O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Ethical Hacking Masterclass

Video Description

Your certification guide to ethical hacking

About This Video

  • Understand the WHYs, HOWs and WHATs of Ethical Hacking
  • A comprehensive course full of the latest and most important tools for you to be a master in the Ethical Hacking world
  • Use the the practice questions in the Ethical Hacking course and pass this prestigious exam

In Detail

Security is the foremost concern for all organizations both big and small. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. This action-packed course provides information on all the latest hacking tools in one place. You'll learn all the latest tools and features such as network pentesting, website pentesting, and Android pentesting. By the end of the course you'll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker.

Table of Contents

  1. Chapter 1 : Ethical Hacking Course Introduction
    1. The Course Overview 00:03:17
    2. Course Overview – How to Get the Most Out of This Course? 00:02:31
    3. Teaser – Bypass Antivirus in Windows 10 and Hack Windows 10 Completely 00:10:29
    4. Ethical Hacking – Latest Terminologies 00:03:03
  2. Chapter 2 : Network Pentesting Lab Setup and Overview
    1. Download and Install VMware Workstation 00:03:47
    2. Download Windows 10 and Kali Linux 2018 00:05:18
    3. Installation of Windows 10 and Kali Linux in VMware Workstation 00:04:48
    4. Update and Upgrade the Kali Linux Operating System 00:04:05
    5. What Is Network Pentesting? 00:03:38
    6. Various Components of Network Pentesting 00:03:31
  3. Chapter 3 : Network Pentesting – Network Scanning Techniques
    1. IP Scanners in Network 00:06:12
    2. Port Scanning in Network Using Nmap 00:06:01
    3. Nessus Installation 00:06:19
    4. Vulnerability Scanning Using Nessus 00:06:04
  4. Chapter 4 : Network Pentesting – Network Host Exploitation with the AV Bypass Mechanism
    1. Installation of Antivirus Bypass Frameworks 00:10:21
    2. Bypass Windows 10 Defender and Hack Windows 10 from Kali Linux 00:07:53
    3. Bypass Windows 10 Antivirus and Hack Windows 10 from Kali Linux 00:13:00
    4. Various Meterpreter Commands 00:07:28
  5. Chapter 5 : Network Pentesting – Network IoT Devices Exploitation
    1. About Router Pentesting 00:03:56
    2. Download and Install VyOS on a VMware Workstation (Virtual Router) 00:06:11
    3. Start Services in Router 00:07:32
    4. Password Cracking (Brute Forcing) Using the Hydra and Medusa Tools 00:10:16
  6. Chapter 6 : Other Major Network Attacks
    1. Man-in-the-Middle Attack Overview 00:02:25
    2. Man-in-the-Middle Attack (MITM) Using Wireshark and Ettercap 00:06:52
    3. Social Engineering Attack Overview 00:02:43
    4. Social Engineering Attack Using Social Engineering Toolkit 00:05:19
    5. About the Browser Exploitation Framework 00:03:05
    6. Browser Exploitation Attack Using BeEF 00:06:35
  7. Chapter 7 : Website Pentesting Lab Setup and Overview
    1. Download and Install Xampp Server in Kali Linux 00:07:42
    2. Download and Install a Buggy Web Application 00:05:13
    3. Website Introduction 00:02:31
    4. Website Pentesting Overview 00:03:58
  8. Chapter 8 : Website Pentesting – Scanning Websites
    1. Acunetix Web Vulnerability Scanner 00:07:44
    2. Burp Suite Community Edition 00:07:32
    3. Zed Attack Proxy Tool (ZAP) 00:07:22
    4. Report Creation and Analysis 00:06:38
  9. Chapter 9 : Website Pentesting – SQL Injection Attack
    1. SQL Injection Attack Overview 00:02:48
    2. SQL Injection Attack on a Buggy Web Application 00:06:33
    3. HTML Injection Attack on a Buggy Web Application 00:06:24
    4. SQL Injection on a Live Website Using Sqlmap Kali Linux 00:09:57
  10. Chapter 10 : Website Pentesting – XSS and CSRF Attacks
    1. About XSS Attack and Types 00:02:38
    2. Persistent XSS Attack on a Buggy Web Application 00:06:43
    3. Non-Persistent XSS Attack on a Buggy Web Application 00:05:11
    4. DOM-Based XSS Attack 00:03:22
    5. About CSRF Attacks 00:03:26
    6. CSRF Attack on a Buggy Web Application 00:08:55
  11. Chapter 11 : Website Pentesting – Other Major Web Attacks
    1. Shell Upload Attack on a Buggy Web Application 00:06:41
    2. Buffer Overflow Attack on a Web Application 00:05:17
    3. Brute-Force Attack on the Login Panel of a Web Application 00:08:45
    4. Local File Inclusion Attack on a Web Application 00:07:47
  12. Chapter 12 : Android Pentesting Lab Setup and Overview
    1. Download and Install Android Studio 00:06:05
    2. Start Android Phone in Android Studio 00:05:17
    3. Download and Install APK File in Android Phone 00:06:21
    4. About Android Pentesting 00:02:58
    5. Scope of Android Pentesting 00:03:23
  13. Chapter 13 : Android Pentesting – Analyze Log Files and Find Secret Information
    1. About Android Log Files 00:04:29
    2. Information About Task 00:03:39
    3. Open Log Files Using Logcat 00:05:06
    4. Analyze Log Files and Find Secret Code 00:05:20
  14. Chapter 14 : Android Pentesting – Reverse Engineering Process
    1. About the Reverse Engineering Process in Android 00:04:18
    2. Information About Task 00:02:52
    3. Download and Install the Dex2jar Tool 00:06:24
    4. Download and Install the JD-Gui Tool 00:06:20
  15. Chapter 15 : Android Pentesting – Break Encryption in Android
    1. Encryption Process in Android 00:04:04
    2. Information About Task 00:03:32
    3. Analyze the Code and Find the Encryption Algorithm 00:04:09
    4. Complete the Task 00:05:51
  16. Chapter 16 : Android Pentesting – SQL Injection Attack on Android
    1. About SQL Injection Attack on Android 00:04:32
    2. Download and Install Drozer and Drozer-Agent.apk 00:07:34
    3. Drozer Commands 00:07:35
    4. Perform an SQL Injection Attack on Android Using Drozer 00:06:10
  17. Chapter 17 : Ethical Hacking Exam Preparation
    1. Overview of Major Ethical Hacking Exams 00:02:21
    2. Ethical Hacking Exam Practice Questions – Part 1 (MCQ) 00:08:39
    3. Ethical Hacking Exam Practice Questions – Part 2 (MCQ) 00:06:41
    4. Ethical Hacking Exam Practice Questions – Part 3 (MCQ) 00:05:29
    5. Ethical Hacking Exam Practice Questions – Part 4 (MCQ) 00:07:01
    6. Ethical Hacking Exam Practice Questions – Part 5 (MCQ) 00:07:14