Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts.
What you’ll learn
[ul] [li]135+ ethical hacking & security videos.[/li] [li] Start from 0 up to a high-intermediate level.[/li] [li] Learn ethical hacking, its fields & the different types of hackers.[/li] [li] Install a hacking lab & needed software (on Windows, OS X and Linux).[/li] [li] Hack & secure both WiFi & wired networks.[/li] [li] Understand how websites work, how to discover & exploit web application vulnerabilities to hack websites.[/li] [li] Use 30+ hacking tools such as Metasploit, Aircrack-ng, SQLmap…..etc.[/li] [li] Discover vulnerabilities & exploit them to hack into servers.[/li] [li] Hack secure systems using client-side & social engineering.[/li] [li] Secure systems from all the attacks shown.[/li] [li] Install & use Kali Linux – a penetration testing operating system.[/li] [li] Learn Linux basics.[/li] [li] Learn Linux commands & how to interact with the terminal.[/li] [li] Learn Network Hacking / Penetration Testing.[/li] [li] Network basics & how devices interact inside a network.[/li] [li] Run attacks on networks without knowing its key.[/li] [li] Control Wi-Fi connections without knowing the password.[/li] [li] Create a fake Wi-Fi network with internet connection & spy on clients.[/li] [li] Gather detailed information about networks & connected clients like their OS, ports …etc.[/li] [li] Crack WEP/WPA/WPA2 encryptions using a number of methods.[/li] [li] ARP Spoofing / ARP Poisoning.[/li] [li] Launch Various Man In The Middle attacks.[/li] [li] Access any account accessed by any client on the network.[/li] [li] Sniff network traffic & analyse it to extract important info such as passwords, cookies, URLs, videos, images ..etc.[/li] [li] Intercept network traffic & modify it on the fly.[/li] [li] Discover devices connected to the same network.[/li] [li] Inject Javascript in pages loaded by clients connected to the same network.[/li] [li] Redirect DNS requests to any destination (DNS spoofing).[/li] [li] Secure networks from the discussed attacks.[/li] [li] Edit router settings for maximum security.[/li] [li] Discover suspicious activities in networks.[/li] [li] Encrypt traffic to prevent MITM attacks.[/li] [li] Discover open ports, installed services and vulnerabilities on computer systems.[/li] [li] Hack servers using server-side attacks.[/li] [li] Exploit buffer overflows & code execution vulnerabilities to gain control over systems.[/li] [li] Hack systems using client-side attacks.[/li] [li] Hack systems using fake updates.[/li] [li] Hack systems by backdooring downloads on the fly.[/li] [li] Create an undetectable backdoor.[/li] [li] Backdoor normal programs.[/li] [li] Backdoor any file type such as pictures, pdf’s …etc.[/li] [li] Gather information about people, such as emails, social media accounts, emails and friends.[/li] [li] Hack secure systems using social engineering.[/li] [li] Send emails from ANY email account without knowing the password for that account.[/li] [li] Analyse malware.[/li] [li] Manually detect undetectable malware.[/li] [li] Read, write download, upload and execute files on compromised systems.[/li] [li] Capture keystrokes on a compromised system.[/li] [li] Use a compromised computer as a pivot to hack other systems.[/li] [li] Understand how websites & web applications work.[/li] [li] Understand how browsers communicate with websites.[/li] [li] Gather sensitive information about websites.[/li] [li] Discover servers, technologies & services used on the target website.[/li] [li] Discover emails & sensitive data associated with a specific website.[/li] [li] Discover subdomains associated with a website.[/li] [li] Discover unpublished directories & files associated with a target website.[/li] [li] Discover websites hosted on the same server as the target website.[/li] [li] Exploit file upload vulnerabilities to gain control over the target website.[/li] [li] Discover, exploit and fix code execution vulnerabilities.[/li] [li] Discover, exploit & fix local file inclusion vulnerabilities.[/li] [li] Discover, exploit & fix SQL injection vulnerabilities.[/li] [li] Bypass login forms and login as admin using SQL injections.[/li] [li] Exploit SQL injections to find databases, tables & sensitive data such as usernames, passwords…etc[/li] [li] Read / Write files to the server using SQL injections.[/li] [li] Learn the right way to write SQL queries to prevent SQL injections.[/li] [li] Discover reflected XSS vulnerabilities.[/li] [li] Discover Stored XSS vulnerabilities.[/li] [li] Hook victims to BeEF using XSS vulnerabilities.[/li] [li] Fix XSS vulnerabilities & protect yourself from them as a user.[/li] [/ul]
Created by Zaid Sabih, z Security Last updated 12/2019 English English, French [Auto-generated] Size: 8.44 GB