Ethical Hacking for Beginners

Course

Online

£ 10 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Hack your way to a secure and threat-free environment using best-in-class tools and techniques.This video course provides a good starting point from which to learn ethical hacking and identify threats and vulnerabilities to secure your IT environment.We'll begin by introducing you to the best tools around; these are essential to get you started with penetration testing. Next, we'll introduce you to a basic hacking technique: reconnaissance. You'll get hands-on experience working with Metasploit and testing the effectiveness of different defenses. Next, you'll learn about sniffing and how effective the Man-in-the-Middle attack can be. We'll take you through a coffee shop scenario to further your understanding. You'll get the hang of bypassing different defenses, then learn how hackers use networks to gain access to different systems.About the authorGary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome's computer security and forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Stage attacks to your own advantage
Work with the Metasploit toolkit to test the effectiveness of defenses
Incorporate sniffing with the Man-in-the-Middle attack
Bypass modern security defenses to understand the ins and outs of security
Understand how networks are exploited by attackers

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Operating System
  • TCP
  • Systems
  • Printing
  • Operating Systems
  • Hacking
  • Switches
  • Testing
  • Options

Course programme

First Steps 3 lectures 10:30 The Course Overview This video provides an overview of the entire content. Basic Terminologies The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.
  • Get a grasp on the definitions of the hacking terms used in this course
  • Understand their significance
  • Know the phases of ethical hacking
Operating Systems and Tools Used In this video, we will take a look at the operating systems used in this course.
  • Check out the operating system used in the course
  • Glance through some of the tools we have used in the course
First Steps 3 lectures 10:30 The Course Overview This video provides an overview of the entire content. Basic Terminologies The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.
  • Get a grasp on the definitions of the hacking terms used in this course
  • Understand their significance
  • Know the phases of ethical hacking
Operating Systems and Tools Used In this video, we will take a look at the operating systems used in this course.
  • Check out the operating system used in the course
  • Glance through some of the tools we have used in the course
The Course Overview This video provides an overview of the entire content. The Course Overview This video provides an overview of the entire content. The Course Overview This video provides an overview of the entire content. The Course Overview This video provides an overview of the entire content. This video provides an overview of the entire content. This video provides an overview of the entire content. Basic Terminologies The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.
  • Get a grasp on the definitions of the hacking terms used in this course
  • Understand their significance
  • Know the phases of ethical hacking
Basic Terminologies The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.
  • Get a grasp on the definitions of the hacking terms used in this course
  • Understand their significance
  • Know the phases of ethical hacking
Basic Terminologies The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.
  • Get a grasp on the definitions of the hacking terms used in this course
  • Understand their significance
  • Know the phases of ethical hacking
Basic Terminologies The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.
  • Get a grasp on the definitions of the hacking terms used in this course
  • Understand their significance
  • Know the phases of ethical hacking
The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.
  • Get a grasp on the definitions of the hacking terms used in this course
  • Understand their significance
  • Know the phases of ethical hacking
The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.
  • Get a grasp on the definitions of the hacking terms used in this course
  • Understand their significance
  • Know the phases of ethical hacking
Operating Systems and Tools Used In this video, we will take a look at the operating systems used in this course.
  • Check out the operating system used in the course
  • Glance through some of the tools we have used in the course
Operating Systems and Tools Used In this video, we will take a look at the operating systems used in this course.
  • Check out the operating system used in the course
  • Glance through some of the tools we have used in the course
Operating Systems and Tools Used In this video, we will take a look at the operating systems used in this course.
  • Check out the operating system used in the course
  • Glance through some of the tools we have used in the course
Operating Systems and Tools Used In this video, we will take a look at the operating systems used in this course.
  • Check out the operating system used in the course
  • Glance through some of the tools we have used in the course
In this video, we will take a look at the operating systems used in this course.
  • Check out the operating system used in the course
  • Glance through some of the tools we have used in the course
In this video, we will take a look at the operating systems used in this course.
  • Check out the operating system used in the course
  • Glance through some of the tools we have used in the course
Reconnaissance and Scanning 4 lectures 42:41 What is Reconnaissance? The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.
  • Understand the importance of the Reconnaissance phase in hacking
  • Know more about Passive and Active foot printing
  • Take a deeper look at Vulnerability Research
Working with NMap Our aim in this video is to understand what NMap is and how we will be working with it.
  • Understand the 3-way TCP handshake
  • Talk about ports, switches, and options
  • Use the commands we learnt in demo scenarios
Shodan for scanning In this video we will learn what Shodan is and how to use it.
  • Scour through the Shodan website
  • Explore the options available on the website
  • Create a demo report
Other Types of Reconnaissance In this video we’ll understand vulnerability scanning
  • Check out vulnerability scanning with Nikto
  • Check out vulnerability scanning with Sparta
Reconnaissance and Scanning 4 lectures 42:41 What is Reconnaissance? The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.
