If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course. This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced. which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world. Join us now and receive over 80 lectures & 15 hours of HD video, and 1 on 1 assistance from experienced network security professionals. We will cover the following topics in this course:
If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course. This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced. which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world. Join us now and receive over 80 lectures & 15 hours of HD video, and 1 on 1 assistance from experienced network security professionals. We will cover the following topics in this course:
This course will receive monthly updates based on students requests, and our goal is to make this the #1 network security course online.
The intent of this course is to give you the tools to defend your own networks, share skills that are valuable to companies all over the world, and help you to better understand the challenges that information security professionals face on a daily basis.
English & Spanish subtitles available.
Thank you for taking the time to read this, and we hope to see you in the course.
What you can expect to learn in this course and hardware & software requirements.
Explains how to set up the environment.
Guides you through the process of Linux installation.
General browser configuration.
Getting acquainted in Fedora KDE Desktop.
Showing basic Linux commands.
Setting up Wireshark and configuring it for later usage.
Explains how to connect to the Internet via Proxy for the purposes of anonymization.
Here I demonstrate and explain how proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.
Learn how to anonymize your traffic by using a VPN server as an anonymizer.
Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.
Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.
Here I will show you how you can monitor the traffic of your VPN server.
Lets have a look at how we can access the dark side of the Internet by using the Tor network via Tor browser.
Here we are going to take a look at how a Tor relay can be set up and configured.
Lets go ahead and install one of the necessary prerequisites for this chapter, namely aircrack-ng, which will be used in combination with our CPU to bruteforce the WPA2 key.
In order for us to begin the cracking procedure, we need to go ahead and capture a handshake between the authenticated client and the wireless access point.
Since we are going to need something to generate lists of possible passwords, I decided to use Crunch for this purpose as it is very convenient due to its numerous options.
Lets learn how to create custom rule sets for the password generation process so that our passwords would fit within a certain range of predefined rules.
In this final stage, we will feed aircrack with the passwords generated by Crunch and aircrack, in turn, will attempt to guess the passphrase by utilizing the CPU.
Installing drivers for our dedicated GPU.
Step by step guide on how to install HashCat.
Here we will learn how to prepare the capture file for HashCat.
Getting started with Hashcat, one of the world's fastest CPU/GPU based password recovery tools.
Advanced Hashcat tutorial for attacks & automation.
Here I will show you how to utilize the tool to change the mac address of your network devices so that you may reach a higher degree of anonymity.
Install a virtual machine to isolate the incoming traffic.
Configuring our network card to function as a wireless hotspot.
How to bring up and configure your own DNS server.
Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Here we will learn how to DOS the wireless connection by deauthenticating the authenticated clients.
Here we will use the tool wget in order to clone websites.
Learn how to decrypt the encrypted files.
Part 2 of how to decrypt the encrypted files.
Part 3 of how to decrypt the encrypted files.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.