Навыки, которые вы получите:
Linux
HTTP
SQL
Virtual machine
Nmap
Ethical hacking
On this course you can practice all the skills and techniques in real time, we start by setting up an ethical hacking lab on your computer. Here you can put the theory you learn to the test, and have a safe space to practice using hacking tools and attacks. We’ll experience real time hacking examples, and learn how to protect ourselves against these attacks at the same time.
The Program
- Introduction.
- Hacking Lab Setup.
- Kali Linux 101.
- Anonymity Online.
- Dark Web.
- Network Pentesting.
- Gathering Information From Networks.
- Wireless Attacks.
- Post Connection Attacks.
- System Pentesting.
- Attacks On Users.
- Social Engineering.
- Social Media Security.
- Beef.
- External Network Attacks.
- Fake Game Website Attacks.
- Post Hacking Sessions.
- Hacker Methodology.
- Website Reconnaissance.
- Website Pentesting.
- Cross Site Scripting.
- SQL.
- SQL Injection.
- Website Pentesting Tools.
- Ethical Hacking Certifications.
- Network Theory.
- Python For Ethical Hacking Setup ect.
What will you learn
- How hackers launch attacks on different systems, computers, users, websites and wireless networks.
- What tools hackers use, why, and how they work.
- How to protect yourselves (or your clients!) against these attacks.
- How to build your own security and hacking tools with Python.
- How to create your own Ethical Hacking tool portfolio.