Complete Ethical Hacking Bootcamp : Zero to Mastery
- Offered byUDEMY
Complete Ethical Hacking Bootcamp : Zero to Mastery at UDEMY Overview
Duration | 27 hours |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Beginner |
Official Website | Go to Website |
Credential | Certificate |
Complete Ethical Hacking Bootcamp : Zero to Mastery at UDEMY Course details
- Anybody interested in learning ethical hacking and penetration testing
- Anybody interested in learning python and ethical hacking
- Anybody looking to go beyond a normal "beginner" tutorial that doesn't give you a chance to practice
- Anybody looking to learn how hackers hack computer systems
- Any developer looking to secure their computer systems from hackers
- Learn Ethical Hacking from scratch & All 5 phases of Penetration Testing
- Learn Python from scratch so you are able to write your own tools for ethical hacking
- Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with Windows/Mac/Linux)
- Create additional virtual *vulnerable* machines that we can practice our attacks on
- Create trojans, viruses, keyloggers for ethical hacking
- Learn how to bypass Firewalls & Intrusion Detection System with Advanced Scanning
- Learn how to crack Wireless Access Point passwords
- Bug Bounty: Discover all types of Web Application Bugs that could cause a threat
- Learn how to gain access to any type of machine: Windows/Linux/MacOS
- Sniff passwords over the local area network with Man In The Middle Attacks
- SQL Injection, XSS, Command Injection and other techniques
- Learn how to trick people into opening your program (i.e Social Engineering)
- Learn Advance Metasploit Framework usage
- Learn Basics of Linux and Linux Terminal
- Master Information Gathering and Footprinting
- Learn how to perform Vulnerability Analysis
- Perform advanced scanning of an entire network
- Perform Deauthentication Attack to disconnect everyone from the Wireless Access Point
- Learn Website Application Penetration Testing from scratch
- Learn Advance Nmap Usage
- Code your own Advanced Backdoor that you can use in your Penetration Tests
- Create Persistence on target machines
- Perform newest Windows 7 + 10 exploits & attacks
- Learn how to gain access to a router in various ways
- Learn Networking & different Networking Protocols
- Combine programming knowledge and ethical hacking knowledge so you can mix techniques and adapt them to different situations
- Just launched with all modern ethical hacking tools and best practices for ! Join a live online community of over 400,000+ students and a course taught by industry experts. This course will take you from absolute beginning of setting up your own hacking lab (like Kali Linux) on your machine, all the way to becoming a security expert that is able to use all the hacking techniques used by hackers and defend against them!
- Whether you are a complete beginner looking to become an ethical hacker, or you?re a student looking to learn about securing computer systems, or you are a programmer who is looking to improve their security online and prevent attacks from hackers on your website, this course will dive you into the world of hacking and penetration testing. We even teach you Python programming from scratch for those that want to learn to program their own tools for hacking and penetration testing.
- This course is focused on learning by doing. We are going to teach you how hacking works by actually practicing the techniques and methods used by hackers today. We will start off by creating our hacking lab to make sure we keep your computers safe throughout the course, as well as doing things legally, and once we have our computers set up for ethical hacking, then we dive into topics like:
- 1. HACKING LAB - In this section we are building our own lab where we can perform our attacks (You will be able to use your Mac, Windows, Linux operating systems don't worry!). What this lab essentially is, is a virtual machine that we will use for hacking (Kali Linux) and throughout the course we also create additional virtual *vulnerable* machines that we can practice our attacks on. The reason we use virtual machines is because we are not allowed to test our attacks on real life websites and networks so we create our own environment to do that.
- 2. OPTIONAL: PYTHON 101 - Learn python 3 programming from scratch. This section is not mandatory and is optional for those that want to learn to programming so you are able to build your own ethical hacking tools!
- 3. RECONNAISSANCE - Here we learn what we call Footprinting, or in other words, Information Gathering. Once we choose our target, our first task is to gain as much information about the target as possible.
- 4. SCANNING - This is where things get real. In this section, we also gather information but we try to gather only technical information (i.e. if they have open ports, if they have a firewall, what softwares they are running on those open ports, what operating system do they have, is it an outdated operating system, etc.).
- 5. VULNERABILITY ANALYSIS - In this section we use the information that we gathered from scanning (such as softwares that the target has running on open ports) and with this information, we try to determine whether there is any known vulnerabilities.
- 6. EXPLOITATION & GAINING ACCESS - This is the exciting part of the course. This is where we attack and gain access to the target machines. Throughout this section, we will be covering many different vulnerabilities and different targets. We perform these attacks on our virtual machines and cover another really important tool for an ethical hacker: Metasploit Framework. The goal of exploitation is to get on that target machine. This means we must drop a payload on that target machine so we can use it to navigate through their systems, look through their files, execute anything we want, and delete anything we want without the target knowing anything about it. We will also learn to create our own Viruses and Trojans that we can deliver to the target whether through an email or through an USB.
