/> Complete Ethical Hacking Course​ | WeGeek

Complete Ethical Hacking Course

Learn Ethical Hacking from PRO and become a certified hacker, a Perfect practical guide for beginners & professionals.

 

What you’ll learn?

 
  • Learn what is ethical hacking, its fields and the different types of hackers
  • Install hacking lab & needed software (works on Windows, OS X and Linux)
  • Hack & secure both WiFi & wired networks
1623 students Enrolled
  • (192 Reviews)

Curiculum

Introduction to the course

Get your course goals

Instructors

Admin bar avatar
HQ Traing

Developer

He has a Master of Science in Network Systems and a Bachelor of Science in Software Engineering. He is also a Microsoft Certified Application Developer, Technology Specialist (Web Applications) and Professional. Outside the software world, he is a photographer, a pianist and a passionate Latin dancer.
User Rating

4.1 average based on 254 reviews.


5 star
150
4 star
63
3 star
15
2 star
6
1 star
20

Benefits

Industry-Recognized Certification

After completion of each course, you will be entitled with valid certification that will recognize your efforts of particular field. Share your achievement with your friends, family and organization for your career growth.

certificate.1

Description

This course is highly practical but it won’t neglect the theory, so we’ll start with ethical hacking basics and the different fields in penetration testing, installing the needed software (works on Windows, Linux and Mac OS X) and then we’ll dive and start hacking systems straight away. From here onwards you’ll learn everything by example, by analysing and exploiting computer systems such as networks, servers, clients, websites …..etc, so we’ll never have any boring dry theoretical lectures.

The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you’ll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses and hack into it, not only that but you’ll also learn how to secure this system from the discussed attacks. This course will take you from a beginner to a more advanced level by the time you finish, you will have knowledge about most penetration testing fields.

Class Curriculum

    Introduction

  • Introduction to Ethical Hacking (29:50)
  • Setup your Lab

  • Install VMWARE Player (9:33)
  • Install and configure the lab (12:17)
  • Start to use Linux

  • Linux (19:39)
  • Reconnaissance

  • What is Reconnaissance (24:41)
  • What information you should look for (8:06)
  • Tools and Technique (4:36)
  • Advanced Resonance technique (7:29)
  • Maltego (2:23)
  • Scanning

  • What is Scanning (2:17)
  • NMAP (18:23)
  • Advanced technique of scanning Nessus (13:45)
  • Different types of scanning (13:27)
  • Enumeration (15:06)
  • Start Hacking

  • Define your Objective (3:15)
  • Password guessing and cracking (15:09)
  • Hydra and Xhydra (12:10)
  • Rambow table technique (19:20)
  • Advanced Password cracking technique (10:49)
  • Network Hacking

  • How to Hack a network (5:40)
  • Sniffing (30:13)
  • Man in the Middle attack (11:59)
  • Cain and Able (6:33)
  • Ettercap (5:44)
  • DNS Poising (15:58)
  • SSL Stip (10:47)
  • Social Engineering

  • Fake Email (Spoofing)
  • (6:13)
  • What is Social Engineering? (5:24)
  • Social Engineering Toolkit (4:41)
  • Advanced Social engineering technique (18:58)
  • Phising Credential Harvest (13:11)
  • Vulnerability and Exploit

  • What is a Vulnerability and Exploit? (4:15)
  • Search for Vulnerability and its Exploit (7:58)
  • Exploit the Vulnerability (10:28)
  • Metasploit (5:33)
  • Fast Track (9:41)
  • Armitage (8:29)
  • Wireless Hacking

  • Wireless explanation (4:23)
  • Wireless network infrastructure (17:26)
  • Warless attacks (2:33)
  • WEP cracking (20:48)
  • WPA WPA2 Cracking (27:51)
  • Advanced WPA2 Cracking technique using Reaver (6:40)
  • Buffer Overflow

  • What is Buffer Overflow (5:28)
  • How to search for Buffer Overflow (14:04)
  • Buffer Overflow 1 (16:33)
  • Buffer Overflow 2 (48:26)
  • Buffer Overflow 3 (26:05)
  • Another Demonstration (6:28)
  • Your Mission if you choose to accept it (1:47)
  • Web Application Hacking

  • What is Web Application Hacking? (4:16)
  • DVWA (9:09)
  • Hackthissite (3:07)
  • What is SQL Injection Attack (14:05)
  • SQL Injection Attack 1 (7:52)
  • SQL Injection Attack 2 (14:01)
  • XSS Introduction (2:58)
  • Reflected XSS (12:38)
  • Stored XSS (5:14)
  • Affected Web Site (3:27)
  • Advanced web application Attack (10:50)
  • Major Web Application vulnerabilities (3:01)
  • Your Mission if you choose to accept it (1:42)
  • Cryptography

  • Cryptographu Part 1 (12:16)
  • Cryptographu Part 2 (14:40)
  • Steganography (10:00)
  • Hashing (7:57)
  • Malicious Code

  • Maliciou Code Analysis (11:10)
  • Types of 0Malicious Code (14:51)
  • File Hash (5:08)
  • Discovering Malicious Code (8:32)
  • Denial of Service

  • What is Denial of Service (3:38)
  • Denial Service Attacks (7:56)
  • DOS Attack 1 (9:09)
  • DOS Attack 2 (6:44)
  • Ping of Death (6:39)
  • DDOS (3:11)
  • Bypassing Security

  • Bypassing different Security Technique (10:43)
  • Real Life Scenario

  • Real Life Scenario 1 (18:19)
  • Real Life Scenario 2 (14:00)
  • Real Life Scenario 3 (7:27)
  • Pentration Testing Project (6:32)
User Rating

4.8 average based on 192 reviews.


5 star
150
4 star
63
3 star
15
2 star
6
1 star
20

Student Reviews

Dont Miss Out Offer Ends In

  • Days
  • Hours
  • Minutes
  • Seconds

Explore the best practices of Ethical Hacking & Web Development from Basic to Advance Level

$12

Course Features

  • 30-Day Money-Back Guarantee
  • Lessons With Examples
  • 8 Hours of Learning
  • Lifetime 24/7 Access
  • Completion Certificate