Full Ethical Hacking Course

Go to class
Write Review

Full Ethical Hacking Course provided by Udemy is a comprehensive online course, which lasts for 14 hours worth of material. Full Ethical Hacking Course is taught by Loi Liang Yang. Upon completion of the course, you can receive an e-certificate from Udemy. The course is taught in Englishand is Paid Course. Visit the course page at Udemy for detailed price information.

Overview
  • Learn all about ethical hacking and penetration testing.

    What you'll learn:

    • Ethical hacking and cybersecurity
    • Penetration testing

    Introduction to cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.

    Introduction to cyber-security

    • Cyber-attack chain

    • Reconnaissance

    • Weaponization

    • Delivery

    • Exploitation

    • Installation

    • Command and Control

    • Actions on Objective

    Virtualization on VirtualBox

    • Kali Linux

    • Install, deploy and run Kali Linux

    • Installation and deployment of vulnerable server for testing

    Reconnaissance

    Information gathering

    Assess security vulnerabilities

    Scanning engines

    • Nmap scanning

    Search engine scanners

    Internet scanners

    • Google search engine

    Open source intelligence

    • Recon-ng scanning

    Security standards

    Center for Internet Security (CIS)

    Hardening checks for systems

    Exploitation

    Metasploit framework for ethical hacking

    • Basic commands and usage

    • Module exploration

    • Search for vulnerabilities from scanning results

    • Exploitation of systems

    • Post-exploitation for privilege escalation and scanning

    Security hardening and configuration

    Social engineering

    • Dark Web with Tor

      • Hacking groups and forums

    • Wireless security assessment with WiFi PineApple

      • Wireless vulnerabilities

    • Social Engineering Toolkit (SET) attacks

    • Direct attacks into Windows 10 with Macros and Powershell

    Web, application and database vulnerabilities

    Open Web Application Security Project (OWASP) top 10

    • Injection

    • Broken authentication

    • Sensitive data exposure

    • XML External Entities

    • Broken access control

    • Security misconfiguration

    • Cross-Site Scripting

    • Insecure Deserialization

    • Using components with known vulnerabilities

    • Insufficient logging and monitoring

    Full SQLMAP tutorial for web penetration testing

    BurpSuite tutorial for manual injection on web penetration testing

    Payload testing with custom load

    Creation of payload

    • Payloads package on injection

    • Fully undetected payloads

    • Buffer overflow for shell

    Come join thousands of students who has learned from the top ethical hacking and penetration testing instructor, Loi Liang Yang, now!