وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Ethical Hacking Mastery: Cybersecurity & Pen Testing

سرفصل های دوره

Become an Expert Ethical Hacker: Master Cybersecurity, Penetration Testing, and Vulnerability Assessment.


1 - Introduction
  • 1 - Course Introduction and Overview

  • 2 - Building Your Hacking Playground Setting Up the Ethical Hacking Lab
  • 2 - Introduction and Scope
  • 3 - Virtual Machines for Ethical Hacking
  • 4 - Installing VirtualBox on Windows
  • 5 - Installing VirtualBox on Mac
  • 6 - Installing Kali Linux
  • 7 - Installing Windows in VirtualBox
  • 8 - Snapshot Management in VirtualBox Preserving Ethical Hacking Environments

  • 3 - Mastering Kali Linux Advanced Tools and Techniques for Ethical Hacking
  • 9 - Introduction to Kali Linux
  • 10 - Kali Linux Overview
  • 11 - Linux Terminal and Commands Essential Skills for Ethical Hackers
  • 12 - Changing the Kali Linux Password Ensuring Security in Hacking Environments

  • 4 - Securing Your Digital Footprint Online Anonymity for Ethical Hackers
  • 13 - Introduction
  • 14 - Understanding Network Fundamentals
  • 15 - Domain Name SystemDNS
  • 16 - Configuring DNS Servers
  • 17 - Virtual Private NetworkVPN

  • 5 - Exploring the Dark Web
  • 18 - Introduction
  • 19 - Understanding the Dark Web An InDepth Exploration
  • 20 - Installing Tor Gateway to Anonymous Browsing and Accessing the Dark Web
  • 21 - Navigating the Dark Web Safely

  • 6 - Network Penetration Testing Infiltrating Systems
  • 22 - Introduction
  • 23 - Fundamentals and Objectives of Network Pentesting
  • 24 - Exploring Chipsets
  • 25 - Connecting WiFi USB Adapters
  • 26 - MAC Addresses Device Identification in Network Security
  • 27 - Monitor Mode vs Managed Mode Wireless Network Configurations

  • 7 - Network Reconnaissance and Footprinting
  • 28 - Introduction
  • 29 - Network Sniffing Techniques
  • 30 - Airodumpng for Targeted Reconnaissance Profiling Specific Network Entities
  • 31 - Deauthentication Attacks Disrupting Network Connections for Security Analysis
  • 32 - Realtime Deauthentication Attacks Dynamic Network Disruptions

  • 8 - Attacking Wireless Networks
  • 33 - Introduction
  • 34 - Wireless Encryption Models
  • 35 - Cracking WEP Networks
  • 36 - Fake Authentication Attacks
  • 37 - Packet Injection Techniques Manipulating Data
  • 38 - WPA Networks
  • 39 - Capturing 3Way Handshakes
  • 40 - Creating Wordlists Building Effective Dictionaries for Ethical Hacking Strategi
  • 41 - RealTime WPA Network Cracking
  • 42 - Safe Routers Configuration Securing Wireless Networks for Ethical Hacking

  • 9 - PostConnection Attacks
  • 43 - Introduction
  • 44 - Post Connection Settings
  • 45 - NetDiscover Network Address Discovery for Ethical Hacking Exploration
  • 46 - Nmap Mastery Comprehensive Network Scanning for Ethical Hacking Strategies
  • 47 - MITM Attacks Unveiled Mastering ManintheMiddle Exploits for Ethical Hacking
  • 48 - ARP Poisoning Techniques Manipulating Network Traffic
  • 49 - MITM Frameworks Harnessing Advanced Tools for ManintheMiddle Attacks
  • 50 - Password Sniffing Techniques
  • 51 - Bypassing HTTPS Decrypting Secure Connections for Ethical Hacking Insights
  • 52 - Creating a Web Server
  • 53 - DNS Attacks Uncovering Vulnerabilities for Ethical Hacking Analysis
  • 54 - Installing Bettercap Advanced Network Sniffing
  • 55 - ARP Attacks Exploiting Address Resolution
  • 56 - Capturing Information Ethical Techniques for Ethical Hacking Analysis
  • 57 - Bettercap Caplets Customized Network Manipulation
  • 58 - HSTS Settings Enhancing HTTPS Security for Ethical Hacking Proficiency
  • 59 - Downgrading HTTPS
  • 60 - HSTS Downgrade
  • 61 - Injecting JavaScript Exploiting ClientSide Vulnerabilities
  • 62 - Introduction to Wireshark Unveiling Network Traffic Analysis
  • 63 - Wireshark Analysis Mastering Network Traffic Examination
  • 64 - Protecting Yourself Ethical Hacking Safeguards and Best Practices

  • 10 - System Penetration Testing Probing Operating Systems
  • 65 - Introduction
  • 66 - Gaining Access Ethical Hacking Strategies for System Penetration Testing
  • 67 - Installing Metasploitable Setting Up Vulnerable Systems for Ethical Hacking Exp
  • 68 - Vulnerability Assessment Identifying Weaknesses for System Penetration Testing
  • 69 - Exploiting First Vulnerability Ethical Hacking Techniques in System Penetration
  • 70 - Exploiting Username Map Script Vulnerability
  • 71 - Exploiting PostgreSQL Vulnerability

  • 11 - UserCentric Attacks
  • 72 - Introduction
  • 73 - User Exploitation Techniques
  • 74 - Installing Veil Framework
  • 75 - Veil Framework Overview
  • 76 - Backdoor Creation Techniques
  • 77 - Antivirus Bypass Techniques
  • 78 - Utilizing MultiHandler Advanced User Exploitation Tactics in Ethical Hacking
  • 79 - Backdoor Testing Methods Evaluating User Exploitation Techniques

