Welcome to this comprehensive Ethical Hacking course! This course assumes you have NO prior knowledge and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts! You'll learn everything by example, by analyzing and exploiting different systems such as networks, servers, clients, websites .....etc.
The course is divided into a number of sections, each section covers a penetration testing & hacking field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit these weaknesses to hack this system. By the end of the course you will have a strong foundation in most hacking or penetration testing fields and you'll also learn how to detect, prevent and secure systems and yourself from the discussed attacks.
Part 1:
1.1 Downloading & installing VMWare (or Virtual Box) Software.
1.2 Enabling Virtualization Technology (VTx) in Computer or Laptop.
1.3 Installing Kali Linux on VMWare.
1.4 Setting up Repository & User in Kali Linux.
2nd Part: CEH v11 | 20 Modules
Module 01 Introduction to Ethical Hacking
Module 02 Foot-printing and Reconnaissance
Module 03 Scanning Networks
Module 04 Enumeration
Module 05 Vulnerability Analysis
Module 06 System Hacking
Module 07 Malware Threats
Module 08 Sniffing
Module 09 Social Engineering
Module 10 Denial-of-Service (DOS & DDOS)
Module 11 Session Hijacking
Module 12 Evading IDS, Firewalls, and Honeypots
Module 13 Hacking Web Servers
Module 14 Hacking Web Applications
Module 15 SQL Injection
Module 16 Hacking Wireless Networks (Wi-Fi)
Module 17 Hacking Mobile Platforms
Module 18 IoT Hacking
Module 19 Cloud Computing
Module 20 Cryptography
3rd Part:- 3.1 How to Continue Your Research in Hacking
Who this course is for?
- Ethical Hacker beginners
- Penetration testers
- Having person interest in hacking
- Computer science students
- Cyber Security students
- Information Security students