Description
Periz X – The Complete Cyber Security Bundle: Beginner to Advanced!
Price: $52
Archive: https://pastebin.com/qy7iXqb3
-
This is the Platform’s biggest and most advanced Cyber Security course. Black Hat hacking has always been a dream for us! Make your dream come true by taking this Course. Learn to launch Cyber attacks, defending cyber attacks, hacking computer systems/websites like a Real-World black hat hacker & much more!
-
This is the most comprehensive, yet straight-forward, course for Cyber Security on Udemy! In this course you will start as a beginner with no previous knowledge & by the end of the course you will be at a High Intermediate level.
-
With 550 lectures & 66+ hours of content this comprehensive course leaves no stone unturned! Once you buy that Course you will get a Life time access to the content & you will get answer to your every single question from an experienced IT professional!
-
You don’t need any previous programming knowledge or basics for starting this course.In this course we will start from Scratch.We will explain all the techniques of hacking , theory behind those techniques & give Real world examples in every single Part of the course!
-
In this course there are 18 parts but this course can be divided in to 8 main sections. Below there is a brief explanation of this Complete course.You will learn much more than what we try to explain below !
-
Main Section One(1) : Brief introduction to the complete course , Setting up the lab & maintaining Anonymity [Covering Part 1]
-
Complete course overview in just 3 minutes & 39 seconds !
-
Setting up the Complete Ethical Hacking Lab
-
1.Learn how to Install VirtualBox
-
2.Configure the VirtualBox
-
3.Downloading & Installing Kali Linux latest
-
4.Downloading & Installing 2 different Operating Systems(Windows & Metasploit)
-
5.Downloading & Installing Android Platforms on the PC for learning to hack Android mobile phones.
-
Hacking Lab Basics
-
1.Kali Linux Basics
-
2.Basics of Kali Linux Terminal & Commands
-
3.Advanced uses of Kali Linux Terminal & Commands
-
4.Getting Black Hat hacking tools for further use(Only for Ethical Hacking purpose!)
-
Anonymity Online
-
1.Learn how to be Anonymous Online
-
2.Learn how to cover your tracks
-
3.Learn to use different tools for maintaining anonymity Online
-
4.We are going to get more lectures to be anonymous online through out the Course
-
Main Section Two(2) : Gathering Information [Covering Part 2]
-
Gathering Information about the Victim weather it is a person, website or a company.
-
Gathering Passive Information
-
1.Gathering Passive Information using different tools
-
2.Searching for hidden people
-
3.Hacking Job sites for getting details
-
4.Using Netcraft for gathering Passive Information
-
5.Using Maltego for gathering Passive Information
-
6.Using Google Hacking for gathering Passive Information
-
7.Knowing about any hidden information easily
-
Gathering Active Information
-
1.Gathering active information using search engines
-
2.Using different websites for Gathering active information
-
3.Advanced Google Search operators for gathering active Information
-
4.Using Database Hacking , Tools & advanced Google hacking
-
5.Nmap, Nmap NSE scripts, Zenmap for gathering Active Information
-
6.Gathering Active Information using DNS transfer Zone, SMB Null Session & SMB Enumeration
-
Main Section Three(3) : Hacking WiFi & Wired connection [Covering Part 3]
-
Understanding how WiFi & Wired hacking works
-
Identifying the target network
-
Identifying hidden networks
-
Exploiting the target network
-
1.Hacking WEP networks
-
2.Hacking WPA/WPA2 networks
-
3.Hacking WPS enabled networks
-
4.Capturing packets
-
5.Taking advantage of Router misconfigurations
-
6.Post Exploitation
-
Different types of attack on the Victim
-
1.Non disrupting techniques
-
2.Eavesdropping
-
3.Creating an access point for Man in the Middle attack
-
4.Creating an Online access point for Man In the Middle attack
-
5.Denial of Service attack (DOS) on the Wireless Network
-
6.Disconnecting any device from the network
-
Creating rogue access Point
-
Creating Fake Captive portals
-
Covering our tracks
-
1.Using Disposable VMs for covering our tracks
-
2.Changing our MAC addresses
-
Wireless penetration testing Accessories
-
Main Section Four(4) : All the attacks that a hacker can do and you should learn ! [Covering Part 4 to 15 ]
-
Scanning Network(Brief Description)
-
Learn to Scan Networks
-
Learn to Scan out of your own Network
-
Network level scanning & Web application level scanning learn both
-
Learn to Scan for Vulnerability
-
Get Demonstration & Real World examples
-
DOS & DDOS attack (Brief Description)
-
Understand DOS & DDOS properly
-
Learn about the Computer networking OSI model
-
DDOS in the world map
-
Clearing concept using best tools and services
-
Doing DOS & DDOS using HTTP flood, ICMP flood, SYN flood,Slowloris, LOIC , JS LOIC, etc…
-
Stressers and Booters for DOS & DDOS
-
Tools that hacker community use for DOS & DDOS
-
Sniffing Attacks(Brief Description)
-
Sniffing using ARP Poisoning & ARP Spoofing
-
Sniffing using DNS Poisoning
-
Advanced techniques for Sniffing
-
Demonstration in every section!
