• Course Categories
    • Business, Management & Law
    • Finance
    • Personal Development
    • Productivity
    • Marketing
    • Trading
    • Design
    • Health & Fitness
    • Languages
    • Videography
    • Photography
    • Web Development
  • Cart
  • Gift Bundles
  • Popular courses
  • All Courses
  • All Access Pass
      • Sign UpLogin
    EDPLX.COM | Over 1000 Home Study, Distance Learing Courses.EDPLX.COM | Over 1000 Home Study, Distance Learing Courses.
    • Course Categories
      • Business, Management & Law
      • Finance
      • Personal Development
      • Productivity
      • Marketing
      • Trading
      • Design
      • Health & Fitness
      • Languages
      • Videography
      • Photography
      • Web Development
    • Cart
    • Gift Bundles
    • Popular courses
    • All Courses
    • All Access Pass
    • Browse
    • Cart
    • All Access Pass
      • Sign UpLogin
      • Build
      • Business
      • Finance
      • Personal Development
      • Productivity
      • Marketing
      • Trading
      • Create
      • Design
      • Health & Fitness
      • Languages
      • Photography
      • Videography
      • Web Development
      • All Courses
      • Gift Bundles
      • Popular Courses
      • Live Courses

      Information Technology

      Test
      • Home
      • All courses
      • Information Technology
      • Certified Ethical Hacking Course
      CoursesInformation TechnologyCertified Ethical Hacking Course
      • Introduction and Installation 4

        • Lecture1.1
          Introduction to the course 05 min
        • Lecture1.2
          VirtualBox installation 16 min
        • Lecture1.3
          Kali Linux installation 14 min
        • Lecture1.4
          Enabling full-screen 18 min
      • Basic Linux Commands 3

        • Lecture2.1
          Basic commands part 1 10 min
        • Lecture2.2
          Basic commands part 2 21 min
        • Lecture2.3
          Basic commands part 3 13 min
      • Creating a Secure Hacking Environment 6

        • Lecture3.1
          Changing IP address and wireless adapter setup 05 min
        • Lecture3.2
          Creating a bootable Kali USB drive 05 min
        • Lecture3.3
          Essential networking terms 10 min
        • Lecture3.4
          Essential hacking terms 18 min
        • Lecture3.5
          Additional Kali tools to install 09 min
        • Lecture3.6
          Changing our MAC address with macchanger 07 min
      • Footprinting 6

        • Lecture4.1
          Google hacking 13 min
        • Lecture4.2
          Nikto basics 11 min
        • Lecture4.3
          Whois tool 07 min
        • Lecture4.4
          Email harvesting 06 min
        • Lecture4.5
          Shodan 11 min
        • Lecture4.6
          Zone transfer with Dig 07 min
      • Scanning 9

        • Lecture5.1
          Installing Metasploitable 07 min
        • Lecture5.2
          Nmap part 1 16 min
        • Lecture5.3
          Nmap part 2 12 min
        • Lecture5.4
          Nmap part 3 13 min
        • Lecture5.5
          Zenmap 08 min
        • Lecture5.6
          TCP scans 16 min
        • Lecture5.7
          Nmap bypassing defenses 18 min
        • Lecture5.8
          Nmap scripts part 1 10 min
        • Lecture5.9
          Nmap scripts part 2 14 min
      • Website Penetration Testing 24

        • Lecture6.1
          Installing OWASP 09 min
        • Lecture6.2
          HTTP request 10 min
        • Lecture6.3
          HTTP response 11 min
        • Lecture6.4
          Burpsuite configuration 13 min
        • Lecture6.5
          Editing packets in Burpsuite 13 min
        • Lecture6.6
          Whatweb and Dirb 10 min
        • Lecture6.7
          Password recovery attack 16 min
        • Lecture6.8
          Burpsuite login bruteforce 11 min
        • Lecture6.9
          Hydra login bruteforce 09 min
        • Lecture6.10
          Session fixation 14 min
        • Lecture6.11
          Injection attacks 06 min
        • Lecture6.12
          Simple command injection 11 min
        • Lecture6.13
          Exploiting command injection vulnerability 08 min
        • Lecture6.14
          Finding blind command injection 14 min
        • Lecture6.15
          SQL basics 11 min
        • Lecture6.16
          Manual SQL injection part 1 13 min
        • Lecture6.17
          Manual SQL injection part 2 21 min
        • Lecture6.18
          SQLmap basics 17 min
        • Lecture6.19
          XML injection 16 min
        • Lecture6.20
          Installing XCAT and preventing injection attacks 06 min
        • Lecture6.21
          Reflected XSS 11 min
        • Lecture6.22
          Stored XSS 12 min
        • Lecture6.23
          Changing HTML code with XSS 08 min
        • Lecture6.24
          XSSer and XSSsniper 14 min
      • Wireless Cracking 13

