Get $1 credit for every $25 spent!

Ethical Hacking A to Z Bundle

Ending In:
Add to Cart - $39
Add to Cart ($39)
$1,273
96% off
wishlist
(631)
Courses
8
Lessons
384
Enrolled
6,305

What's Included

Product Details

Access
Lifetime
Content
19.5 hours
Lessons
98

Ethical Hacker Bootcamp for 2017

Break Into a Career As An Ethical Hacker

By Joseph Delgadillo | in Online Courses

Ethical hackers are in huge demand in the wake of highly publicized hacks and data breaches in both the private and public sectors. This bootcamp was designed for aspiring information security professionals who wish to take an immersive look at this in-demand career and ultimately become a professional pentester. You'll examine not just the theories and tools a professional hacker would use when conducting a penetration test, but also gain an insight into the day to day workflow of an ethical hacker.

  • Access 98 lectures & 19.5 hours of content 24/7
  • Learn how to think like a hacker
  • Explore passive & active reconnaissance, scanning & enumeration, network mapping, & more
  • Understand hacking for Windows & Linux
  • Dive into social engineering basics
  • Watch live hacking demonstrations w/ tools like Maltego, FOCA, Harvester, Recon-ng, Nmap, masscan, & many more
  • Receive a blueprint for conducting your own penetration test
Joseph Delgadillo teaches skills ranging from computers & technology, to entrepreneurship & digital marketing. He is a proud alumnus of Central Washington University.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Introduction to Ethical Hacking
    • What is an ethical hacker? (7:22)
    • Terminology crash course pt.1 (9:24)
    • Terminology crash course pt.2 (13:29)
    • Terminology crash course pt.3 (8:25)
    • Confidentiality, integrity, and availability (13:18)
    • Legal considerations (11:29)
    • Section 1 Powerpoint
  • Reconnaissance: Surveying the Attack Surface
    • Surveying the attack surface (10:24)
    • Recon types (7:44)
    • Passive recon pt.1 (7:21)
    • Passive recon pt.2 (10:02)
    • Active recon (15:01)
    • Recon walk-through and tools summary (14:08)
    • Section 2 Powerpoint
    • DEMO - Maltego real world example (7:04)
    • DEMO - FOCA to examine metadata (4:57)
    • DEMO - Harvester (2:02)
    • DEMO - Information collection using Recon-ng (6:24)
  • Scanning and Enumeration: Getting Down to Business
    • Scanning & enumeration (8:10)
    • Identifying active hosts pt.1 (9:45)
    • Identifying active hosts pt.2 (13:17)
    • Identifying active services (18:23)
    • OS and services fingerprinting (14:41)
    • Network mapping (9:46)
    • Final thoughts (11:04)
    • Section 3 Powerpoint
    • DEMO - Nmap syntax pt.1 (14:21)
    • DEMO - Nmap syntax pt.2 (15:32)
    • DEMO - Nmap hosts discovery (12:19)
    • DEMO - Nmap service discovery (17:10)
    • DEMO - Nmap scripts (11:17)
    • DEMO - masscan (10:57)
  • Network Presence
    • Network insecurity (4:01)
