We guarantee that all our online courses will meet or exceed your
expectations. If you are not fully satisfied with a course - for
any reason at all - simply request a full refund. We guarantee no
hassles. That's our promise to you.
Go ahead and order with confidence!
| Unit 01: Introduction and Installation | |||
| Introduction to the course | |||
| Virtual box installation | |||
| Kali linux installation | |||
| Enabling full screen | |||
| Unit 02: Basic Linux Commands | |||
| Basic commands part 1 | |||
| Basic commands part 2 | |||
| Basic commands part 3 | |||
| Unit 03: Creating a Secure Hacking Environment | |||
| Changing ip address and wireless adapter setup | |||
| Creating a bootable Kali USB drive | |||
| Essential networking terms | |||
| Essential hacking terms | |||
| Additional kali tools to install | |||
| Changing our MAC address with mac changer | |||
| Unit 04: Footprinting | |||
| Google hacking | |||
| Nikto basics | |||
| Whois tools | |||
| Email harvesting | |||
| Shodan | |||
| Zone transfer with Dig | |||
| Unit 05: Scanning | |||
| Installing Metasploitable | |||
| Nmap part 1 | |||
| Nmap part 2 | |||
| Nmap part 3 | |||
| Zen map | |||
| TCP scans | |||
| Nmap by passing defenses | |||
| Nmap scripts part 1 | |||
| Nmap scripts part 2 | |||
| Unit 06: Website Penetration Testing | |||
| Installing OWASP | |||
| HTTP request | |||
| HTTP response | |||
| Burpsuite configuration | |||
| Editing packets in Burpsuite | |||
| Whatweb and Dirb | |||
| Password recovery attack | |||
| Burpsuite login bruteforce | |||
| Hydra login bruteforce | |||
| Session fixation | |||
| Injection attacks | |||
| Simple command injection | |||
| Exploiting command injection vulnerability | |||
| Finding blind command injection | |||
| SQL basics | |||
| Manual SQL injection part 1 | |||
| Manual SQL injection part 2 | |||
| SQL map basics | |||
| XML injection | |||
| Installing XCAT and preventing injection attacks | |||
| Reflected XSS | |||
| Stored XSS | |||
| Changing HTML code with XSS | |||
| XSSer and XSS sniper | |||
| Unit 07: Wireless Cracking | |||
| Wireless attacking theory | |||
| Enabling monitor mode | |||
| Capturing handshake with airodump | |||
| Rockyou.txt | |||
| Cracking with aircrack | |||
| Cracking with hashcat | |||
| Creating password lists with crunch | |||
| Creating password lists with cup | |||
| Rainbow tables part 1 | |||
| Rainbow tables part 2 | |||
| Installing fluxion | |||
| Finding and cracking hidden networks | |||
| Preventing wireless attacks | |||
| Unit 08: Man in the Middle Attacks | |||
| ARP protocol basics | |||
| Man in the middle attack theory | |||
| Installing MITMf | |||
| Manual ARP spoofing | |||
| Problems while installing MITMf | |||
| HTTP traffic sniffing | |||
| DNS spoofing and HTTPS password sniffing | |||
| Hooking browser with BEEF | |||
| Screenshotting targets browser | |||
| Cloning any webpage | |||
| Ettercap basics | |||
| Unit 09: System Hacking with Metasploit | |||
| MFS console environment | |||
| Metasploit modules explained | |||
| Bruteforcing SSH with Metasploit | |||
| Attacking tomcat with metasploit | |||
| Getting meterpreter with command injection | |||
| PHP code injection | |||
| Metasploitable exploits | |||
| Wine installation | |||
| Creating windows payloads with Msfvenom | |||
| Encoders and Hex editors | |||
| Windows 10 meterpreter shell | |||
| Meterpreter environment | |||
| Windows 10 privilege escalation | |||
| Preventing privilege escalation | |||
| Post exploitation modules | |||
| Getting Meterpreter over Internet with port forwarding | |||
| Eternalblue exploit | |||
| Persistence module | |||
| Hacking over the internet with Ngrok | |||
| Android device hacking with venom | |||
| The real hacking begins now! | |||
| Unit 10: Python Crash Course | |||
| Variables | |||
| Raw input | |||
| If else statements | |||
| For loops | |||
| While loops | |||
| Python lists | |||
| Functions | |||
| Classes | |||
| Importing libraries | |||
| Files in python | |||
| Try and except the rule | |||
| Unit 11: Coding an Advanced Backdoor | |||
| Theory behind reverse shells | |||
| Simple server code | |||
| Connection with reverse shell | |||
| Sending and receiving messages | |||
| Sending messages with while true loop | |||
| Executing commands on target system | |||
| Fixing backdoor bugs and adding functions | |||
| First test using our backdoor | |||
| Trying to connect every 20 seconds | |||
| Creating persistence part 1 | |||
| Creating persistence part 2 | |||
| Changing directory | |||
| Uploading and downloading files | |||
| Downloading files from the internet | |||
| Starting programs using our backdoor | |||
| Capturing screenshots on the target PC | |||
| Embedding backdoor in an image part 1 | |||
| Embedding backdoor in an image part 2 | |||
| Checking for administrator privileges | |||
| Adding help option | |||
| Unit 12: Creating a Key logger for the Backdoor | |||
| Importing Pynput | |||
| Simple keylogger | |||
| Adding report function | |||
| Writing key strokes to a file | |||
| Adding the keylogger to our reverse shell part 1 | |||
| Adding the keylogger to our reverse shell part 2 | |||
| Final project test | |||
| Unit 13: Basic Authentication Bruteforcer | |||
| Printing banner | |||
| Adding available options | |||
| Starting threads for bruteforce | |||
| Writing function to run the attack | |||
| Bruteforcing router login | |||
| Bypassing antivirus with your future programs | |||
| Sending malware with spoofed email | |||
| Unit 14: BONUS - Building a Career in Cyber Security | |||
| What will you learn in this section? | |||
| Why is ethical hacking a valuable skill? | |||
| What is the best ethical hacking certification? | |||
| Tips for getting your first job as an ethical hacker | |||
| How I started my career as an ethical hacker | |||
| How to price your work | |||
| Unit 15: Additional Content: Grand Finale | |||
| Bonuses. Enjoy the Benefits | |||