Advertisement
Guest User

Periz X - The Complete Cyber Security Bundle: Beginner to Ad

a guest
Jun 5th, 2020
6,432
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.26 KB | None | 0 0
  1. This is the Platform's biggest and most advanced Cyber Security course. Black Hat hacking has always been a dream for us! Make your dream come true by taking this Course. Learn to launch Cyber attacks, defending cyber attacks, hacking computer systems/websites like a Real-World black hat hacker & much more!
  2.  
  3.  
  4. This is the most comprehensive, yet straight-forward, course for Cyber Security on Udemy! In this course you will start as a beginner with no previous knowledge & by the end of the course you will be at a High Intermediate level.
  5.  
  6. With 550 lectures & 66+ hours of content this comprehensive course leaves no stone unturned! Once you buy that Course you will get a Life time access to the content & you will get answer to your every single question from an experienced IT professional!
  7.  
  8.  
  9. You don't need any previous programming knowledge or basics for starting this course.In this course we will start from Scratch.We will explain all the techniques of hacking , theory behind those techniques & give Real world examples in every single Part of the course!
  10.  
  11.  
  12. In this course there are 18 parts but this course can be divided in to 8 main sections. Below there is a brief explanation of this Complete course.You will learn much more than what we try to explain below !
  13.  
  14.  
  15. Main Section One(1) : Brief introduction to the complete course , Setting up the lab & maintaining Anonymity [Covering Part 1]
  16.  
  17.  
  18. Complete course overview in just 3 minutes & 39 seconds !
  19.  
  20. Setting up the Complete Ethical Hacking Lab
  21.  
  22. 1.Learn how to Install VirtualBox
  23.  
  24. 2.Configure the VirtualBox
  25.  
  26. 3.Downloading & Installing Kali Linux latest
  27.  
  28. 4.Downloading & Installing 2 different Operating Systems(Windows & Metasploit)
  29.  
  30. 5.Downloading & Installing Android Platforms on the PC for learning to hack Android mobile phones.
  31.  
  32. Hacking Lab Basics
  33.  
  34. 1.Kali Linux Basics
  35.  
  36. 2.Basics of Kali Linux Terminal & Commands
  37.  
  38. 3.Advanced uses of Kali Linux Terminal & Commands
  39.  
  40. 4.Getting Black Hat hacking tools for further use(Only for Ethical Hacking purpose!)
  41.  
  42. Anonymity Online
  43.  
  44. 1.Learn how to be Anonymous Online
  45.  
  46. 2.Learn how to cover your tracks
  47.  
  48. 3.Learn to use different tools for maintaining anonymity Online
  49.  
  50. 4.We are going to get more lectures to be anonymous online through out the Course
  51.  
  52.  
  53.  
  54. Main Section Two(2) : Gathering Information [Covering Part 2]
  55.  
  56.  
  57. Gathering Information about the Victim weather it is a person, website or a company.
  58.  
  59. Gathering Passive Information
  60.  
  61. 1.Gathering Passive Information using different tools
  62.  
  63. 2.Searching for hidden people
  64.  
  65. 3.Hacking Job sites for getting details
  66.  
  67. 4.Using Netcraft for gathering Passive Information
  68.  
  69. 5.Using Maltego for gathering Passive Information
  70.  
  71. 6.Using Google Hacking for gathering Passive Information
  72.  
  73. 7.Knowing about any hidden information easily
  74.  
  75. Gathering Active Information
  76.  
  77. 1.Gathering active information using search engines
  78.  
  79. 2.Using different websites for Gathering active information
  80.  
  81. 3.Advanced Google Search operators for gathering active Information
  82.  
  83. 4.Using Database Hacking , Tools & advanced Google hacking
  84.  
  85. 5.Nmap, Nmap NSE scripts, Zenmap for gathering Active Information
  86.  
  87. 6.Gathering Active Information using DNS transfer Zone, SMB Null Session & SMB Enumeration
  88.  
  89.  
  90.  
  91.  
  92. Main Section Three(3) : Hacking WiFi & Wired connection [Covering Part 3]
  93.  
  94.  
  95. Understanding how WiFi & Wired hacking works
  96.  
  97. Identifying the target network
  98.  
  99. Identifying hidden networks
  100.  
  101. Exploiting the target network
  102.  
  103. 1.Hacking WEP networks
  104.  
  105. 2.Hacking WPA/WPA2 networks
  106.  
  107. 3.Hacking WPS enabled networks
  108.  
  109. 4.Capturing packets
  110.  
  111. 5.Taking advantage of Router misconfigurations
  112.  
  113. 6.Post Exploitation
  114.  
