Video description
This course is highly practical and is divided into several sections, each of which aims to achieve a specific goal; the goal is usually to hack into a specific system so that you can practice all the skills and techniques you learn in real time. We will start by setting up an ethical hacking lab on your computer. Here, you can put the theory you learn to the test and have a safe space to practice using hacking tools and attacks. We’ll experience real-time hacking examples and learn how to protect ourselves against these attacks at the same time!
In this course, you will learn the following:
- How hackers launch attacks on different systems, computers, users, websites, and wireless networks
- What tools hackers use, why and how they work
- How to protect yourself (or your clients!) against these attacks
- How to build your security and hacking tools with Python from scratch and with no programming experience necessary
- How to create your own ethical hacking tool portfolio
In the relevant sections, you will learn about subjects such as Kali Linux, Wireshark, Maltego, net discover, MSFC, Trojan, Backdoor, Veil, Metasploitable, SQLi, MITMf, Crunch, Meterpreter, Beef, Apache, Nmap, SQLMap, Python, Socket, Scapy, Pynput, Keylogger, and more. We start with practical information without excessive detail and progress accordingly without neglecting the theory at the end.
What You Will Learn
- Learn to use Kali Linux tools
- Learn basic Python programming concepts and fundamentals
- Write ethical hacking tools with Python
- Perform wireless networks penetration testing
- Learn website and system penetration testing
- Apply SQL Injection
Audience
This course targets people who are keen to learn ethical hacking once and for all, are looking forward to a career in cybersecurity, who want to learn Python programming for ethical hacking, are willing to write their own cybersecurity tools, are passionate about Kali Linux and general ethical hacking tools, and are anxious to enhance their IT skills and prepare for hacker attacks.
About The Author
Atil Samancioglu: Atil Samancioglu is a best-selling online instructor and has instructed more than 80,000 students on Ethical Hacking. Atil has trained more than 20.000 students on the following Ethical Hacking subjects: Kali Linux, Metasploit, metasploitable, social engineering, Nmap, Man-in-the-Middle attacks, MITM proxy, Beef, Wireshark, Maltego, SQL Injection, XSS, social media safety, VPN server creation, Meterpreter, Ettercap, WPA Enterprise. He currently works as eBusiness Team Leader in a multinational company.
Table of contents
- Chapter 1 : Introduction
- Chapter 2 : Hacking Lab Setup
- Chapter 3 : Kali Linux 101
- Chapter 4 : Anonymity Online
- Chapter 5 : Dark Web
- Chapter 6 : Network Pentesting
- Chapter 7 : Gathering Information from Networks
- Chapter 8 : Wireless Attacks
-
Chapter 9 : Post Connection Attacks
- Post Connection Attacks Introduction
- Post Connection Settings
- Netdiscover
- nMap
- Man In The Middle
- Manual ARP Poison
- What is MITMF
- How Hackers Steal Passwords
- Breaking HTTPS
- Creating Web Server
- DNS Attacks
- Bettercap Installation
- ARP Attack
- Capturing Information
- Caplet Usage
- HSTS Settings
- Breaking HTTPS
- HSTS Downgrade Attempt
- JavaScript Injection
- Wireshark Intro
- Wireshark Detailed Analysis
- How to Make Yourself Safe
- Post Connection Outro
- Chapter 10 : System Pentesting
- Chapter 11 : Attacks on Users
- Chapter 12 : Social Engineering
- Chapter 13 : Social Media Security
- Chapter 14 : Beef
- Chapter 15 : External Network Attacks
- Chapter 16 : Fake Game Website Attacks - Introduction
- Chapter 17 : Post Hacking Sessions
- Chapter 18 : Hacker Methodology
- Chapter 19 : Website Reconnaissance
- Chapter 20 : Website Pentesting
- Chapter 21 : Cross Site Scripting
- Chapter 22 : SQL 101
- Chapter 23 : SQL Injection
- Chapter 24 : Website Pentesting Tools
- Chapter 25 : Ethical Hacking Certifications
- Chapter 26 : Python for Ethical Hacking Setup
- Chapter 27 : Python Data Types and Structures Introduction
- Chapter 28 : Control Statements and Loops
- Chapter 29 : Essentials
- Chapter 30 : Functions
- Chapter 31 : Object-Oriented Programming
- Chapter 32 : Modules
- Chapter 33 : MAC Changer
- Chapter 34 : Network Scanner
- Chapter 35 : Man In The Middle
- Chapter 36 : Packet Listener
- Chapter 37 : Keylogger
-
Chapter 38 : Backdoor
- Backdoor Introduction
- How to Write a Backdoor?
- Opening a Connection
- Running Commands
- Writing Listener
- Sending Commands with Listener
- Class Structure
- Finishing Classes
- What is JSON?
- Processing JSON
- Sending Commands with List
- Cd Command Implementation
- Getting Contents
- Saving Files
- Encoding Downloads
- Upload Functionality
- Handling Errors
- Python3 Compatibility
- Backdoor Outro
- Chapter 39 : Packaging and Malicious Files
- Chapter 40 : Network Theory
- Chapter 41 : Closing and Ethical Hacker's Handbook
Product information
- Title: The Complete Ethical Hacking Course
- Author(s):
- Release date: October 2021
- Publisher(s): Packt Publishing
- ISBN: 9781839210495
You might also like
video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced
Are you looking to pursue a career in cybersecurity and want to master the art of …
video
Learning Path: Certified Ethical Hacker CEH Complete Video Course
Duration More Than 10 Hours of Video Instruction Overview Learn everything you need to know to …
video
Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition
13+ Hours of Video Instruction Designed to help you pass the EC-Council Certified Ethical Hacker (CEH) …
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction An updated edition of this video title is …