Cyber Security Pack- All Course


Cyber Security Pack- All Course

In this course, you’ll learn the sensible side of ethical hacking. Too many courses teach students tools and ideas that are never utilized in the important world. In this course, we’ll focus only on tools and topics which will cause you to successful as an ethical hacker. The course is incredibly hands on and can cover many foundational topics.

In this course, we will cover:

A Day within the Life on an Ethical Hacker. What does an ethical hacker do on each day to day basis? How much can he or she make? What sort of assessments might an ethical hacker perform? These questions and more will be answered.

Effective Notekeeping. An ethical hacker is merely nearly as good because the notes he or she keeps. We will discuss the important tools you’ll use to stay notes and achieve success within the course and within the field.

Networking Refresher. This section focuses on the concepts of computer networking. We will discuss common ports and protocols, the OSI model, subnetting, and even walk through a network build with using Cisco CLI.

Introductory Python. Most ethical hackers are proficient during a programing language . This section will introduce you to at least one of the foremost commonly used languages among ethical hackers, Python. You’ll learn the ins and outs of Python 3 and by the top , you will be building your own port scanner and writing exploits in Python.

Hacking Methodology. This section overviews the five stages of hacking, which we’ll dive deeper into because the course progresses.

Reconnaissance and Information Gathering. You’ll find out how to obtain information on a client using open source intelligence. Better yet, you’ll find out how to extract breached credentials from databases to perform credential stuffing attacks, seek out subdomains during client engagements, and gather information with Burp Suite.

Scanning and Enumeration. One of the foremost important topics in ethical hacking is that the art of enumeration. You’ll find out how to seek out open ports, research for potential vulnerabilities, and learn an assortment of tools needed to perform quality enumeration.

Exploitation Basics. Here, you’ll exploit your first machine! We’ll find out how to use Metasploit to realize access to machines, the way to perform manual exploitation using coding, perform brute force and password spraying attacks, and far more.

Mid-Course Capstone. This section takes everything you’ve got learned thus far and challenges you with 10 vulnerable boxes that order in increasing difficulty. You’ll learn how an attacker thinks and learn new tools and thought processes along the way. Do you have what it takes?

Exploit Development. This section discusses the topics of buffer overflows. You will manually write your own code to take advantage of a vulnerable program and dive deep into registers to know how overflows work. This section includes custom script writing with Python 3.

Active Directory. Did you recognize that 95% of the Fortune 1000 companies run Active Directory in their environments? Due to this, Active Directory penetration testing is one among the foremost important topics you ought to learn and one among the smallest amount taught. The Active Directory portion of the course focuses on several topics. You will build out your own Active Directory lab and find out how to take advantage of it. Attacks include, but are not limited to: LLMNR poisoning, SMB relays, IPv6 DNS takeovers, pass-the-hash/pass-the-password, token impersonation, kerberoasting, GPP attacks, golden ticket attacks, and much more. You’ll also learn important tools like mimikatz, Bloodhound, and PowerView. This is not a section to miss!

Post Exploitation. The fourth and fifth stages of ethical hacking are covered here. What do we do once we have exploited a machine? How do we transfer files? How do we pivot? What are the best practices for maintaining access and cleaning up?

Web Application Penetration Testing. In this section, we revisit the art of enumeration and are introduced to several new tools that will make the process easier. You will also find out how to automate these tools utilize Bash scripting. After the enumeration section, the course dives into the OWASP Top 10. We will discuss attacks and defenses for every of the highest 10 and perform walkthroughs employing a vulnerable web applications. Topics include: SQL Injection, Broken Authentication, Sensitive Data Exposure, XML External Entities (XXE), Broken Access Control, Security Misconfigurations, Cross-Site Scripting (XSS), Insecure Deserialization, Using Components with Known Vulnerabilities, and Insufficient Logging and Monitoring

Wireless Attacks. Here, you will learn how to perform wireless attacks against WPA2 and compromise a wireless network in under 5 minutes.

Legal Documentation and Report Writing. A topic that’s rarely covered, we’ll dive into the legal documents you’ll encounter as a penetration tester, including Statements of labor , Rules of Engagement, Non-Disclosure Agreements, and Master Service Agreements. We will also discuss report writing. You will be provided a sample report also as walked through a report from an actual client assessment.

Career Advice. The course wraps up with career advice and tips for finding a job in the field.

At the end of this course, you will have a deep understanding of external and internal network penetration testing, wireless penetration testing, and web application penetration testing. All lessons taught are from a real-world experience and what has been encountered on actual engagements in the field.

When you finish this course you will learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that you can directly apply when you get back to work. I am coming from field and I will be sharing my 20 years experience with all of you. So you will also learn tips and tricks from me so that you can win the battle against the wide range of cyber adversaries that want to harm your environment.

