Ethical Hacking Certification Live Courses
Course Content
Introduction to Ethical Hacking
-
Introduction to Ethical Hacking
00:00 -
Daily life of a penetration tester or an ethical hacker
-
Effective Note Keeping
-
Important Tools For Note Keeping
Class
-
Network Refresher Introduction
00:00 -
IP Address
00:00 -
MAC Address
-
OSI Model
Class
-
TCP , UDP & Three Way Handshake
00:00 -
Common Ports And Protocols
00:00 -
Installing Vmware or VirtualBox
00:00 -
Installing Kali Linux
-
Configuring Virtualbox
Class
-
Basic Commands and Linux Path
-
Linux Permission, User, Package Management
-
Navigating File System
-
How to add different users
-
Common Network Commands
Class
-
Passive Recon
-
Identifying our target
-
Breached Credentials
-
Hunting subdomains
-
Identifying Web technologies
Class
-
OSINT Basic
00:00 -
Information collect from google
-
Information from social media
Class
-
Hacking Lab Setup (kioptrix installation)
00:00 -
Scanning with nmap
-
HTTP Enumeration
-
SMB enumeration
-
SSH Enumeration
-
Research potential Vulnerabilities
Class
-
Metasploit Overview
00:00 -
Exploit kioptrix with metasploit
-
Manual Exploitation
Class
-
BurpSuite Configuration
00:00 -
Burpsuite Overview
Class
-
Website Enumeration (Live)
00:00 -
Google Dorking
00:00 -
Hidden directory fuzzing
00:00
Learn How to find live bug
-
XSS
00:00 -
HTMLi INJECTION
00:00 -
Directory Traversal
00:00 -
SSRF
00:00 -
Broken Access Control Vulnerability
00:00 -
Information disclosure
00:00 -
SQL Injection Automation
00:00 -
XXE Vulnerability
00:00 -
Command Injection Vulnerability
00:00 -
Security Misconfiguration Issues
00:00 -
SSTI (Server-side template injection)
00:00 -
SSTI (Server-side template injection)
00:00 -
Brute Force attack
00:00 -
CORS [Cross Origin Resource Sharing]
00:00 -
Business Logic Vulnerabilities
00:00
Where and how to choose bug bounty program?
-
Where and how to choose bug bounty program
00:00 -
Report Writing
00:00
Class
-
Memory Forensics
-
Digital Forensics(AUTOPSY)
00:00
Class
-
Server Hacking Explain
00:00 -
Lab Setup For Linux server Hacking(academy)
00:00 -
Downloading all the iso files
00:00
Class
-
Hacking Lab Setup For Windows Hacking
00:00 -
Configuration
00:00 -
Exploitation part 1
-
Exploitation part 2
-
Introduction to tryhackme
Class
-
Cryptography Basic
00:00 -
Stegonography Basic
00:00 -
Why we need to use them
00:00
Class
-
Problem solving on Crytography and stegonography
-
Basic ctf challenges from tryhackme
Class
-
Social Engineering
00:00
Class
-
Shell / Deface Upload & Modify
00:00 -
Complete Malware Removal
-
Freelancing with malware removal
Class
-
Freelancing client hunting
Class
-
Introducing Dark Web
-
Create Darkweb website
-
Host Website
Final Discussion
-
Final Discussion
00:00
Student Ratings & Reviews
No Review Yet