Published 3/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 3.17 GB | Duration: 5h 21m
Learn Ethical Hacking and Start your Career in Cyber Security What you'll learn What is Cyber Security ? Kali Linux Command Line (CLI) Wireshark Passive Information Gathering Techniques Scanning with Nmap The Metasploit Framework Essentials Active Directory Attacks Basic Linux Commands Netcat (nc) Essentials Bash Scripting (Shell Scripting) Active Information Gathering Techniques Web Application Attacks Buffer Overflow Hands-On Practice Labs Requirements Nothing just Patience and Eager to Learn ! Description What is ethical hacking?Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strats and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.Also known as “white hats,” ethical hackers are security experts that perform these assessments. The proactive work they do helps to improve an organization’s security posture. With prior approval from the organization or owner of the IT asset, the mission of ethical hacking is opposite from malicious hacking.What Is A Red Team?A red team consists of security professionals who act as adversaries to overcome cyber security controls. Red teams often consist of independent ethical hackers who evaluate system security in an objective manner.They utilize all the available techniques to find weaknesses in people, processes, and technology to gain unauthorized access to assets. As a result of these simulated attacks, red teams make recommendations and plans on how to strengthen an organization’s security posture.How Does A Red Team Work?You might be surprised to learn that red teams spend more planning an attack then they do perfog attacks. In fact, red teams deploy a number of methods to gain access to a network.Social eeering attacks, for example, rely on reconnaissance and research to deliver targeted spear phishing campaigns. Likewise, prior to perfog a penetration test, packet sniffers and protocol analyzers are used to scan the network and gather as much information about the system as possible.What Is A Blue Team?A blue team consists of security professionals who have an inside out view of the organization. Their task is to protect the organization’s critical assets against any kind of threat.They are well aware of the business objectives and the organization’s security strategy. Therefore, their task is to strengthen the castle walls so no intruder can compromise the defenses.How Does A Blue Team Work?The blue team first gathers data, documents exactly what needs to be protected and carries out a risk assessment. They then tighten up access to the system in many ways, including introducing stronger password policies and educating staff to ensure they understand and conform to security procedures.Monitoring tools are often put in place, allowing information regarding access to the systems to be logged and checked for unusual activity. Blue teams will perform regular checks on the system, for example, DNS audits, internal or external network vulnerability scans and capturing sample network traffic for analysis. Overview Section 1: Introduction Lecture 1 What is Ethical Hacking Lecture 2 Red Team Vs Blue Team Lecture 3 Why Kali Linux ? Section 2: Getting Started with Kali Linux Lecture 4 Booting Up Kali Linux Lecture 5 The Linux Filesystem Lecture 6 Basic Linux Commands Lecture 7 Managing Kali Linux Services Lecture 8 Searching, Installing, and Removing Tools Section 3: Kali Linux Command Line (CLI) Lecture 9 Environment Variables Lecture 10 Bash History Command Lecture 11 Piping and Redirection Lecture 12 Text Searching and Manipulation Lecture 13 Editing Files Lecture 14 Comparing Files Lecture 15 Managing Processes Lecture 16 File and Command Monitoring Lecture 17 ing Files Lecture 18 Customizing the Bash Environment Section 4: Netcat (nc) Essentials Lecture 19 Netcat (nc) Section 5: Wireshark Lecture 20 What is Wireshark and why should