  115. Different types of attack on the Victim
  116.  
  117. 1.Non disrupting techniques
  118.  
  119. 2.Eavesdropping
  120.  
  121. 3.Creating an access point for Man in the Middle attack
  122.  
  123. 4.Creating an Online access point for Man In the Middle attack
  124.  
  125. 5.Denial of Service attack (DOS) on the Wireless Network
  126.  
  127. 6.Disconnecting any device from the network
  128.  
  129. Creating rogue access Point
  130.  
  131. Creating Fake Captive portals
  132.  
  133. Covering our tracks
  134.  
  135. 1.Using Disposable VMs for covering our tracks
  136.  
  137. 2.Changing our MAC addresses
  138.  
  139. Wireless penetration testing Accessories
  140.  
  141.  
  142.  
  143. Main Section Four(4) : All the attacks that a hacker can do and you should learn ! [Covering Part 4 to 15 ]
  144.  
  145.  
  146.  
  147. Scanning Network(Brief Description)
  148.  
  149.  
  150. Learn to Scan Networks
  151.  
  152. Learn to Scan out of your own Network
  153.  
  154. Network level scanning & Web application level scanning learn both
  155.  
  156. Learn to Scan for Vulnerability
  157.  
  158. Get Demonstration & Real World examples
  159.  
  160.  
  161.  
  162. DOS & DDOS attack (Brief Description)
  163.  
  164.  
  165. Understand DOS & DDOS properly
  166.  
  167. Learn about the Computer networking OSI model
  168.  
  169. DDOS in the world map
  170.  
  171. Clearing concept using best tools and services
  172.  
  173. Doing DOS & DDOS using HTTP flood, ICMP flood, SYN flood,Slowloris, LOIC , JS LOIC, etc...
  174.  
  175. Stressers and Booters for DOS & DDOS
  176.  
  177. Tools that hacker community use for DOS & DDOS
  178.  
  179.  
  180.  
  181. Sniffing Attacks(Brief Description)
  182.  
  183.  
  184. Sniffing using ARP Poisoning & ARP Spoofing
  185.  
  186. Sniffing using DNS Poisoning
  187.  
  188. Advanced techniques for Sniffing
  189.  
  190. Demonstration in every section!
  191.  
  192.  
  193. Session Hijacking(Brief Description)
  194.  
  195.  
  196. Learn Session Hijacking of Network level & Web Application level
  197.  
  198. Network Level Session Hijacking using TCP & UDP hijacking, Blind hijacking etc...
  199.  
  200. Web application level session hijacking using Cookies, Bruteforce, XSS etc...
  201.  
  202. Automating Session hijacking using Burpsuite, Owaspzap, Netsparker etc...
  203.  
  204. Social Engineering(Brief Description)
  205.  
  206.  
  207. Social Engineering basics
  208.  
  209. The Art of human attacks using social engineering
  210.  
  211. Human based Social Engineering vs Computer based Social Engineering
  212.  
  213. Learn Social Engineering using Kali Linux such as: Creating payloads, listening for it, uses of metasploit etc...
  214.  
  215. Phishing attacks using SET toolkit, Phish5, Phishing emails etc...
  216.  
  217. Doing Scams [Learn how to do & take money]
  218.  
  219. Learn to do Identity theft
  220.  
  221. Buy & Sell Identities
  222.  
  223. Real World example included for Social Engineering attack
  224.  
  225. Enumeration(Brief Description)
  226.  
  227.  
  228. Learn & Understand Enumeration
  229.  
  230. Enumeration using SNMP, SMTP, NTP, NETBIOS, LDAP etc...
  231.  
  232. Demonstration of Enumeration using SNMP, SMTP, NTP, NETBIOS, LDAP etc...
  233.  
  234. Buffer Overflow hacking(Brief Description)
  235.  
  236.  
  237. Learn to hack using Buffer Overflow
  238.  
  239. Basics of Buffer Overflow
  240.  
  241. Mastering Buffer Overflow
  242.  
  243. Buffer Overflow using Malware
  244.  
  245. Buffer Overflow using Programming
  246.  
  247. Database hacking & Reporting of Buffer Overflow
  248.  
  249. Learning advance techniques of Buffer Overflow
  250.  
  251. Compromising the Victim using Buffer Overflow
  252.  
  253. Web Application Hacking(Brief Description)
  254.  
  255.  
  256. Learn how to do Web application hacking
  257.  
  258. Gathering information for application hacking
  259.  
  260. Learn to do web application tampering
  261.  
  262. Client side attacks of web application hacking
  263.  
  264. Identity management & access control of web application hacking
  265.  
  266. Hacking with Malware(Brief Description)
  267.  
