Full Ethical Hacking Course

What you'll learn Ethical hacking and cybersecurity Penetration testing

john wig | Author Level 1

0.0
(0) 0 Students

What you will learn

  • hacking

Introduction to cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.
Introduction to cyber-security
Cyber-attack chain
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control
Actions on Objective
Virtualization on VirtualBox
Kali Linux
Install, deploy and run Kali Linux
Installation and deployment of vulnerable server for testing
Reconnaissance
Information gathering
Assess security vulnerabilities
Scanning engines
Nmap scanning
Search engine scanners
Internet scanners
Google search engine
Open source intelligence
Recon-ng scanning
Security standards
Center for Internet Security (CIS)
Hardening checks for systems
Exploitation
Metasploit framework for ethical hacking
Basic commands and usage
Module exploration
Search for vulnerabilities from scanning results
Exploitation of systems
Post-exploitation for privilege escalation and scanning
Security hardening and configuration
Social engineering
Dark Web with Tor
Hacking groups and forums
Wireless security assessment with WiFi PineApple
Wireless vulnerabilities
Social Engineering Toolkit (SET) attacks
Direct attacks into Windows 10 with Macros and Powershell
Web, application and database vulnerabilities
Open Web Application Security Project (OWASP) top 10
Injection
Broken authentication
Sensitive data exposure
XML External Entities
Broken access control
Security misconfiguration
Cross-Site Scripting
Insecure Deserialization
Using components with known vulnerabilities
Insufficient logging and monitoring
Full SQLMAP tutorial for web penetration testing
BurpSuite tutorial for manual injection on web penetration testing
Payload testing with custom load
Creation of payload
Payloads package on injection
Fully undetected payloads
Buffer overflow for shell
Come join thousands of students who has learned from the top ethical hacking and penetration testing instructor, Loi Liang Yang, now!
Who this course is for:

Beginners to pros interested in learning ethical hacking

img
No Discussion Found

0.0

0 Reviews

5
0
4
0
3
0
2
0
1
0
Meet Your Instructor

Instructor
0.0 Rating
0 Students
Author Level 1
9 Courses
About Instructor

Programming skills should be affordable and open to all. An education material should teach real life skills that are current and they should not waste a student's valuable time. Having learned important lessons from working for Fortune 500 companies, tech startups, to even founding his own business, he is now dedicating 100% of his time to teaching others valuable software development skills in order to take control of their life and work in an exciting industry with infinite possibilities. Andrei promises you that there are no other courses out there as comprehensive and as well explained. He believes that in order to learn anything of value, you need to start with the foundation and develop the roots of the tree. Only from there will you be able to learn concepts and specific skills(leaves) that connect to the foundation. Learning becomes exponential when structured in this way.

video

$ 230.00 $ 300.00

23.33% off
  • Course Duration
    1 h 0 m 55 s
  • Course Level
    Medium
  • Student Enrolled
    0
  • Language
    English
This Course Includes
  • 1 h 0 m 55 s Video Lectures
  • 0 Quizzes
  • 0 Assignments
  • 0 Downloadable Resources
  • Full Lifetime Access
  • Certificate of Completion