This plan includes
- Limited free courses access
- Play & Pause Course Videos
- Video Recorded Lectures
- Learn on Mobile/PC/Tablet
- Quizzes and Real Projects
- Lifetime Course Certificate
- Email & Chat Support
What you'll learn?
- Students will be familiar with different phases and approaches involved in conducting ethical hacking and penetration testing
- Students will have an understanding of network protocols, vulnerabilities, and security mechanisms
- Gain knowledge of common web application vulnerabilities like cross-site scripting (XSS), SQL injection, session hijacking, and more
- learn about the security of wireless networks, including vulnerabilities in Wi-Fi networks and techniques for securing them
Course Overview
Pre-requisites
- Knowledge of Basic Computer and Networking
Target Audience
- Open to individuals who are interested in the field of ethical hacking and cybersecurity.
Curriculum 97 Lectures 12:06:49
-
Section 1 : Introduction
- Lecture 2 :
- Types of Hackers and Hacking – An Overview
- Lecture 3 :
- High career growth in Ethical Hacking and Cyber Security
- Lecture 4 :
- Overview of Ethical Hacking Course
-
Section 2 : Best Practice For Information Gathering [ActivePassive]
- Lecture 1 :
- Overview-And-Objective-Of-Information-Gathering
- Lecture 2 :
- Information-Gathering-By-Using-Search-Engine
- Lecture 3 :
- Information-Gathering-By-Using-Social-Sites
- Lecture 4 :
- Information-Gathering-About-Website
- Lecture 5 :
- Gather-Domain-Owners-Personal-Details-Whois
- Lecture 6 :
- Information-Gathering-About-Dns-And-Mail-Server
- Lecture 7 :
- Collecting-Emails-And-Gather-Information-From-Emails
-
Section 3 : Know More About Your Target - Scanning And Enumeration
- Lecture 1 :
- Overview-Of-Network-Scanning
- Lecture 2 :
- Scan-Network-For-Live-Hosts
- Lecture 3 :
- Scan-Hosts-In-Nework-Open-Ports
- Lecture 4 :
- Different-Techniques-Port-Scanning
- Lecture 5 :
- Enumeration Nmap ScriptEngine
- Lecture 6 :
- Detect-Service-Version-Os-Detail
- Lecture 7 :
- Nmap-Scan-Result-Output-Result
-
Section 4 : Google Hacking And Google Hacking Database
- Lecture 1 :
- Overview-Of-Google-Hacking
- Lecture 2 :
- Overview-Of-Google-Operators
- Lecture 3 :
- 3-Overview-Of-Google-Hacking-Database
-
Section 5 : Windows Hacking And Security
- Lecture 1 :
- How to change Windows 10 password
- Lecture 2 :
- Change Windows Password By Backdoor
- Lecture 3 :
- Bypass Windows Login Screen
- Lecture 4 :
- Dump Windows 10 Password Hashes And Crack It
- Lecture 5 :
- Enable Syskey Password To Protect Windows-10
-
Section 6 : Linux Security And Hacking
- Lecture 1 :
- Linux User And Password Management
- Lecture 2 :
- Change Linux User Password In Single User Mode
- Lecture 3 :
- Implement Immutable Attribute And Protect Password Files
- Lecture 4 :
- Protect Grub Bootloader
- Lecture 5 :
- Remove Grub Bootloader Password Protection
- Lecture 6 :
- Dump Linux Hashes
-
Section 7 : Password Cracking Techniques
- Lecture 1 :
- Overview Of Password Cracking And Types
- Lecture 2 :
- Creating Dictionary By Using Crunch
- Lecture 3 :
- Creating Dictionary Using Cwel
- Lecture 4 :
- Cracking Online Services
- Lecture 5 :
- Rule Based Dictionary Attack
- Lecture 6 :
- Zip Password Cracking With Bruteforce Attack
- Lecture 7 :
- Collect Username And Password Using Keylogger
-
Section 8 : Protect Your Data From Hacker's EYE
- Lecture 1 :
- Ntfs Data Stream In Action
- Lecture 2 :
- Detect Alternate Data Stream
- Lecture 3 :
- Overview Of Steganography
- Lecture 4 :
- Steganography In Action Quickstego
- Lecture 5 :
- Steganography In Action Omnihide
- Lecture 6 :
- Overview Of Encryption For Protecting Data
- Lecture 7 :
