
Master ethical hacking and gain the skills to secure computer systems like an expert, with the complete It: Ethical Hacking, IT Security and IT Cyber Attacking training course.
The It: Ethical Hacking, IT Security and IT Cyber Attacking course teaches everything you need to know about IT security, with step-by-step guidance on how to perform penetration testing. You’ll learn how to hack computer systems like black hat hackers, and secure them, with complete audiovisual training. This course will also explore the different types of hackers, and the hacking tools you’ll need to secure computer systems like an expert.
Fast track your career in the IT sector with a recognised qualification in It: Ethical Hacking, IT Security and IT Cyber Attacking.
After studying the course materials of the It: Ethical Hacking, IT Security and IT Cyber Attacking you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60.
This It: Ethical Hacking, IT Security and IT Cyber Attacking does not require you to have any prior qualifications or experience. You can just enrol and start learning.
This It: Ethical Hacking, IT Security and IT Cyber Attacking was made by professionals and it is compatible with all PC’s, Mac’s, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection.
As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This It: Ethical Hacking, IT Security and IT Cyber Attacking is a great way for you to gain multiple skills from the comfort of your home.
Introduction to Ethical Hacking | |||
What is an Ethical Hacker | 00:07:00 | ||
Terminology Crash Course pt. 1 | 00:09:00 | ||
Terminology Crash Course pt. 2 | 00:13:00 | ||
Terminology Crash Course pt. 3 | 00:08:00 | ||
Legal Considerations | 00:11:00 | ||
Reconnaissance - Surveying the Attack Surface | |||
Surveying the Attack Surface | 00:10:00 | ||
Recon Types | 00:08:00 | ||
Passive Recon Part 1 | 00:07:00 | ||
Passive Recon Part 2 | 00:10:00 | ||
Active Recon | 00:15:00 | ||
Recon Walkthrough Tools Summary | 00:14:00 | ||
Maltego Demo | 00:07:00 | ||
FOCA Demo | 00:05:00 | ||
DEMO – Harvester | 00:02:00 | ||
Scanning and Enumeration - Getting Down to Business | |||
Scanning & enumeration | 00:08:00 | ||
Identifying Active Hosts pt. 1 | 00:10:00 | ||
Identifying Active Hosts pt. 2 | 00:13:00 | ||
Identifying Active Services | 00:18:00 | ||
OS and Services Fingerprinting | 00:15:00 | ||
Network Mapping | 00:10:00 | ||
Final Thoughts | 00:05:00 | ||
DEMO – Nmap Syntax pt. 1 | 00:14:00 | ||
DEMO – Nmap Syntax pt. 2 | 00:16:00 | ||
DEMO – Nmap Hosts Discovery | 00:12:00 | ||
DEMO – Nmap Service Discovery | 00:17:00 | ||
DEMO – Nmap Scripts | 00:11:00 | ||
DEMO – Masscan | 00:11:00 | ||
Network Presence | |||
Network Insecurity | 00:04:00 | ||
Sniffing and Spoofing | 00:13:00 | ||
Sniffing Tools | 00:09:00 | ||
Spoofing, Crypto and Wifi | 00:15:00 | ||
DEMO – tcpdump | 00:11:00 | ||
DEMO – Wireshark | 00:11:00 | ||
DEMO – Ettercap | 00:13:00 | ||
DEMO – Burp Suite | 00:15:00 | ||
DEMO – Scapy | 00:10:00 | ||
Attacking | |||
Security Overview pt. 1: Windows Architecture | 00:18:00 | ||
Security Overview pt. 2: Credentials Security | 00:16:00 | ||
Security Overview pt. 3: Memory Corruption and Exploitation | 00:16:00 | ||
Windows Hacking Basics | 00:20:00 | ||
Local Access and Privilege Escalation | 00:20:00 | ||
Dumping Hashes and Cracking Passwords | 00:18:00 | ||
Linux Attacking Basics pt. 1 | 00:13:00 | ||
Linux Attacking Basics pt. 2 | 00:14:00 | ||
References | 00:08:00 | ||
DEMO – Windows MSF Exploit pt. 1 | 00:13:00 | ||
DEMO – Windows MSF Exploit pt. 2 | 00:15:00 | ||
DEMO – Post Exploitation Activities | 00:13:00 | ||
DEMO – Mimikatz | 00:07:00 | ||
DEMO – Hashcat | 00:08:00 | ||
DEMO – Konboot | 00:13:00 | ||
DEMO – Post Exploitation Windows CMD | 00:14:00 | ||
DEMO – Post Exploitation Windows Powershell | 00:13:00 | ||
DEMO – Attacking Linux targets pt. 1 | 00:10:00 | ||
DEMO – Attacking Linux targets pt. 1 | 00:13:00 | ||
Web Hacking | |||
Introduction to Web Hacking | 00:03:00 | ||
Web Security Architecture Overview pt. 1 | 00:17:00 | ||
Web Security Architecture Overview pt. 2 | 00:12:00 | ||
Attacking the Web Server pt. 1 | 00:10:00 | ||
Attacking the Web Server pt. 2 | 00:11:00 | ||
Attacking the Platform pt. 1 | 00:19:00 | ||
Attacking the Platform pt. 2 | 00:08:00 | ||
Attacking the Technology pt. 1 | 00:21:00 | ||
Attacking the Technology pt. 2 | 00:17:00 | ||
OWASP Top 10 pt. 1 | 00:09:00 | ||
OWASP Top 10 pt. 2 | 00:21:00 | ||
Attacking the Business Logic pt. 1 | 00:11:00 | ||
Attacking the Business Logic pt. 2 | 00:15:00 | ||
Tools and Methodology | 00:20:00 | ||
References | 00:05:00 | ||
DEMO – OWASP Mutillidae | 00:09:00 | ||
SQLI | 00:07:00 | ||
SQL Map Intro | 00:08:00 | ||
SQL Map | 00:25:00 | ||
DEMO – Burpsuite | 00:37:00 | ||
DEMO – Burpsuite XSS Hunter | 00:16:00 | ||
DEMO – mitmproxy | 00:10:00 | ||
DEMO – Skipfish pt.1 | 00:04:00 | ||
DEMO – Skipfish pt.2 | 00:04:00 | ||
Social Engineering - Hacking Humans | |||
Social Engineering Basics | 00:15:00 | ||
Social Engineering Methods | 00:16:00 | ||
Tools and Techniques pt. 1 | 00:15:00 | ||
Tools and Techniques pt. 2 | 00:12:00 | ||
Tools and Techniques pt. 3 | 00:09:00 | ||
Physical Security Considerations | 00:13:00 | ||
Final Thoughts | 00:11:00 | ||
DEMO – Credential harvesting | 00:02:00 | ||
DEMO – Website cloning | 00:06:00 | ||
DEMO – Automating an attack | 00:03:00 | ||
DEMO – Anti-virus evasion pt. 1 | 00:08:00 | ||
DEMO – Anti-virus evasion pt. 2 | 00:12:00 |
Overview The Ultimate Microsoft Office Bundle course will allow you to get the very best results from every one of …
65
Overview Uplift Your Career & Skill Up to Your Dream Job – Learning Simplified From Home! Kickstart your career & …
1
Dive deep into the intricate world of Microsoft Office with a tailored course specifically designed for Arabic speakers. The “Microsoft …
1