    • Sniffing and spoofing (12:45)
    • Sniffing tools (8:57)
    • Spoofing, crypto, and wifi (15:00)
    • Section 4 Powerpoint
    • DEMO - tcpdump (10:53)
    • DEMO - Wireshark (11:24)
    • DEMO - Ettercap (12:55)
    • DEMO - SSL Burp Suite (15:12)
    • DEMO - Scapy (10:15)
  • Attacking
    • Security overview windows architecture (17:51)
    • Security overview credentials security (15:32)
    • Security overview memory corruption and exploitation (15:31)
    • Windows hacking basics (20:08)
    • Local access and privilege escalation (20:13)
    • Dumping hashes and cracking passwords (18:12)
    • Linux attacking basics pt.1 (12:44)
    • Linux attacking basics pt.2 (13:50)
    • References (5:25)
    • Section 5 Powerpoint
    • DEMO - Windows msf exploit pt.1 (13:05)
    • DEMO - Windows msf exploit pt.2 (15:20)
    • DEMO - Post exploitation (13:13)
    • DEMO - Mimikatz (7:09)
    • DEMO - Dumping hashes (3:23)
    • DEMO - Hashcat (8:21)
    • DEMO - Konboot (12:57)
    • DEMO - Post exploitation Windows cmd (14:08)
    • DEMO - Post exploitation Windows powershell (13:09)
    • DEMO - Online password cracking pt.1 (14:51)
    • DEMO - Online password cracking pt.2 (12:02)
    • DEMO - Attacking Linux targets pt.1 (10:07)
    • DEMO - Attacking Linux targets pt.2 (12:35)
  • Web Hacking
    • Introduction to web hacking (2:47)
    • Web security architecture overview pt.1 (16:40)
    • Web security architecture overview pt.2 (12:20)
    • Attacking the web server pt.1 (10:28)
    • Attacking the web server pt.2 (10:59)
    • Attacking the platform pt.1 (18:33)
    • Attacking the platform pt.2 (8:13)
    • Attacking the technology pt.1 (21:00)
    • Attacking the technology pt.2 (17:20)
    • OWASP top 10 pt.1 (9:21)
    • OWASP top 10 pt.2 (21:12)
    • Attacking the business logic pt.1 (10:37)
    • Attacking the business logic pt.2 (15:07)
    • Tools and methodology (20:15)
    • References (7:41)
    • Section 6 Powerpoint
    • DEMO - OWASP Mutillidae (8:50)
    • DEMO - SQL injection (7:04)
    • DEMO - SQLMAP intro (8:21)
    • DEMO - SQLMAP practice (25:04)
    • DEMO - Burpsuite (37:03)
    • DEMO - Burpsuite xsshunter (16:12)
    • DEMO - mitmproxy (10:27)
    • DEMO - Skipfish pt.1 (4:30)
    • DEMO - Skipfish pt.2 (4:29)
  • Social Engineering: Hacking Humans
    • Social engineering basics (14:41)
    • Social engineering methods (15:44)
    • Tools and techniques pt.1 (14:35)
    • Tools and techniques pt.2 (11:49)
    • Tools and techniques pt.3 (9:04)
    • Physical security considerations (12:53)
    • Final thoughts (5:15)
    • Section 7 Powerpoint
    • DEMO - Social engineering intro (10:43)
    • DEMO - Social engineering toolkit prep (9:01)
    • DEMO - Credential harvesting (2:06)
    • DEMO - Website cloning (6:19)
    • DEMO - Automating an attack (2:59)
    • DEMO - Antivirus evasion pt.1 (8:17)
    • DEMO - Antivirus evasion pt.2 (11:43)

