Back

Hacking For Beginners

Start from absolute scratch!

Tarek

Lead Trainer

5h 0m

Course Summary

Description
Unlock the world of ethical hacking with Hacking For Beginners. In this high-energy, hands-on course, you'll dive into the thrilling realm of penetration testing and ethical hacking. Designed specifically for newcomers, this course will empower you to master the essentials of hacking in just a few hours.

 

What You'll Learn:

Pentesting Basics: Discover the foundational tools and techniques used in penetration testing. Learn how to identify vulnerabilities, exploit weaknesses, and assess security.
Remote Hacking Essentials: Gain practical skills to perform controlled, remote hacking. Learn to safely access and test remote systems, ensuring you're prepared to handle real-world scenarios.
Hands-On Labs: Put theory into practice with our interactive, online labs. With zero setup required, you'll jump straight into action, exploring vulnerabilities in a secure, virtual environment.
 

By the end of this course, you'll be equipped with the knowledge and skills to start your journey into cybersecurity. Whether you're aiming for a career in tech or just curious about the world of hacking, "Hacking For Beginners" offers an exhilarating introduction to the field. Enroll now and start hacking your way to becoming a cyber pro!

Course Curriculum

Introduction

1 lessons

1. Welcome From Tarek

6:26

Kali Linux First Steps

9 lessons

2. IMPORTANT: Lab Instructions

3. Start The Lab

4. Intro to Kali Linux

7:56

5. Kali Linux GUI

5:06

6. Kali Linux - Terminal Shortcuts

6:38

7. Kali Linux - root

7:02

8. Kali Linux - Basic Commands

6:48

9. Test Your Knowledge

10. Kali Linux - Package Management

3:27

The Internet

8 lessons

11. The Internet

2:56

12. Test Your Knowledge

13. Internet Protocols

6:05

14. Test Your Knowledge

15. Public and Private IPs

4:12

16. NAT

8:35

17. DNS

6:52

18. Test Your Knowledge

Servers, Services, Ports and Clients

4 lessons

19. Servers

3:48

20. Services and Ports

6:51

21. Test Your Knowledge

22. Clients

5:00

Packets and Protocols

4 lessons

23. What Are Packets?

5:45

24. Understanding TCP

4:27

25. Understanding HTTP

1:46

26. Test Your Knowledge

Packet Analysis

5 lessons

27. Wireshark PCAP File

28. Introduction to Wireshark

6:38

29. Wireshark TCP Handshake Analysis

8:32

30. Wireshark Display Filters

2:58

31. Wireshark Capture Filters

6:00

Port Scanning

6 lessons

32. Port Scanning First Run

5:33

33. Port Scanning Techniques

4:48

34. Port Scanning Packet Analysis

6:02

35. Port Scanning With Service Detection

5:31

36. Port Scanning Service Detection Packet Analysis

4:34

37. Test Your Knowledge

Vulnerability Identification

10 lessons

38. Vulnerabilities and Exploits

4:16

39. CVE and CVSS

3:28

40. Test Your Knowledge

41. Manual Vulnerability Research

3:37

42. Semi-automated Vulnerability Research

4:09

43. Scripted Vulnerability Research

4:57

44. Vulnerability Scanning

9:40

45. Test Your Knowledge

46. Vulnerability Reporting

4:53

47. OpenVAS Report - PDF

Exploitation and Backdoors

7 lessons

48. Exploitation Key Terms

6:-1

49. What Is A Remote Shell?

8:05

50. What Is A Backdoor?

4:08

51. Exploiting A Backdoored FTP

4:18

52. Test Your Knowledge

53. Creating Your Own Backdoor

5:04

54. How The Backdoor FTP Exploit Works

8:34

Metasploit Crash Course

11 lessons

55. Introduction to Metasploit

4:52

56. Metasploit Auxiliary

8:41

57. Metasploit Auxiliary Search

3:35

58. Metasploit Search

8:48

59. Exploiting Backdoored FTP With Metasploit

7:37

60. Managing Metasploit Multiple Sessions

10:47

61. Install A Tool

62. Exploiting Tomcat Manually

9:20

63. Exploiting Tomcat with Metasploit

10:43

64. Metasploit Meterpreter Shell

7:36

65. Test Your Knowledge

Last Section

0 lessons