Ethical Hacking for Beginners
What you'll learn
- Learn how to hack WiFi networks
- Learn fundamental networking topics such as IP and MAC Addressing, binary numbering, subnetting, and common ports and protocols
- Learn how to create a virtual lab for following along with the course using free virtualization platforms and tools
- Learn some of the main tools inside of Kali Linux commonly leveraged by ethical hackers
- Learn the basics of Linux, including common commands, file permissions, file system navigation, installing updates, and bash scripting
- Learn the basics of the Python programming language, including strings, variables, functions, conditions, loops, and modules
- Learn about the legal considerations for ethical hackers and take a look at a sample penetration testing findings report
- Learn the important steps of hacking methodology used for penetration testing
- Practice reconnaissance techniques for gathering open-source intelligence (OSINT)
- Perform scanning and enumeration techniques against web servers in order to gather intelligence and discover vulnerabilities
- Learn how to gain access by exploiting vulnerabilities and weaknesses
- Understand techniques for maintaining access and covering your tracks
- Learn about the top 10 threats to web servers, testing out those vulnerabilities in a lab environment with Kali Linux tools
- Learn the fundamentals of WiFi technologies
Requirements
- No prior experience necessary. The only requirements are some basic computer skills and an eagerness to learn.
- For the WiFi hacking section, you may need to purchase a WiFi adapter that supports monitor and injection mode (depends)
- You will need a computer that you can run Kali Linux on (either natively or in a virtual machine)
Description
This course is for anyone interested in becoming an ethical hacker, no matter your current skill level. The curriculum is designed for absolute beginners interested in a career as a security professional, beginning with the absolute basics of penetration testing, and progressing to advanced topics and techniques. Get started today in your Ethical Hacking career.
The goal of ethical hacking is to find security vulnerabilities in an organization’s digital systems and networks. The best way to test the security of this infrastructure is to attempt to break in through penetration testing techniques. The increasing amount of high-profile cyber incidents continues to emphasize the need for individuals with these skills, with job demand projected to continue at an exponential rate.
The techniques shown here leverage free tools which are explained throughout the course, including instructions for creating your own home lab for practice and study. One of the primary tools you will become familiar with is Kali Linux, which is a Debian-based Linux distribution aimed at penetration testing and security auditing.
This course explores the following topics and more:
- Networking Basics
- Creating a Virtual Lab
- Kali Linux Tools for Penetration Testing
- Linux Basics
- Python Basics
- Penetration Testing Methodology
- Legal Considerations
- Report Writing
- Passive and Active Reconnaissance
- Scanning and Enumeration
- Reverse and Bind Shell
- Automated Payloads and Exploitation
- Brute Force Attacks
- Credential Stuffing
- Password Spraying
- Tips for Maintaining Access and Covering Tracks
- Web Server Vulnerabilities
- Wifi Hacking
Who this course is for:
- Anyone interested in ethical hacking and penetration testing techniques
- Anyone interested in network security topics
- IT professionals interested in diversifying or updating their skill set
Instructors
David Bombal, together with some of the best minds in the industry is offering courses on a wide range of topics including networking, programming and software development. Our team has decades of experience teaching students from all over the world.
Together we can do more!
=======================================
Chuck Black
=======================================
Chuck has been developing software for networking equipment since 1981 and has designed and developed software products for large scale networking environments using languages such as C, C++, and Java.
Chuck has been granted 15 patents in the areas of network topology discovery, management, monitoring, health, and access control.
Chuck graduated from California Polytechnic State University-San Luis Obispo with Bachelor and Master of Computer Science degrees.
Chuck has developed Python for Network Engineers courses for vendors such as Cisco and Juniper Networks. In addition, he has developed numerous SDN application development courses for vendors such as Cisco, HPE and Brocade.
Chuck is the co-author of the book SDN: A Comprehensive Approach, a thorough technical and business exploration of software defined networking, which has been used as a textbook for graduate level computer science coursework.
Chuck is a well known figure in SDN and network programmability circles. He has made participated in organizations such as the Open Networking Foundation (ONF) and the OpenDaylight project.
Chuck is the coauthor of one of the most popular SDN books on the market today: Software Defined Networks: A Comprehensive Approach.
=======================================
Hank Preston
=======================================
Hank’s two passions are technology and theatre. Bringing them together drives him towards a borderline obsession on creating entertaining presentations, labs and demonstrations that breakdown complex technology topics for audiences. After spending several years working on and behind the scenes on stage productions, what started as a hobby turned to a profession when Hank entered the IT industry with a focus on web and database development and engineering.
