* Cantinho Satkeys

Refresh History
  • FELISCUNHA: ghyt74   49E09B4F  e bom feriado   4tj97u<z
    Hoje às 10:39
  • JPratas: try65hytr Pessoal  h7ft6l k7y8j0
    Hoje às 03:51
  • j.s.: try65hytr a todos  4tj97u<z
    30 de Outubro de 2024, 21:00
  • JPratas: dgtgtr Pessoal  4tj97u<z k7y8j0
    28 de Outubro de 2024, 17:35
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  k8h9m
    27 de Outubro de 2024, 11:21
  • j.s.: bom fim de semana   49E09B4F 49E09B4F
    26 de Outubro de 2024, 17:06
  • j.s.: dgtgtr a todos  4tj97u<z
    26 de Outubro de 2024, 17:06
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana
    26 de Outubro de 2024, 11:49
  • JPratas: try65hytr Pessoal  101yd91 k7y8j0
    25 de Outubro de 2024, 03:53
  • JPratas: dgtgtr A Todos  4tj97u<z 2dgh8i k7y8j0
    23 de Outubro de 2024, 16:31
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    23 de Outubro de 2024, 10:59
  • j.s.: dgtgtr a todos  4tj97u<z
    22 de Outubro de 2024, 18:16
  • j.s.: dgtgtr a todos  4tj97u<z
    20 de Outubro de 2024, 15:04
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  101041
    20 de Outubro de 2024, 11:37
  • axlpoa: hi
    19 de Outubro de 2024, 22:24
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana  4tj97u<z
    19 de Outubro de 2024, 11:31
  • j.s.: ghyt74 a todos  4tj97u<z
    18 de Outubro de 2024, 09:33
  • JPratas: try65hytr Pessoal  4tj97u<z classic k7y8j0
    18 de Outubro de 2024, 03:28
  • schmeagle: iheartradio
    17 de Outubro de 2024, 22:58
  • j.s.: dgtgtr a todos  4tj97u<z
    17 de Outubro de 2024, 18:09

Autor Tópico: Hands-On Ethical Hacking and Network Security Applied 2020  (Lida 201 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Online mitsumi

  • Moderador Global
  • ***
  • Mensagens: 115395
  • Karma: +0/-0

Hands-On Ethical Hacking and Network Security Applied 2020
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz
Language: English | VTT | Size: 6.96 GB | Duration: 13 hours

What you'll learn
Learn How to set up a Hacking Lab (Kali Linux, Metasploitable, VMs).
You will MASTER Ethical Hacking and Network Security Key Concepts (Reconnaissance, Sniffing, Exploitation ...).
Acquire the Skills to MITIGATE ALL THE ATTACKS presented in the course.
Learn How to Hack Routers and IoT Devices using RouterSploit.
Learn How to Hack Systems using Metasploit.
Learn How to Hack WiFi Networks (Traffic Sniffing and Injection, Deauthentication Attack, WPA2 Cracking).
Learn How to Secure a WiFi Network and stay safe and anonymous while browsing the Web.
Learn How to implement Full Disk Encryption.
Learn How to Hack ARP (Poisoning, Ettercap, Bettercap, Caplets, Ban, ...).
Learn How to Hack STP.
Learn How to Hack CDP.
Learn How to Hack Switches.
Acquire an In-Depth Understanding of Steganography and How to Hide Secret Data.
Learn about the tools used for Cracking Passwords (John the Ripper, Hydra, Rainbow Tables, rcrack).
Acquire an In-Depth Understanding of GnuPG (symmetric and asymmetric encryption, key management, digital signatures).
Acquire an In-Depth Understanding of Hashes and How to Break them.
Learn How to Hack HTTPS (SSL Sniffing, SSL Stripping, HTTPS Downgrade).
Learn How to Hack DHCP (Flooding, Starvation, Roque Server).
Learn How to Hack Google Searches (Google Dorks).
Learn How to use Shodan to discover and Hack IoT devices.
Acquire In-Depth Sniffing Techniques (Wireshark, Filters, tcpdump, airodump-ng).
Acquire In-Depth Scanning Techniques using Nmap, Nmap Scripting Engine, Zenmap, arp-scan and netdiscover.
Acquire an In-Depth Understanding of Netfilter/Iptables Linux Firewall (Chains, Tables, Matches, Targets).

