). Professor K has worked in technology for more than 20 years and has been an online instructor for 14 years. When not maintaining his own online published courses, Professor K works as a full and part faculty member teaching technology, cybersecurity, and digital forensics courses for several online universities and colleges.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 65
    • duration 10:20:24
    • English subtitles has
    • Release Date 2023/10/04

    Courses related to Ethical Hacking

    Courses related to Penetration Testing