Learn Ethical Hacking Advance Level Using Kali Linux
4.8 (49 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
536 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Learn Ethical Hacking Advance Level Using Kali Linux to your Wishlist.

Add to Wishlist

Learn Ethical Hacking Advance Level Using Kali Linux

Complete Kali Linux Training,Complete penetration testing training,Complete basic to expert level covered
4.8 (49 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
536 students enrolled
Created by Vishal Patel
Last updated 6/2016
English
Current price: $10 Original price: $195 Discount: 95% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 17.5 hours on-demand video
  • 16 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
Footprinting,Scanning,Enumeration,System Hacking,Trojan and Backdoors,Viruses and worms,Denial-of-service,Sniffing,Session Hijacking,Wireless Hacking,Firewall,IDS,Honeypots,Buffer Overflows,Penetration Testing,Cryptography
View Curriculum
Requirements
  • Basic IT Skill
  • Internet Users
Description

Ethical hacking is testing the IT resources for a good cause and for the betterment of technology. This training will establish your understanding of all the fundamental concepts, processes, and procedures.. You will spend time concentrating on each knowledge area, and studying the tools and techniques, inputs, and outputs associated with each knowledge area.

In the pre-assessment quiz you'll face questions from all sections of this Ethical Hacking training. Test your current knowledge and know your strengths and weaknesses.

In Introduction to Ethical Hacking, you will be introduced to various concepts on ethical hacking. You will receive an introduction to the basics of Risk Management and Disaster Recovery. As well as an introduction to Penetration Testing.

You will gain a comprehensive understanding of vulnerability assessment and the tools used in this process. What kind of security measures do you take to protect your facilities, equipment, resources, personnel, and property from damage caused by unauthorized access? In this course, Physical Security, these are questions that we will be answering. Footprinting is the gathering of information related to a particular computer and its users and systems.

Reconnaissance is an exploration that is conducted to gain information. Network scanning is the scanning of public or private networks to find out which systems are running, their IP addresses, and which services they are running. In Port Scanning, you will learn how ports can be scanned, how a hacker can break into your network through the ports, and the countermeasures you can take to protect your device or network.

Banner grabbing is a technique used to grab information about computer systems on a network and the services running its open ports. In this course you will be introduced to enumeration and the many different uses it has in computer systems. This course will include demos on the different tools and uses of enumeration. In this course you will be learning the fundamentals of Linux. We will be pairing this course with demos with a more in-depth look into some of the fundamentals and tools of Linux.

Pentesting is an attack on a system in hopes of finding security weaknesses. In the course Configuring Linux for Pentesting, you will be learning the steps to configure Linux for pentesting and tools used for pentesting on a Linux system. Whenever we login to a computer system, we provide information to identify ourselves. We refer to this as authentication. Ensure that you know everything involved in securing a Windows system against attack. During this course you'll get into Windows passwords — how they're created, how they're stored, and different methods used to crack them.

You will take a good look at spyware, the activities it performs, different types of spyware, and the countermeasures needed in order to prevent hackers from utilizing these types of techniques against your company. You will also spend time studying different types of keyloggers. There are three different types of keyloggers that we see used in today's environments: hardware, software, and kernel/driver keyloggers. Covering Tracks will be going over various ways that attackers have at their disposal to cover any tracks that may lead to their unwanted eviction, or worse yet, to an audit trail that would lead directly back to them. Trojans and Backdoors is the course where our software is going to be going undercover.

You will discover what viruses and worms are and how they can infect computers and systems. Sniffers is our course where we take a look at Network Sniffing. Social engineering is the art of extorting employees for information.

Become familiar with the following concepts: denial-of-service, distributed denial-of-service, and how the denial-of-service and distributed denial-of-service attacks take place. In the course Session Hijacking, you will learn details about session hijacking, well-known techniques employed by aggressors, the steps involved in session hijacking, various types of session hijacking, tools for hijacking sessions, ways you can protect yourselves from session hijacking, and how pentesting can be used to identify vulnerabilities. Hacking Web and Application Servers, is a course that will give you a good idea about vulnerabilities and attacks available for web servers and web applications. In our course our course Advanced Exploitation Techniques, you will learn what advanced exploitation techniques are and how you can use them in your penetration testing.

Final Exam

Who is the target audience?
  • Anyone want to learn how to hack
  • IT Professionals
  • Engineers
  • IT Students
  • Computer Known
  • Network Engineers
  • Internet Users
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 133 Lectures Collapse All 133 Lectures 32:08:47
+
Ethical Hacking Introduction
1 Lecture 08:49
+
All Practicals Lab's PDF with Snapshots
16 Lectures 00:00
Footprinting and Reconnaisance
83 pages

