Learn Ethical Hacking From Scratch
- Offered byUDEMY
Learn Ethical Hacking From Scratch at UDEMY Overview
Duration | 15 hours |
Total fee | ₹360 |
Mode of learning | Online |
Difficulty level | Beginner |
Credential | Certificate |
Learn Ethical Hacking From Scratch at UDEMY Highlights
- Earn a certificate of completion from Udemy
- Get a 30 days money back guarantee on the course
- Get full lifetime access of the course material
- Learn from 22 downloadable resources and 2 Articles
- Includes 135+ ethical hacking & security videos.
Learn Ethical Hacking From Scratch at UDEMY Course details
- Hack secure systems using client-side & social engineering.
- Secure systems from all the attacks shown
- Install & use Kali Linux - a penetration testing operating system.
- Learn linux basics
- Learn linux commands & how to interact with the terminal
- This course is highly practical but it won't neglect the theory; learners will start with ethical hacking basics, breakdown the different penetration testing fields and install the needed software (on Windows, Linux and Mac OS X), then they'll dive and start hacking straight away
- From here onwards learners will learn everything by example, by analysing and exploiting different systems such as networks, servers, clients, websites etc
- The course is divided into a number of sections, each section covers a penetration testing / hacking field
- In each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses to hack this system
Learn Ethical Hacking From Scratch at UDEMY Curriculum
Introduction
Setting up a Hacking Lab
Linux Basics
Network Hacking
Network Hacking - Pre Connection Attacks
Network Hacking - Gaining Access - WEP Cracking
Network Hacking - Gaining Access (WEP/WPA/WPA2 Cracking)
Network Hacking - Gaining Access - WPA / WPA2 Cracking
Network Hacking - Gaining Access - Security
Network Hacking - Post Connection Attacks
Network Hacking - Post-Connection Attacks - Information Gathering
Network Hacking - Post Connection Attacks - MITM Attacks
Network Hacking - Detection & Security
Gaining Access To Computers
Gaining Access - Server Side Attacks
Gaining Access - Client Side Attacks
Gaining Access - Client Side Attacks - Social Engineering
Gaining Access - Using The Above Attacks Outside The Local Network
Post Exploitation
Website Hacking
Website Hacking - Information Gathering
Website Hacking - File Upload, Code Execution & File Inclusion Vulns
Website Hacking - SQL Injection Vulnerabilities
Website Hacking - Cross Site Scripting Vulnerabilities
Website Hacking - Discovering Vulnerabilities Automatically
Bonus Section