you learn it? Lecture 21 Basics of Computer Networking Lecture 22 OSI model Lecture 23 Install Wireshark Lecture 24 WireShark Getting Started Lecture 25 Sets a conversation filter between two specific IP addresses Lecture 26 Sets a filter to display allhttp and dns protocols Lecture 27 Sets filters for any TCP packet with a specific source or destination port Lecture 28 displays all TCP packets that contain a certain term Lecture 29 filters all HTTP GET and POST requests Lecture 30 filter out certain types of protocols Lecture 31 Can Wireshark capture passwords? Lecture 32 Plain text network protocols Lecture 33 Capture Insecure Connections (Net Cat) Lecture 34 Capture FTP Passwords Lecture 35 Extract files from FTP using Wireshark Lecture 36 Capture HTTP Passwords Lecture 37 Capture files (images) from HTTP traffic Section 6: Bash Scripting (Shell Scripting) Lecture 38 Our First Bash Script Lecture 39 Variables Lecture 40 If, Else, Elif Statements Lecture 41 Loops Lecture 42 Functions Section 7: Passive Information Gathering Techniques Lecture 43 What is Passive Information Gathering Lecture 44 Whois Enumeration Lecture 45 Google Hacking Lecture 46 Netcraft Lecture 47 Shodan Lecture 48 Security Headers Scanner Lecture 49 Email Harvesting Lecture 50 Information Gathering Frameworks Section 8: Active Information Gathering Techniques Lecture 51 DNS Introduction Lecture 52 DNS Enumeration Section 9: Scanning with Nmap Lecture 53 Port Scanners Essentials Lecture 54 What is Nmap Lecture 55 Preparing the Environment Lecture 56 UDP Scan (-sU) Lecture 57 FIN Scan (-sF) Lecture 58 Ping Scan (-sP) Lecture 59 TCP SYN Scan (-sS) Lecture 60 TCP Connect Scan (-sT) Lecture 61 Version Detection (-sV) Lecture 62 Idle Scan (-sI) Lecture 63 Basic Nmap Scan against IP or host - Hands On Lecture 64 Nmap Ping Scan - Hands On Lecture 65 Scan specific ports or scan entire port ranges - Hands On Lecture 66 Scan multiple IP addresses - Hands On Lecture 67 Scan the most popular ports - Hands On Lecture 68 Scan hosts and IP addresses reading from a text file - Hands On Lecture 69 Save your Nmap scan results to a file - Hands On Lecture 70 Disabling DNS name resolution - Hands On Lecture 71 Scan + OS and service detection with fast execution - Hands On Lecture 72 Detect service/daemon versions - Hands On Lecture 73 Scan using TCP or UDP protocols - Hands On Lecture 74 What is NSE ? Lecture 75 CVE detection using Nmap - Theory Lecture 76 CVE detection using Nmap - Hands On Lecture 77 Launching DOS with Nmap - Hands On Lecture 78 Launching brute force attacks - Hands On Lecture 79 Detecting malware infections on remote hosts - Hands On Section 10: Web Application Attacks Lecture 80 Web Application Security Lecture 81 Web Application Assessment Tools - DIRB Lecture 82 Web Application Assessment Tools - Burp Suite Lecture 83 Web Application Assessment Tools - Nikto Lecture 84 Open Web Application Security Project Top 10 (OWASP Top 10) Section 11: The Metasploit Framework Essentials Lecture 85 Basics of Metasploit Framework Lecture 86 Metasploit User Interfaces and Setup Lecture 87 Getting Familiar with MSF Syntax Lecture 88 Metasploit Database Access Lecture 89 Auxiliary Modules Lecture 90 Metasploit Payloads - Meterpreter Payloads Section 12: Hands-On Practice Lab 1 Lecture 91 Hands-On Practice Lab 1 Links Lecture 92 Setup the Environment Lecture 93 Hands-On Practice Lab 1 Walkthrough Section 13: Hands-On Practice Lab 2 Lecture 94 Hands-On Practice Lab 2 Links Lecture 95 Setup the Environment Lecture 96 Hands-On Practice Lab 2 Walkthrough Section 14: Hands-On Practice Lab 3 Lecture 97 Hands-On Practice Lab 3 Links Lecture 98 Setup the Environment Lecture 99 Hands-On Practice Lab 3 Walkthrough Ethical Hackers,Cyber Security Eeers,DevSecOps Eeers,System Administrator,IT Eeers HomePage: gfxtra__Use_Kali_L.part1.rar.html gfxtra__Use_Kali_L.part2.rar.html
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.