Description
The Complete Ethical Hacker Course by Mohamed Atef
**More information:
Sale Page
Archive Page
Get The Complete Ethical Hacker Course by Mohamed Atef at Bestoftrader.com
Description
In the course, you will learn:
- Key issues plaguing the information security world, incident management process, and penetration testing
- Various types of foot-printing, foot-printing tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- System hacking methodology, steganography, steganalysis attacks, and covering tracks
- Different types of Trojans, Trojan analysis, and Trojan countermeasures
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
- Packet sniffring techniques and how to defend against sniffring
- Social Engineering techniques, identify theft, and social engineering countermeasures
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
- Session hijacking techniques and countermeasures
- Different types of webserver attacks, attack methodology, and countermeasures
- SQL injection attacks and injection detection tools
- Wi-Fi Hacking, wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
- Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
- Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
- Various cloud computing concepts, threats, attacks, and security techniques and tools
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Various types of penetration testing, security audit, vulnerability assessment, and penetration testing road map
Make This Investment in Yourself
COURSE CURRICULUM
Materials and extra resources
Build your lab
-
Start
4.Build your virtual lab (7:15)
-
Start
5.Download Windows ISO Images (9:38)
-
Start
6.Configure Windows VM (13:48)
-
Start
7.Download Kali Linux (10:01)
-
Start
8.Configure Kali Linux (5:41)
-
Start
9.Download OWASBWA and Metasploitable (11:36)
Get Familiar with Kali Linux
Footprinting and Reconnaissance
-
Start
15.Footprinting Introduction (7:28)
-
Start
16.Footprinting and Reconnaissance (14:12)
-
Start
17.Email Harvest (9:51)
-
Start
18. Google Hacking (10:36)
-
Start
19.Metagoofil (10:18)
-
Start
20.People Search Engine (6:13)
-
Start
21.Maltego (Intelligence Tool) (8:38)
-
Start
22.Internet Archives and Alerts (7:04)
Network Scanning
-
Start
23.Network Scanning Overview (5:21)
-
Start
24.Important Scanning Defination (13:18)
-
Start
25. Network Scanning Methology (2:55)
-
Start
26.Identifying Live system (6:40)
-
Start
27.Port Scanning (14:23)
-
Start
28.Advanced Scanning Techniques (7:23)
-
Start
29.Get more information about your victim (7:15)
-
Start
30.NMAP NSE Scripts (1:40)
-
Start
31.Zenmap (5:43)
-
Start
32.Netcat (7:59)
-
Start
33.Grabbing Banner (2:24)
-
Start
34.Network Mapping (11:41)
-
Start
35.Vulnerability Scanning (13:51)
System Hacking
-
Start
Introduction to System Hacking (8:23)
-
Start
Password Hacking techniques (8:50)
-
Start
Default Password (5:40)
-
Start
Important Tool (14:33)
-
Start
Cain in Action (18:22)
-
Start
Xhydra (7:33)
-
Start
SSH Cracking (3:29)
-
Start
Ncrack (8:44)
-
Start
Ncrack different OS (4:07)
-
Start
The right worldlist (4:30)
-
Start
Crunch (6:04)
-
Start
The most amazing and effect wordlsit (6:22)
-
Start
Password Reset Hack (15:57)
-
Start
Offline Password attack (5:58)
Malware Threats
-
Start
59.Introduction to Maleware (5:12)
-
Start
60.Types of Malware (10:11)
-
Start
