Certified Ethical Hacking Course
£99.00
Course Overview
If you would like to learn ethical hacking in 2020, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux and Python hacking with over 28 hours of HD video tutorials! We will cover the following topics in this course:
- How to setup a Kali Linux system
- Essential Linux system commands
- How to create a secure penetration testing environment
- Footprinting
- Scanning
- Website penetration testing
- WPA2 wireless network cracking
- Man in the middle attacks
- System hacking
- Python programming fundamentals
- Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)
- Tips for building a career in cyber security
This course was designed for absolute beginners, so no previous ethical hacking or programming knowledge is necessary.
Why choose this course?
- Internationally recognised accredited qualification
- Access to our free career advisors
- Over 95% pass rate
- 1 year accessibility to the course
- Attain PDF or hardcopy certificate to show employers
- Comprehensive Syllabus to kick start your career
- Study at your own pace anywhere
- Employer has access to certificate validation
- Tutor Support available
- Invitation to future job fairs
Course Curriculum
This Course will cover some of the following topics:-
- How to setup a Kali Linux system
- Essential Linux system commands,
- How to create a secure penetration testing environment,
- Footprinting,
- Scanning,
- Website penetration testing,
- WPA2 wireless network cracking,
- Man in the middle attacks,
- System hacking,
- Python programming fundamentals,
- Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer),
- Tips for building a career in cyber security
and much more.
Who is this Course for
This course is suitable for absolute beginners, so no previous ethical hacking or programming knowledge is necessary.
Career Path
This training course will lead you to many different career opportunities, Here are few prospects:
- Ethical Hacker- £52,121 per annum
- Information security manager – £49,985 per annum
- Information security analyst – £33,317 per annum
- Chief information security officer – £85,497 per annum
- Software developer – £30,661 per annum
Course Features
- Lectures 148
- Quizzes 0
- Duration 28h 44m
- Skill level All levels
- Language English
- Students 767
- Certificate Yes
- Assessments Yes
-
Introduction and Installation
-
Basic Linux Commands
-
Creating a Secure Hacking Environment
-
Footprinting
-
Scanning
-
Website Penetration Testing
- Installing OWASP
- HTTP request
- HTTP response
- Burpsuite configuration
- Editing packets in Burpsuite
- Whatweb and Dirb
- Password recovery attack
- Burpsuite login bruteforce
- Hydra login bruteforce
- Session fixation
- Injection attacks
- Simple command injection
- Exploiting command injection vulnerability
- Finding blind command injection
- SQL basics
- Manual SQL injection part 1
- Manual SQL injection part 2
- SQLmap basics
- XML injection
- Installing XCAT and preventing injection attacks
- Reflected XSS
- Stored XSS
- Changing HTML code with XSS
- XSSer and XSSsniper
-
Wireless Cracking
- Wireless attacking theory
- Enabling monitor mode
- Capturing handshake with airodump
- RockYou.txt
- Cracking with Aircrack
- Cracking with Hashcat
- Creating password lists with Crunch
- Creating password lists with Cupp
- Rainbow tables part 1
- Rainbow tables part 2
- Installing Fluxion
- Finding and cracking hidden networks
- Preventing wireless attacks
-
Man in the Middle Attacks
-
System Hacking with Metasploit
- MSFconsole environment
- Metasploit modules explained
- Bruteforcing SSH with Metasploit
- Attacking Tomcat with Metasploit
- Getting Meterpreter with command injection
- PHP code injection
- 2 Metasploitable exploits
- Wine installation
- Creating Windows payloads with Msfvenom
- Encoders and Hex editor
- Windows 10 Meterpreter shell
- Meterpreter environment
- Windows 10 privilege escalation
- Preventing privilege escalation
- Post exploitation modules
- Getting Meterpreter over Internet with port forwarding
- Eternalblue exploit
- Persistence module
- Hacking over the internet with Ngrok
- Android device attack with Venom
- The real hacking begins now!
-
Python Crash Course
-
Coding an Advanced Backdoor
- Theory behind reverse shells
- Simple server code
- Connection with reverse shell
- Sending and receiving messages
- Sending messages with while true loop
- Executing commands on target system
- Fixing backdoor bugs and adding functions
- First test using our backdoor
- Trying to connect every 20 seconds
- Creating persistence part 1
- Creating persistence part 2
- Changing directory
- Uploading and downloading files
- Downloading files from the internet
- Starting programs using our backdoor
- Capturing screenshot on the target PC
- Embedding backdoor in an image part 1
- Embedding backdoor in an image part 2
- Checking for administrator privileges
- Adding help option
-
Creating a Keylogger for the Backdoor
-
Basic Authentication Bruteforcer
-
BONUS-Building a Career in Cyber Security