        • Lecture7.1
          Wireless attacking theory 11 min
        • Lecture7.2
          Enabling monitor mode 04 min
        • Lecture7.3
          Capturing handshake with airodump 15 min
        • Lecture7.4
          RockYou.txt 14 min
        • Lecture7.5
          Cracking with Aircrack 16 min
        • Lecture7.6
          Cracking with Hashcat 15 min
        • Lecture7.7
          Creating password lists with Crunch 19 min
        • Lecture7.8
          Creating password lists with Cupp 07 min
        • Lecture7.9
          Rainbow tables part 1 17 min
        • Lecture7.10
          Rainbow tables part 2 06 min
        • Lecture7.11
          Installing Fluxion 06 min
        • Lecture7.12
          Finding and cracking hidden networks 08 min
        • Lecture7.13
          Preventing wireless attacks 08 min
      • Man in the Middle Attacks 11

        • Lecture8.1
          ARP protocol basics 11 min
        • Lecture8.2
          Man in the middle attack theory 07 min
        • Lecture8.3
          Installing MITMf 07 min
        • Lecture8.4
          Manual ARP spoofing 13 min
        • Lecture8.5
          Problems while installing MITMf 06 min
        • Lecture8.6
          HTTP traffic sniffing 09 min
        • Lecture8.7
          DNS spoofing and HTTPS password sniffing 21 min
        • Lecture8.8
          Hooking browsers with BEEF 16 min
        • Lecture8.9
          Screenshotting targets browser 11 min
        • Lecture8.10
          Cloning any webpage 09 min
        • Lecture8.11
          Ettercap basics 07 min
      • System Hacking with Metasploit 21

        • Lecture9.1
          MSFconsole environment 16 min
        • Lecture9.2
          Metasploit modules explained 12 min
        • Lecture9.3
          Bruteforcing SSH with Metasploit 15 min
        • Lecture9.4
          Attacking Tomcat with Metasploit 09 min
        • Lecture9.5
          Getting Meterpreter with command injection 25 min
        • Lecture9.6
          PHP code injection 06 min
        • Lecture9.7
          2 Metasploitable exploits 07 min
        • Lecture9.8
          Wine installation 12 min
        • Lecture9.9
          Creating Windows payloads with Msfvenom 10 min
        • Lecture9.10
          Encoders and Hex editor 19 min
        • Lecture9.11
          Windows 10 Meterpreter shell 12 min
        • Lecture9.12
          Meterpreter environment 12 min
        • Lecture9.13
          Windows 10 privilege escalation 12 min
        • Lecture9.14
          Preventing privilege escalation 07 min
        • Lecture9.15
          Post exploitation modules 14 min
        • Lecture9.16
          Getting Meterpreter over Internet with port forwarding 11 min
        • Lecture9.17
          Eternalblue exploit 21 min
        • Lecture9.18
          Persistence module 13 min
        • Lecture9.19
          Hacking over the internet with Ngrok 11 min
        • Lecture9.20
          Android device attack with Venom 10 min
        • Lecture9.21
          The real hacking begins now! 03 min
      • Python Crash Course 11

        • Lecture10.1
          Variables 14 min
        • Lecture10.2
          Raw input 11 min
        • Lecture10.3
          If-else statements 11 min
        • Lecture10.4
          For loops 07 min
        • Lecture10.5
          While loops 09 min
        • Lecture10.6
          Python lists 08 min
        • Lecture10.7
          Functions 14 min
        • Lecture10.8
          Classes 11 min
        • Lecture10.9
          Importing libraries 07 min
        • Lecture10.10
          Files in Python 12 min
        • Lecture10.11
          Try and except rule 05 min
      • Coding an Advanced Backdoor 20

