Ace quick missions & earn crypto rewards while gaining real-world Web3 skills. JOIN NOW! 🔥
watching now
5 Students

Description

What Will You Learn?

  • Fundamentals of cyber security and ethical hacking
  • How to hack systems, web servers, web applications, wireless networks, etc.
  • Prepare for the Certified Ethical Hacking Exam Version 10

Requirements

  • No prior knowledge is needed
  • NFT Certificate
  • 172 Lessons
  • Beginner
  • English
  • 2.5 Rating
  • +100 XP

Share Course on Social media

Curriculum

Course consist of total 52h 52min of content, in total.

Section 3: Scanning networks!
1:04:12
Network scanning theory: Fundamentals for ethical hackers preparing for CEH version 10 exam!
31:55
Network scanning commands in Kali Linux for Certified Ethical Hacking Exam Preparation!
10:34
Port forwarding and host visibility in networks with Kali Linux.
11:37
Network scanning using Nmap, Netdiscover and Bettercap
10:06
Section 4: Enumeration
1:17:30
Enumeration fundamentals for Ethical Hackers preparing for CEH exam!
19:33
Basics of enumeration using Kali Linux
15:03
Advanced enumeration using Nmap and Kali Linux
14:47
Enumeration with wpscan and Kali Linux
18:33
Enumeration implementation
09:34
Section 5: Vulnerability analysis
1:31:18
Vulnerability analysis fundamentals and theory
29:09
Vulnerability analysis demonstration including how to check manually
17:54
Basic Nessus installation on Windows 7
10:07
Basics of Nessus and automated vulnerability scans
23:14
Nessus installation on Kali Linux
10:54
Section 6: System hacking
2:34:44
Fundamentals of system hacking and remote shells
30:35
Basic Linux commands and fundamentals of file structure
18:45
Fundamentals of processes and nano
12:50
Basics of VIM
11:41
Linux processes and permissions
17:29
Armitage basics with Kali Linux
07:21
Metasploit basics with Kali Linux
13:54
Attacking Windows 7 with Eternalblue and Kali Linux
13:15
Attacking Windows 7 with msfvenom and Kali Linux
17:08
Command prompt powershell and permission basics in Windows
11:46
Section 7: Malware threats
1:06:19
Malware fundamentals
15:45
C fundamentals of hacking programming and files using Kali Linux
29:31
Basics of Python coding for networking and hacking with Kali Linux
11:45
Generating payloads with TheFatRat and Kali Linux
09:18
Section 8: Sniffing
59:13
Fundamentals of sniffing and sniffing tools
18:03
Netsniff - ng - Ettercap - Wireshark
10:42
TcpDump
13:40
WireShark
16:48
Section 9: Social engineering
1:10:56
Social engineering fundamentals
19:45
Social engineering Facebook attack using setoolkit and Kali Linux
13:37
Social engineering attacks using BEEF and Kali Linux
15:15
SET SpearFish
13:55
SET Payload
08:24
Section 10: Denial of Service
1:25:34
Denial of Service fundamentals
18:13
Basics of DoS with Kali Linux
07:49
DoS trough tor network with Kali Linux
08:50
How to connect Kali Linux in tor network
18:00
How to create a script which connects you to tor network with bash and Kali Linux
25:51
DoS with LOIC and Kali Linux
06:51
Section 11: Session hijacking
1:00:11
Session hijacking fundamentals
19:37
Becoming man in the middle with Kali Linux
11:16
Sniffing with Bettercap and Kali Linux
11:29
Basics of Burp with Kali Linux
09:38
Session hijacking with Kali Linux
08:11
Section 12: Evading IDS, firewalls, and honeypots
2:53:40
Evading fundamentals
33:47
Installing snort IDS on Windows 7
23:56
How to create snort rules on Windows 7
29:50
Snort on Linux
40:12
Setting up vulnerable Windows 7 honeypot
12:32
Honeypots
21:48
Evading firewalls with Nmap and Kali Linux
11:35
Section 13: Hacking web servers
2:29:42
Hacking web servers fundamentals
32:16
Installing Python 3 on Windows 7 and setting up simple Python HTTP server
13:23
Installing XAMPP on Windows 7
13:33
Installing Apache and working with simple web server on Kali Linux
11:09
Working with web servers on Kali Linux
08:05
Installing and playing around with Bee-Box and Kali Linux
15:39
