Course Introduction & Overview

Lecture Transcript - Course Introduction & Overview

Hello and welcome. My name is Zaid, I'm an ethical hacker, a computer scientist, and I'll be your instructor in this course. And this course, I'm going to teach you ethical hacking from scratch. So I'm going to assume that you have no prior knowledge.

And by the end of it, you'll be at a high intermediate level. So we'll start by teaching you how to set up penetration testing lab and how to install the needed software so you can practice hacking safely. Once done, the course is divided into four main penetration testing sections.


The first is the network hacking section, where you learn how networks work, how devices communicate with each other, and how to exploit this method of communication to control all the connections around you, crack Wi-Fi keys and gain access to Wi-Fi networks, whether they use WEP, WPA or WPA to intercept data to capture usernames, passwords, chat messages or

anything that anybody does on the same network. What's done with this? We'll move to the gaining access section where you learn how to gain access to servers and personal computers. So first, you'll learn how to gather comprehensive information about your target, discover vulnerabilities and exploit them to gain full control over the target system.


Not only that, but you'll also learn how to generate undetectable back doors and use social engineering to deliver them to your target as a fake update or as a PDF or an image or any other file that they might be interested in.


You'll also learn how to spoof emails, so when they're delivered to your target, they appear as if they're sent from a friend, from their boss or from any address that they're likely to interact with. Once done with all of this, we'll move to the post-exploitation section where you learn, what can you do with the access that you gained in the previous sections, so you learn how to interact with the file system, how to execute system commands, record keystrokes, open the webcam and even use the hacked computer as a pivot to hack into other computers.


Once done with all of this, we'll move to the website hacking section where you learn how websites work, how to gather comprehensive information about a target website, and how to discover and exploit a number of dangerous vulnerabilities that allow you to gain full control over the target website.


At the end of each section, you learn how to secure systems and secure yourself from the discussed attacks.



Complete and Continue  

Become a Member and Get Unlimited Access to 310+ Top Cyber Security Courses.