Cybersecurity White Hat Hacking v10 Complete Course & PDF Guides
$10.00
Price: 10.00 USD | Size : 4.73 GB | Duration : 19 Hours | 127 Video Lessons | ENGLISH |
Bonus : White Hat Hacking PDF Guides | INSTANT DOWNLOAD |⭐️⭐️⭐️⭐️⭐️ 4.9
Description
Price: 10.00 USD | Size : 4.73 GB | Duration : 19 Hours | 127 Video Lessons | ENGLISH |
Bonus : White Hat Hacking PDF Guides | INSTANT DOWNLOAD |⭐️⭐️⭐️⭐️⭐️ 4.9
White Hat Hacking v10 Complete 19 Hours Course & PDF Guides
In this intermediate White Hat Hacking training, Keith Barker prepares security professionals to become penetration and vulnerability testers.
Demand for security professionals is at an all-time high — and that’s particularly true for pen testers. With this security training, you’ll learn how to scan networks for vulnerabilities, use Kali Linux to (legally) hack into systems, and write reports on how you did it.
Security professionals who take this White Hat Hacking course will have the skills they need to advance into pen tester roles — and get one of the several offensive security certifications.
For anyone who manages security training, this White Hat Hacking training can be used for penetration and vulnerability exam prep, upskilling security professionals, or to create training plans for network or security professionals.
White Hat Hacking v10: What You Need to Know
While this White Hat Hacking training doesn’t map to a certification, it covers these security topics that are valuable to aspiring pen testers and more:
- Kali Linux VM and its benefits and uses for penetration testing
- Ethical hacking: vocabulary, concepts, and strategies, as well as attack categories, types, and vectors
- Hacker’s tools: search engine, website recon, metagoofil metadata tool, DNS tools, WHOIS, and more
- Network Scanning: overview, methodology, port discovery, stealth idle scanning, vulnerability scanning, and network mapping
- Network technologies: SNMP, NetBios, LDAP, NTP, SMTP, proxy services
- Password cracking: overview, concepts, MITM and sniffing, with demonstration in the lab
- Malware: spyware, buffer overflow, trojans, viruses, detection, analysis, remedies
- Web application security: OWASP, SQL injection, man-in-the-middle, session hijacking
- Cloud computing security, mobile security, Wi-Fi security, and other special topics
Who Should Take White Hat Hacking v10 Training?
This White Hat training is considered expert-level security training, which means it was designed for experienced security professionals. This White Hat Hacking v10 course is valuable for new IT professionals with at least a year of experience with pen testing as well as experienced security professionals looking to validate their security skills.
New or aspiring security professionals. Network security professionals are in high demand these days. Those who are skilled in penetration testing can command a respectable income. Even those with no experience in ethical hacking techniques will gain a lot from our White Hat Hacking v10 training. It’s a great way to develop or accelerate a career as an IT security specialist.
Experienced security professionals. Penetration testers tend to learn a lot on their own. But there is only so much that you can get by self-study. Even experienced pen testers can pick up valuable new information and skills from our White Hat Hacking v10 course. Our coverage of the latest threats and vulnerabilities will help ethical hackers no matter how long they have been in the business.
Build and Configure your White Hat Hacking Lab
1. Getting the Most From Your Time
2 mins
2. Building a LAB: Concepts
5 mins
3. Building a LAB: Networking
9 mins
4. Deploy a Kali Linux VM
14 mins
5. Adding Metasploitable to Your Lab
9 mins
6. Adding Windows to Your Lab
14 mins
7. Configure a Static IP on Kali
3 mins
Prerequisite Hacking Knowledge
1. Ethics and Hacking
7 mins
2. Hacking Vocabulary
5 mins
3. InfoSec Concepts
5 mins
4. Attack Categories, Types, and Vectors
4 mins
5. Five Phases of Hacking
5 mins
Footprinting and Reconnaissance Tools
1. Footprinting and Reconnaissance Concepts
9 mins
2. Search Engine Tools
7 mins
3. Hacking Using Google
11 mins
4. Website Recon Tools
8 mins
5. Metagoofil Metadata Tool
3 mins
6. Email Headers for Footprinting
4 mins
7. Using WHOIS for Recon
4 mins
8. DNS Tools
9 mins
Network Scanning
1. Network Scanning Overview
3 mins
2. Network Scanning Methodology
7 mins
3. Port Discovery
9 mins
4. Stealth Idle Scanning
9 mins
5. OS and Application Fingerprinting
9 mins
Find Vulnerabilities
1. Vulnerability Scanning
7 mins
2. Network Mapping Tools
4 mins
3. NMAP
36 mins
4. Scapy
23 mins
5. Hping3
28 mins
6. Proxy Servers
8 mins
7. Using Public Proxy Services
5 mins
8. Shellshock
5 mins
Gain More Information with Enumeration Tools
1. Enumeration Concepts
5 mins
2. NetBIOS Enumeration
7 mins
3. SNMP Enumeration Concepts
8 mins
4. SNMP Enumeration Tools
7 mins
5. LDAP Enumeration Concepts
4 mins
6. LDAP Enumeration Example
6 mins
7. NTP Enumeration
6 mins
8. SMTP Enumeration
8 mins
Hack Passwords and Systems
1. System Hacking Overview
8 mins
2. Password Cracking Concepts
