IT & Software

Full Ethical Hacking Course

Advertisement - Continue Below
Advertisement - Continue Below

Find out everything you need to know about ethical hacking and penetration testing in this Full Ethical Hacking Course.

What you'll learn

  • Ethical hacking and cybersecurity
  • Penetration testing


  • Basic computer knowledge


Advertisement - Continue Below

Introduction to cyber-security and ethical hacking platforms, taught by Loi Liang Yang, the world's top ethical hacker and penetration testing instructor. Loi has more than 200,000 subscribers and has been viewed more than 5 million times for his security content.

Advertisement - Continue Below

Introduction to cyber-security

  • Cyber-attack chain
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and Control
  • Actions on Objective

Virtualization on VirtualBox

  • Kali Linux
  • Install, deploy and run Kali Linux
  • Installation and deployment of vulnerable server for testing


Advertisement - Continue Below

Information gathering

Advertisement - Continue Below

Assess security vulnerabilities

Scanning engines

  • Nmap scanning
Advertisement - Continue Below

Search engine scanners

Advertisement - Continue Below

Internet scanners

  • Google search engine
Advertisement - Continue Below

Open source intelligence

  • Recon-ng scanning

Security standards

Advertisement - Continue Below

Center for Internet Security (CIS)

Hardening checks for systems


Advertisement - Continue Below

Metasploit framework for ethical hacking

Advertisement - Continue Below
  • Basic commands and usage
  • Module exploration
  • Search for vulnerabilities from scanning results
  • Exploitation of systems
  • Post-exploitation for privilege escalation and scanning

Security hardening and configuration

Social engineering

  • Dark Web with Tor
    • Hacking groups and forums
  • Wireless security assessment with WiFi PineApple
    • Wireless vulnerabilities
  • Social Engineering Toolkit (SET) attacks
  • Direct attacks into Windows 10 with Macros and Powershell

Web, application and database vulnerabilities

Open Web Application Security Project (OWASP) top 10

  • Injection
  • Broken authentication
  • Sensitive data exposure
  • XML External Entities
  • Broken access control
  • Security misconfiguration
  • Cross-Site Scripting
  • Insecure Deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
Advertisement - Continue Below

Full SQLMAP tutorial for web penetration testing

Advertisement - Continue Below

BurpSuite tutorial for manual injection on web penetration testing

Payload testing with custom load

Advertisement - Continue Below

Creation of payload

  • Payloads package on injection
  • Fully undetected payloads
  • Buffer overflow for shell

Come join thousands of students who has learned from the top ethical hacking and penetration testing instructor, Loi Liang Yang, now!

Advertisement - Continue Below

Who this course is for:

  • Beginners to pros interested in learning ethical hacking

Created by Loi Liang Yang
Last updated 3/2021
Size: 8.61 GB

Download Course

Subscribe To Our Newsletter

Advertisement - Continue Below

Related Courses

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button


Join our telegram channel and be the first to know when we post/update courses and also when we share awesome deals & freebies.