Course Overview
These videos guide you through each chapter, demonstrating the hacks outlined in the book. A must-have for readers who enjoyed the book! Upon completing these videos, you’ll be well on your way to mastering hacking!
Course Outline
-
Getting Started
-
Introduction
-
Career paths in cybersecurity
-
History of hacking
-
-
Essential Skills and Tools
-
Intangible skills (critical thinking, problem-solving, communication)
-
Tangible skills (Linux, programming, networking, etc)
-
-
Hacker’s Process
-
Understanding the hacking lifecycle
-
Phases of an attack
-
-
Passive Reconnaissance (OSINT)
-
Open-source intelligence gathering techniques
-
OSINT tools (Google Dorks, Shodan)
-
WHOIS and DNS information gathering
-
-
Active Reconnaissance
-
Network scanning techniques
-
Port scanning with Nmap
-
Service and OS fingerprinting
-
-
Finding Vulnerabilities
-
Understanding common vulnerabilities (OWASP Top 10)
-
Manual vs. automated vulnerability discovery
-
-
Cracking Passwords
-
Online password attacks (dictionary attacks, brute-force)
-
Offline password cracking (hashcat, John the Ripper)
-
Rainbow tables and salting
-
-
Metasploit Framework
-
Introduction to Metasploit
-
Using Metasploit for vulnerability scanning
-
Exploit development and usage
-
Post-exploitation with Meterpreter
-
-
Sniffers (Wireshark and tcpdump)
-
Network traffic analysis basics
-
Capturing and analyzing packets with Wireshark
-
Using tcpdump for command-line packet capture
-
-
Post-Exploitation
-
Privilege escalation techniques
-
Data exfiltration methods
-
Maintaining persistence
-
-
Web Application Hacking
-
Web application architecture and common vulnerabilities
-
Using tools like OWASP ZAP and Burp Suite
-
-
Evading Antivirus
-
Understanding antivirus detection methods
-
Obfuscation techniques
-
Bypassing firewalls and intrusion detection systems
-
-
Covering Tracks
-
Log manipulation and deletion
-
Disabling auditing and logging
-
Anti-forensics techniques
-
-
Wi-Fi Hacking
-
Wi-Fi security protocols (WEP, WPA, WPA2, WPA3)
-
Evil twin attacks
-
Securing wireless networks
-
-
Python for Cybersecurity
-
Creating custom tools and scripts
-
-
Social Engineering
-
Psychology of social engineering
-
Social engineering frameworks
-
By the end of this course, you will be able to:
-
Understand the role and responsibilities of a hacker
-
Conduct thorough reconnaissance using both passive and active techniques
-
Identify and exploit common vulnerabilities in various systems
-
Use essential tools and frameworks for hacking
-
Perform basic web application and Wi-Fi security assessments
-
Develop simple Python scripts for cybersecurity tasks
-
Understand and implement social engineering techniques