Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
This is one of the initial Ethical Hacking course which is designed and molded specifically for Beginners who wants to make their Career in the field of Ethical Hacking.
This course takes an in-depth look to get your started with setting up base to work with Linux, Networking to work with Firewalls and Analyze one of the most dangerous viruses in the world. Using readily available tools and custom developed practice scenarios, you will navigate your way through the techniques attacker use to hack websites and also ways to protect it.
In this course we teach everything from scratch and no pre-existing knowledge is needed. So as long as you have a working internet connection and a computer/laptop you are good to go.
With 50+ modules for this course and Challenge Assignments for topics, we make sure you understand the topic from the ground up to the deep packet level and build a strong base to move your career ahead in field of Ethical Hacking.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Getting Started with the Course|
Introduction to the CoursePreview
|Section 2: Setting up the Hacking Lab|
Introduction to Virtualization
Installing Kali Linux 2.0
Getting the Windows 8.1 Official Evaluation
VMware Features : Adding Resources to Virtual Machines
VMware Features : Snapshots
|Section 3: Our Favorite Networking|
Introduction to Protocols
Introduction to Domain Name Systems
DNS - Packet Level View
DNS - Exercise
Transmission Control Protocol ( TCP )
Notes : TCP
Analyzing TCP in Packet CapturePreview
|Section 4: Cryptography & Network Security|
Introduction to Cryptography
Plain Text vs Encrypted Text based algorithms
Exercise : Encryption
Disk Level Encryption Schemas
Exercise : Full Disk Encryption
Pretty Good Privacy ( PGP )
Asymmetric Key Encryption
Exercise - Hashing
SSH Key Based Authentication
Understanding working of HTTPS
|Section 5: Intermidary Nodes for Hacking|
The Proxy Servers
Virtual Private Networks
|Section 6: The Metasploit Module|
Getting started with Metasploit
Metasploit & Windows 8.1
Exercise : Hacking using Metasploit
The Big Metasploitable 2
Notes : Metasploitable
|Section 7: Vulnerability, Exploit , Payload|
Understanding the VEP approach during Hacking
Exercise - Vulnerability Scanning
|Section 8: Hail The Dangerous Viruses|
Remote Access Trojans
Most Dangerous Ransomwares
Notes : Dangerous Viruses
|Section 9: Windows Hacking|
Bypassing Windows Based Authentication Schemas
Alternate Data Streams
Group Policy Editor
Denial Of Service
|Section 10: Password Attacks|
The Stumbling Passwords
Getting started with Password Cracking
Password Attacks Practicals
Customizing our Wordlist
|Section 11: Firewall|
Getting started with Firewall's
Rate Limiting with Firewalls
|Section 12: Forensics|
I am Zeal Vora. I work as a Cloud Security Engineer. Working into the field of Security, we face tens of thousands of hacking attempts everyday and protecting the Servers from those is a challenging task but that is what makes the work Cool :)
My domain of expertise lies in Linux & Information Security. I hold many Certifications like : Certified Ethical Hacker, RedHat Certified Engineer, VMware Certified Associate for Cloud Computing, Data Center Virtualization, Workforce Mobility.
One of my passions is teaching and i have been teaching at personal tutor level to that of University level. One of my aim is to make Education free at some point of time. I'll look forward to that.