View Full Curriculum


Access
Lifetime
Content
7 hours
Lessons
92

A to Z Ethical Hacking Course

Learn Ethical Hacking, From Basics to Advanced Skills

By Amit Huddar | in Online Courses

From basics to advanced techniques, this course leaves no stone unturned as you explore the complex world of ethical hacking. Security professionals are in greater demand than ever, and this course will give you hands-on practice in a variety of techniques. By course's end, you'll be ready to score high-paying ethical hacking jobs.

  • Access 92 lectures & 7 hours of content 24/7
  • Learn how to make money as an ethical hacker
  • Explore bug bounty programs, viruses, & worms
  • Cover SQL injections, phishing, cross site scripting, & email hacking
  • Understand tools like Metasploit, Keylogger, Wire Shark, & more
Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company "Softdust," which develops products for new technologies like wearables and other gadgets. He opted for computer science engineering in 2013 at SSIT and started his software company in his first year of engineering.

His skills include: Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, Building Custom Linux OS, Cloud Computing. Penetration testing, Kali Linux and Hacking.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Basics
    • Disclaimer (0:54)
    • Introduction (2:50)
    • Hacker vs Cracker (2:44)
    • Types of Hacker (5:15)
    • Steps Performed by Hackers (3:23)
    • Working of an Ethical Hacker (4:14)
    • Information Gathering (3:08)
    • Introduction to Linux (5:22)
    • Pen Testing (4:46)
    • How an Ethical Earns (7:07)
    • Brief Introduction of Bug Bounty (5:53)
    • Learn Bug Bounty (4:57)
    • Installing Kali Linux (3:00)
    • Dual boot Kali Linux with Windows (5:45)
    • Live Boot of Kali Linux (2:44)
    • Setting up Kali Linux in virtual box (8:57)
    • Introduction to Virus, Trojan, Worm etc (4:56)
    • Trojans Brief (3:44)
    • Tips to Maintain a Virus free PC (6:36)
    • Virus to different OS (7:05)
    • How to create harmless virus (3:42)
    • IP address (4:36)
    • Changing IP address in windows (4:06)
    • Changing IP From the Command Line in Linux (1:53)
    • Web Proxy (3:57)
    • VPN (3:45)
    • Web Development 1 (1:32)
    • Web Development 2 (3:11)
    • Web Development 3 (4:31)
    • Web Development 4 (3:04)
    • Web Development 5 (6:58)
    • Web Development 6 (4:40)
    • Web Development 7 (5:17)
    • Introduction to Web Server (3:25)
    • DVWA 1 (3:58)
    • DVWA 2 (5:50)
    • Installing DVWA on Windows (5:11)
    • Programming (5:26)
    • C Programming (8:08)
    • C++ Program (6:51)
    • Java Program (6:38)
    • Python (5:56)
  • Web Hacking
    • Login Process and SQL Injections (1:57)
    • SQL Injection Introduction (5:01)
    • SQL Injection finding Web Sites (4:38)
    • SQL Injection using Kali Linux (6:25)
    • SQL Injection using Havij (6:25)
    • SQL in DVWA (7:50)
    • Cross site scripting [XXS] 1 (4:50)
    • Cross site scripting [XXS] 2 (5:18)
    • Cross site scripting [XXS] 3
    • XXS in DVWA (5:43)
    • Phishing Introduction (2:08)
    • Phishing Page Development Introduction (1:54)
    • Creating Phishing Page using Kali Linux (3:30)
    • Developing Phishing Site (2:54)
    • Phishing- Facebook Hacking AdWords (1:54)
  • Miscellaneous
    • Encryption (4:25)
    • Keylogger (2:36)
    • Demonstration Free Keylogger (9:23)
    • Top Keyloggers (11:14)
    • Email Hacking (6:00)
    • Email Tracing (2:11)
    • Check Gmail Account is Hacked or not (2:03)
    • Windows Hacking and Security (5:49)
    • Windows Password Cracking (6:03)
  • Wireless Hacking
    • Wireless Hacking (4:46)
    • Wireless Hacking continue (2:20)
    • before WEP (2:52)
    • Wep Kali 2.0 (5:37)
    • MAC Address (5:33)
    • MAC Address filtering (2:01)
    • Changing MAC Address on Windows, Linux and Mac (2:51)
    • wifi hacking using reaver (4:18)
    • Reaver in Depth (8:12)
    • Sniffers Introduction (2:57)
    • Wireshark (4:38)
    • wireshark to Capture Filter and Inspect Packets (6:08)
    • Meta Sploit (7:11)
    • Meta Sploit 2 (6:45)
    • Meta Sploit 3 (4:48)
    • Robots (2:12)
    • Guessing (4:51)
    • Recover Deleted Files (6:37)
    • Team Viewer (10:25)
    • DOS Attack Introducton (5:02)
    • DOC attack tools (1:46)
    • DOC Counter Measure (1:22)
    • Social Engineering Introduction (3:48)
    • Prevention From Hackers (4:10)
    • Top Hackers (7:13)

View Full Curriculum


Access
Lifetime
Content
2 hours
Lessons
18

Learn Burp Suite for Advanced Web Penetration Testing

Perform Hands-On Security Testing to Master Burp Suite

By IT University | in Online Courses

Burp Suite is a Java based software platform of tools for performing security testing. In this hands-on course, you'll learn about different types of web attacks by targeting a test environment based on OWASP Web Goat, a deliberately vulnerable web app used to practice security techniques.