Here is the list of what you’ll learn by the end of course,

Setting Up The Laboratory
Set Up Kali Linux from VM
Set Up Kali Linux from ISO File
Set Up a Victim: Metasploitable Linux
Set Up a Victim: OWASP Broken Web Applications
Set Up a Victim: Windows System

Penetration Test

Penetration Test Types
Security Audit
Vulnerability Scan
Penetration Test Approaches: Black Box to White Box
Penetration Test Phases: Reconnaissance to Reporting
Legal Issues Testing Standards

Network Scan

Network Scan Types
Passive Scan With Wireshark
Passive Scan with ARP Tables
Active Scan with Hping
Hping for Another Purpose: DDos

Nmap for Active Network Scan

Ping Scan to Enumerate Network Hosts
Port Scan with Nmap
SYN Scan, TCP Scan, UDP Scan
Version & Operating System Detection
Input & Output Management in Nmap
Nmap Scripting Engine
How to Bypass Security Measures in Nmap Scans
Some Other Types of Scans: XMAS, ACK, etc.
Idle (Stealth) Scan

Vulnerability Scan

Introduction to Vulnerability Scan
Introduction to a Vulnerability Scanner: Nessus
Nessus: Download, Install & Setup
Nessus: Creating a Custom Policy
Nessus: First Scan
An Aggressive Scan
Nessus: Report Function


Exploitation Terminologies
Exploit Databases
Manual Exploitation
Exploitation Frameworks
Metasploit Framework (MSF)
Introduction to MSF Console
MSF Console & How to Run an Exploit
Introduction to Meterpreter
Gaining a Meterpreter Session
Meterpreter Basics
Pass the Hash: Hack Even there’s No Vulnerability


Persistence: What is it?
Persistence Module of Meterpreter
Removing a Persistence Backdoor
Next Generation Persistence
Meterpreter for Post-Exploitation with Extensions: Core, Stdapi, Mimikatz…
Post Modules of Metasploit Framework (MSF)
Collecting Sensitive Data in Post-Exploitation Phase

Hacking Web Applications

Terms and Standards
Intercepting HTTP & HTTPS Traffics with Burp Suite
An Automated Tool: Zed Attack Proxy (ZAP) in Details
Information Gathering and Configuration Flaws
Input & Output Manipulation
Cross Site Scripting (XSS)
Reflected XSS, Stored XSS and DOM-Based XSS
BeEF – The Browser Exploitation Framework
SQL Injection
Authentication Flaws
Online Password Cracking
Authorisation Flaws
Path Traversal Attack
Session Management
Session Fixation Attack
Cross-Site Request Forgery (CSRF)

Social Engineering & Phishing Attacks

Social Engineering Terminologies
Creating Malware – Terminologies
MSF Venom
Veil to Create Custom Payloads
TheFatRat – Installation and Creating a Custom Malware
Embedding Malware in PDF Files
Embedding Malware in Word Documents
Embedding Malware in Firefox Add-ons
Empire Project in Action
Exploiting Java Vulnerabilities
Social Engineering Toolkit (SET) for Phishing
Sending Fake Emails for Phishing
Voice Phishing: Vishing

Network Fundamentals

Reference Models: OSI vs. TCP/IP
Demonstration of OSI Layers Using Wireshark
Data Link Layer (Layer 2) Standards & Protocols
Layer 2: Ethernet – Principles, Frames & Headers
Layer 2: ARP – Address Resolution Protocol
Layer 2: VLANs (Virtual Local Area Networks)
Layer 2: WLANs (Wireless Local Area Networks)
Introduction to Network Layer (Layer 3)
Layer 3: IP (Internet Protocol)
Layer 3: IPv4 Addressing System
Layer 3: IPv4 Subnetting
Layer 3: Private Networks
Layer 3: NAT (Network Address Translation)
Layer 3: IPv6
Layer 3: DHCP – How the Mechanism Works
Layer 3: ICMP (Internet Control Message Protocol)
Layer 3: Traceroute
Introduction to Transport Layer (Layer 4)
Layer 4: TCP (Transmission Control Protocol)
Layer 4: UDP (User Datagram Protocol)
Introduction to Application Layer (Layer 5 to 7)
Layer 7: DNS (Domain Name System)
Layer 7: HTTP (Hyper Text Transfer Protocol)
Layer 7: HTTPS

Network Layer & Layer-2 Attacks

Creating Network with GNS3
Network Sniffing: The “Man in the Middle” (MitM)
Network Sniffing: TCPDump
Network Sniffing: Wireshark
Active Network Devices: Router, Switch, Hub
MAC Flood Using Macof
ARP Spoof
ARP Cache Poisoning using Ettercap
DHCP Starvation & DHCP Spoofing
VLAN Hopping: Switch Spoofing, Double Tagging
Reconnaissance on Network Devices
Cracking the Passwords of the Services of Network Devices
Compromising SNMP: Finding Community Names Using NMAP Scripts
Compromising SNMP: Write Access Check Using SNMP-Check Tool
Compromising SNMP: Grabbing SNMP Configuration Using Metasploit

Password Creation Methods of Cisco Routers
Identity Management in the Network Devices
ACLs (Access Control Lists) in Cisco Switches & Routers
SNMP (Simple Network Management Protocol) Security

Enroll now to become professional Ethical Hacker!


Leave a Comment