Full Ethical Hacking Course
Offered By: Udemy
Course Description
Overview
What you'll learn:
- Ethical hacking and cybersecurity
- Penetration testing
Introduction to cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.
Introduction to cyber-security
Cyber-attack chain
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control
Actions on Objective
Virtualization on VirtualBox
Kali Linux
Install, deploy and run Kali Linux
Installation and deployment of vulnerable server for testing
Reconnaissance
Information gathering
Assess security vulnerabilities
Scanning engines
Nmap scanning
Search engine scanners
Internet scanners
Google search engine
Open source intelligence
Recon-ng scanning
Security standards
Center for Internet Security (CIS)
Hardening checks for systems
Exploitation
Metasploit framework for ethical hacking
Basic commands and usage
Module exploration
Search for vulnerabilities from scanning results
Exploitation of systems
Post-exploitation for privilege escalation and scanning
Security hardening and configuration
Social engineering
Dark Web with Tor
Hacking groups and forums
Wireless security assessment with WiFi PineApple
Wireless vulnerabilities
Social Engineering Toolkit (SET) attacks
Direct attacks into Windows 10 with Macros and Powershell
Web, application and database vulnerabilities
Open Web Application Security Project (OWASP) top 10
Injection
Broken authentication
Sensitive data exposure
XML External Entities
Broken access control
Security misconfiguration
Cross-Site Scripting
Insecure Deserialization
Using components with known vulnerabilities
Insufficient logging and monitoring
Full SQLMAP tutorial for web penetration testing
BurpSuite tutorial for manual injection on web penetration testing
Payload testing with custom load
Creation of payload
Payloads package on injection
Fully undetected payloads
Buffer overflow for shell
Come join thousands of students who has learned from the top ethical hacking and penetration testing instructor, Loi Liang Yang, now!
Taught by
Loi Liang Yang
Related Courses
Cyber Security Foundations: Common Malware Attacks and Defense StrategiesEC-Council via FutureLearn Cyber Security Incident Response for Managers
PA Consulting via FutureLearn Cybersecurity in Healthcare (Hospitals & Care Centres)
Erasmus University Rotterdam via Coursera Avoiding Phishing Scams
LinkedIn Learning Become an Ethical Hacker
LinkedIn Learning