  • Access 18 lectures & 2 hours of content 24/7
  • Learn the most important features of the Burp Suite
  • Use hands-on exercises to gain practical experience
  • Perform efficient manual web penetration testing
  • Discover how to use Burp to automate certain attacks
Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Introduction and Setup
    • About Myself (0:47)
    • What is Burp. Course Expectations (1:55)
    • Download Respurces and Setup Environment (4:35)
    • Alternative Setup - Download Burp. Free vs Paid (1:26)
    • Environment Setup. Import Burp Certificate (10:19)
  • Burp Modules and Usage
    • General Concept (4:23)
    • Target Module (10:21)
    • Proxy Module - Part 1 (11:48)
    • Proxy Module - Part 2 (10:06)
    • Spider Module (6:34)
    • Repeater Module (9:17)
    • Sequencer and Scanner Modules (12:10)
    • Decoder Module (9:09)
    • Intruder and Comparer Modules (14:20)
    • BApp Store (13:26)
  • Final Words
    • Burp Proxy Help - Further Documentation (1:47)
    • Burp Alternatives (1:47)
    • Final Words (0:14)

View Full Curriculum


Access
Lifetime
Content
1 hours
Lessons
26

Complete Ethical Hacking / Penetration Testing Course

Discover the Art of Penetration Testing & Ethical Hacking

By Learn Pentest | in Online Courses

Starting from square one, this course will take you through a complete, simulated penetration testing process. Traversing through five stages (Information Gathering, Enumeration, Vulnerability Scanning, Exploitation, and Post Exploitation) you'll gain a comprehensive understanding of penetration testing and understand how to do it on your own.

  • Access 26 lectures & 1 hour of content 24/7
  • Learn how to collect as much information as possible about a threat
  • Enumerate smartly & efficiently
  • Find vulnerabilities & security issues using automated scanning tools or manually
  • Exploit vulnerabilities in applications or services
  • Check if a machine is related to other machines on the network or if it is part of more networks
LearnPentest is a group of penetration testers and ethical hackers with an extensive background in web application security, web and software development, network administration and exploit development. They have over 7 years of professional experience in the cyber security domain. Their instructors hold some of the most valuable certifications in the cyber security domain including: OSCP, LPT, C|EH, CISSP, OSCE.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Introduction
    • Introduction (0:56)
    • Preparing Kali Linux as Virtual Machine (VMware) (2:53)
  • Kali Linux Basics
    • Tools, Services and Files (2:33)
  • Information Gathering and Enumeration
    • Passive Information Gathering - Subdomains (1:00)
    • Passive Information Gathering - Emails (1:25)
    • Active Information Gathering - Basic Network Scan (1:47)
    • Active Information Gathering - OS Detection (1:23)
    • Active Information Gathering - Service Enumeration (1:38)
    • Active Information Gathering - Dirbuster (2:50)
    • Active Information Gathering - Netcat Banner Grabbing (1:18)
    • Active Information Gathering - Subdomains (1:01)
  • Vulnerability Scanning
    • Checking Vulnerabilities using NSE Scripts (1:18)
    • Wordpress Website (2:20)
    • Joomla Website (1:31)
    • Web Servers (1:02)
  • Exploitation
    • Windows Metasploit Backdoors (3:36)
    • Metasploit Exploits (1:53)
    • SQL Injection (2:59)
    • Local File Inclusion (2:18)
    • Remote File Inclusion (2:55)
    • Command Injection (1:32)
  • Tunneling
    • Metaspoit Route Pivoting (3:20)
  • Post Exploitation
    • Metasploit Modules (2:46)
    • User Account Control (1:39)
  • Privilege Escalation
    • Windows Exploit (2:40)
    • Linux Exploit (1:59)

View Full Curriculum


Access
Lifetime
Content
1 hours
Lessons
7

Intro to Ethical Hacking

Study Ethical Hacking Essentials to Get a Head Start On a New Career

By Web of Security | in Online Courses

This quick and dirty course will give you an introduction to ethical hacking and how to succeed in the cutthroat IT industry. It's a lucrative career path, so it's absolutely imperative to have a comprehensive knowledge of all things security hacking, which you'll dive into headlong here. The demand for security professionals is hitting an all-time high, and this course will help you jump in on the action.

  • Access 7 lectures & 1 hour of content 24/7
  • Learn the basics of ethical hacking
  • Explore hacking techniques through hands-on examples
Chad Russell has been in the CyberSecurity industry for over 15 years. He has taught Microsoft Engineering courses as a Certified trainer, he's managed teams of security engineers and analysts for an internet banking provider, and has been an information security consultant working for companies including SAP, Microsoft and Oracle.

