Oreilly - Ethical Hacking Masterclass - 9781789530018
Oreilly - Ethical Hacking Masterclass
by Sunil Gupta | Publisher: Packt Publishing | Release Date: September 2018 | ISBN: 9781789530018


Your certification guide to ethical hacking About This VideoUnderstand the WHYs, HOWs and WHATs of Ethical HackingA comprehensive course full of the latest and most important tools for you to be a master in the Ethical Hacking worldUse the the practice questions in the Ethical Hacking course and pass this prestigious examIn DetailSecurity is the foremost concern for all organizations both big and small. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. This action-packed course provides information on all the latest hacking tools in one place. You'll learn all the latest tools and features such as network pentesting, website pentesting, and Android pentesting. By the end of the course you'll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker.
  1. Chapter 1 : Ethical Hacking Course Introduction
    • The Course Overview 00:03:17
    • Course Overview – How to Get the Most Out of This Course? 00:02:31
    • Teaser – Bypass Antivirus in Windows 10 and Hack Windows 10 Completely 00:10:29
    • Ethical Hacking – Latest Terminologies 00:03:03
  2. Chapter 2 : Network Pentesting Lab Setup and Overview
    • Download and Install VMware Workstation 00:03:47
    • Download Windows 10 and Kali Linux 2018 00:05:18
    • Installation of Windows 10 and Kali Linux in VMware Workstation 00:04:48
    • Update and Upgrade the Kali Linux Operating System 00:04:05
    • What Is Network Pentesting? 00:03:38
    • Various Components of Network Pentesting 00:03:31
  3. Chapter 3 : Network Pentesting – Network Scanning Techniques
    • IP Scanners in Network 00:06:12
    • Port Scanning in Network Using Nmap 00:06:01
    • Nessus Installation 00:06:19
    • Vulnerability Scanning Using Nessus 00:06:04
  4. Chapter 4 : Network Pentesting – Network Host Exploitation with the AV Bypass Mechanism
    • Installation of Antivirus Bypass Frameworks 00:10:21
    • Bypass Windows 10 Defender and Hack Windows 10 from Kali Linux 00:07:53
    • Bypass Windows 10 Antivirus and Hack Windows 10 from Kali Linux 00:13:00
    • Various Meterpreter Commands 00:07:28
  5. Chapter 5 : Network Pentesting – Network IoT Devices Exploitation
    • About Router Pentesting 00:03:56
    • Download and Install VyOS on a VMware Workstation (Virtual Router) 00:06:11
    • Start Services in Router 00:07:32
    • Password Cracking (Brute Forcing) Using the Hydra and Medusa Tools 00:10:16
  6. Chapter 6 : Other Major Network Attacks
    • Man-in-the-Middle Attack Overview 00:02:25
    • Man-in-the-Middle Attack (MITM) Using Wireshark and Ettercap 00:06:52
    • Social Engineering Attack Overview 00:02:43
    • Social Engineering Attack Using Social Engineering Toolkit 00:05:19
    • About the Browser Exploitation Framework 00:03:05
    • Browser Exploitation Attack Using BeEF 00:06:35
  7. Chapter 7 : Website Pentesting Lab Setup and Overview
    • Download and Install Xampp Server in Kali Linux 00:07:42
    • Download and Install a Buggy Web Application 00:05:13
    • Website Introduction 00:02:31
    • Website Pentesting Overview 00:03:58
  8. Chapter 8 : Website Pentesting – Scanning Websites
    • Acunetix Web Vulnerability Scanner 00:07:44
    • Burp Suite Community Edition 00:07:32
    • Zed Attack Proxy Tool (ZAP) 00:07:22
    • Report Creation and Analysis 00:06:38
  9. Chapter 9 : Website Pentesting – SQL Injection Attack
    • SQL Injection Attack Overview 00:02:48
    • SQL Injection Attack on a Buggy Web Application 00:06:33
    • HTML Injection Attack on a Buggy Web Application 00:06:24
    • SQL Injection on a Live Website Using Sqlmap Kali Linux 00:09:57
  10. Chapter 10 : Website Pentesting – XSS and CSRF Attacks
    • About XSS Attack and Types 00:02:38
    • Persistent XSS Attack on a Buggy Web Application 00:06:43
    • Non-Persistent XSS Attack on a Buggy Web Application 00:05:11
    • DOM-Based XSS Attack 00:03:22
    • About CSRF Attacks 00:03:26
    • CSRF Attack on a Buggy Web Application 00:08:55
  11. Chapter 11 : Website Pentesting – Other Major Web Attacks
    • Shell Upload Attack on a Buggy Web Application 00:06:41
    • Buffer Overflow Attack on a Web Application 00:05:17
    • Brute-Force Attack on the Login Panel of a Web Application 00:08:45
    • Local File Inclusion Attack on a Web Application 00:07:47
  12. Chapter 12 : Android Pentesting Lab Setup and Overview
    • Download and Install Android Studio 00:06:05
    • Start Android Phone in Android Studio 00:05:17
    • Download and Install APK File in Android Phone 00:06:21
    • About Android Pentesting 00:02:58
    • Scope of Android Pentesting 00:03:23
  13. Chapter 13 : Android Pentesting – Analyze Log Files and Find Secret Information
    • About Android Log Files 00:04:29
    • Information About Task 00:03:39
    • Open Log Files Using Logcat 00:05:06
    • Analyze Log Files and Find Secret Code 00:05:20
  14. Chapter 14 : Android Pentesting – Reverse Engineering Process
    • About the Reverse Engineering Process in Android 00:04:18
    • Information About Task 00:02:52
    • Download and Install the Dex2jar Tool 00:06:24
    • Download and Install the JD-Gui Tool 00:06:20
  15. Chapter 15 : Android Pentesting – Break Encryption in Android
    • Encryption Process in Android 00:04:04
    • Information About Task 00:03:32
    • Analyze the Code and Find the Encryption Algorithm 00:04:09
    • Complete the Task 00:05:51
  16. Chapter 16 : Android Pentesting – SQL Injection Attack on Android
    • About SQL Injection Attack on Android 00:04:32
    • Download and Install Drozer and Drozer-Agent.apk 00:07:34
    • Drozer Commands 00:07:35
    • Perform an SQL Injection Attack on Android Using Drozer 00:06:10
  17. Chapter 17 : Ethical Hacking Exam Preparation
    • Overview of Major Ethical Hacking Exams 00:02:21
    • Ethical Hacking Exam Practice Questions – Part 1 (MCQ) 00:08:39
    • Ethical Hacking Exam Practice Questions – Part 2 (MCQ) 00:06:41
    • Ethical Hacking Exam Practice Questions – Part 3 (MCQ) 00:05:29
    • Ethical Hacking Exam Practice Questions – Part 4 (MCQ) 00:07:01
    • Ethical Hacking Exam Practice Questions – Part 5 (MCQ) 00:07:14
  18. Oreilly - Ethical Hacking Masterclass


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss