Cyber Week

Save big!

All courses under $5 - for a limited time!
watching now
93 Students
103 Lessons
Beginner

What Will You Learn?

  • Exploit the Web for Your Own Personal Needs
  • The Usage of Terminal
  • Creating an Inflicted USB
  • How to Utilize Social Engineering
  • How to Hack Hardware

Curriculum

13h 15m
Section 1: Basic Theory ( Optional )
19:29
Process of Hacking
07:12
Types of Penetration Testing
04:28
Section 2: Setting up the Operating System
09:00
Setup Kali Linux
04:35
VirtualBox Guest Additions
04:25
Section 3: Learn to use the Terminal
58:21
Navigation Commands
13:25
File Operations Part 1
11:27
File Operations Part 2
14:15
Permission and Ownership
19:14
Section 4: Web Hacking Lab
32:59
Setup DVWA on Localhost
05:51
Configure Database and User
13:32
Fixing Issues Part 1
09:26
Fixing Issues Part 2
04:10
Section 5: Pre-Requisite Tool - BurpSuite
17:42
Burp Installation
03:18
Scanner, Intruder and Repeater
05:02
Target, Proxy and Spider
05:25
Wrapping up BurpSuite
03:57
Section 6: Web Hacking on Low Security
1:39:08
CSRF on Low Security
09:15
XSS Reflected on Low Security
04:39
XSS Stored on Low Security
12:09
XSS DOM on Low Security
02:34
Cookie Stealing with XSS
18:10
File Upload on Low
04:28
Creating a Backdoor
11:46
File Inclusion on Low Security
05:09
Command Injection on Low Security
05:41
Brute Forcing on Low Security
08:10
SQL Injection on Low and Medium
17:07
Section 7: Web Hacking on Medium Security
28:11
CSRF on Medium Security
08:06
XSS Reflected on Medium Security
01:56
XSS Stored on Medium Security
05:28
XSS DOM on Medium Security
02:20
File Upload on Medium Security
05:00
Command Injection on Medium Secirity
05:21
Section 8: Get Deep in Web Hacking
44:29
File Upload on High Security
07:59
Introduction to Weevely
08:07
XSS Reflected on High Security
05:05
XSS Stored on High Security
04:55
SQL Injection Manual Method
14:15
SQL Injection Hash Decoding
04:08
Section 9: Anonymity and Deception
1:43:07
Change your Mac Address
12:43
Introduction to AirVPN
07:13
Watch for DNS Leaks
04:30
FAKE ID (LIVE DEMO)
02:55
Using a Virtual Private Network
05:55
VPN to TOR Circuit
02:34
TOR to VPN Circuit
06:51
Using TOR ( The Onion Browsing )
10:17
Temporary Email Can Help!
02:39
Random Identity
04:08
Changing IP using Proxy
05:19
Port Forwarding over VPN
08:33
How to Spoof your Phone Call
09:34
How to create a FAKE ID
14:46
Making Temporary Debit Cards
05:10
Section 10: Human is the Weakest link
41:37
Open Source Intelligence Data Gethering on People
17:04
SE Techniques 1
02:57
SE Techniques 2
04:39
SE Techniques 3
04:17
SE Techniques 4
05:59
SE Techniques 5
06:41
Section 11: HID Bad Usb Attack
1:16:27
Getting Arudino
16:15
Arduino Basic Setup
08:05
Writing Ducky Scripts
16:23
Meterpreter Shell Through HID
17:53
Meterpreter Shell Demo
06:23
DigiSpark - A Compact Alternative
07:52
DigiSpark Continued
03:36
Section 12: GoPhish Framework - The Most Advance Phishing Tool
1:32:24
Getting GoPhish
03:04
Starting GoPhish
02:43
GoPhish on a Server
13:33
Domain Name on GoPhish Server
09:28
SSL on GoPhish Server
09:14
SSL on GoPhish Server Continued
15:18
GoPhish Sending Profile
11:05
Launching out the Campaign
08:12
Sending E-Mails
08:05
Opening the Spoofed E-Mail
09:03
Analysing the Submitted Data
02:39
Section 13: Information Gathering
1:00:52
Downloading the Source Code of the Website
05:27
Using Components with Known Vulnerabilities
05:38
Enemurating Subdomains
10:24
Looking for Some Archived Page for Information Gathering
05:16
Google Dorks live demo
05:33
Enemurating Directories
04:26
Information Gathering Using WhatWeb
03:31
Information Gathering Using TheHarvester
06:04
Different Type of Nmap Scan Theory
05:50
Different Type of Nmap Scan Demo
04:38
Banner Grabbing Using Nmap
04:05
Section 14: Attack Like a Pro using MetaSploit
46:14
Setting Up the Database
04:29
Overview to Meterpreter
12:02
MetaSploit - MultiHandler
09:49
MetaSploit - MSFVenom
06:55
Metasploit - Encoders
12:59
Section 15: The Venom
40:00
Introduction to venom
10:34
Setup Venom on your System
14:35
Venom Android Payload
07:02
Venom Windows Payload
07:49
Section 16: Reporting to Clients
25:03
Reporting Part 1
09:31
Reporting Part 2
01:52
Reporting Part 3
08:39
Reporting Part 4
05:01

Description

Requirements

  • The very Fundamental Basics of Terminal
  • Hardware Knowledge is Advised

About the Instructor

Reviews 93
Students 15,745
Massive audience
Courses 4

Sagar Bansal is the best selling InfoSec author and India’s first accountable security mentor. He is also India's No. 1 security management YouTuber. On his channel, he is teaching people InfoSec and Ethical Hacking.

Sagar has lots of proofs of his experience and expertise, including CISSP, OSCP, LPT, CISA, CISM, and other certificates. He is experienced at working with multiple government projects including highly complex and confidential things.

Moreover, Sagar Bansal was recognized as a top 100 Cyber Geek when he was only 18, and later – as a top 200 Information Security Researcher. People say that he is one of the top experts and his courses on Ethical Hacking are among the best on the Planet.

On BitDegree, you have an opportunity to be guided by this amazing instructor to learn ethical hacking and Python. Sagar Bansal will teach you how to become an ethical hacker, how to set up a server from scratch and all the basics of Python programming language. So, choose the best course for yourself and start expanding your skills today.

BitDegree platform reviews

Our students say Excellent
9.5 out of 10
trustpilot logo 1 trustpilot logo