  • 12 - Social Engineering Tactics in Ethical Hacking
  • 80 - Introduction
  • 81 - Maltego Exploration Leveraging Data Mining
  • 82 - Maltego Overview Harnessing Data Intelligence
  • 83 - Maltego Strategies Advanced Data Mining Techniques for Social Engineering
  • 84 - Downloading Combiner Ethical Hacking Tools for Social Engineering Tactics
  • 85 - File Combination Techniques Ethical Hacking Strategies in Social Engineering
  • 86 - Creating Convincing Files Advanced Social Engineering
  • 87 - Manipulating Characters
  • 88 - Sending Fake Emails Deceptive Communication in Social Engineering

  • 13 - Social Media Security Safeguarding Online Presence and User Privacy
  • 89 - Introduction
  • 90 - Brute Force Attacks Ethical Hacking Strategies for User Credentials
  • 91 - Instagram Social Engineering Manipulating User Behavior for Ethical Hacking
  • 92 - Protecting Your Online Presence Social Media Security Measures

  • 14 - Browser Exploitation Framework Manipulating Web Browsers for Ethical Hacking
  • 93 - Introduction
  • 94 - Exploring BeEF Browser Exploitation Framework for Ethical Hacking Techniques
  • 95 - Hooking a Target to BeEF Exploiting Browser Vulnerabilities
  • 96 - JavaScript Injection Techniques
  • 97 - Capturing Screenshots
  • 98 - Password Theft Techniques
  • 99 - Backdoor Delivery Methods
  • 100 - Protecting Against Backdoor Attacks

  • 15 - Exploiting External Networks
  • 101 - Introduction
  • 102 - Creating External Backdoors Advanced Techniques for Ethical Hacking in Network
  • 103 - Port Forwarding Tactics Ethical Hacking Strategies for Network Access
  • 104 - Disabling CDP Ethical Hacking Techniques for Concealing Network Information

  • 16 - PostExploitation Ethical Hacking Analysis and Remediation
  • 105 - Introduction
  • 106 - Managing Meterpreter Sessions PostExploitation Analysis
  • 107 - Migration Commands in Meterpreter Secure PostExploitation Control
  • 108 - Downloading Files in Meterpreter Techniques for Secure Data Retrieval
  • 109 - Capturing Keylogs with Meterpreter Ethical Hacking for Secure PostExploitation

  • 17 - Hacker Methodology Ethical Hacking Approaches and Techniques
  • 110 - Introduction
  • 111 - Ethical Hacker Steps Approach to Penetration Testing and Network Defense
  • 112 - Detailed Explanation of Ethical Hacking Steps

  • 18 - Website Reconnaissance Footprinting
  • 113 - Introduction
  • 114 - Essential Configurations for Web Penetration Testing
  • 115 - Maltego in Website Reconnaissance
  • 116 - Utilizing Netcraft in Website Reconnaissance
  • 117 - Reverse DNS Lookup IP Address Exploration
  • 118 - WHOIS Lookup Techniques for Domain Information Retrieval
  • 119 - Understanding robotstxt Insights for Web Crawling Restrictions
  • 120 - Exploring Subdomains Hacking Strategies for Comprehensive Domain Analysis

  • 19 - Website Penetration Testing
  • 121 - Introduction
  • 122 - Code Execution Vulnerabilities
  • 123 - Reverse TCP Commands Secure Remote Communication Protocols
  • 124 - File Upload Vulnerabilities
  • 125 - File Inclusion Vulnerabilities

  • 20 - Cross Site Scripting XSS
  • 126 - Introduction
  • 127 - Understanding Cross Site Scripting XSS
  • 128 - Reflected XSS Exploits
  • 129 - Stored XSS Vulnerabilities
  • 130 - Realtime XSS Attacks
  • 131 - XSS Prevention Measures

  • 21 - SQL Fundamentals Comprehensive Understanding of Database Management and Queries
  • 132 - Database and SQL Fundamentals
  • 133 - Understanding Database Structures
  • 134 - Adding New Values to the Database
  • 135 - Updating and Deleting Database Values
  • 136 - Filtering Data in SQL

  • 22 - SQL Injection Attacks
  • 137 - Introduction
  • 138 - Metasploitable Database
  • 139 - Working with Mutillidae
  • 140 - Vulnerability Testing
  • 141 - POSTSQL Exploitation Methods for Database Manipulation and Security Analysis
  • 142 - GET Requests and SQL Techniques for Secure Data Retrieval and Analysis
  • 143 - Retrieving Passwords from Databases
  • 144 - Learning Database Names
  • 145 - Advanced Database Reconnaissance
  • 146 - Retrieving All Data

  • 23 - Web Penetration Testing Tools
  • 147 - Introduction
  • 148 - SQLmap Advanced SQL Injection Testing and Exploitation
  • 149 - OWASP ZAP Zed Attack Proxy
  • 150 - OWASP ZAP Analysis

  • 24 - Cyber Security Certifications
  • 151 - Introduction
  • 152 - Exploring Cyber Security Certifications
  • 153 - Certified Ethical Hacker CEH Certification
  • 154 - Offensive Security Certified Professional OSCP
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 27068
    حجم: 9836 مگابایت
    مدت زمان: 880 دقیقه
    تاریخ انتشار: ۲۷ آذر ۱۴۰۲
    دسته بندی محصول
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید