Video description
A comprehensive course designed to cover from basic to the most advanced ethical hacking techniques using Kali Linux. This course introduces you to the essentials of cybersecurity, from setting up a hacking lab to mastering Kali Linux's core functionalities for cybersecurity tasks.
You'll delve into network security, learn to exploit network vulnerabilities, understand online anonymity, explore the dark web, and master wireless network security. Gain insights into system penetration testing, web application vulnerabilities like SQL injections, and cross-site scripting. The course places a strong emphasis on social engineering, teaching you to both execute and thwart these strategies.
This program goes beyond mere technical skills to cover the ethical aspects of hacking, preparing you for a responsible role in the cybersecurity domain. With a focus on hands-on learning, it includes labs and projects that mimic real-world scenarios, allowing you to apply learned concepts practically.
By the end, you'll possess a broad set of ethical hacking skills, preparing you for the cybersecurity challenges of today and tomorrow. This course is not just an educational journey; it's a gateway to a career in cybersecurity, equipping you with the knowledge and tools to safeguard digital assets in our technology-driven world.
What you will learn
- Conduct network and system pentesting.
- Apply anonymity techniques online and explore the dark web.
- Perform wireless and network attacks.
- Understand and execute social engineering attacks.
- Protect against and exploit vulnerabilities in web applications.
- Develop proficiency in Python for hacking and automation tasks.
Audience
This course is ideal for individuals keen on mastering ethical hacking from scratch, aspiring cybersecurity professionals, those interested in Python programming for security purposes, individuals aiming to develop their own cybersecurity tools, enthusiasts of Kali Linux and ethical hacking tools, and IT professionals seeking to augment their skills and safeguard against hacker intrusions.
About the Authors
Codestars By Rob Percival: Rob Percival wants to revolutionize the way people learn to code by making it simple, logical, fun, and, above all, accessible. But as just one man, Rob couldn't create all the courses his students, more than half a million of them, wanted. That's why Rob created Codestars. Together, the instructors that make up the Codestars team create courses on all the topics that students want to learn, in the way that students want to learn them: courses that are well-structured, super interactive, and easy to understand. Codestars wants to make it as easy as possible for learners of all ages and levels to build functional websites and apps.
Atil Samancioglu: Atil Samancioglu, a distinguished instructor and Bogazici University alumnus, specializes in Development, Mobile Applications, and Cyber Security. As the founder of Academy Club and CTO of Orphex, his expertise spans corporate training to software development. Atil champions the importance of code literacy for everyone, emphasizing that understanding programming is crucial in our rapidly evolving digital world. He encourages individuals to explore the realm of programming, whether to pursue career aspirations in software development and cyber security or to bring innovative app ideas to life. Atil's courses are designed to empower students to not just learn, but to transform their ideas into reality and stay ahead in the tech industry.
Table of contents
- Chapter 1 : Course Introduction
-
Chapter 2 : Hacking Lab Setup
- Hacking Lab Setup Introduction
- What is Virtual Machine
- Installing Virtualbox (Windows)
- Installing Virtualbox (MAC)
- Downloading Kali Linux
- Kali Linux Installation
- Solving Install Problems (Windows)
- Manual .ISO Installation (Problem Solving)
- Solving Install Problems (MAC)
- Installing Virtual Windows
- Snapshots
- Quick Reminder Before We Move On
- Chapter 3 : Kali Linux 101
- Chapter 4 : Anonymity Online
- Chapter 5 : Dark Web
- Chapter 6 : Network Pentesting
- Chapter 7 : Gathering Information From Networks
- Chapter 8 : Wireless Attacks
- Chapter 9 : Post Connection Attacks
- Chapter 10 : System Pentesting
- Chapter 11 : Attacks On Users
- Chapter 12 : Social Engineering
- Chapter 13 : Social Media Security
- Chapter 14 : Beef
-
Chapter 15 : External Network Attacks
- External Network Attacks Introduction
- External Network Attack Options
- What is a Tunneling Service?
- Msfvenom
- Hacking Windows
- Running Veil with Ngrok
- Optional: External Backdoor with Port Forwarding
- Optional: External Backdoor Hacking with Port Listening
- Setoolkit
- Setoolkit Modules
- Hacking Gmail
- sendEmail
- External Network Attacks Outro
- Chapter 16 : Fake Game Website Attacks
- Chapter 17 : Post Hacking Sessions
- Chapter 18 : Hacker Methodology
- Chapter 19 : Website Reconnaissance
- Chapter 20 : Website Pentesting
- Chapter 21 : Cross Site Scripting
- Chapter 22 : SQL 101
- Chapter 23 : SQL Injection
- Chapter 24 : Website Pentesting Tools
- Chapter 25 : Ethical Hacking Certifications
- Chapter 26 : Network Theory
- Chapter 27 : Python For Ethical Hacking Setup
- Chapter 28 : Python Data Types Structures
- Chapter 29 : Control Statements Loops
- Chapter 30 : Essentials
- Chapter 31 : Functions
- Chapter 32 : Object Oriented Programming
- Chapter 33 : Modules
- Chapter 34 : MAC Changer
- Chapter 35 : Network Scanner
- Chapter 36 : Man In The Middle
- Chapter 37 : Packet Listener
- Chapter 38 : Keylogger
-
Chapter 39 : Backdoor
- Backdoor Introduction
- How To Write a Backdoor?
- Opening a Connection
- Running Commands
- Writing Listener
- Sending Commands With Listener
- Class Structure
- Finishing Classes
- What is JSON?
- Processing JSON
- Sending Commands With List
- Cd Command Implementation
- Getting Contents
- Saving Files
- Encoding Downloads
- Upload Functionality
- Handling Errors
- Python3 Compatibility
- Backdoor Outro
- Chapter 40 : Packaging Malicious Files
- Chapter 41 : Closing Ethical Hacker's Handbook
Product information
- Title: The Complete Ethical Hacking Course
- Author(s):
- Release date: April 2024
- Publisher(s): Packt Publishing
- ISBN: 9781839210495
You might also like
video
Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition
13+ Hours of Video Instruction Designed to help you pass the EC-Council Certified Ethical Hacker (CEH) …
video
Certified Ethical Hacker (CEH) v.12
The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical …
video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced
Are you looking to pursue a career in cybersecurity and want to master the art of …
video
The Complete Cybersecurity Bootcamp, 2nd Edition
26 Hours of Video Instruction 26 Hours of Detailed, Curated Video Training to Take You from …