YoVDO

The Complete Ethical Hacking Course for 2021

Offered By: Joseph Delgadillo via YouTube

Tags

Ethical Hacking Courses Cybersecurity Courses Penetration Testing Courses Kali Linux Courses Tor (The Onion Router) Courses VirtualBox Courses Web Server Management Courses

Course Description

Overview

Embark on a comprehensive 7-hour 47-minute video tutorial designed for beginners to learn ethical hacking, penetration testing, and cybersecurity. Start with the basics of installing VirtualBox and Kali Linux, then progress through essential hacking terms and Linux terminal commands. Explore advanced topics such as using Tor, proxychains, and macchanger for anonymity. Set up a web server, learn about SQL injections, and practice securing vulnerabilities. Dive into tools like SQLmap and nmap for scanning and testing servers. Master brute force techniques for various protocols and applications. Conclude with a two-part phishing demonstration. Gain hands-on experience in coding, testing, and securing applications throughout this comprehensive ethical hacking course.

Syllabus

Introduction and requirements.
Installing VirtualBox.
Installing VirtualBox on Windows.
Installing Kali Linux.
Finishing our Kali installation.
Installing Kali in VirtualBox on Windows 10.
Installing Virtualbox Guest Additions.
Guest additions fix.
Running Kali on a USB drive.
Essential hacking terms.
Linux terminal basics part 1.
Linux terminal basics part 2.
Using the apt package manager.
Tor part 1.
Tor part 2.
Proxychains.
Adding multiple links in a proxychain.
Macchanger.
Setting up a web server to hack.
phpMyAdmin configuration.
Troubleshooting MySQL permissions.
phpMyAdmin issue resolved.
Setting up a database.
Coding a simple PHP app.
Hacking our website.
Patching our vulnerability.
Securing strings against SQL injections.
SQLmap options and scanning a WordPress site.
Using nmap to scan a server.
Testing servers for vulnerabilities using nmap.
Brute forcing WordPress sites.
Brute forcing SSH, SFTP and other protocols.
Building a simple app to brute force.
Brute forcing PHP applications.
Phishing demonstration part 1.
Phishing demonstration part 2.


Taught by

Joseph Delgadillo

Related Courses

Hacking and Patching
University of Colorado System via Coursera
Injection SQL Avec Kali
Coursera Project Network via Coursera
CompTIA PenTest+ (PT0-001): 5 Selecting Pen Testing Tools
LinkedIn Learning
Kali Linux on Windows 10 First Look
LinkedIn Learning
Learning Kali Linux
LinkedIn Learning