He leads and conducts 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.

Over the past 15 years Chad has held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and has a B.S. in Computer Science from Excelsior College.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Intro to Ethical Hacking
    • Ethical Hacking - Vulnerability Assessment and Penetration Testing (9:25)
    • Footprinting with Maltego (5:24)
    • Cyber Attacks (4:11)
    • Vulnerability Scanning Websites using Zed Attack Proxy (4:30)
    • Wireless Hacking (8:28)
    • Incident Response (3:06)
    • Network Sniffing Tools - Wireshark (6:12)

View Full Curriculum


Access
Lifetime
Content
5 hours
Lessons
51

Real World Hacking & Penetration Testing

Learn the Most Up to Date Pentesting Tools & Techniques

By Atul Tiwari | in Online Courses

Regardless of your pentesting experience, this immersive course will get you caught up on all the most up to date ethical hacking techniques and tools. From computer and network attacks to web application penetration testing and automated attacks, you'll get a complete understanding of what pentesters do and how they do it.

  • Access 51 lectures & 5 hours of content 24/7
  • Explore attacks on computers, networks, & web apps
  • Learn about firewall, AV evasion, & veil-evasion
  • Discover DARKNET & wireless attacks
  • Understand social engineering attacks & the best commercial pentesting tools
Atul Tiwari has more than 7 years of working experience in the information security field. He has trained more than 3,000 students in information security and penetration testing. With his expertise in web application penetration testing, Atul has performed penetration tests, security audits, and security analysis for private enterprise, governments, and security agencies to assist with cyber threats.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Introduction to course
    • Introduction Pentesters (4:02)
  • Building your penetration testing box (LAB)
    • Setting-up OWASPbwa virtual machine (3:17)
    • Setting-up KALI Linux virtual machine (4:27)
    • Setting-up metasploitable VM (2:02)
    • Setting-up windows VM (1:40)
  • Penetration testing methodologies
    • Penetration Testing methodologies OSSTMM and OWASP (2:25)
  • Passive Discovery - Open source intelligence gathering - OSINT
    • Open source intelligence gathering-basics (4:05)
    • Open source intelligence gathering - Recon-ng (14:03)
    • Open source intelligence gathering - DiscoverScript
    • Open-source intelligence gathering - Spiderfoot
  • Active Discovery - Reconnaissance
    • Active Reconnaissance with Sparta (9:19)
    • Scanning Entire network in 6 minutes (8:13)
    • Taking massive snapshots of web (3:48)
    • Httpscreenshots and Eyewitness-details
  • Vulnerability Assessments
    • Vulnerability Assessment - Nessus (14:28)
    • Vulnerability Assessment - openVAS
    • Vulnerability Assessment - Nikto
    • Quick findings of web apps vulnerabilities
    • Web application scanning - ZAP
    • ZAP scan analysis
    • Web application scanning - AppSpider_pro
  • Vulnerability to Exploitations - Exploiting the targets
    • Metasploit Commanding
    • Metasploit - Exploiting MS08-067
    • Metasploit - Exploiting web apps
    • Binary Exploitation - Buffer overflow attack
    • Binary Exploitation
    • Browser Exploitation with BeEF (9:31)
  • Web application penetration testing - Exploiting web apps
    • SQL injections basics
    • Exploiting SQL Injections (8:33)
    • Cross Site Scripting attacks - XSS (5:13)
    • Cross Site Request Forgery attack - CSRF (6:00)
    • Fuzzing Input fields - input validations attacks (8:21)
  • Wireless network hacking - Security testing WLAN
    • WEP cracking basics
    • WPA/WPA2 Cracking basics
    • Cracking / Security Testing WPA/WPA2 - All in action (6:48)
  • Post exploitation attacks - Lateral moving in networks
    • First post Responder - collecting creds without Auth (5:32)
    • Adding user account to target machine (2:25)
    • Creating persistent backdoor on target machine (3:30)
    • Msfvenom-msfpc with RC scripts (5:49)
    • Dumping cached credentials ( last 10 passwords ) (1:59)
  • Anti-virus / Firewall / IDS Evasion / VEIL Evasion
    • Firewall Evasion with NMAP (10:59)
    • Content filter bypass with metasploit (3:30)
    • Veil Evasion framework (Evading Anti-viruses) (4:18)
  • Password cracking and exploits
    • Windows Password cracking - KON BOOT (1:34)
    • Linux Password Hash cracking - jtr (3:54)
    • Generating alpha-numeric passwords lists (2:16)
    • Generating Passwords lists from target sites (2:44)
    • Compromised Passwords lists
  • Exploits and vulnerability research
    • SearchSploit in kali (4:04)
    • Exploits search in bugtraq (2:17)
    • Exploits in EXPLOIT-DB (3:39)
  • Anonymity - safe and secure
    • Being anonymous & safe internet (9:44)
  • My recommendations for pentesting
    • Best Commercial Tools (3:27)
    • Top Security Conferences & magazine (3:30)
    • Bug Bounty programmes (1:03)
  • Bonus lectures
    • Penetration Tester's Suitcase - International
    • THE DARKNET - Deep web links (Dark side of the internet) (7:31)

