English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 2h 03m | 702 MB
Hack your way to a secure and threat-free environment using best-in-class tools and techniques.
This video course provides a good starting point from which to learn ethical hacking and identify threats and vulnerabilities to secure your IT environment.
We'll begin by introducing you to the best tools around; these are essential to get you started with penetration testing. Next, we'll introduce you to a basic hacking technique: reconnaissance. You'll get hands-on experience working with Metasploit and testing the effectiveness of different defenses. Next, you'll learn about sniffing and how effective the Man-in-the-Middle attack can be. We'll take you through a coffee shop scenario to further your understanding. You'll get the hang of bypassing different defenses, then learn how hackers use networks to gain access to different systems.
What You Will Learn
- Stage attacks to your own advantage
- Work with the Metasploit toolkit to test the effectiveness of defenses
- Incorporate sniffing with the Man-in-the-Middle attack
- Bypass modern security defenses to understand the ins and outs of security
- Understand how networks are exploited by attackers
01 The Course Overview
02 Basic Terminologies
03 Operating Systems and Tools Used
04 What is Reconnaissance
05 Working with NMap
06 Shodan for scanning
07 Other Types of Reconnaissance
08 Metasploit Basics
09 Exploiting a Vulnerability
12 MitM (Man-in-the-Middle) Attack
13 Social Engineering Toolkit
14 Working with Wireshark