Scanning Networks
182 pages

Enumeration
41 pages

System Hacking
117 pages

Trojan and backdoor
105 pages

Viruses and worm
55 pages

Social Engineering
28 pages

Denial of Service
13 pages

Session Hijacking
15 pages

Hacking Web Server
31 pages

Hacking Web Application
20 pages

SQL Injection
37 pages

Hacking Wireless Network
28 pages

BufferOverflow
13 pages

Evading IDS and firewall and Honeypots
55 pages

Cryptography
52 pages
+
Penetration Testing by Kali Linux
116 Lectures 17:24:58

Ethical Hacking & Penetration Testing
08:05

Kali Linux
11:47

Operating System
05:58

Operating System Concept
09:21

Installing kali linux on mac
11:17

Installing Operating Systems
08:59

Installing Vmware tools
10:22

Configuring Kali Linux
09:21

What is Footprinting
10:20

Footprinting Objective
09:15

Footprinting tool
12:23

Introduction to Google Hacking
08:50

Nuts and Bolt of Google hacking
07:00

Google Hacking Process
06:38

Who is lookup
10:14

DNS Footprinting Overview
06:46

DNS Footprinting Function and Process
07:03

Determining Operating System
09:42

Introduction to Phishing Attack
07:25

Phishing Attack Details
06:19

Connecting information database
12:02

NMAP
07:28

zenmap
07:28

The Harvester Overview
06:33

Harvester Process and Function
05:59

WHOIS and dnsnum Overview
07:48

DNSenum
07:17

URLcrazy
06:24

DNSdict
05:45

DNSrecon
09:21


Introduction to Social Engineering and Information Gathering
09:45

Types of Social Engineering
09:56

Social Engineering Attacks
07:06

Spearphishing Attack
11:10

Phishing Attack
07:02

PhishingAttackConsequences
07:01


Introduction to Computer Malwares
06:42

TypesOfComputerMalwares
07:53

DangerousVirusesOfallTime
07:33

SomeProminentDangerousVirusesOf
07:53

InstallingRootkitHunter
06:44

BackdoorOverview
07:07

BackdoorProcessandFunctions
06:36


BackdoorMaitainingAccess
07:15

BackdoorMaitainingAccessContinue
05:24

IntroducingCommandPrompt Backdoor
08:00

CommandPromptBackdoorDetail
07:09

MeterpreterBackdoor
10:55

I am ROOT
13:50

FoensicEscaping
06:58

HackingWin7SAMdatabase
11:33

JackTheRipper
11:39

Meterpreter Backdoor
12:39

PDF Embedded Trojan Horse
11:20

Introduction to JAVA applete attack method
06:37

Java Applete Attack Method Continue
08:08

MITM Attack
09:31

ARP Poisoning
10:56

DNS Spoofing vs. DNS Posioning
08:19


Advacned concept on DNS Spoofing
10:47

DHCP Spoofing
12:26


Introduction to ICMP Redirection
10:15

ICMP Redirection visual chart
10:15

ICMP Redirection process and function
09:53

Killing a network
10:48

Ddosing unauthorized Network
08:54

Drifnet
09:52

Introducing EvilGrade
09:27

EvilGrade Continue
08:46

Introduction to Dos
09:32

Dos vs. DDos
06:30

Level of DDos Attack
08:11

Preventing DDOS Attacks
09:06

Intoducing DDosing win7
10:38

DDosing win7
09:47

Intro to Hacking
06:02

Hacking through Android
06:50

Hacking android via kali linux
11:32

Password Cracking
11:34

Password Cracking strategy shown in practicals
09:52

Windows password cracking overview
08:05

Nuts and Bolts of windows password cracking strategies
07:19

Introduction to Linux hash cracking
08:55

Linux Hash cracking strategies
12:52

Generating word list
07:33

Generating word list processes and function
10:18

ceWl Cracking
08:50

WEP and WPA
09:39

WPA Continue
10:34

802.1x standard
08:40

Wireless cracking overview
08:52

Wireless cracking via Kali linux overview
08:58

Meterpreter Overview
14:14

Activating Payload
09:06

MSFConsole Explained
12:01

MSFconsole Command
11:54

Exploits
11:39

Payload
09:54

Generating payloads
10:50

Generating Payload continue
11:41

Intro to SQL Injection
07:52

SQL Mapping via Kali linux
09:56

Introduction to cryptography
05:24

Basic concept of cryptography
07:12

Hash function and oracle method
09:35

Birthday theorm and Digitial Signature
09:36

Pros and cons of cryptography
08:11

Importing Database
09:05

Exporting Database
07:17

Exporting database shown in practical
05:40
About the Instructor
Vishal Patel
4.4 Average rating
232 Reviews
5,267 Students
5 Courses
SystemAdministrator,Ethical Hacker,RedHat Certified Engineer

Hi My name is Vishal Patel. I am CEH,RHCSA,RHCE,Strata,A+,N+,CSCU.I have a 6 years of experience as Technical Trainer.I have given lots of training to IT Professionals,Students in India.I have taken lots of seminars in Schools and Colleges in India.I have given full time dedication to this field.I have a keen interest in the field of hacking and network security and adopted this field as my full-time employment.I enjoys computer Security topics.I like music,movies,playing football,swimming,reading.