
Uplift Your Career & Skill Up to Your Dream Job – Learning Simplified From Home!
Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special Learn Ethical Hacking with Kali Linux Course. You’ll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today’s workplaces.
The Learn Ethical Hacking with Kali Linux Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Learn Ethical Hacking with Kali Linux Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field.
This Learn Ethical Hacking with Kali Linux Course, like every one of Study Hub’s courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly.
At StudyHub, we don’t just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support.
After studying the course materials of the Learn Ethical Hacking with Kali Linux there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60.
This Learn Ethical Hacking with Kali Linux course is ideal for
This Learn Ethical Hacking with Kali Linux does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Learn Ethical Hacking with Kali Linux was made by professionals and it is compatible with all PC’s, Mac’s, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection.
As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Learn Ethical Hacking with Kali Linux is a great way for you to gain multiple skills from the comfort of your home.
Unit 01: Introduction and Installation | |||
Introduction to the course | 00:05:00 | ||
Virtual box installation | 00:16:00 | ||
Kali linux installation | 00:14:00 | ||
Enabling full screen | 00:18:00 | ||
Unit 02: Basic Linux Commands | |||
Basic commands part 1 | 00:10:00 | ||
Basic commands part 2 | 00:21:00 | ||
Basic commands part 3 | 00:13:00 | ||
Unit 03: Creating a Secure Hacking Environment | |||
Changing ip address and wireless adapter setup | 00:05:00 | ||
Creating a bootable Kali USB drive | 00:05:00 | ||
Essential networking terms | 00:10:00 | ||
Essential hacking terms | 00:18:00 | ||
Additional kali tools to install | 00:09:00 | ||
Changing our MAC address with mac changer | 00:06:00 | ||
Unit 04: Footprinting | |||
Google hacking | 00:13:00 | ||
Nikto basics | 00:11:00 | ||
Whois tools | 00:07:00 | ||
Email harvesting | 00:06:00 | ||
Shodan | 00:10:00 | ||
Zone transfer with Dig | 00:07:00 | ||
Unit 05: Scanning | |||
Installing Metasploitable | 00:07:00 | ||
Nmap part 1 | 00:16:00 | ||
Nmap part 2 | 00:12:00 | ||
Nmap part 3 | 00:12:00 | ||
Zen map | 00:08:00 | ||
TCP scans | 00:16:00 | ||
Nmap by passing defenses | 00:17:00 | ||
Nmap scripts part 1 | 00:09:00 | ||
Nmap scripts part 2 | 00:14:00 | ||
Unit 06: Website Penetration Testing | |||
Installing OWASP | 00:08:00 | ||
HTTP request | 00:10:00 | ||
HTTP response | 00:10:00 | ||
Burpsuite configuration | 00:13:00 | ||
Editing packets in Burpsuite | 00:12:00 | ||
Whatweb and Dirb | 00:10:00 | ||
Password recovery attack | 00:16:00 | ||
Burpsuite login bruteforce | 00:11:00 | ||
Hydra login bruteforce | 00:09:00 | ||
Session fixation | 00:14:00 | ||
Injection attacks | 00:06:00 | ||
Simple command injection | 00:11:00 | ||
Exploiting command injection vulnerability | 00:08:00 | ||
Finding blind command injection | 00:14:00 | ||
SQL basics | 00:10:00 | ||
Manual SQL injection part 1 | 00:13:00 | ||
Manual SQL injection part 2 | 00:21:00 | ||
SQL map basics | 00:17:00 | ||
XML injection | 00:16:00 | ||
Installing XCAT and preventing injection attacks | 00:06:00 | ||
Reflected XSS | 00:11:00 | ||
Stored XSS | 00:12:00 | ||
Changing HTML code with XSS | 00:07:00 | ||
XSSer and XSS sniper | 00:14:00 | ||
Unit 07: Wireless Cracking | |||
Wireless attacking theory | 00:11:00 | ||
Enabling monitor mode | 00:05:00 | ||
Capturing handshake with airodump | 00:15:00 | ||
Rockyou.txt | 00:14:00 | ||
Cracking with aircrack | 00:16:00 | ||
Cracking with hashcat | 00:15:00 | ||
Creating password lists with crunch | 00:18:00 | ||
Creating password lists with cup | 00:07:00 | ||
Rainbow tables part 1 | 00:17:00 | ||
Rainbow tables part 2 | 00:06:00 | ||
Installing fluxion | 00:06:00 | ||
Finding and cracking hidden networks | 00:08:00 | ||
Preventing wireless attacks | 00:08:00 | ||
Unit 08: Man in the Middle Attacks | |||
ARP protocol basics | 00:10:00 | ||
Man in the middle attack theory | 00:07:00 | ||
Installing MITMf | 00:07:00 | ||
Manual ARP spoofing | 00:13:00 | ||
Problems while installing MITMf | 00:06:00 | ||