- Efs In Action And Backup Certificate
- Lecture 8 :
- Circumstances Of Losing Efs Data And Recovery
- Lecture 9 :
- Bitlocker And Bitlocker Go In Action
- Lecture 10 :
- Overview And Installation Of Veracrypt
- Lecture 11 :
- Veracrypt in Action
-
Section 9 : Trojan And Virus
- Lecture 1 :
- Overview Of Trojan
- Lecture 2 :
- Trojan Infection And Evading Techniques
- Lecture 3 :
- Trojan Detection Techniques
- Lecture 4 :
- Cports
- Lecture 5 :
- Driversview
- Lecture 6 :
- Jv-16-Registry
- Lecture 7 :
- Netstat
- Lecture 8 :
- Processmonitor
- Lecture 9 :
- Service Monitor
- Lecture 10 :
- Startup Monitor
- Lecture 11 :
- Tcpviewa
- Lecture 12 :
- Countermeasure From Trojan
-
Section 10 : Honeypot
- Lecture 1 :
- Overview And Types Of Honeypot
- Lecture 2 :
- Honeypot Kfsensor In Action
-
Section 11 : Proxy Server
- Lecture 1 :
- Overview Proxy Server
- Lecture 2 :
- Types Of Proxy Server
- Lecture 3 :
- Configure Proxy In Browsers
- Lecture 4 :
- Bounce Your Ip Like ProHacker Eps
- Lecture 5 :
- Elite Proxy Checker
-
Section 12 : Network Security And Hacking
- Lecture 1 :
- Basic Understanding Network Devices
- Lecture 2 :
- Mac Flooding Attack Against Switch In Network
- Lecture 3 :
- Arp Spoofing Attack In Lan
- Lecture 4 :
- Detect Arpspoofing Attack On Windows
- Lecture 5 :
- Mac Spoofing Attack In Windows And Linux
- Lecture 6 :
- Dhcp Starvation Attack
- Lecture 7 :
- Sniffing-Get-Username-And-Password-From-The-Network
-
Section 13 : Social Engineering
- Lecture 1 :
- Overview Of Social Engineering
- Lecture 2 :
- Types Of Social Engineering
- Lecture 3 :
- Types Of Social Engineering And Human Based Se
- Lecture 4 :
- Computer Based Social Engineering
- Lecture 5 :
- Mobile Based Social Engineering
-
Section 14 : Social Sites Hacking And Protection
- Lecture 1 :
- Reality Behind Hacking Of Social Sites
- Lecture 2 :
- Advance phishing attack Facebook
- Lecture 3 :
- Stealing Saved Password Browser
- Lecture 4 :
- Hijack Of Facebook
-
Section 15 : Metasploit Framework - All In One Hacking Console
- Lecture 1 :
- Getting Started
- Lecture 2 :
- Component Metasploit
- Lecture 3 :
- Authentication Bruteforcing Against Online Services
- Lecture 4 :
- Metasploit Gui Armitage
- Lecture 5 :
- Armitage One More Step
- Lecture 6 :
- Msfvenom Create Trojan For Windows
- Lecture 7 :
- Client Side Attack Linux Trojan
- Lecture 8 :
- Know-about-open-ports-vulnerability-Remote-host
-
Section 16 : Wireless Hacking - WPA WPA2 Encryption
- Lecture 1 :
- Enable WEP WiFi Router
- Lecture 2 :
- Cracking Wirerless Encryption - WEP
- Lecture 3 :
- Enable WPA In Wifi Router
- Lecture 4 :
- Cracking Wifi WPA/ WPA2 Encryption
Our learners work at
Frequently Asked Questions
-
How do i access the course after purchase?
It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time. -
Are these video based online self-learning courses?
Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic. -
Can i play & pause the course as per my convenience?
Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on. -
How do i contact the instructor for any doubts or questions?
Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want. -
Do i need a pc to access the course or can i do it on mobile & tablet as well?
Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly. -
Do i get any certificate for the courses?
Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion. -
For how long can i access my course on the platform?
You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions. -
Is there any free trial?
Currently, we do not offer any free trial. -
Can i cancel anytime?
Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?
Instructor
6323 Course Views
8 Courses