Learn Ethical Hacking From Scratch


Learn Ethical Hacking From Scratch
English | Size: 1.91 GB
Category: CBTs
Welcome to this comprehensive course on ethical hacking! This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in Zaid’s lab. The course is structured in a way that will take you through the basics of Linux, computer systems, networks, and how devices communicate with each other. We will start by talking about how we can exploit these systems to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level and by the time you finish, you will have knowledge about most penetration testing fields. You will also learn how to discover and exploit a number of dangerous vulnerabilities such as SQL injections, XSS vulnerabilities, and so on. At the end of each section you will learn how to detect, prevent and secure your system and yourself from these attacks. All the attacks in this course are practical attacks that work against any computer device, so it does not matter if the device is a phone, tablet, laptop, or whatever. Each attack is explained in a simple way: first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.

Style and Approach
In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking. The first thing you will learn is some basic information about ethical hacking and the different fields in penetration testing.

What You Will Learn
In this course, you have access to 120 detailed videos about ethical hacking and computer security.
Learn about hacking, ethical hacking, and different types of hackers
Learn about the different fields of ethical hacking
Set up a lab environment to practice hacking
Install Kali Linux – a penetration testing operating system
Install Windows and vulnerable operating systems as virtual machines for testing
Learn Linux basics and commands and how to interact with the terminal
Learn network penetration testing, network basics, how devices interact inside a network, and a number of practical attacks that can be used without knowing the key to the target network
Control the connections of clients around you without knowing the password
Create a fake Wi-Fi network with internet connection and spy on clients and much more

Tags: , , , ,

Leave a Reply