HTTP traffic sniffing | 00:08:00 | ||
DNS spoofing and HTTPS password sniffing | 00:24:00 | ||
Hooking browser with BEEF | 00:16:00 | ||
Screenshotting targets browser | 00:11:00 | ||
Cloning any webpage | 00:09:00 | ||
Ettercap basics | 00:07:00 | ||
Unit 09: System Hacking with Metasploit | |||
MFS console environment | 00:16:00 | ||
Metasploit modules explained | 00:12:00 | ||
Bruteforcing SSH with Metasploit | 00:15:00 | ||
Attacking tomcat with metasploit | 00:09:00 | ||
Getting meterpreter with command injection | 00:25:00 | ||
PHP code injection | 00:06:00 | ||
Metasploitable exploits | 00:07:00 | ||
Wine installation | 00:12:00 | ||
Creating windows payloads with Msfvenom | 00:10:00 | ||
Encoders and Hex editors | 00:19:00 | ||
Windows 10 meterpreter shell | 00:12:00 | ||
Meterpreter environment | 00:11:00 | ||
Windows 10 privilege escalation | 00:11:00 | ||
Preventing privilege escalation | 00:06:00 | ||
Post exploitation modules | 00:14:00 | ||
Getting Meterpreter over Internet with port forwarding | 00:11:00 | ||
Eternalblue exploit | 00:20:00 | ||
Persistence module | 00:13:00 | ||
Hacking over the internet with Ngrok | 00:10:00 | ||
Android device hacking with venom | 00:10:00 | ||
The real hacking begins now! | 00:02:00 | ||
Unit 10: Python Crash Course | |||
Variables | 00:14:00 | ||
Raw input | 00:11:00 | ||
If else statements | 00:10:00 | ||
For loops | 00:07:00 | ||
While loops | 00:08:00 | ||
Python lists | 00:08:00 | ||
Functions | 00:15:00 | ||
Classes | 00:10:00 | ||
Importing libraries | 00:07:00 | ||
Files in python | 00:12:00 | ||
Try and except the rule | 00:05:00 | ||
Unit 11: Coding an Advanced Backdoor | |||
Theory behind reverse shells | 00:07:00 | ||
Simple server code | 00:13:00 | ||
Connection with reverse shell | 00:07:00 | ||
Sending and receiving messages | 00:11:00 | ||
Sending messages with while true loop | 00:08:00 | ||
Executing commands on target system | 00:10:00 | ||
Fixing backdoor bugs and adding functions | 00:20:00 | ||
First test using our backdoor | 00:18:00 | ||
Trying to connect every 20 seconds | 00:12:00 | ||
Creating persistence part 1 | 00:06:00 | ||
Creating persistence part 2 | 00:17:00 | ||
Changing directory | 00:12:00 | ||
Uploading and downloading files | 00:22:00 | ||
Downloading files from the internet | 00:23:00 | ||
Starting programs using our backdoor | 00:07:00 | ||
Capturing screenshots on the target PC | 00:19:00 | ||
Embedding backdoor in an image part 1 | 00:13:00 | ||
Embedding backdoor in an image part 2 | 00:09:00 | ||
Checking for administrator privileges | 00:12:00 | ||
Adding help option | 00:09:00 | ||
Unit 12: Creating a Key logger for the Backdoor | |||
Importing Pynput | 00:10:00 | ||
Simple keylogger | 00:10:00 | ||
Adding report function | 00:11:00 | ||
Writing key strokes to a file | 00:14:00 | ||
Adding the keylogger to our reverse shell part 1 | 00:23:00 | ||
Adding the keylogger to our reverse shell part 2 | 00:08:00 | ||
Final project test | 00:14:00 | ||
Unit 13: Basic Authentication Bruteforcer | |||
Printing banner | 00:11:00 | ||
Adding available options | 00:11:00 | ||
Starting threads for bruteforce | 00:08:00 | ||
Writing function to run the attack | 00:11:00 | ||
Bruteforcing router login | 00:10:00 | ||
Bypassing antivirus with your future programs | 00:14:00 | ||
Sending malware with spoofed email | 00:15:00 | ||
Unit 14: BONUS - Building a Career in Cyber Security | |||
What will you learn in this section? | 00:03:00 | ||
Why is ethical hacking a valuable skill? | 00:23:00 | ||
What is the best ethical hacking certification? | 00:17:00 | ||
Tips for getting your first job as an ethical hacker | 00:18:00 | ||
How I started my career as an ethical hacker | 00:14:00 | ||
How to price your work | 00:11:00 | ||
Unit 15: Additional Content: Grand Finale | |||
Bonuses. Enjoy the Benefits | 01:05:00 | ||
Assignment | |||
Assignment – Learn Ethical Hacking with Kali Linux | 00:00:00 |
Embark on a thrilling expedition into the digital realm with our “Get 100 MILLION Views on YouTube” course. This isn’t …
0
Embark on a transformative journey into the realm of cutting-edge development with our course, “Master Spring Boot 3.0 and MongoDB.” …
0
Embark on a transformative learning journey with our course, “Microsoft Teams – Master Microsoft Teams.” Unleash the full potential of …
0