        • Lecture11.1
          Theory behind reverse shells 07 min
        • Lecture11.2
          Simple server code 13 min
        • Lecture11.3
          Connection with reverse shell 07 min
        • Lecture11.4
          Sending and receiving messages 11 min
        • Lecture11.5
          Sending messages with while true loop 08 min
        • Lecture11.6
          Executing commands on target system 10 min
        • Lecture11.7
          Fixing backdoor bugs and adding functions 21 min
        • Lecture11.8
          First test using our backdoor 18 min
        • Lecture11.9
          Trying to connect every 20 seconds 13 min
        • Lecture11.10
          Creating persistence part 1 06 min
        • Lecture11.11
          Creating persistence part 2 17 min
        • Lecture11.12
          Changing directory 12 min
        • Lecture11.13
          Uploading and downloading files 23 min
        • Lecture11.14
          Downloading files from the internet 23 min
        • Lecture11.15
          Starting programs using our backdoor 07 min
        • Lecture11.16
          Capturing screenshot on the target PC 19 min
        • Lecture11.17
          Embedding backdoor in an image part 1 14 min
        • Lecture11.18
          Embedding backdoor in an image part 2 09 min
        • Lecture11.19
          Checking for administrator privileges 12 min
        • Lecture11.20
          Adding help option 09 min
      • Creating a Keylogger for the Backdoor 7

        • Lecture12.1
          Importing Pynput 11 min
        • Lecture12.2
          Simple keylogger 10 min
        • Lecture12.3
          Adding report function 11 min
        • Lecture12.4
          Writing keystrokes to a file 14 min
        • Lecture12.5
          Adding the keylogger to our reverse shell part 1 23 min
        • Lecture12.6
          Adding the keylogger to our reverse shell part 2 08 min
        • Lecture12.7
          Final project test 15 min
      • Basic Authentication Bruteforcer 7

        • Lecture13.1
          Printing banner 12 min
        • Lecture13.2
          Adding available options 11 min
        • Lecture13.3
          Starting threads for bruteforce 09 min
        • Lecture13.4
          Writing function to run the attack 11 min
        • Lecture13.5
          Bruteforcing router login 10 min
        • Lecture13.6
          Bypassing antivirus with your future programs 14 min
        • Lecture13.7
          Sending malware with spoofed email 14 min
      • BONUS-Building a Career in Cyber Security 6

        • Lecture14.1
          What will you learn in this section? 03 min
        • Lecture14.2
          Why is ethical hacking a valuable skill? 23 min
        • Lecture14.3
          What is the best ethical hacking certification? 17 min
        • Lecture14.4
          Tips for getting your first job as an ethical hacker 19 min
        • Lecture14.5
          How I started my career as an ethical hacker 14 min
        • Lecture14.6
          How to price your work 11 min
        This content is protected, please login and enroll course to view this content!
        Prev Essential hacking terms
        Next Changing our MAC address with macchanger

        Categories

        • Business, Management & Law
          • Finance
          • Marketing
          • Personal Development
          • Productivity
          • Trading
        • Course Builder
        • Design
        • Finance
        • Health & Social Care
        • Information Technology
        • Languages
        • Marketing
        • Open Learning College
          • Course Builder
        • Personal Development
        • Photography
        • Productivity
        • Trading
        • Videography

        EDPLX is a learning community with online courses in design, business, web development, photography, fitness and more. Anyone can join the community to learn cutting-edge skills, network with other creatives and discover new oppotunities.

        Company
        • About
        • Blog
        • Contact
        • FAQ
        Community
        • Become an Instructor
        • Redeem Voucher
        new-logo

        @2024 All rights reserved. Privacy Policy and Terms and condition.

        EDPLX Limited 15398152

        Facebook-f
        Youtube
        Twitter
        Instagram

        Connect with

        Login with Facebook

        logo

        Login

        Connect with

        Login with Facebook

        logo


        Lost your password?

        Not a member yet? Register now

        Sign up with your Email

        Are you a member? Login now

        • Login
        • Sign Up
        Forgot Password?
        Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.