Learn Ethical Hacking From Zero to a Master

Learn Ethical Hacking From Zero to a Master: The Course Assumes Zero Knowledge
Course Description
Ethical hacking is the use of same tools, techniques and procedures used by the malicious black hat hackers to attack and compromise a computer network in order to find vulnerabilities that a black hat hacker could have otherwise exploited. Ethical hacking is a cyber security profession. It falls into a field of security called offensive security. Ethical hacking is also called penetration testing.
This course is an ethical hacking course targeted towards beginners with ZERO knowledge and skills in Ethical hacking. Everything is started from the beginning SIMPLIFIED and explained in DETAILED. The course is fully PRACTICAL without neglecting the theory.
Audience
This course is beginners with ZERO knowledge in Ethical Hacking.
Prerequisites
There is no any prerequisites. Everything is started from scratch.
Requirements
1 Computer with minimum of 500GB HDD and 8GB RAM
External Wireless Network Card that can support monitor mode and packet injection
Internet Connection
Learning Outcomes
Know how to perform information gathering
Know how to hack wireless networks
Know exploit vulnerabilities and gain access to a system
Know how to perform post exploitation attacks
Course Features
- Lectures 40
- Quizzes 0
- Duration 20 Hours
- Skill level Beginners
- Language English
- Students 126
- Assessments Yes
-
SECTION 1: INTRODUCTION
-
SECTION 2: LAB SETUP
-
SECTION 3: INTRODUCTION TO LINUX
-
SECTION 4: PASSIVE INFORMATION GATHERING
-
SECTION 5: BREAKING INTO A LOCAL AREA NETWORK
- Connecting a Wireless Network Card to Kali Linux
- Changing MAC Address
- Managed Mode vs Monitor Mode
- Packet Sniffing
- Targetted Packet Sniffing
- Deauthentication Attack
- WEP vs WPA (Theory)
- Capturing WPA2 Handshakes
- Cracking WPA2 Handshakes
- Cracking Wi-Fi Networks with Wifite
- Evil Twin Attack with Fluxion
- Evil Twin Attack with Airgeddon
- Evil Twin Attack with Wifi-Pumpkin
-
SECTION 6: ACTIVE INFORMATION GATHERING
-
SECTION 7: NETWORK ATTACKS
-
SECTION 8: SERVER SIDE ATTACKS
-
SECTION 9: CLIENT SIDE ATTACKS
-
SECTION 10: RESOURCES
-
Ssozi Malik
Great
Great course
8 Comments
A quick check on one video from two different courses, OSINT and the Ethical hacking, I quickly noticed that the set up of the virtual machines (Kali) is the same. I think they shouldn’t be; because the purpose of the lab wont be for the same purpose. Waiting for your Forensic course bro.
Wish you good luck
Open Source Intelligence (OSINT) is a passive reconnaissance approach which is the first step in ethical hacking/pentesting, so the lab set up should be expected to be the same. Thank you very much Arman for the feedback.
I have really benefited from this course. I have learn a lot. Thank you very much Phoenyx Academy.
Thank you Usman Adamu. I am so glad you find the course useful.
Great tutor, you really bring out the content and make it too easy to learn information security, just know it has been my goal and you just made it come true. Thanks for sharing your knowledge.
Thank you Ssozi Malik . I am so glad you find the course useful.
pls sir can you extend the deadline for the course.
There is no any deadline, you can always come back.