Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack

Cyber Mentor via YouTube

Overview

and Beginning of Part 2 - Enumerating Hosts and Services - Vulnerabilities in Third-Party Software - Exploitation and Control - Payloads and Exploits - Client Side Exploitation - SQL Injection - ARP Spoofing & MiTM - DNS, Zeroday, & Phishing - SOC (Security Operations Center) Setup This course is designed to introduce students to the world of ethical hacking. It starts by introducing whoami, a day in the life, and effective note-taking techniques. Important tools, networking refresher and the OSI model are also covered, followed by subnetting and setting up VMWare and Kali Linux. Common network commands, viewing, creating and editing files, starting and stopping services, installing and updating tools, and Bash scripting are also discussed. Python modules are then introduced, including strings, math, variables, methods, functions, and boolean expressions. Other topics include lists, tuples, looping, advanced strings, dictionaries, sockets, building port scanners, user input, and more. The course culminates with connecting the five stages of ethical hacking with techniques such as passive recon, identifying the target, discovering email addresses, breached credentials, enumerating hosts and services, and exploring vulnerabilities in third-party software. Exploitation, payloads, client side exploitation, SQL injection, ARP spoofing, DNS, zeroday and phishing are also discussed, as well as the setup of a SOC (Security Operations Center).

Syllabus

- Introduction/whoami
- A Day in the Life of an Ethical Hacker
- Effective Notekeeping
- Important Tools
- Networking Refresher: Introduction
- IP Addresses
- MAC Addresses
- TCP, UDP, & the Three-Way Handshake
- Common Ports & Protocols
- The OSI Model
- Subnetting, Part 1
- Subnetting, Part 2
- Installing VMWare / VirtualBox
- Installing Kali Linux
- Configuring VirtualBox
- Kali Linux Overview
- Sudo Overview
- Navigating the File System
- Users & Privileges
- Common Network Commands
- Viewing, Creating, & Editing Files
- Starting and Stopping Services
- Installing and Updating Tools
- Bash Scripting
- Intro to Python
- Strings
- Math
- Variables & Methods
- Functions
- Boolean Expressions and Relational Operators
- Conditional Statements
- Lists
- Tuples
- Looping
- Advanced Strings
- Dictionaries
- Importing Modules
- Sockets
- Building a Port Scanner
- User Input
- Reading and Writing Files
- Classes and Objects
- Building a Shoe Budget Tool
- The 5 Stages of Ethical Hacking
- Passive Recon Overview
- Identifying Our Target
- Discovering Email Addresses
- Breached Credentials Part 1
- Breached Credentials Part 2
- End Part 1

Taught by

The Cyber Mentor

Reviews

Start your review of Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.