Virtual course of: Udemy |
This course was ranked in the Top 100 of the best courses on Udemy, within a catalog of more than 135.000 courses.
Welcome to this comprehensive Ethical Hacking course! This course assumes that you have NO prior knowledge and by the end you will be able to hack systems like black hat hackers and secure them like security experts.
This course is highly practical, but will not neglect theory; We'll start with the basics of ethical hacking, walk through the different penetration testing grounds and install the necessary software (on Windows, Linux, and Mac OS X), then dive right in and start hacking right away.
You will learn everything by example, analyzing and exploiting different systems such as networks, servers, clients, websites.
etc.
We will never have boring and dry theoretical lectures.
The course is divided into several sections, each section covers a hacking/penetration testing field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit these weaknesses for hacking. this system.
By the end of the course, you will have a solid foundation in most fields of hacking or penetration testing and will also learn how to detect, prevent, and protect systems and yourself from the attacks discussed.
The course is divided into four main sections: . Network Hacking – This section will teach you how to test the security of wired and wireless networks.
First, you'll learn the basics of networking, how it works, and how devices communicate with each other.
It will then branch into three subsections: Pre-Connection Attacks – In this subsection you will learn a series of attacks that can be executed without connecting to the target network and without the need to know the network password; You will learn how to collect information about networks around you, discover connected devices, and control connections (deny/allow devices to connect to networks).
Gain Access – Now that you've gathered information about the networks around you, in this subsection you'll learn how to crack the key and get the password of your target network if it's using WEP, WPA, or even WPA. Post-Connection Attacks – Now that you have the key, you can connect to the target network, in this subsection you will learn a series of powerful techniques that allow you to collect comprehensive information about connected devices, see everything they do on the Internet (such as information login information, passwords, visited URLs, images, videos, etc.
), redirect requests, inject malicious code into loaded pages, and much more.
All of these attacks work against wireless and wired networks.
You will also learn how to create a fake WiFi network, entice users to connect to it, and use all of the above techniques against connected clients.
.Gain Access – In this section, you will learn two main approaches to gain full control or hack into computer systems: Server Side Attacks – In this subsection, you will learn how to gain full access to computer systems without user interaction.
You will learn how to collect useful information about a target computer system, such as its operating system, open ports, installed services, then use this information to discover weaknesses and vulnerabilities and exploit them to gain full control over the target.
Finally, you will learn how to automatically scan servers for vulnerabilities and generate different types of reports with your findings.
Client Side Attacks – If the target system does not contain any weaknesses then the only way to hack it is by interacting with users, in this subsection you will learn how to make the target user install a backdoor on their system without even realizing it , this is done by hijacking software updates or backloading on the fly.
This subsection also teaches you how to use social engineering to hack secure systems, so you will learn how to collect complete information about system users like their social accounts, friends, their emails.
etc.
, you will learn how to create Trojans by backdooring normal files (such as an image or a pdf) and using the collected information to spoof emails to make them appear to be sent by the target's friend, boss, or any email account.
they are likely to interact with to design them on social media to run their torjan.
.Post Exploitation -In this section you will learn how to interact with the systems you have compromised so far.
You will learn how to access the file system (read/write/load/execute), maintain its access, spy on the target (capture keystrokes, turn on webcam, take screenshots, etc.
) and even use the target computer as a pivot to hack other . Website/Web Application Hacking – In this section you will learn how websites work, how to collect information about a target website (such as website owner, server location, technologies used, etc.
) and how to discover and exploit the following dangerous website hacking vulnerabilities: File uploads.
Code execution.
Inclusion of local files.
Remote file inclusion.
SQL injection.
Cross Site Scripting (XSS).
At the end of each section, you will learn how to detect, prevent, and protect your systems and yourself from the attacks discussed.
All techniques i
14
Udemy has the largest repository of online courses in the world
Access to the content of the course, once finished, so you can enjoy its future updates
Experts in their fields from all over the world share their expertise on Udemy
From all over the world, 480 million times have been enrolled in Udemy courses
Hello how can I help you? Are you interested in a course? About what subject?
Susana Calderon R.
July 13, 2021 at 3: 55 pmHe is a very good teacher and I like the way he explains everything.