-
Session Hijacking(Brief Description)
-
Learn Session Hijacking of Network level & Web Application level
-
Network Level Session Hijacking using TCP & UDP hijacking, Blind hijacking etc…
-
Web application level session hijacking using Cookies, Bruteforce, XSS etc…
-
Automating Session hijacking using Burpsuite, Owaspzap, Netsparker etc…
-
Social Engineering(Brief Description)
-
Social Engineering basics
-
The Art of human attacks using social engineering
-
Human based Social Engineering vs Computer based Social Engineering
-
Learn Social Engineering using Kali Linux such as: Creating payloads, listening for it, uses of metasploit etc…
-
Phishing attacks using SET toolkit, Phish5, Phishing emails etc…
-
Doing Scams [Learn how to do & take money]
-
Learn to do Identity theft
-
Buy & Sell Identities
-
Real World example included for Social Engineering attack
-
Enumeration(Brief Description)
-
Learn & Understand Enumeration
-
Enumeration using SNMP, SMTP, NTP, NETBIOS, LDAP etc…
-
Demonstration of Enumeration using SNMP, SMTP, NTP, NETBIOS, LDAP etc…
-
Buffer Overflow hacking(Brief Description)
-
Learn to hack using Buffer Overflow
-
Basics of Buffer Overflow
-
Mastering Buffer Overflow
-
Buffer Overflow using Malware
-
Buffer Overflow using Programming
-
Database hacking & Reporting of Buffer Overflow
-
Learning advance techniques of Buffer Overflow
-
Compromising the Victim using Buffer Overflow
-
Web Application Hacking(Brief Description)
-
Learn how to do Web application hacking
-
Gathering information for application hacking
-
Learn to do web application tampering
-
Client side attacks of web application hacking
-
Identity management & access control of web application hacking
-
Hacking with Malware(Brief Description)
-
Learn malware threats from Scratch
-
Basics of Trojan Viruses
-
Basics of Virus & Worms
-
Creating a Trojan Virus
-
Creating Virus & Worms
-
Cloud Computing Hacking(Brief Description)
-
Learn to hack with Cloud Computing
-
Cloud computing basics
-
Hacking through cloud computing
-
Cloud computing using Social Engineering
-
Strengthening the security of Cloud Computing
-
DDOS prevention and much more for strengthening the security of Cloud computing
-
Hacking Systems(Brief Description)
-
Learn to hack systems step by step
-
Gaining access attacks
-
Maintaining access to the Victim’s pc
-
Post exploitation after gaining access
-
Covering our tracks & evidence
-
Main Section Five(5) : Website Hacking & Penetration testing [Covering Part 15 to 16]
-
Learn how to Cross Site Scripting(XSS) in great details!
-
Hacking using Cross Site Scripting Demonstration
-
Learn how to do SQL Injection in great details!
-
Blind SQL Injection
-
SQL Map to hack a website
-
Advanced SQL Injection
-
Hacking Using SQL Injection Demonstration
-
Learn how to hack a web server
-
Web Server hacking advanced techniques
-
Hacking Web Servers Demonstration
-
Main Section Six(6) : Learn to hack mobile platforms such as: Android, Windows, Blackberry [Covering Part 17]
-
Hacking Android phones
-
Using Payloads, Malwares, Metasploit, Social Enginerering etc… for hacking mobile phones
-
Hacking IOS mobiles
-
Hacking Windows mobiles
-
Hacking Blackberry mobiles
-
Hacking Demonstration for all the platforms!
-
Main Section Seven(7) : Defend Hacking attacks & Digital Forensics [Covering Part 18]
-
Defend most of the attacks that we learnt
-
Learn forensics from scratch
-
Learn Kali Linux & Forensics
-
Using different tools from Digital Forensics such as : LIBEWF, Guymager, DCFLDD, Hasdeep etc…
-
Main Section Eight(8) : Bonus Sections !
-
Python & Kali(Brief Description)
-
Learning Python Programming language from Scratch
-
Making a Web App with Python for clearing our concept & mastering Python
-
Python & Kali Linux together
-
Writing a TCP Client in Python
-
Writing a UDP Client in Python
-
Writing a TCP Server in Python
-
Developing an application like Netcat in Python
-
Metasploit in Hacking(Brief Description)
-
Learn Metasploit from Scratch
-
Scanning using Metasploit
-
Gaining access to the system using Metasploit
-
Maintaining access to the System using Metasploit
-
Learning advanced uses of Metasploit
-
Who this course is for:
-
People who want to learn about Cyber Security
-
Anybody who is interested in learning ethical hacking & penetration testing
-
People who want to get a training to become a Certified Ethical Hacker (CEH)
-
People with basics/advanced level knowledge of Hacking and want to take their knowledge to next level
-
Anybody who wants to learn how to launch different attacks exactly the same way Black Hat hackers do
-
Anybody who wants to learn about Website Hacking & Penetration Testing From Scratch
-
Anybody who wants to learn about Digital Forensics
-
Anybody who wants to learn Python & Kali Linux
-
Anybody who wants to grow their skill to get a better job
-
Anybody who wants to advance their career as a freelancer online & increase their hourly pay rate
-
Anybody who wants to learn how a hacker would attack their Computer / Websites
-
Anybody who wants to secure their Computer / Websites
Reviews
There are no reviews yet.