Companies Home Search Profile

Network Ethical Hacking for beginners (Kali - Hands-on)

Focused View

Hamza Sheikh

3:39:08

3 View
  • 1. Introduction to Network Ethical Hacking for Beginners.mp4
    03:27
  • 2. Kali Linux History.mp4
    05:03
  • 3. Kali Linux File Structure.mp4
    05:02
  • 4. Downloading and Installing VirtualBox.mp4
    03:29
  • 5. Downloading and Importing Kali Linux to VirtualBox.mp4
    05:10
  • 6. Solving Importing Kali Linux to VirtualBox error.mp4
    05:06
  • 7. Getting Comfortable with Kali Linux Part 1.mp4
    08:22
  • 8. Getting Comfortable with Kali Linux Part 2.mp4
    07:54
  • 9. How Do Wi-Fi Networks Work.mp4
    00:50
  • 10. Discover Close Wi-Fi Networks and Solve Wi-Fi Adapter Issue.mp4
    07:56
  • 11. Another Way to Solve Adapter Monitor Mode Issue.mp4
    01:44
  • 12. Additional Way to Solve Airodump-ng Issue.mp4
    04:54
  • 13. Explaining the Outputof Airodump ng Command.mp4
    03:19
  • 14. Get Hidden Names of Wi-Fi Networks (SSID).mp4
    01:50
  • 15. How to Change Your MAC Address.mp4
    02:05
  • 16. Solve MAC Address Reset Issue.mp4
    03:07
  • 17. Disconnect Connected Clients from Any Close Wi-Fi Network.mp4
    05:09
  • 18. Disconnect a Specific Client from Any Close Wi-Fi Network.mp4
    02:53
  • 19. Hacking WEP Networks with wifite Tool.mp4
    07:28
  • 20. Hacking WEP Network without Tools.mp4
    06:57
  • 21. Hacking WPAWPA2 through WPS Feature.mp4
    07:13
  • 22. Hacking WPA WPA2 Password using a Wordlist.mp4
    07:46
  • 23. Hack Wi-Fi (WPAWPA2) Password Easily.mp4
    07:36
  • 24. Scan Connected Clients to Your Network and Solve WiFi Issue.mp4
    04:28
  • 25. Scan Opened Ports in Your Network.mp4
    07:07
  • 26. Downloading and Installing Windows 10 as a Virtual Machine.mp4
    05:14
  • 27. Man in the Middle Attack.mp4
    06:20
  • 28. Sniffing HTTP Traffic.mp4
    08:06
  • 29. Sniffing HTTPS Traffic.mp4
    08:46
  • 30. DNS Spoof Attack.mp4
    08:15
  • 31. VEIL Tool- a Tool for Generating Your Own Viruses.mp4
    05:00
  • 32. Generating a Backdoor (Virus).mp4
    07:52
  • 33. Gaining Access via Meterpreter.mp4
    04:42
  • 34. Moving the Backdoor to Another Virtual Machine.mp4
    01:57
  • 35. Meterpreter Commands after Gaining the Access.mp4
    10:44
  • 36. Spoof Backdoor Extension Part 1.mp4
    08:56
  • 37. Spoof Backdoor Extension Part 2.mp4
    03:11
  • 38. Let the Backdoor to Work Outside Your Network.mp4
    06:03
  • 39. Protect Yourself from Above mentioned Attacks.mp4
    08:07
  • Description


    Learn How Hackers Think! & Secure Your Systems Like Security Experts.

    What You'll Learn?


    • Course subtitles are available with these languages: English - Spanish - Arabic - Turkish - Portuguese - French - Chinese - German - Greek - Italian - Russian.
    • How to hack wireless networks to step by step.
    • How to Sniff Data from the network you hacked.
    • How to generate your own viruses.
    • How to attack any close wireless network and get all details about it.
    • How to gain access to remote computers.
    • How to perform fake-authentication attack to target router without even knowing the password of the target network.
    • How to perform De-Authentication attacks without even knowing the password of the target network.
    • How to keep yourself protected from the above mentioned attacks
    • How to Perform (word list) Attacks to get passwords.
    • How to Hack the Wi-Fi passwords for WEP, WPA, and WPA2.
    • How to get comfortable with Kali Linux by getting the important required commands
    • How to use Linux commands & how to interact with the command terminal.
    • How to perform ARP spoofing attack to be the man in the middle MITM to intercept user names and passwords.
    • How to scan network for more details about connected devices.
    • How to know who is connected to the network you hacked.
    • How to use many tools, tricks and techniques to hack networks.
    • How to hide your virus in any other file extension (jpg, pdf, docx, xlsx..)
    • How to hack Mic, Camera, and Keyboard keys (Key Logger)..
    • Many other cool stuff about network hacking.
    • How to change your system MAC address (Spoof) to stay anonymous.
    • How to perform ARP attack without even knowing the password of the target network.