Working with Bee-Box on Kali Linux
22:42
Hacking web servers with Kali Linux
18:47
ShellShock
14:08
Section 14: Hacking web applications
5:20:48
Web application hacking fundamentals
40:36
HTML injection with Kali Linux
18:04
Basics of burp and requests with Kali Linux
14:39
Iframe injection with Kali Linux
09:20
Remote commands injection with Kali Linux
13:35
PHP arbitrary code injection with Kali Linux
07:34
Broken authentication
11:46
HeatBleed
17:15
XSS - intro
21:10
XSS - Stored - GET
10:51
XSS - Reflected - POST
09:12
XSS - Reflected - GET
09:17
XSS - Json
10:13
XSS - Ajax - Json
10:02
Exploiting unencrypted communication with Bettercap
08:16
Fundamentals of robots.txt file
14:34
Arbitrary files upload
22:48
Cross Site Request Forgery
08:49
CSRF transfer hacking
09:00
PHPinfo fundamentals
09:22
Directory traversal with Kali Linux
19:16
Fuzzing with OWASP Zap
08:42
Cookie encoding fundamentals
16:27
Section 15: SQL injection
1:46:25
SQL injection fundamentals part 1
22:36
SQL injection fundamentals part 2
21:51
SQL injection with Kali Linux
22:00
Post SQL injection with Kali Linux
09:28
Login SQL injection with Kali Linux
06:02
SQLite injection with Kali Linux
13:52
SQL injection in user agent
10:36
Section 16: Hacking wireless networks
5:55:48
Wireless network theory
36:06
Hacking wireless networks theory
33:45
Wifi hacking tools theory
35:20
Encryption and cryptography theory
23:29
Wardriving theory
15:09
Wardriving examples
08:06
WiFiPhisher
20:19
Aircrack suite
17:47
WireShark
15:53
Hacking with wifiphisher - part 1
20:06
Hacking with wifiphisher (part2) and wifipumpkin
23:14
Fake AP attacks with airgeddon and Kali Linux
43:35
Hacking wireless WPA networks with aircrack-ng package
26:01
Hacking wireless networks with fluxion and Kali Linux
36:58
Section 17: Hacking mobile platforms
5:03:06
Mobile devices theory
37:16
Mobile hacking theory
23:30
Android hacking tools
40:11
Hacking mobile devices engagement
06:06
IOS security controls theory
30:34
Android security controls theory
22:07
How to protect your Android smartphone
17:32
How to install Android emulator
17:49
Android emulators
14:32
How to install Android as a virtual machine
24:15
Hacking Android devices with Metasploit
37:27
Metasploit Android
14:37
Becoming persistent in Android system
17:10
Section 18: IoT hacking
3:36:53
IoT 1
14:57
IoT 2
18:59
IoT hacking tools
34:59
Hacking IoT - part 2
30:22
IoT scenario - part 1
23:18
IoT scenario - part 2
24:48
Smart devices
32:34
AWS basics
36:56
Section 19: Cloud computing
5:59:53
Cloud computing theory - part 1
25:02
Cloud computing theory - part 2
17:05
Cloud vulnerabilities theory
28:28
Cloud security controls
22:08
Data centers
31:34
Cloud solutions
36:56
Using Google Drive plus tips and tricks
27:37
Using Drive for hacking
18:56
Azure basics
36:31
Hacking into data center stories
17:08
Software as a Service
24:06
Infrastructure as a Service
11:02
Platform as a Service
13:15
Remote code execution vulnerability
38:38
Real life hacking example
11:27
Section 20: Cryptography
6:25:11
Cryptographic theory - part 1
23:06
Cryptographic theory - part 2
28:09
Asymmetric encryption
22:00
Symmetric encryption
17:09
Secure Socket Layer (SSL)
17:56
Pretty Good Privacy (PGP)
10:24
Advanced Encryption Standard (AES)
10:32
Wifi security - WPA2
08:43
Wifi security - WPA3
12:14
Vulnerabilities - TLS1.3
10:37
Hashing algorythms
32:30
Breaking the hash
08:47
Hashing analysis and basic encryption
10:25
Creating password dictionary
14:18
Networking and encrypting with Python
27:43
File encryptor with C
28:19
Brute forcing SSH service using Hydra
10:59
Linux MAC passwords - theory
10:48
Linux MAC password - practical
09:31
How Windows manages passwords
14:28
Windows passwords management
07:25
Cracking passwords theory
19:07
Cracking offline passwords with John
09:58
Digital certificates
20:03

About the Instructor

90.4% of students rated this instructor as excellent!

See All Instructor Courses

BitDegree platform reviews