10 mins
3. Password Attack Example: MITM and Sniffing
12 mins
4. Rainbow Crack Lab Setup
8 mins
5. Rainbow Crack Demonstration
8 mins
6. Password Reset Hacking
7 mins
7. DHCP Starvation
10 mins
8. Remote Access
14 mins
9. NTFS Alternate Data Streams Exploit
8 mins
10. Steganography with OpenPuff
7 mins
11. Steganography with SNOW
5 mins
12. Covering Tracks
6 mins
Understand Common Malware Types
1. Malware Overview
10 mins
2. Spyware
8 mins
3. Buffer Overflow
13 mins
4. Trojan Overview
10 mins
5. Creating a Trojan
11 mins
6. Virus Overview
12 mins
7. Virus Creation
8 mins
8. Detecting Malware
17 mins
9. Malware Analysis
9 mins
10. File Verification via Hash
8 mins
Network Sniffing Tools
1. Sniffing Overview
12 mins
2. CAM Table Attack and Port Security
9 mins
3. DHCP Snooping
11 mins
4. Dynamic ARP Inspection (DAI)
8 mins
Understand Social Engineering
1. Social Engineering Concepts
5 mins
2. Social Engineering Phases
4 mins
3. Social Engineering Prevention
3 mins
Common Types of Cyber Attacks
1. DoS and DDoS Overview
9 mins
2. DoS and DDoS Prevention
7 mins
3. Session Hijacking Overview
11 mins
4. Reducing the Risk of Session Hijacking
5 mins
5. Firewall Evasion
13 mins
6. Firewall ACL Example
15 mins
7. NAT and PAT Fundamentals
11 mins
8. IDS/IPS Evasion
17 mins
9. Honeypots
12 mins
10. Hacking Web Servers
10 mins
11. OWASP Broken Web Application Project
11 mins
12. Web App Vulnerabilities: WordPress
9 mins
13. SQL Introduction
9 mins
14. SQL Injection
16 mins
Understand Wireless Technologies for Hacking Purposes
1. Wireless Hacking Overview
11 mins
2. Wireless Topologies and Vocabulary
19 mins
3. Standards and Regulations
15 mins
4. RF Fundamentals
20 mins
5. Antenna Fundamentals
13 mins
6. WLAN Frame Types
21 mins
7. WLAN Frame Flow
15 mins
Hack Wireless Technologies
1. Uncovering Hidden SSIDs
12 mins
2. Bypassing MAC Address Filters
14 mins
3. Breaking WPA2 Wireless
10 mins
4. Rogue Wireless Access Points
23 mins
5. Wireless Mis-Association Attacks
15 mins
6. MITM Using Wireless Bridging
16 mins
7. Protecting Wireless
6 mins
Hack Mobile and Cloud Technologies
1. Using an Android VM
3 mins
2. Malware for Mobile
11 mins
3. Mobile Device Risks
5 mins
4. Improving Mobile Security
6 mins
5. Cloud Computing Overview
9 mins
6. Cloud Computing Security Concerns
6 mins
7. Cloud Computing Security Benefits
7 mins
8. IoT Security Overview
5 mins
9. IoT Web, Cloud, and Mobile Interfaces
5 mins
Understand Encryption
1. Symmetrical Encryption Concepts
9 mins
2. Hashing Concepts for Data Integrity
4 mins
3. Asymmetrical Encryption Concepts
3 mins
Secure your Information and Systems
1. Control Types
3 mins
2. Multifactor Authentication
3 mins
3. CIA: Confidentiality, Integrity, and Availability
2 mins
4. Quantifying Risk
5 mins
5. Separation of Duties
5 mins
6. Centralized Identity Management
6 mins
7. Kerberos and Single Sign On (SSO)
7 mins
8. Backups and Media Management
4 mins
9. Operations Security Controls
5 mins
10. Physical Security Controls
4 mins
11. Incident Response
3 mins
12. VPNs
4 mins
13. Disaster Recovery Planning
4 mins
Tips and Tools when Pen Testing
1. Pen Testing Tips
10 mins
2. Useful Tools
11 mins
3. Case Study for Security
20 mins
4. Additional Resources
4 mins
What will you learn in this white hat hacking training?
Hacking is illegal. Ethical hacking, on the other hand, can be legal. But that doesn’t mean you can just go and hack into any system you want and expect a reward. Learning to be a white hat hacker means learning the tools and the rules – this course covers it all.
Who should take this white hat hacking course?
Ethical hacking, or white hat hacking, is a set of specific skills that can be used by many IT professionals – but especially cybersecurity professionals. This course might be too challenging for brand new IT professionals, but it’s a good fit for cybersecurity professionals with a few years of experience.
Is this training in white hat hacking associated with any certifications?
Yes, this white hat hacking course was designed to help learners as they prepare for the EC-Council Certified Ethical Hacker program’s certification exam. This course wasn’t modeled directly on the certification exam, but you’ll gain hands-on proficiency in the same material that you’ll find on the CEH exam.
What certification should you consider after taking this course in white hat hacking?
Once you’ve finished this course, you’ll probably want to consider earning the Certified Ethical Hacker (CEH) certification from EC-Council. The EC-Council is one of the world’s leaders in certifying white hat hackers who go on to be hired by companies to sniff out vulnerabilities and protect their networks.
Why should you take this white hat hacking training?
The skills of an ethical hacker aren’t limited to just what tools to use. There are important questions around legality, getting hired, and avoiding ethical problems that this course covers. At the same time, it gives you hands-on experience with the software, hardware and tools that make ethical hacking possible.
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.