Full Ethical Hacking Course

Currently reading:
 Full Ethical Hacking Course

cochisetol

Member
LV
1
Joined
Aug 13, 2023
Threads
16
Likes
3
Awards
4
Credits
1,146©
Cash
0$
Learn all about ethical hacking and penetration testing

https://www.udemy.com/course/full-ethical-hacking-course/

What you'll learn​

  • Ethical hacking and cybersecurity
  • Penetration testing

Requirements​

  • Basic computer knowledge

Description​

Introduction to cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.
Introduction to cyber-security

  • Cyber-attack chain
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and Control
  • Actions on Objective
Virtualization on VirtualBox
  • Kali Linux
  • Install, deploy and run Kali Linux
  • Installation and deployment of vulnerable server for testing
Reconnaissance
Information gathering
Assess security vulnerabilities
Scanning engines
  • Nmap scanning
Search engine scanners
Internet scanners
  • Google search engine
Open source intelligence
  • Recon-ng scanning
Security standards
Center for Internet Security (CIS)
Hardening checks for systems
Exploitation
Metasploit framework for ethical hacking
  • Basic commands and usage
  • Module exploration
  • Search for vulnerabilities from scanning results
  • Exploitation of systems
  • Post-exploitation for privilege escalation and scanning
Security hardening and configuration
Social engineering

  • Dark Web with Tor
    • Hacking groups and forums
  • Wireless security assessment with WiFi PineApple
    • Wireless vulnerabilities
  • Social Engineering Toolkit (SET) attacks
  • Direct attacks into Windows 10 with Macros and Powershell
Web, application and database vulnerabilities
Open Web Application Security Project (OWASP) top 10
  • Injection
  • Broken authentication
  • Sensitive data exposure
  • XML External Entities
  • Broken access control
  • Security misconfiguration
  • Cross-Site Scripting
  • Insecure Deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
Full SQLMAP tutorial for web penetration testing
BurpSuite tutorial for manual injection on web penetration testing
Payload testing with custom load
Creation of payload
  • Payloads package on injection
  • Fully undetected payloads
  • Buffer overflow for shell
 

carxproveteran

Member
Amateur
LV
9
Joined
Apr 7, 2023
Threads
8,515
Likes
789
Awards
13
Credits
6,749©
Cash
0$
Learn all about ethical hacking and penetration testing

https://www.udemy.com/course/full-ethical-hacking-course/

What you'll learn​

  • Ethical hacking and cybersecurity
  • Penetration testing

Requirements​

  • Basic computer knowledge

Description​

Introduction to cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.
Introduction to cyber-security

  • Cyber-attack chain
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and Control
  • Actions on Objective
Virtualization on VirtualBox
  • Kali Linux
  • Install, deploy and run Kali Linux
  • Installation and deployment of vulnerable server for testing
Reconnaissance
Information gathering
Assess security vulnerabilities
Scanning engines
  • Nmap scanning
Search engine scanners
Internet scanners
  • Google search engine
Open source intelligence
  • Recon-ng scanning
Security standards
Center for Internet Security (CIS)
Hardening checks for systems
Exploitation
Metasploit framework for ethical hacking
  • Basic commands and usage
  • Module exploration
  • Search for vulnerabilities from scanning results
  • Exploitation of systems
  • Post-exploitation for privilege escalation and scanning
Security hardening and configuration
Social engineering

  • Dark Web with Tor
    • Hacking groups and forums
  • Wireless security assessment with WiFi PineApple
    • Wireless vulnerabilities
  • Social Engineering Toolkit (SET) attacks
  • Direct attacks into Windows 10 with Macros and Powershell
Web, application and database vulnerabilities
Open Web Application Security Project (OWASP) top 10
  • Injection
  • Broken authentication
  • Sensitive data exposure
  • XML External Entities
  • Broken access control
  • Security misconfiguration
  • Cross-Site Scripting
  • Insecure Deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
Full SQLMAP tutorial for web penetration testing
BurpSuite tutorial for manual injection on web penetration testing
Payload testing with custom load
Creation of payload
  • Payloads package on injection
  • Fully undetected payloads
  • Buffer overflow for shell
*** Hidden text: cannot be quoted. ***
000....000
 

humanperson

Member
LV
1
Joined
Jun 1, 2023
Threads
12
Likes
16
Awards
5
Credits
8,601©
Cash
0$
Learn all about ethical hacking and penetration testing

https://www.udemy.com/course/full-ethical-hacking-course/

What you'll learn​

  • Ethical hacking and cybersecurity
  • Penetration testing

Requirements​

  • Basic computer knowledge

Description​

Introduction to cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.
Introduction to cyber-security

  • Cyber-attack chain
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and Control
  • Actions on Objective
Virtualization on VirtualBox
  • Kali Linux
  • Install, deploy and run Kali Linux
  • Installation and deployment of vulnerable server for testing
Reconnaissance
Information gathering
Assess security vulnerabilities
Scanning engines
  • Nmap scanning
Search engine scanners
Internet scanners
  • Google search engine
Open source intelligence
  • Recon-ng scanning
Security standards
Center for Internet Security (CIS)
Hardening checks for systems
Exploitation
Metasploit framework for ethical hacking
  • Basic commands and usage
  • Module exploration
  • Search for vulnerabilities from scanning results
  • Exploitation of systems
  • Post-exploitation for privilege escalation and scanning
Security hardening and configuration
Social engineering

  • Dark Web with Tor
    • Hacking groups and forums
  • Wireless security assessment with WiFi PineApple
    • Wireless vulnerabilities
  • Social Engineering Toolkit (SET) attacks
  • Direct attacks into Windows 10 with Macros and Powershell
Web, application and database vulnerabilities
Open Web Application Security Project (OWASP) top 10
  • Injection
  • Broken authentication
  • Sensitive data exposure
  • XML External Entities
  • Broken access control
  • Security misconfiguration
  • Cross-Site Scripting
  • Insecure Deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
Full SQLMAP tutorial for web penetration testing
BurpSuite tutorial for manual injection on web penetration testing
Payload testing with custom load
Creation of payload
  • Payloads package on injection
  • Fully undetected payloads
  • Buffer overflow for shell
*** Hidden text: cannot be quoted. ***
yoo thanks man
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Top Bottom