61.Create a virus (6:25)
-
Start
62.Creating a Virus using a Tool (2:45)
-
Start
63.Creating a Trojan 1 (R) (16:40)
-
Start
64.64. Creating a Trojan 2. (R) (8:14)
-
Start
64.1 Using the Meterpreter Sessions (9:27)
-
Start
64.2 Can I Bypass the AV (4:27)
Sniffring
-
Start
65. Introduction to Sniffring (9:33)
-
Start
65.1 MITM Attack (Proof of Concept) (13:07)
-
Start
66. Enable Routing (3:37)
-
Start
67.MITM Attack using Ettercap and Xplico (9:07)
-
Start
68. Start Xplico (1:46)
-
Start
69. Ettercap and Xplico attack (9:34)
-
Start
70. DNS Spoofing 2 (10:58)
-
Start
71. DNS Spoofing attack (10:07)
Cryptography
-
Start
72. Cryptography Basics (12:15)
-
Start
73. Symmetric Encryption (7:43)
-
Start
74. Asymmetric Encryption (8:43)
-
Start
75. Digital Signature (3:14)
-
Start
76. Hash (5:21)
-
Start
77. Steganography (10:18)
-
Start
78. Cryptography Attacks (4:23)
Social Engineering
-
Start
79. Introduction to Social Engineering (3:13)
-
Start
80. Social Engineering Proof of Concept (10:02)
-
Start
81. Phishing Attack (16:17)
-
Start
82. How far you can go with SE (7:40)
-
Start
83.Vishing Attack using Fake Call (5:51)
-
Start
84. Vishing using Fake SMS (4:53)
-
Start
85. Important Countermeasures (8:29)
-
Start
86. Other SET Attack (9:11)
Denial Of Service
-
Start
87.Introduction to Denail of Service (13:31)
-
Start
88.Denial of Service Attack Demonstration 1 (10:58)
-
Start
89. Denial of Service Attack Demonstration 2 (9:14)
-
Start
90. Denial of Service Attack Demonstration 3 (6:48)
-
Start
91. Distributed Denial of Service (DDOS) (5:57)
Hacking Web Server
-
Start
92. Hacking web server (15:44)
-
Start
93.Hacking an Apache Server (11:07)
-
Start
94 . Hacking a Windows Server (5:42)
-
Start
95.Practice (1:32)
-
Start
96.Working with Exploit (4:34)
-
Start
97.MetaSploit (7:30)
-
Start
98. Armitage (2:49)
-
Start
99. Armitage in Action (7:48)
-
Start
100.Armitage Example 2 (7:38)
SQL Injection
-
Start
101.SQL Injection Introduction (2:28)
-
Start
102.What is SQL Injection (9:52)
-
Start
103.Setup your web application lab (9:54)
-
Start
104.Is the site infected with SQLI (4:47)
-
Start
105.The amazing SQLMAP (10:27)
-
Start
106.Live Example (7:04)
Important Definition for the Exam
-
Start
107.Risk Assessment (16:31)
-
Start
108.Information Asset Register (4:50)
-
Start
109.Policy and Procedure (4:13)
-
Start
110.Security in Layers (3:17)
Hacking Mobile Platform
-
Start
111.Introduction to Mobile Hacking (2:18)
-
Start
112.Setting up Your Android Platform (3:07)
-
Start
113.Creating a Fake APP-1 (8:05)
-
Start
114.Creating a Fake APP-2 (12:04)
-
Start
115.Android attack using Armitage (4:09)
-
Start
116.Stagefright Attack (9:05)
Buffer Overflow
-
Start
117.1Introduction to Buffer Overflow (13:27)
-
Start
117.How to search for Buffer Overflow (14:09)
-
Start
118. Buffer overflow 1 (48:31)
-
Start
119. Buffer overflow 2 (16:37)
-
Start
120.Buffer Overflow 3 (26:09)
-
Start
121.Another Buffer Overflow Demonstration (6:33)
-
Start
122.Practice (1:51)
Cloud Computing
-
Start
123.Introduction to Cloud Computing (3:03)
-
Start
124.IaaS vs PaaS vs SaaS (2:25)
-
Start
125.SaaS (4:24)
-
Start
126.PaaS (2:04)
-
Start
127.IaaS (1:59)
-
Start
128.Cloud Deployment (0:49)
-
Start
129.Private Cloud (3:03)
-
Start
130.Public Cloud (8:04)
-
Start
131.Hybrid Cloud (1:30)
-
Start
132.NIST SP 800 -145 (1:45)