->
Udemy - The Complete Cyber Security Bundle Beginner to Advanced
Udemy - The Complete Cyber Security Bundle Beginner to Advanced

Welcome this comprehensive course on Ethical Hacking! This course assumes you have NO prior knowledge in hacking and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts!


Description

Welcome this comprehensive course on Ethical Hacking! This course assumes you have NO prior knowledge in hacking and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts!

This course is highly practical but it won't neglect the theory, so we'll start with ethical hacking basics and the different fields in penetration testing, installing the needed software (works on Windows, Linux and Mac OS X) and then we'll dive and start hacking systems straight away. From here you'll learn everything by example, by analyzing and exploiting computer systems such as networks, servers, clients, websites .....etc, so we'll never have any boring dry theoretical lectures.

The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses and hack into it, not only that but you'll also learn how to secure this system from the discussed attacks. This course will take you from a beginner to a more advanced level by the time you finish, you will have knowledge about most penetration testing fields.

Who this course is for:
  • Anyone who want to learn about hacking

Course content

  • Introduction & Setup the Lab
    • 1. Download and Install VM
    • Configuring the VM
    • Download and Install Kali Linux
    • Download and Install two different operating system
    • Download and Install Android Platform on PC
    • Kali Linux Basics
    • Kali Linux Terminal and Commands
    • Kali Linux Terminal and Command [Advanced]
    • Let's Have some Cool Hacking Tools ! [Black-Hat]
    • Hide yourself from internet - Part 1
    • Hide yourself from internet - Part 2
    • Hide yourself from internet - Part 3
  • Part 2 -Information Gathering
    • Introduction
    • People Search(hidden
    • Get details from Job Sites (easy)
    • Gathering InFo from Social Websites (like-FB,Linkedin)
    • Netcraft
    • 5. Maltego - Part 1
    • 5. Maltego - Part 2
    • 7. Google Hacking - Part 1
    • 7. Google Hacking - Part 2
    • 9. How to get any Hidden Information easily
    • 1. Using Search Engines
    • 2. Using Different Websites
    • 3. Using WHOis
    • 4. Advanced DNS Tricks
    • 5. Advanced Google Search Operators - Google Hacking
    • 6. Google Hacking Database , Best Tools & more - Google Hacking
    • 7. Nmap , Nmap NSE Scripts, Zenmap
    • 8. DNS transfer Zone
    • 9. SMB Null Session and SMB Enumeration
  • Part 3 - Pre Connection Attacks - WiFi & Wired Hacking
    • 1. Introduction to Pre Connection Attacks - WiFi & Wired Hacking
    • 1. Introduction
    • 2. Wireless Network Penetration testing process
    • 3. Advanced Preconnection attack
    • 1. Gathering Module Information
    • 2. Identifying the target Network
    • 3. Capturing packet
    • 4. Gathering Information from the Target Network[Demonstration]
    • 5. Identifying Hidden Networks[Demonstration]
    • 1. Introduction to Exploiting the Target Network
    • 2. Hacking WEP Networks
    • 3. Hacking WPAWPA2 Networks
    • 4. Hacking WPS enabled networks
    • 5. Taking advantage of Router misconfigurations
    • 6. Post Exploitation
    • 1. Non Disrupting Techniques
    • 2. Eavesdropping
    • 3. Creating an access point for Man in the Middle attack[advance]
    • 4. Creating an Online access point for Man In the Middle attack
    • 5. Denial of Service attack (DOS) on Wireless Network
    • 6. Deauthentication Attack (Disconnecting Any Device From The Network)
    • 1. Creating a Rogue Access Point - Part 1
    • 2. Creating a Rogue Access Point - Part 2
    • 1. Creating a Fake Captive Portals - Part 1
    • 1. Creating a Fake Captive Portals - Part 2
    • 15. intro to Covering our Tracks
    • 2. Disposable VMs - Covering our Tracks
    • 3. Changing our MAC addresses
    • 4. Wireless Penetration testing Accessories
  • Part 4 - Scanning Networks
    • Introduction to Scanning Networks
    • 1. Scanning [Definition & Basics]
    • 2. Types of Scanning
    • 3. Techniques Used for Scanning
    • 4. Tools Used for Scanning
    • 5. How to do Scanning out of your own Network
  • the 2nd course "'Offensive-Security - PWK - Penetration Testing with Kali""
    • 0
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • 23
    • 24
    • 25
    • 26
    • 27
    • 28
    • 29
    • 30
    • 31
    • 32
    • 33
    • 34
    • 35
    • 36
    • 37
    • 38
    • 39
    • 40
    • 41
    • 42
    • 43
    • 44
    • 45
    • 46
    • 47
    • 48
    • 49
    • 50
    • 51
    • 52
    • 53
    • 54
    • 55
    • 56
    • 57
    • 58
    • 59
    • 60
    • 61
    • 62
    • 63
    • 64
    • 65
    • 66
    • 67
    • 68
    • 69
    • 70
    • 71
    • 72
    • 73
    • 74
    • 75
    • 76
    • 77
    • 78
    • 79
    • 80
    • 81
    • 82
    • 83
    • 84
    • 85
    • 86
    • 87
    • 88
    • 89
    • 90
    • 91
    • 92
    • 93
    • 94
    • 95
    • 96
    • 97
    • 98
    • 99
    • 100
    • 101
    • 102
    • 103
    • 104
    • 105
    • 106
    • 107
    • 108
    • 109
    • 110
    • 111
    • 112
    • 113
    • 114
    • 115
    • 116
    • 117
    • 118
    • 119
    • 120
    • 121
    • 122
    • 123
    • 124
    • 125
    • 126
    • 127
    • 128
    • 129
    • 130
    • 131
    • 132
    • 133
    • 134
    • 135
    • 136
    • 137
    • 138
    • 139
    • 140
    • 141
    • 142
    • 143
    • 144
    • 145
    • 146
    • 147
    • 148

The_Complete_Cyber_Security_Bundle_Beginner_to_Advanced.part1.rar

The_Complete_Cyber_Security_Bundle_Beginner_to_Advanced.part2.rar

The_Complete_Cyber_Security_Bundle_Beginner_to_Advanced.part3.rar

The_Complete_Cyber_Security_Bundle_Beginner_to_Advanced.part4.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Gamystyle   |  

Information
Members of Guests cannot leave comments.




rss