View Full Curriculum


Access
Lifetime
Content
5.5 hours
Lessons
45

Learn Kali Linux and Hack Android Mobile Devices

Start Securing Android Phones & Tablets by Learning to Hack with Kali Linux

By Mohamed Atef | in Online Courses

Think about it: Most of your critical data is stored on your smartphone, right? Hackers know this, which is why more and more are targeting smartphones to steal personal information. Yet most ethical hackers are studying to secure Windows, Mac, or Linux systems while neglecting the largest mobile OS on earth, Android. This course rectifies that flaw, teaching you how to hack and secure Android smartphones and tablets while adding a unique skill to your resume.

  • Access 45 lectures & 5.5 hours of content 24/7
  • Set up Virtual Machines, a workspace, & an Android platform
  • Learn Kali Linux & its hacking capabilities
  • Explore important mobile hacking tools like Netcat, Ettercap, & NMAP
  • Work w/ exploit, Metasploit, & Armitage
  • Hack Android devices & explore countermeasures to each kind of attack
Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Penetration Testin
    • Introduction (13:46)
    • Disclaimer (0:54)
    • Android device (3:20)
  • Setup your Lab
    • Setup up your Virtual Machines (14:30)
    • Setting your Workspace (3:39)
    • Setup up your Android platform (3:02)
  • Finding Your Way Around Kali
    • Kali Linux (8:18)
    • Update/Upgrade Kali linux (3:38)
  • Important Tools
    • Netcat (7:55)
    • Grabing the baneer (2:19)
    • Transfering Files using Netcat (4:55)
    • Remote Adminitration using Netcat (2:42)
    • Android Netcat (1:53)
    • Ettercap (7:08)
    • Ettercap Basics (4:15)
    • DNS Poising using Ettercap (11:12)
    • Scanning a system using NMAP (10:01)
  • Exploitation
    • Working with exploit (11:18)
    • Android Exploit (4:31)
    • Metasploit (12:52)
    • Armitage (8:24)
    • Different Armitage usage (9:52)
  • Hacking Android devices
    • Android Attack 1-1 (8:00)
    • Android Attack 1-2 (11:59)
    • Using Meterpreter session (3:23)
    • Countermeasure (4:28)
    • Android attack using Armitage (4:05)
    • Stagefrigt Attack (9:01)
    • Countermeasure (2:53)
    • Social Engineering Toolkit (SET) (4:41)
    • Fix SET if needed (5:08)
    • Android Attack 2 (13:28)
    • Android Attack 3 (8:25)
    • Countermeasure (4:09)
    • Install Notepad ++ in Kali Linux (4:36)
  • Social Engineering
    • Spoof Email (7:07)
    • Countermeasure (4:00)
    • Spoof Mobile mumber (5:47)
    • Spoof SMS (4:49)
    • Countermeasure (3:52)
  • Hacking using Android devices
    • Network Spoofer (10:34)
    • Root a device (5:09)
    • Bugtroid (5:18)
    • DSPLOIT (2:50)
    • Countermeasure (5:01)

View Full Curriculum


Access
Lifetime
Content
4.5 hours
Lessons
47

Learn Hacking/Penetration Testing Using Android From Scratch

Explore a Variety of Common Attacks & Learn How to Prevent Them Using Android

By iSecur1ty | in Online Courses

Focusing on the practical, non-theoretical side of penetration testing, this course delves into using Android as a penetration testing tool, using real life scenarios that will give you full control over a variety of computer systems. For each attack explored, you'll learn how it works, how to practically launch it, and how to detect and prevent that type of attack from happening. By course's end, you'll have a firm grasp of penetration testing with Android and be able to implement techniques on your own system or in corporate environments.