- 7. POST EXPLOITATION - This is what comes after Exploitation. Post exploitation is what we do on the target machine after we have exploited it. Since we are on that machine we can do many things depending on what we want to get out from it. At the end, after we do all of the things we wanted, we want to make sure we cover our tracks by deleting any event logs or deleting any evidence that we were ever on that machine.
- 8. WEBSITE PENETRATION TESTING - This is another big topic for an ethical hacker. In this section, we are mainly targeting websites and their bugs/vulnerabilities. These vulnerabilities can be anything from misconfigurations, SQL Injections (us interacting with the database), Information Disclosures (having access to some information by mistake which shouldn't be out there), Command Injection (directly interacting with the system through the webpage), XSS (Cross Site Scripting Attack and Injecting Javascript code on the page).
- 9. MAN IN THE MIDDLE - This is an attack that is used inside a network. This allows us to sniff any unencrypted data and see it in plain text. This could also include seeing passwords in plain text for some websites. There are many tools out there that can perform this attack for us and we cover some of the main ones in the section.
- 10. WIFI CRACKING - This is the section where we want to gain access to a network by cracking its wireless password.
- 11. SOCIAL ENGINEERING - This is something we cover in almost every section. Social Engineering is an attack on humans since as we know people are always the weakest security!
- + much much more!
- We guarantee you this is the most comprehensive online course on hacking and security skills! Have a look at the course outline video to see all the topics we are going to cover, all the projects we?re going to build, and all the techniques you?re going to learn to become a top ethical hacker and penetration tester!
Complete Ethical Hacking Bootcamp : Zero to Mastery at UDEMY Curriculum
Introduction
Course Outline
Join Our Online Classroom!
Exercise Meet The Community
What Is Ethical Hacking?
Course Resources + Guide
Setting Up Our Hacking Lab
What is A Virtual Machine?
Why Linux?
Monthly Coding Challenges, Free Resources and Guides
Downloading Virtual Box & Kali Linux
Important - New Kali Linux Categories
Note Kali Linux Updates All The Time!
Creating Our First Virtual Machine
Installing Kali Linux Operating System
Update - New & Old Versions of Kali Linux
Networking Basics
Full Screen Mode & Network Settings
Note Getting Familiar With Kali Linux!
Stages Of A Penetration Test
Linux Operating System
Navigating Through Linux System
Creating Files & Managing Directories
Network Commands & Sudo Privileges In Kali
Note Linux File System & Additional Commands
Reconnaissance & Information Gathering
What is Information Gathering?
Obtaining IP Address, Physical Address Using Whois Tool
Whatweb Stealthy Scan
Aggressive Website Technology Discovering on IP Range
Note Same Tools Different Results!
Gathering Emails Using theHarvester & Hunter.io
How To Download Tools Online
Finding Usernames With Sherlock
Bonus - Email Scraper Tool In Python
Note More About Information Gathering
Scanning
Theory Behind Scanning
TCP & UDP
Installing Vulnerable Virtual Machine
Netdiscover
Perforg First Nmap Scan
Different Nmap Scan Types
ZTM Nmap Cheat Sheet
Discovering Target Operating System
Detecting Version Of Service Running On An Open Port
Filtering Port Range & Output Of Scan Results
What is a Firewall/IDS?
Using Decoys and Packet Fragmentation
Security Evasion Nmap Options
Note Time To Switch Things Up!
Python Coding Project # - Portscanner
The Paths
Note Do We Need To Learn Programg To Be An Ethical Hacker?
Coding a Portscanner in Python
Vulnerability Analysis
Finding First Vulnerability With Nmap Scripts
Manual Vulnerability Analysis & Searchsploit
Nessus Installation
Discovering Vulnerabilities With Nessus
Scanning Windows Machine With Nessus
Lets cool down for a bit!
Exploitation & Gaining Access
What is Exploitation?
What is a Vulnerability?
Reverse Shells, Bind Shells
Metasploit Framework Structure
Msfconsole Basic Commands
Our First Exploit ? vsftp 2.3.4 Exploitation
Misconfigurations Happen - Bindshell Exploitation
Information Disclosure - Telnet Exploit
Software Vulnerability - Samba Exploitation
Attacking SSH - Bruteforce Attack
Exploitation Challenge - Different Exploits
Explaining Windows Setup
Eternal Blue Attack - Windows Exploitation
DoublePulsar Attack - Windows Exploit
BlueKeep Vulnerability - Windows Exploit
Note We Can Also Target Routers!
Update - Routersploit
Update - Router Default Credentials
SMBGhost CVE - - Windows Manual Exploitation
Note Not Everything Will Work Smooth!
Setting Up Vulnerable Windows
Crashing Windows Machine Remotely
Exploiting Windows Machine Remotely
Gaining Access (Viruses, Trojans, Payloads ...)
Generating Basic Payload With Msfvenom
Advance Msfvenom Usage Part
Advance Msfvenom Usage Part
Generating Powershell Payload Using Veil
TheFatRat Payload Creation
Note My Payloads Are Getting Detected By An Antivirus!
Hexeditor & Antiviruses
Making Our Payload Open An Image
Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
Post Exploitation Theory
Meterpreter Basic Commands Part
Meterpreter Basic Commands Part
Elevating Privileges With Different Modules
Creating Persistence On The Target System
Post Exploitation Modules
Exploitation Recap
Python Coding Project # 2- Backdoor
What Are We Creating?
Connecting Server And Backdoor
Processing Instructional Commands
Sending and Receiving Data
Executing Commands And Compiling The Program
Changing Directory Inside Of Our Backdoor
Uploading & Downloading Files
Testing All The Commands
Note You Can Continue Building Onto This Project!
Website Application Penetration Testing
Website Penetration Testing Theory
HTTP Request & Response
Information Gathering & Dirb Tool
Burpsuite Configuration
ShellShock Exploitation
Command Injection Exploitation
Getting Meterpreter Shell With Command Execution
Reflected XSS & Cookie Stealing
Stored XSS
HTML Injection
SQL Injection
CSRF Vulnerability
Hydra Bruteforce Attack Example
Hydra Bruteforce Attack Example
Burpsuite Intruder
Python Coding Project # 3- Login Bruteforce, Directory Discovery
Creating Programs
Bruteforcer In Python
Hidden Directory Discovery
Man In The Middle - MITM
Theory - Man In The Middle Attack
Bettercap ARP Spoofing
Ettercap Password Sniffing
Manually Poisoning Targets ARP Cache With Scapy
Bonus Wireless Access Point Cracking
Wireless Cracking Theory
Putting Wireless Card In Monitor Mode
Deauthenticating Devices & Grabbing Password
Aircrack Password Cracking
Hashcat Password Cracking
Bonus Gaining Access To An Android Device
Android Hacking Theory
Android VM Install
Gaining Access With Android Meterpreter
Evil Droid
Is it Flappy Bird or Malware
Hack Any Device On Any Network With Ngrok
Where To Go From Here?
Become An Alumni
Endorsements On LinkedIN
What is Next?
Learning Guideline
Practice
Bug Bounty
Coding For Hackers
Exploit Development
Python Monthly
Course Review
The Final Challenge
Learn Python Basics
What Is A Programming Language
Python Interpreter
How To Run Python Code
Our First Python Program
Latest Version Of Python
Python vs Python
Exercise How Does Python Work?
Learn Python Intermediate
Learning Python
Python Data Types
How To Succeed
Numbers
Math Functions
DEVELOPER FUNDAMENTALS I
Operator Precedence
Exercise Operator Precedence
Optional bin() and complex
Variables
Expressions vs Statements
Augmented Assignment Operator
Strings
String Concatenation
Type Conversion
Escape Sequences
Formatted Strings
String Indexes
Immutability
Built-In Functions + Methods
Booleans
Exercise Type Conversion
DEVELOPER FUNDAMENTALS II
Exercise Password Checker
Lists
List Slicing
Matrix
List Methods
List Methods
List Methods
Common List Patterns
List Unpacking
None
Dictionaries
DEVELOPER FUNDAMENTALS III
Dictionary Keys
Dictionary Methods
Dictionary Methods
Tuples
Tuples
Sets
Sets
Breaking The Flow
Conditional Logic
Indentation In Python
Truthy vs Falsey
Ternary Operator
Short Circuiting
Logical Operators
Exercise Logical Operators
Iterables
Exercise Tricky Counter
range()
enumerate()
While Loops
While Loops
break, continue, pass
Our First GUI
DEVELOPER FUNDAMENTALS IV
Exercise Find Duplicates
Functions
Parameters and Arguments
Default Parameters and Keyword Arguments return
Methods vs Functions
Docstrings
Clean Code
*args and **kwargs
Exercise Functions
Scope
Scope Rules
global Keyword
nonlocal Keyword
Why Do We Need Scope?
Modules in Python
Quick Note Upcog Videos
Optional PyCharm
Packages in Python
Different Ways To Import
Learn Python 3 Error Handling
Errors in Python
Error Handling
Error Handling
Exercises Error Handling
Error Handling
Learn Python 4: File I/O
Working With Files In Python
Read, Write, Append
File Paths
File IO Errors
Exercise Translator
Next Steps
BONUS SECTION
Bonus
Other courses offered by UDEMY
Complete Ethical Hacking Bootcamp : Zero to Mastery at UDEMY Students Ratings & Reviews
- 3-41