Learn Ethical Hacking From Scratch

Learn Ethical Hacking From Scratch
English | Size: 1.91 GB
Category: CBTs

Welcome to this comprehensive course on ethical hacking! This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in Zaid’s lab. The course is structured in a way that will take you through the basics of Linux, computer systems, networks, and how devices communicate with each other. We will start by talking about how we can exploit these systems to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level and by the time you finish, you will have knowledge about most penetration testing fields. You will also learn how to discover and exploit a number of dangerous vulnerabilities such as SQL injections, XSS vulnerabilities, and so on. At the end of each section you will learn how to detect, prevent and secure your system and yourself from these attacks. All the attacks in this course are practical attacks that work against any computer device, so it does not matter if the device is a phone, tablet, laptop, or whatever. Each attack is explained in a simple way: first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux. [Read more…]

INE | Ethical Hacking: Module 6 :: Malware Threats | Josue Vargas

INE | Ethical Hacking: Module 6 :: Malware Threats | Josue Vargas
English | Size: 387.04 MB
Category: CBTS

In this module you will learn how malware works, the different categories of malware and how to use it to your advantage. Encompassing a lot of different tools, malware refers to software used for malicious purposes and currently, threats related to malware are causing millions of dollars in damage, data and reputation loss worldwide. As an ethical hacker, you’re expected to know how to use malware offensively, but also recognize symptoms and signals that point to malware infections; in this module you will build and use malware to infect computers and you will also learn how to detect its presence in a system. Enjoy! [Read more…]

INE | Ethical Hacking: Module 5 :: System Hacking | Josue Vargas

INE | Ethical Hacking: Module 5 :: System Hacking | Josue Vargas
English | Size: 591.36 MB
Category: CBTs

The System Hacking module is the start of what you were looking for in all the previous phases of the Hacking Lifecycle. With the information gathered during previous stages, we will learn how we can force our way into a system, crack passwords, create backdoors, maintaining access to the system, hiding our files in plain sight and covering tracks. After this module, everything else revolves around different techniques and technologies that can be used to hack systems and networks, being the present module the theoretical foundation for what’s to come. [Read more…]

INE | Ethical Hacking: Module 4 :: Enumeration | Josue Vargas

INE | Ethical Hacking: Module 4 :: Enumeration | Josue Vargas
English | Size: 344.78 MB
Category: CBTs

In the enumeration module you will learn how to use the discovered services and protocols running in your target network to gather more details and difficult to obtain intelligence prior to the actual System Hacking phase. This module is the last of the preliminary investigative phases in the hacking cycle and with it ends the information gathering which will now empower us to narrow down our targets and start planning our attacks against specific technologies and choose the appropriate hacking tools we will learn about in the remainder of this course.
[Read more…]

INE Ethical Hacking Module 3 Scanning Networks Josue Vargas

INE | Ethical Hacking: Module 3 :: Scanning Networks | Josue Vargas
English | Size: 485.86 MB
Category: CBTs

Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. In this course you will become prepared to handle this portion of the CEH exam.
[Read more…]

INE | Ethical Hacking: Module 2 :: Footprinting and Reconnaissance | Josue Vargas

INE | Ethical Hacking: Module 2 :: Footprinting and Reconnaissance | Josue Vargas
English | Size: 588.47 MB
Category: Tutorial

Course Description
In this course you will become aware of the investigative tasks that a hacker needs to perform to accurately profile his targets and the different tools and public information sources which can provide valuable information (many times, information that should have never been made public). [Read more…]

O’Reilly – Security Testing and Ethical Hacking with Kali Linux

O’Reilly – Security Testing and Ethical Hacking with Kali Linux
English | Size: 3.17 GB
Category: Tutorial

Analysts and engineers performing security testing or penetration testing are typically expected to deliver a report at the end of their work. In this video, created for entry-to-intermediate-level security engineers, you’ll learn to use the Kali Linux toolsets that help you handle three major tasks associated with producing such reports. First, you’ll learn about the Kali tools that let you manipulate and manage the sometimes overwhelming volume of data that security and penetration test generate. Second, you’ll learn about the Kali tools that help you capture and organize your test notes before integrating them into your reports. Third, you’ll learn about the Kali tools that let you collaborate with your security colleagues to collect, manage, and prepare comprehensive reports. Participants should have access to Kali Linux before starting this course. [Read more…]

Udemy – The Complete Ethical Hacking Course Beginner to Advanced!

Udemy – The Complete Ethical Hacking Course Beginner to Advanced!
English | Size: 6.85 GB
Category: CBTs

Basic hacking terms you will want to know getting started.
Build your hacking environment!
Set up instructions for Mac users ONLY
How to create a bootable USB of Kali Linux ( optional )
Updates: How to install VirtualBox on Fedora 22 + Kali Sana VM ( OPTIONAL )
Linux Terminal including basic functionalities and CLI.
What is Tor? How can you use it to protect your anonymity online?
ProxyChains for using proxy servers, hiding your ip, and obtaining access.
What is a Virtual Private Nework (VPN) and how you can stay anonymous with VPN?
[Read more…]

O’Reilly – Security Testing and Ethical Hacking with Kali Linux

O’Reilly – Security Testing and Ethical Hacking with Kali Linux
English | Size: 3.03 GB
Category: Linux | Security

Analysts and engineers performing security testing or penetration testing are typically expected to deliver a report at the end of their work. In this video, created for entry-to-intermediate-level security engineers, you’ll learn to use the Kali Linux toolsets that help you handle three major tasks associated with producing such reports. First, you’ll learn about the Kali tools that let you manipulate and manage the sometimes overwhelming volume of data that security and penetration test generate. Second, you’ll learn about the Kali tools that help you capture and organize your test notes before integrating them into your reports. Third, you’ll learn about the Kali tools that let you collaborate with your security colleagues to collect, manage, and prepare comprehensive reports. Participants should have access to Kali Linux before starting this course. [Read more…]

Udemy – Ethical Hacking Full Series From Scratch to Advanced

Udemy – Ethical Hacking Full Series From Scratch to Advanced
English | Size: 1.30 GB
Category: CBTs

Today, security is one of the key factors of a trusted organization and is a successful organization that can properly protect its own intelligence assets, but security is not at all a simple matter and there are many difficulties to implement it, with Considering the ever-increasing advances in technology and the diversification of hacking techniques and the continual change of these techniques, as well as the finding of many security holes in various software applications , the security process has become much more complex. Legitimate hacking or ethical hacking actually involves the use of tools, tricks and techniques by which vulnerable network pointsDuring the training, the ++ Udemy Ethical Hacking Full Series: From Scratch to Advanced for ethical hacking are familiar with basic to advanced. [Read more…]