Requirements
A computer (Windows, Mac, or Linux) with an Internet Connection and at least 4GB RAM and 20GB free hard disk space.
Linux basics like commands, text editors, file system etc.
Very basic knowledge of Networking concepts (how clients and servers typically communicate, TCP, ARP, DNS, IP's, ports, etc).
For Hacking WiFi Networks (9 lectures only) a wireless adapter that supports monitor mode (more info provided in the course).
Your time and enthusiasm to learn and practice :))
Description
This course IS NOT like any other Ethical Hacking courses you can take online. At the end of this course you will MASTER the key concepts and you will become an Ethical Hacker and Network Security Expert.

This is a brand new Ethical Hacking and Network Security Applied course just recently launched in April 2020 and it's updated to teach you the skills required for the future that comes.

The world is changing, constantly and at a fast pace! The technology-driven future in which we'll live is filled with promise but also challenges. This Ethical Hacking course is really different! You'll learn what really matters and you'll get the skills to get ahead and gain an edge.

I won't teach you how to run an exploit on a vulnerable application that will be patched in a few days and will not work anymore. Instead I'll teach you the network security principles that will last for years to come using a practical approach but without neglecting the theory which is the base of a deep understanding.

Do you want to learn a new valuable skill, get hired, get a promotion or simply prepare for the future that comes? Well, then this course is for you! By enrolling in this course now, you make the best investment in your career!

Given the surge in the cyber-security threads millions of new jobs will open across the industry and the global digital security spending will exceed hundreds of billions of dollars in the years to come.

After this course you'll have an in-depth understanding of how hackers think and behave.

This course is for you, if you want to learn Ethical Hacking and Network Security applied to the real-world.

It's especially designed for you whether you have no experience in Network Security, you've taken other related courses and you want to level up your skills, or you are coming from other fields like Network and System administration or Programming.

You'll have access to my closed and exclusive online Group in order to provide you with improved, faster and better support for your course-related questions.

This course is taught by me, a Senior Network Engineer and Professional Trainer. Why should you learn from me?

I'm a Practitioner and an Enthusiast. Welcome to the real world! I entered the Network Security world 15 years ago. I'm not just a random guy that teaches Ethical Hacking and Network Security. Just imagine that during this time I've learned and applied more and more almost on a daily basis. And now I'm giving everything to you!

I'm an Educator and I know how to make a Curriculum. I know exactly what is important and what is not. For the last 10 years I've trained thousands of people on Security, Networking and Programming.

You'll learn not only some commands and tools, but also advanced concepts for real-word jobs that will last. After this course you'll be an effective Ethical Hacker!

You'll have lifetime access and you can return and look for a specific hack or countermeasure anytime you want. And let's not forget, if you don't like the course, you are covered by a 30 day money back guarantee, full refund, no questions asked!

The topics covered in this Hands-On Ethical Hacking and Network Security Applied course are:

Setting the Hacking Environment (Kali Linux, Metasploitable, VMs)

Use Kali to Hack Networks and Devices

Hacking Routers and IoT Devices using RouterSploit

Hacking anything with Metasploit

Cryptography In Depth (Hashes, Digital Signature, Encryption)

Attacks on Hash Algorithms

Full Disk Encryption (Data at rest protection)

GnuPG In Depth

Steganography In Depth

Hiding files in other files

Cracking Passwords (John & Hydra)

Rainbow Tables

Information Gathering (Reconnaissance)

Nmap & Zenmap, Nmap Scripting Engine (NSE)

arp-scan & net-discover

Hacking Google Searches In Depth

Shodan

Sniffing Traffic (Wireshark & tcpdump)

Hacking WiFi Networks

Hacking WPA2

Hacking ARP (Ettercap & Bettercap)

Hacking HTTPS

Hacking DNS

Hacking DHCP

Hacking Cisco Devices

Hacking Switches

Hacking STP

Mitigating all attacks presented in the course

Every topic includes many live examples in Kali Linux, a command section, quizzes, slides and many practice challenges.

The skills you'll learn will broaden your horizons and could change your life.

Who this course is for:
Network and System Administrators.
Anyone interested in learning Ethical Hacking and Penetration Testing.
Anyone interested in learning how to secure systems from Hackers.
Programmers

Screenshots
 

Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction