English | Size: 8.62 GB
Genre: eLearning
What you’ll learn
Ethical hacking and cybersecurity
Penetration testing
Introduction to cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.
Introduction to cyber-security
Cyber-attack chain
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control
Actions on Objective
Virtualization on VirtualBox
Kali Linux
Install, deploy and run Kali Linux
Installation and deployment of vulnerable server for testing
Reconnaissance
Information gathering
Assess security vulnerabilities
Scanning engines
Nmap scanning
Search engine scanners
Internet scanners
Google search engine
Open source intelligence
Recon-ng scanning
Security standards
Center for Internet Security (CIS)
Hardening checks for systems
Exploitation
Metasploit framework for ethical hacking
Basic commands and usage
Module exploration
Search for vulnerabilities from scanning results
Exploitation of systems
Post-exploitation for privilege escalation and scanning
Security hardening and configuration
Social engineering
Dark Web with Tor
Hacking groups and forums
Wireless security assessment with WiFi PineApple
Wireless vulnerabilities
Social Engineering Toolkit (SET) attacks
Direct attacks into Windows 10 with Macros and Powershell
Web, application and database vulnerabilities
Open Web Application Security Project (OWASP) top 10
Injection
Broken authentication
Sensitive data exposure
XML External Entities
Broken access control
Security misconfiguration
Cross-Site Scripting
Insecure Deserialization
Using components with known vulnerabilities
Insufficient logging and monitoring
Full SQLMAP tutorial for web penetration testing
BurpSuite tutorial for manual injection on web penetration testing
Payload testing with custom load
Creation of payload
Payloads package on injection
Fully undetected payloads
Buffer overflow for shell
Who this course is for:
Beginners to pros interested in learning ethical hacking
nitroflare.com/view/0452037C90156BD/Full-Ethical-Hacking-Course.2.2.part01.rar
nitroflare.com/view/9F9F6D9F1547817/Full-Ethical-Hacking-Course.2.2.part02.rar
nitroflare.com/view/FD3F6FFC2BA0EB9/Full-Ethical-Hacking-Course.2.2.part03.rar
nitroflare.com/view/14799C3259A16DC/Full-Ethical-Hacking-Course.2.2.part04.rar
nitroflare.com/view/621D3A264C4FFF1/Full-Ethical-Hacking-Course.2.2.part05.rar
nitroflare.com/view/2FC680B8B859828/Full-Ethical-Hacking-Course.2.2.part06.rar
nitroflare.com/view/9B995B0DDB4ED5E/Full-Ethical-Hacking-Course.2.2.part07.rar
nitroflare.com/view/B2D876BCC6BB919/Full-Ethical-Hacking-Course.2.2.part08.rar
nitroflare.com/view/638DC3EC87611E3/Full-Ethical-Hacking-Course.2.2.part09.rar
rapidgator.net/file/033939e641eeefe2919d4159119eeab4/Full-Ethical-Hacking-Course.2.2.part01.rar.html
rapidgator.net/file/f02d3d941ae5f17daa8bcc9a396a1f4b/Full-Ethical-Hacking-Course.2.2.part02.rar.html
rapidgator.net/file/aaf28d44efd2caa2af32ad2bfac645c5/Full-Ethical-Hacking-Course.2.2.part03.rar.html
rapidgator.net/file/adcbc39c3b27dbaae96356d81140699c/Full-Ethical-Hacking-Course.2.2.part04.rar.html
rapidgator.net/file/67dd206f28e9e25c64df43fc5375ac28/Full-Ethical-Hacking-Course.2.2.part05.rar.html
rapidgator.net/file/95b9c9dfa900a400e23f7e17899f11ac/Full-Ethical-Hacking-Course.2.2.part06.rar.html
rapidgator.net/file/257438f5ce8b14427e977a14eddfbdae/Full-Ethical-Hacking-Course.2.2.part07.rar.html
rapidgator.net/file/a9ddac3f9d8a9c7106daf00dcc4cc483/Full-Ethical-Hacking-Course.2.2.part08.rar.html
rapidgator.net/file/9c45c11c3404ca195de7f1341c0ccf8c/Full-Ethical-Hacking-Course.2.2.part09.rar.html
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9