This video course provides a good starting point from which to learn ethical hacking and identify threats and vulnerabilities to secure your IT environment.
We'll begin by introducing you to the best tools around; these are essential to get you started with penetration testing. Next, we'll introduce you to a basic hacking technique: reconnaissance. You'll get hands-on experience working with Metasploit and testing the effectiveness of different defenses. Next, you'll learn about sniffing and how effective the Man-in-the-Middle attack can be. We'll take you through a coffee shop scenario to further your understanding. You'll get the hang of bypassing different defenses, then learn how hackers use networks to gain access to different systems.
About the author
Gary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome's computer security and forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats.
The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.
In this video, we will take a look at the operating systems used in this course.
The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.
Our aim in this video is to understand what NMap is and how we will be working with it.
In this video we will learn what Shodan is and how to use it.
In this video we’ll understand vulnerability scanning
Used by industry leaders in security, Metasploit is essential to a hacking course for beginners. Let’s talk about it in this video.
This video will help us understand how we can effectively exploit the weakness in a system
This video will help us understand armitage in detail.
In this video we will take a look at Aircrack-ng that will help us in wireless hacking.
The goal in this video is get a grasp over MitM (Man-in-the-Middle) Attacks.
Our aim in the video is to know how to use the Social Engineering Toolkit.
This video will help us understand the working details of Wireshark.
Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.
With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.
From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.
Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.