    Who is this for?


  • IT Fresh Graduates
  • Anyone loves hacking
  • Ethical hackers
  • Security guys
  • Security engineers
  • Pen. testers
  • Hackers
  • What You Need to Know?


  • Love to learn hacking.
  • Basic IT Skills.
  • Computer with 4GB memory minimum.
  • For WiFi cracking - Wireless adapter.
  • More details


    Description

    Welcome to the Network Ethical Hacking course!

    This Course subtitles are available with the following languages: English - Spanish - Arabic - Turkish - Russian - French - Chinese - German.

    Hacking is a science similar to any other science. In this course I am going to show you the basics of hacking which will support you to start by yourself to develop your hacking skills to an advanced level. This course considers you have No prior knowledge in hacking or in Linux operating system, & by the end of it you'll be able to hack systems like great hackers and keep yourself secured like security experts!

    This course is practical but it will not ignore the theory. We will start with Kali Linux basics, then will try to make you comfortable with Linux environment. Then we will learn how to install the needed software (VirtualBox, Kali Linux, Windows 10) as virtual machines then we will start the hacking adventure.

    The course is divided into 5 sections, (Introduction, Pre-Attack Phase, Attack Phase, Post-Attack Phase, and How to Keep Yourself Protected).

    In Summary, in this course YOU Will LEARN THE FOLLOWING:

    - How to prepare the penetration testing lab.

    - How to get comfortable with Kali Linux by getting the important required commands.

    - How to use Linux commands & how to interact with the command terminal.

    - How to change your system MAC address (Spoof) to stay anonymous.

    - How to attack any close wireless network and get all details about it (including target network MAC address, SSID, Encryption Type, ...etc).

    - How to get the MAC addresses for all clients connected to the target network without even knowing the password of the target router.

    - How to Perform (word list) Attacks to get passwords.

    - How to perform fake-authentication attack to target router without even knowing the password of the target network.

    - How to perform De-Authentication attacks without even knowing the password of the target network.

    - How to perform ARP attack without even knowing the password of the target network.

    - How to hack wireless networks to step by step.

    - How to get Wi-Fi passwords for WEP , WPA and WPA2.

    - How to Sniff Data from the network you hacked.

    - How to perform ARP spoofing attack to be the man in the middle MITM to intercept user names and passwords.

    - How to know who is connected to the network you hacked.

    - How to scan network for more details about connected devices.

    - How to intercept network traffic.

    - How to use many tools, tricks and techniques to hack networks.

    -How to generate your own viruses.

    - How to hide your virus in any other file extension (jpg, pdf, docx, xlsx..)

    - How to gain access to remote computers.

    - How to hack Mic, Camera, and Keyboard keys (Key Logger)..

    - Many other cool stuff about network hacking.

    - How to keep yourself protected from the above mentioned attacks.


    *** You will get 3.5 hours of hacking and hacking techniques ***

    *** You will start from 0 to reach a good level of understanding and practical use of Linux and hacking tools ***


    Notes:

    • This course is created for educational purposes only, all the attacks are launched in my own lab or against systems that I have permission to test.

    • This course is totally a product of Mohammad Hamza Sheikh and no other organization is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANIZATION IS INVOLVED.


    Kind Regards

    Hamza

    Who this course is for:

    • IT Fresh Graduates
    • Anyone loves hacking
    • Ethical hackers
    • Security guys
    • Security engineers
    • Pen. testers
    • Hackers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Hamza Sheikh
    Hamza Sheikh
    Instructor's Courses
    I'm a computer engineer with 14+ years of experience in Cyber Security, Networking, Cloud and ERP systems. I'm a technology expert who works hard to learn and to update my knowledge on daily basis. The way I teach my team and my students is completely different. It is easy, smooth and straight to the point. Happy to share my experience with you :)Please feel free to ask me any questions. Technology engineering is not a profession, it is a lifestyle!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 39
    • duration 3:39:08
    • Release Date 2024/02/14