Ethical Hacking From Scratch Open Position at PaperVideo

Ethical Hacking From Scratch

Job Details

List of PaperVideo courses in all fields
Category:
Programming
The level of expertise required to teach this PaperVideo course
Job Level:
Beginner Level
How much expected time will the papervideo course will be
# of Hours:
10 - 15 hours
View all the papervideo courses
Create this course

Course Description

Welcome this comprehensive Ethical Hacking course! This course assumes you have NO prior knowledge and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts!

This course is highly practical but it won't neglect the theory; we'll start with ethical hacking basics, breakdown the different penetration testing fields and install the needed software (on Windows, Linux and Mac OS X), then we'll dive and start hacking straight away. You'll learn everything by example, by analysing and exploiting different systems such as networks, servers, clients, websites .....etc. We'll never have any boring dry theoretical lectures.

The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses to hack into this system.

By the end of the course you will have a strong foundation in most hacking or penetration testing fields and you'll also learn how to detect, prevent and secure systems and yourself from the discussed attacks.


The course is divided into four main sections:

1. Network Hacking

2. Gaining Access

3. Post Exploitation

4. Website / Web Application Hacking

At the end of each section you will learn how to detect, prevent and secure systems and yourself from the discussed attacks.

All the techniques in this course are practical and work against real systems, you'll understand the whole mechanism of each technique first, then you'll learn how to use it to hack into the target system. By the end of the course you'll be able to modify the these techniques to launch more powerful attacks, and adopt them to suit different situations and different scenarios.

Who is the Course For

  • You can begin this course with any level of knowledge and quickly start advancing your skills as an information technology and security expert anywhere in the world!
  • If you are working to advance your career on LinkedIn or as a freelancer online, you can use the skills you build in this course to get a better job and to increase your hourly pay rate.
  • If you are hoping to be a better network administrator, you can use this course to learn how to secure networks and protect assets.

Course Outline

  • Prerequisites for getting started with this course
  • Basic Hacking terms you will want to know get started
  • Build your Hacking Enviornment
  • Setup Instruction for MAc user only
  • How to create a bootable USB of Kali Linus
  • How to install VirtualBox on Fedora 22 + Kali Sana
  • Linus Terminal including basic Functionality and CLI
  • What is Tor? How can you use it to protecty your anonymity online?
  • ProxyChains for using proxy servers, hiding your ip, and obtaining access.
  • What is Virtual Private Network (VPN) and How you can stay anonymous with VPN
  • What is Macchanger? And how can you use it to change your mac address?
  • Footprinting with Nmap and external resourceAttacking wireless Networks. Overview of the toolsBreaking WPA/WPA2.
  • Wifi hacking and wifi hacker training.
  • Signal Jamming and denial of serviceSSL Strips
  • Lets have a bit of Fun!Evil Twin Method! Clone wireless access point to steal data
  • Attacking routers to give you free regin over the entire network!
  • DNS setting Hacking to redirect user with post authentication exploitation
  • Websites Attack with SQl Injections
  • Brute - Forcing methods for cracking passwords
  • Denial of service (DoS) atacks demonstrated and explained
  • Reversed shells. Gain remote control of any device!
  • Make you own keylogger C++
  • Retired

Prerequisites

  • Reliable and fast internet connection.
  • Wireless networking card.