Full Ethical Hacking Course udemy course free download

What you'll learn:

Requirements::

Description:

Introduction to cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.

Introduction to cyber-security

  • Cyber-attack chain

  • Reconnaissance

  • Weaponization

  • Delivery

  • Exploitation

  • Installation

  • Command and Control

  • Actions on Objective

Virtualization on VirtualBox

  • Kali Linux

  • Install, deploy and run Kali Linux

  • Installation and deployment of vulnerable server for testing

Reconnaissance

Information gathering

Assess security vulnerabilities

Scanning engines

  • Nmap scanning

Search engine scanners

Internet scanners

  • Google search engine

Open source intelligence

  • Recon-ng scanning

Security standards

Center for Internet Security (CIS)

Hardening checks for systems

Exploitation

Metasploit framework for ethical hacking

  • Basic commands and usage

  • Module exploration

  • Search for vulnerabilities from scanning results

  • Exploitation of systems

  • Post-exploitation for privilege escalation and scanning

Security hardening and configuration

Social engineering

  • Dark Web with Tor

    • Hacking groups and forums

  • Wireless security assessment with WiFi PineApple

    • Wireless vulnerabilities

  • Social Engineering Toolkit (SET) attacks

  • Direct attacks into Windows 10 with Macros and Powershell

Web, application and database vulnerabilities

Open Web Application Security Project (OWASP) top 10

  • Injection

  • Broken authentication

  • Sensitive data exposure

  • XML External Entities

  • Broken access control

  • Security misconfiguration

  • Cross-Site Scripting

  • Insecure Deserialization

  • Using components with known vulnerabilities

  • Insufficient logging and monitoring

Full SQLMAP tutorial for web penetration testing

BurpSuite tutorial for manual injection on web penetration testing

Payload testing with custom load

Creation of payload

  • Payloads package on injection

  • Fully undetected payloads

  • Buffer overflow for shell

Come join thousands of students who has learned from the top ethical hacking and penetration testing instructor, Loi Liang Yang, now!

Who this course is for:

Course Details:

Download Course