Description
Course Overview
This course gives learners with a fundamental degree of competency utilizing a hands-on method to gaining sensible expertise as a penetration tester or an moral hacker (white, gray or black).
This course gives a elementary have a look at offensive safety ideas and methods utilizing a digital set up of Kali Linux and three completely different goal victims, Home windows XP, Server 2008 and Linux (Metesploitable2). This course gives a 100% hands-on method to studying to be an moral hacker or a pentester.
How is the course structured?
The course makes use of brief video tutorials, hands-on labs, virtualization, and open supply instruments for step-by-step studying of moral hacking fundamentals; the identical instruments and open-source software program are utilized by skilled penetration testers and moral hackers.
This course gives movies, labs, and hyperlinks for downloading the free and open-source software program used all through this course.
You’ll capable of construct a digital set up of Kali Linux and Home windows XP for the digital lab atmosphere. It is best to full the primary lab of this course earlier than enrolling. Beginning with lab 2, we’ll start scanning and attacking a Home windows XP sufferer. If the primary lab can’t be accomplished, there isn’t any must enroll within the course since all labs that observe are depending on the primary lab being accomplished.
You’ll learn the way intruders escalate privileges and what steps could be taken to cease them, the significance of a robust firewall, the significance of protecting programs and software program up to date and the usage of advanced passwords.
Additionally, you will learn to launch DDoS Assaults, Buffer Overflows, keylogging, and password hacking. Completion of the course will assist put together a person for an entry-level place as a pen-tester or moral hacker. On finishing this course, you’ll obtain a course completion.
If you need to debate moral hacking, watch another person speak about know-how or write a paper, there are many different programs to select from. To efficiently full this course college students should reveal the basic ideas of offensive hacking. In different phrases, learners will be taught one thing by doing.
Course Targets
- Exhibit the usage of offensive safety instruments and methods.
- Proficiency in the usage of the CLI (Command Line Interface) of Linux.
- Use Linux as a hacking platform.
Who ought to take this course?
Community directors, cybersecurity college students, entry-level penetration testers, anybody who needs to be an moral hacker, involved dad and mom, involved spouses, regulation enforcement and anybody with a strong background in know-how.
Who mustn’t take this course?
Anybody affected by technophobia (the concern of studying new know-how). Anybody not having a great understanding of the OSI mannequin, or the TCP/IP suite.
What are the course necessities, Data degree?
- A good understanding of fundamental networking ideas, the TCPI/IP stack, how units talk, and fundamental troubleshooting of community connectivity points.
- use a pc, a mouse and a keyboard.
- configure a static IP tackle on a Community adapter.
- examine for connectivity utilizing PING, IPCONFIG, and IFCONFIG.
- This course is not going to cowl or evaluate the OSI mannequin, talk about IP addressing or any fundamental networking ideas. College students are anticipated to have these expertise after they enroll.
{Hardware}
- PC, laptop computer or desktop able to virtualization. (Virtualization enabled BIOS).
- A minimal of 4 GB of RAM, (8 GB or extra of RAM really useful).
- Administrative entry to the host working system. (You personal the machine).
- LAN or cable connection for Web entry. (Can’t use a wi-fi connection).
- Excessive-speed web entry utilizing a dependable Web connection. (5mb or larger throughput).
Software program
- Any 64-bit Home windows working system. (most well-liked)
- A present 64-bit model of Mac or a Linux working system.
- Set up of VMWare Participant (free version) for Home windows and Linux customers. (Hyperlinks offered within the lab).
- Set up of Virtualbox for MAC. (Hyperlinks offered within the lab).
- Set up of 7zip (Hyperlinks offered within the lab).
- Copy of Kali ISO or Kali VMWare or Virtualbox picture. (Hyperlinks offered within the lab).
- Copy of Home windows XP SP2 (Hyperlinks offered within the lab).
- Copy of Server 2008 SPI 32 bit (Hyperlinks offered within the lab).
- Copy of Metesploitable2 (Hyperlinks offered within the lab).
Who this course is for:
- Anybody a wanting pure 100% hands-on studying expertise.
- Anybody eager to be taught the fundamentals community penetration.
- Anybody wanting to use fundamental hacking ideas.
- Anyone eager to learn the way hackers hack laptop programs
- Anyone eager to learn to safe their programs from hackers
Necessities
- Full Module 01 – Digital Community Lab Construct
- A laptop computer or desktop able to working two simultaneous digital installs together with their host working system.
- Fundamental networking expertise, IP addressing, familiarization with ports and companies, configure a community adapter, use PING, IFCONFIG, IPCONFIG
- Dependable LAN or cable connection for Web entry.
- A bunch machine working Home windows 7, 8.1 or 10 (most well-liked). MAC and Apple machines will work however a Home windows host is most well-liked.
- A minimal of 4 GB of RAM (8 GB most well-liked)
- Fundamental laptop fundamentals.
- Fundamental working system fundamentals.