Drifting from development into infrastructure engineering brought him to Cisco as a Systems Engineer, focusing on Data Center and Cloud Architecture for large enterprise customers.
And after six years as an SE, Hank took up the mantle of a Developer Evangelist with DevNet where he can focuses full time on reminding everyone that technology can and should be fun to work with.
Hank holds a Master Degree in Information Systems as well as several certifications including CCIE R/S 38336 from Cisco.
=======================================
David Bombal
=======================================
David Bombal (CCIE #11023 Emeritus) passed his Cisco Certified Internetwork Expert Routing and Switching exam in January 2003 and is one of a small percentage of Cisco Engineers that pass their CCIE labs on their first attempt.
David qualified as a Cisco Certified Systems Instructor (CCSI #22787) many years ago! He has been training Cisco courses for over 15 years and has delivered instructor led courses in various countries around the world covering a wide range of Cisco topics from CCNA to CCIE.
He has also personally developed Cisco engineer utilities such as the VPN Config Generator, software, training materials, EBooks, videos and other products which are used throughout the world.
David has designed, implemented and managed networks ranging from single sites to those that span 50 countries.
The Kevin Wallace Training, LLC training team consists of Kevin Wallace, Charles Judd, Anthony Sequeira, and Michael Shannon:
Kevin Wallace
CCIEx2 No. 7945 (Collaboration and Route/Switch)
Kevin Wallace is a Cisco Certified Systems Instructor (CCSI No. 20061), and he holds multiple Cisco professional and associate-level certifications in the Route/Switch, Collaboration, Security, Design, and Data Center tracks. With Cisco experience dating back to 1989, Kevin has been a Network Design Specialist for the Walt Disney World Resort, an instructor of Cisco courses for Skillsoft, and a Network Manager for Eastern Kentucky University. Currently, Kevin produces video courses and writes books for Cisco Press/Pearson IT Certification. Also, he owns and operates Kevin Wallace Training, LLC, a provider of self-paced training materials that simplify computer networking. Kevin holds a Bachelor of Science degree in Electrical Engineering from the University of Kentucky, and he lives in central Kentucky with his wife (Vivian) and two daughters (Sabrina and Stacie).
Charles Judd
CCNA R/S, BS Network Security, AS Applied Technology, AS Machine Technology
Charles Judd joined the Kevin Wallace Training team in January 2018 as a content developer and technical instructor. He holds a Bachelor of Science in Network Security, an Associate of Science in Applied Technology, an Associate of Science in Machine Technology, and a CCNA Routing and Switching certification. Charles is currently in progress on the CCNP Routing and Switching track. His real-world experience includes a decade of CNC programming and operation, duties as a Network Engineer for a healthcare and HIPAA compliancy-focused MSP, and freelance Graphic/Web Designing and IT Consulting. Charles lives in central Kentucky with his wife Jeanna and their three sons - Caleb, Cameron and Corey.
Anthony Sequeira
CCIE No. 15626
Anthony began his IT career in 1994 with IBM in Tampa, Florida. He quickly formed his own computer consultancy Computer Solutions, and then discovered his true passion - teaching and writing about networking technologies. Anthony has lectured to massive audiences around the world while working for Mastering Computers. He is an avid tennis player, a private pilot, a semi-professional poker player, and loves anything at all to do with technology.
Michael J Shannon
CISSP, ITIL Expert, CCNP Security, MCSE
Michael J Shannon began his IT career when he transitioned from recording studio engineer to network technician for a major telecommunications company in the early 1990’s. He soon began to focus on security and was one of the first 10 people to attain the HIPAA Certified Security Specialist. Throughout his 30 years in IT he has worked as an employee, contractor, and consultant for several companies including Platinum Technologies, Fujitsu, IBM, State Farm, MindSharp, Thomson, Pearson, and Skillsoft among others. Mr. Shannon has authored several books, training manuals, blog articles, and CBT modules over the years as well. He has attained the CISSP, ITIL Expert, CCNP Security, MCSE, Palo Alto PCNSE7 and OpenFAIR certifications, among numerous others, including various cloud- based certifications. He has recently produced training for AWS, Google Cloud Platform and Microsoft Azure. His hobbies are playing guitar, songwriting, and golf. He resides with his wife in Abilene Texas. Anthony joined Mastering Computers in 1996 and lectured to massive audiences around the world about the latest in computer technologies. Mastering Computers became the revolutionary online training company, KnowledgeNet, and Anthony trained there for many years. Anthony is an avid tennis player, a private pilot, and enjoys getting beaten up by women and children at he and his daughter’s martial arts school.