  • Access 47 lectures & 4.5 hours of content 24/7
  • Install NetHunter & Kali Linux on your Android device to perform tests
  • Learn how to start gathering information about WiFi networks around you
  • Use your Android device to gain access to any account accessed by devices in your network
  • Create a fake access point in a network & spy on all the data sent on it
  • Explore a number of exploitation methods that can be used to gain full control over a target computer
  • Discover three methods to detect ARP Poisoning Attacks
Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Introduction
    • Course Intro & Overview (2:56)
  • Weaponising
    • Preparing Your Android Device (2:09)
    • Installing Device Drivers
    • Unlocking & Rooting The Device
    • Installing NetHunter
    • NetHunter Preview & Lab Overview (5:36)
  • Installing Kali Linux As Virtual Machine (Optional)
    • Kali Linux - Option 1 - Installing Kali As a Virtual Machine (4:21)
    • Kali Linux - Option 2 - Installing Kali Using the ISO Image (10:01)
    • Basic Overview Of The Operating System (7:06)
  • Information Gathering
    • Discovering Wireless Networks - Wardriving (7:46)
    • Preparing Your Device To Crack WiFi Keys/Passwords - WEP/WPA/WPA2 (7:37)
    • Network Mapping - Discovering Devices Connected To The Network (5:22)
    • Network Mapping - Discovering Open Ports (10:01)
    • Network Mapping - Discovering Installed Services (5:36)
  • Spying
    • Introduction (3:10)
    • MITM (Man In The Middle) Methods (3:48)
  • Spying > MITM Method 1 - Bad USB Attack
    • What Is The Bad USB Attack & How To Launch It (7:39)
    • Sniffing Data & Capturing Passwords (7:19)
    • Bypassing HTTPS (7:35)
    • DNS Spoofing (6:51)
  • Spying > MITM Method 2 - ARP Poisonning
    • What Is ARP Poisonning (6:44)
    • ARP Poisoning & Sniffing Data Using arpspoof (7:02)
    • ARP Poisoning & Sniffing Data Using Zanti2 (7:42)
    • Intercepting Downloaded Files (4:17)
    • Replacing Images & Injecting Javascript Code (2:36)
  • Spying > MITM Method 3 - Fake Access Point (Honey Pot)
    • Fake Access Point Theory (5:59)
    • Configuring Access Point Settings (5:36)
    • Launching The Fake Access Point (8:46)
    • Sniffing Data Sent Over The Accesspoint (6:12)
  • Exploitation (Gaining Access)
    • Introduction (2:38)
    • Bypassing Windows/OSX Logins - Setup (5:36)
    • Bypassing Windows/OSX Logins (4:35)
    • Creating An Undetectable Backdoor (7:26)
    • Using Metasploit Meterpreter (9:15)
    • Replace Downloads With A Backdoor (5:51)
    • Backdooring Downloads On The Fly (12:49)
    • HID Keyboard Attack- Executing Windows Commands On Target Computer Via USB (7:03)
    • HID Keyboard Attack - Gaining Full Control Over Windows Machine (9:07)
  • Exploitation - Rubber Ducky Scripts
    • What Are Rubber Ducky Scripts & How To Use Them (4:01)
    • Automatic Download & Execute To Gain Full Control Over Windows (6:23)
    • Reverse OSX Shell To Gain Full Control Over Mac OSX Computers (6:32)
    • Reverse Linux Shell To Gain Full Control Over Linux Computers (3:40)
  • Detecting Malicious Files
    • Protecting Yourself Against Backdoor Delivery Methods (3:50)
    • Detecting Undetectable Backdoors (3:01)

View Full Curriculum



Terms

  • Instant digital redemption

15-Day Satisfaction Guarantee

We want you to be happy with every course you purchase! If you're unsatisfied for any reason, we will issue a store credit refund within 15 days of purchase.