  268.  
  269. Learn malware threats from Scratch
  270.  
  271. Basics of Trojan Viruses
  272.  
  273. Basics of Virus & Worms
  274.  
  275. Creating a Trojan Virus
  276.  
  277. Creating Virus & Worms
  278.  
  279.  
  280. Cloud Computing Hacking(Brief Description)
  281.  
  282.  
  283. Learn to hack with Cloud Computing
  284.  
  285. Cloud computing basics
  286.  
  287. Hacking through cloud computing
  288.  
  289. Cloud computing using Social Engineering
  290.  
  291. Strengthening the security of Cloud Computing
  292.  
  293. DDOS prevention and much more for strengthening the security of Cloud computing
  294.  
  295.  
  296.  
  297. Hacking Systems(Brief Description)
  298.  
  299.  
  300. Learn to hack systems step by step
  301.  
  302. Gaining access attacks
  303.  
  304. Maintaining access to the Victim's pc
  305.  
  306. Post exploitation after gaining access
  307.  
  308. Covering our tracks & evidence
  309.  
  310.  
  311.  
  312.  
  313.  
  314. Main Section Five(5) : Website Hacking & Penetration testing [Covering Part 15 to 16]
  315.  
  316.  
  317. Learn how to Cross Site Scripting(XSS) in great details!
  318.  
  319. Hacking using Cross Site Scripting Demonstration
  320.  
  321. Learn how to do SQL Injection in great details!
  322.  
  323. Blind SQL Injection
  324.  
  325. SQL Map to hack a website
  326.  
  327. Advanced SQL Injection
  328.  
  329. Hacking Using SQL Injection Demonstration
  330.  
  331. Learn how to hack a web server
  332.  
  333. Web Server hacking advanced techniques
  334.  
  335. Hacking Web Servers Demonstration
  336.  
  337.  
  338.  
  339.  
  340.  
  341. Main Section Six(6) : Learn to hack mobile platforms such as: Android, Windows, Blackberry [Covering Part 17]
  342.  
  343.  
  344. Hacking Android phones
  345.  
  346. Using Payloads, Malwares, Metasploit, Social Enginerering etc... for hacking mobile phones
  347.  
  348. Hacking IOS mobiles
  349.  
  350. Hacking Windows mobiles
  351.  
  352. Hacking Blackberry mobiles
  353.  
  354. Hacking Demonstration for all the platforms!
  355.  
  356.  
  357.  
  358. Main Section Seven(7) : Defend Hacking attacks & Digital Forensics [Covering Part 18]
  359.  
  360.  
  361. Defend most of the attacks that we learnt
  362.  
  363. Learn forensics from scratch
  364.  
  365. Learn Kali Linux & Forensics
  366.  
  367. Using different tools from Digital Forensics such as : LIBEWF, Guymager, DCFLDD, Hasdeep etc...
  368.  
  369.  
  370.  
  371. Main Section Eight(8) : Bonus Sections !
  372.  
  373.  
  374. Python & Kali(Brief Description)
  375.  
  376.  
  377. Learning Python Programming language from Scratch
  378.  
  379. Making a Web App with Python for clearing our concept & mastering Python
  380.  
  381. Python & Kali Linux together
  382.  
  383. Writing a TCP Client in Python
  384.  
  385. Writing a UDP Client in Python
  386.  
  387. Writing a TCP Server in Python
  388.  
  389. Developing an application like Netcat in Python
  390.  
  391. Metasploit in Hacking(Brief Description)
  392.  
  393.  
  394. Learn Metasploit from Scratch
  395.  
  396. Scanning using Metasploit
  397.  
  398. Gaining access to the system using Metasploit
  399.  
  400. Maintaining access to the System using Metasploit
  401.  
  402. Learning advanced uses of Metasploit
  403. Who this course is for:
  404.  
  405. People who want to learn about Cyber Security
  406. Anybody who is interested in learning ethical hacking & penetration testing
  407. People who want to get a training to become a Certified Ethical Hacker (CEH)
  408. People with basics/advanced level knowledge of Hacking and want to take their knowledge to next level
  409. Anybody who wants to learn how to launch different attacks exactly the same way Black Hat hackers do
  410. Anybody who wants to learn about Website Hacking & Penetration Testing From Scratch
  411. Anybody who wants to learn about Digital Forensics
  412. Anybody who wants to learn Python & Kali Linux
  413. Anybody who wants to grow their skill to get a better job
  414. Anybody who wants to advance their career as a freelancer online & increase their hourly pay rate
  415. Anybody who wants to learn how a hacker would attack their Computer / Websites
  416. Anybody who wants to secure their Computer / Websites
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement