Learn Ethical Hacking From Scratch by StationX
- Offered byStationX
Learn Ethical Hacking From Scratch by StationX at StationX Overview
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Go to Website |
Credential | Certificate |
Learn Ethical Hacking From Scratch by StationX at StationX Highlights
- Gain Lifetime Access to Courseware
- 120 detailed videos about ethical hacking & computer security
- Earn a certificate of completion upon successful completion
Learn Ethical Hacking From Scratch by StationX at StationX Course details
- Anybody who is interested in learning ethical hacking / penetration testing
- Anybody who wants to learn how hackers would attack their computer systems
- Anybody who wants to learn how to secure their systems from hacker
- Welcome to my comprehensive course on Ethical Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking. The first thing you will learn is some basic information about ethical hacking and the different fields in penetration testing.
- This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in my lab.
- The course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other. We will start by talking about how we can exploit these systems to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level -- by the time you finish, you will have knowledge about most penetration testing fields.
Learn Ethical Hacking From Scratch by StationX at StationX Curriculum
Introduction
Setting up The Lab
Linux Basics
Network Hacking
Network Hacking - Pre Connection Attacks
Network Hacking - Gaining Access (WEP/WPA/WPA2 Cracking)
Network Hacking - Post Connection Attacks
Network Hacking - Detection & Security
Gaining Access To Computer Devices
Gaining Access - Server Side Attacks
Gaining Access - Client Side Attacks
Gaining Access - Client Side Attacks - Social Engineering
Gaining Access - Using The Above Attacks Outside The Local Network
Post Exploitation
Website Hacking
Website Hacking - Information Gathering
Website Hacking - File Upload, Code Execution & File Inclusion Vulns
Website Hacking - SQL Injection Vulnerabilities
Website Hacking - Cross Site Scripting Vulnerabilities
Website Hacking - Discovering Vulnerabilities Automatically Using OWASP ZAP
Bonus Section