• LOGIN
  • No products in the cart.

Learn the Basics Of Ethical Hacking, Penetration Testing, Wifi Hacking

What you’ll learn
  • Install Kali Linux in a Windows 10 Environment
  • Understand Step By Step Instructions of Enabling Wireless Hacking in Kali Linux

  • Understand the Use of NMAP for Security Scanning and Network Exploring

Requirements
  • Fast and Reliable Internet Connection
  • Wireless Card

What’s New?

2 Hours on an Introduction to Perl and How To Use Perl for Writing Ethical Hacking Scripts.

You will also learn How To Create Malware and Use Python to Create Hacking Scripts and an Nmap scanner. Also you will learn Brute Force Cracking Passwords with Python

Added:

Nessus Port Scanner and Vulnerability Scanner

Footprinting and Enumeration module

You are about to be introduced to one of the most powerful penetration testing platforms in the world. Kali Linux

Kali Linux is one of the most versatile penetration testing platforms favored by ethical hackers.

This course will introduce you to Kali Linux and explain step by step how to install Kali Linux in a virtual environment on a Windows 10 machine.

You will learn how to install Kali Linux, set up the root username and password, install VirtualBox guest additions, Linux kernels and much more!

All videos are recorded in HD quality and you will be able to follow along as the lessons are spoken in clear English.

You will also be introduced to Nmap and how to use it for security scanning, port scanning and network exploration.

The videos will also guide you on how to install a wireless card within the virtual environment so you can scan wireless networks and devices and take advantage of many of the wireless security tools available in the Kali Linux environment.

You will also learn how hackers use Malware to infect a victim’s computer. In addition, you will also be introduced to Python and how to use it for ethical hacking purposes.

Take this course today and start your Ethical Hacking journey now!

Who this course is for:
  • Anyone Wanting To Learn How To Set Up a Proper Ethical Hacking Environment
  • Anyone Wanting To Learn The Basics of Ethical Hacking

Course content

73 lectures  08:50:49
Introduction and Welcome
08:14
08:14
Kali Linux Installation
44:55
Downloading Kali Linux
01:26
Installing Kali Linux Part 1
05:14
Installing Kali Linux Part 2
10:02
Final Installation Steps Before Startup
04:00
First Look at Kali Linux
06:47
Wireless Card Installation Part 1
05:07
Linux Kernel Installation
01:40
Wireless Card Installation Part 2
05:41
NMAP Essentials
41:28
NMAP Anonymous Mode First
01:43
TraceRoute Without ProxyChains
00:55
Proxychains
09:34
Nmap TCP Port Scanning
02:06
Port Scanning on Test Machine
07:09
TCP Port Scanning – Further Results
00:52
FIN and XMAS Scans
04:37
Nmap OS Detection
05:13
Introduction To Footprinting
20:03
Further Footprinting
12:55
Fun with List-Urls.py
01:40
More of The Harvester
01:06
Installing and Working with Nessus
04:08
Introduction to Nessus and Nessus Installation
04:08
Web SQL Injection
13:55
Introduction to Web SQL Injection
11:11
Impacts of Web SQL Injection
02:44
Build Malware in Code Compiler
01:08:30
Installing C / C++ Compiler
05:35
Downloading Additional Applications
05:50
Creating a Malware Program with Codeblocks
10:26
Running Apache Server and Uploading Malware to Server
11:20
Using Reverse Shell on Victim’s PC
09:47
Viewing Access Logs and Introduction to the Metasploit Framerwork
09:34
What to Do When Victim is on a Different Network
03:46
Using Metasploit to Create an Exploit
04:13
Viewing KeyScan Results
02:53
Using Python to Create Hacking Scripts
02:10:38
Python Introduction and Installation on Windows
06:41
Introduction to PyCharm – Create Your First Program
06:48
Importing the Nmap Module
07:47
Introduction to Indentation
06:46
Quick Recap
01:18
Basic Commands in Python
13:53
Conditional Statements
10:56
Lists, Arrays and Dictionaries
09:46
String Manipulation and File Handling
10:37
Building an Nmap Network Scanner – Part 1
09:06
Building an Nmap Network Scanner – Part 2
10:30
Creating a Brute Force Password Cracker in Python
15:15
Brute Force Cracking Results
05:05
How Hackers Create Undetectable Malware and Viruses
01:34:22
Introduction to Undetectable Malware
12:04
Installing Python and Pip
05:01
Installing Veil-Framework
04:09
Setting Up The Veil Framework
09:05
Installing Gnome Desktop
06:31
Wine Mono and Veil-Evasion Installation
02:56
Installing Metasploit
09:38
Metasploit Installation Complete
00:35
Testing MSF Console
01:02
Veil Evasion Final Installation
06:44
Adding the Metasploit Folder to Veil Installation
00:40
Introduction to Veil and The Importance in Ethical Hacking
06:48
Creating an Exploit
12:24
Testing Exploit on a Windows 10 Machine
14:45
Encrypting the Payload
02:00
Introduction To Perl and Foundations for Ethical Hacking
01:44:36
Introduction to Perl
08:11
Basic Perl Programming
10:48
Introduction to Perl Functions
16:48
Working With Arrays
15:56
More Fun With Arrays
17:19
Conditions in Perl
15:43
Switch Statements and More Examples of If Statements
19:51
Download This Course
X