  • Understand the importance of the Reconnaissance phase in hacking
  • Know more about Passive and Active foot printing
  • Take a deeper look at Vulnerability Research
Working with NMap Our aim in this video is to understand what NMap is and how we will be working with it.
  • Understand the 3-way TCP handshake
  • Talk about ports, switches, and options
  • Use the commands we learnt in demo scenarios
Shodan for scanning In this video we will learn what Shodan is and how to use it.
  • Scour through the Shodan website
  • Explore the options available on the website
  • Create a demo report
Other Types of Reconnaissance In this video we’ll understand vulnerability scanning
  • Check out vulnerability scanning with Nikto
  • Check out vulnerability scanning with Sparta
What is Reconnaissance? The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.
  • Understand the importance of the Reconnaissance phase in hacking
  • Know more about Passive and Active foot printing
  • Take a deeper look at Vulnerability Research
What is Reconnaissance? The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.
  • Understand the importance of the Reconnaissance phase in hacking
  • Know more about Passive and Active foot printing
  • Take a deeper look at Vulnerability Research
What is Reconnaissance? The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.
  • Understand the importance of the Reconnaissance phase in hacking
  • Know more about Passive and Active foot printing
  • Take a deeper look at Vulnerability Research
What is Reconnaissance? The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.
  • Understand the importance of the Reconnaissance phase in hacking
  • Know more about Passive and Active foot printing
  • Take a deeper look at Vulnerability Research
The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.
  • Understand the importance of the Reconnaissance phase in hacking
  • Know more about Passive and Active foot printing
  • Take a deeper look at Vulnerability Research
The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.
  • Understand the importance of the Reconnaissance phase in hacking
  • Know more about Passive and Active foot printing
  • Take a deeper look at Vulnerability Research
Working with NMap Our aim in this video is to understand what NMap is and how we will be working with it.
  • Understand the 3-way TCP handshake
  • Talk about ports, switches, and options
  • Use the commands we learnt in demo scenarios
Working with NMap Our aim in this video is to understand what NMap is and how we will be working with it.
  • Understand the 3-way TCP handshake
  • Talk about ports, switches, and options
  • Use the commands we learnt in demo scenarios
Working with NMap Our aim in this video is to understand what NMap is and how we will be working with it.
  • Understand the 3-way TCP handshake
  • Talk about ports, switches, and options
  • Use the commands we learnt in demo scenarios
Working with NMap Our aim in this video is to understand what NMap is and how we will be working with it.
  • Understand the 3-way TCP handshake
  • Talk about ports, switches, and options
  • Use the commands we learnt in demo scenarios
Our aim in this video is to understand what NMap is and how we will be working with it.
  • Understand the 3-way TCP handshake
  • Talk about ports, switches, and options
  • Use the commands we learnt in demo scenarios
Our aim in this video is to understand what NMap is and how we will be working with it.
  • Understand the 3-way TCP handshake
  • Talk about ports, switches, and options
  • Use the commands we learnt in demo scenarios
Shodan for scanning In this video we will learn what Shodan is and how to use it.
  • Scour through the Shodan website
  • Explore the options available on the website
  • Create a demo report
Shodan for scanning In this video we will learn what Shodan is and how to use it.
  • Scour through the Shodan website
  • Explore the options available on the website
  • Create a demo report
Shodan for scanning In this video we will learn what Shodan is and how to use it.
  • Scour through the Shodan website
  • Explore the options available on the website
  • Create a demo report
Shodan for scanning In this video we will learn what Shodan is and how to use it.
  • Scour through the Shodan website
  • Explore the options available on the website
  • Create a demo report
In this video we will learn what Shodan is and how to use it.
  • Scour through the Shodan website
  • Explore the options available on the website
  • Create a demo report
In this video we will learn what Shodan is and how to use it.
  • Scour through the Shodan website
  • Explore the options available on the website
  • Create a demo report
Other Types of Reconnaissance In this video we’ll understand vulnerability scanning
  • Check out vulnerability scanning with Nikto
  • Check out vulnerability scanning with Sparta
Other Types of Reconnaissance In this video we’ll understand vulnerability scanning
  • Check out vulnerability scanning with Nikto
  • Check out vulnerability scanning with Sparta
Other Types of Reconnaissance In this video we’ll understand vulnerability scanning
  • Check out vulnerability scanning with Nikto
  • Check out vulnerability scanning with Sparta
Other Types of Reconnaissance In this video we’ll understand vulnerability scanning
  • Check out vulnerability scanning with Nikto
  • Check out vulnerability scanning with Sparta
In this video we’ll understand vulnerability scanning
  • Check out vulnerability scanning with Nikto
  • Check out vulnerability scanning with Sparta
In this video we’ll understand vulnerability scanning
  • Check out vulnerability scanning with Nikto
  • Check out vulnerability scanning with Sparta
Exploit and Sniffing. 7 lectures 01:09:55 Metasploit Basics Used by industry leaders in security, Metasploit is essential to a hacking course for beginners. Let’s talk about it in this video.
  • Know what Metasploit is
  • Understand the basic commands used in Metasploit
Exploiting a Vulnerability This video will help us understand how we can effectively exploit the weakness in a system
  • Know how to find vulnerabilities in a system
  • Launch exploits to penetrate a target
Armitage This video will help us understand armitage in detail.
  • Understand what armitage is
  • Know how to effectively use armitage
Aircrack-ng In this video we will take a look at Aircrack-ng that will help us in wireless hacking

Additional information

A basic C# programming knowledge is assumed. The course assumes some familiarity with networking-related concepts such as TCP/IP, but no IT security-related background is required

Ethical Hacking for Beginners

£ 10 VAT inc.