The Complete Ethical Hacking Course 2023
Learn Ethical Hacking & Network Penetration Testing From Basic To Advanced
Description
Welcome to ethical hacking course 2023. My name is Niraj Jha. I am an ethical hacker and a penetration tester. And I will be with you throughout this course. This course is actually designed for people who have a little knowledge about computer. And if you don't know anything about hacking, you don't have to worry about it.
I will be starting from a basic level and I will take you to a higher intermediate level. So you will be learning each and everything in this course. So first of all, I will tell you how to set up a lab. You need to set up a lab environment where there will be a Kali machine. Kali machine is our attacker machine and each and everything we'll be doing on Kali Linux machine.
After that, we will install a Metasploitable machine and then there will be Windows 10 machine. All the executables we run will be in a virtual environment and you don't have to worry about your host machine. You don't have to use your host machine. Each and everything will be done on a virtual environment and all of these machines will be interconnected.
Things You Will Learn In This Course:
- Setting The Lab
- Network Penetration (WIFI Hacking)
- Gaining Access To Systems (System Hacking)
- Maintaining Access
- Mobile Hacking
- Website Penetration (Web Hacking)
- Post Exploitation
- Security
The course will be updated time to time and you will learn each and everything to become an ethical hacker in this single course.
What You Will Learn!
- Setting The Lab
- Setting Up Kali Linux
- Setting Up Windows Machine
- Metasploitable
- VirtualBox Snapshots
- Kali Linux: Basic & Advanced
- Configuring Kali Linux
- Network Penetration
- Wireless Adapter
- MAC Address
- Wireless Adapter Modes
- Packet Sniffing
- De-Authentication Attack
- Fake Access Point
- Gaining Access To Networks (WIFI Hacking)
- WEP Cracking
- Packet Injection
- ARP Request Replay
- WPA/WPA2 Cracking
- Exploiting WPS Features
- Best Tool For WIFI Hacking
- Capturing Handshake
- Capturing a Wordlist
- Wordlist Attack
- Post Connection Attacks
- Nmap
- ARP Poisoning Using arpspoof
- ARP Poisoning Using MITMf
- Bypassing HTTPS Pages Using MITMf
- Session Hijacking
- DNS Spoofing Using MITMf
- Eathernet
- Wireshark
- Security and Protection
Who Should Attend!
- Beginners to Advanced