Description
Periz X – The Complete Cyber Security Bundle: Beginner to Advanced!
Price: $52
Archive: https://pastebin.com/qy7iXqb3
- This is the Platform’s biggest and most advanced Cyber Security course. Black Hat hacking has always been a dream for us! Make your dream come true by taking this Course. Learn to launch Cyber attacks, defending cyber attacks, hacking computer systems/websites like a Real-World black hat hacker & much more!
- This is the most comprehensive, yet straight-forward, course for Cyber Security on Udemy! In this course you will start as a beginner with no previous knowledge & by the end of the course you will be at a High Intermediate level.
- With 550 lectures & 66+ hours of content this comprehensive course leaves no stone unturned! Once you buy that Course you will get a Life time access to the content & you will get answer to your every single question from an experienced IT professional!
- You don’t need any previous programming knowledge or basics for starting this course.In this course we will start from Scratch.We will explain all the techniques of hacking , theory behind those techniques & give Real world examples in every single Part of the course!
- In this course there are 18 parts but this course can be divided in to 8 main sections. Below there is a brief explanation of this Complete course.You will learn much more than what we try to explain below !
- Main Section One(1) : Brief introduction to the complete course , Setting up the lab & maintaining Anonymity [Covering Part 1]
- Complete course overview in just 3 minutes & 39 seconds !
- Setting up the Complete Ethical Hacking Lab
- 1.Learn how to Install VirtualBox
- 2.Configure the VirtualBox
- 3.Downloading & Installing Kali Linux latest
- 4.Downloading & Installing 2 different Operating Systems(Windows & Metasploit)
- 5.Downloading & Installing Android Platforms on the PC for learning to hack Android mobile phones.
- Hacking Lab Basics
- 1.Kali Linux Basics
- 2.Basics of Kali Linux Terminal & Commands
- 3.Advanced uses of Kali Linux Terminal & Commands
- 4.Getting Black Hat hacking tools for further use(Only for Ethical Hacking purpose!)
- Anonymity Online
- 1.Learn how to be Anonymous Online
- 2.Learn how to cover your tracks
- 3.Learn to use different tools for maintaining anonymity Online
- 4.We are going to get more lectures to be anonymous online through out the Course
- Main Section Two(2) : Gathering Information [Covering Part 2]
- Gathering Information about the Victim weather it is a person, website or a company.
- Gathering Passive Information
- 1.Gathering Passive Information using different tools
- 2.Searching for hidden people
- 3.Hacking Job sites for getting details
- 4.Using Netcraft for gathering Passive Information
- 5.Using Maltego for gathering Passive Information
- 6.Using Google Hacking for gathering Passive Information
- 7.Knowing about any hidden information easily
- Gathering Active Information
- 1.Gathering active information using search engines
- 2.Using different websites for Gathering active information
- 3.Advanced Google Search operators for gathering active Information
- 4.Using Database Hacking , Tools & advanced Google hacking
- 5.Nmap, Nmap NSE scripts, Zenmap for gathering Active Information
- 6.Gathering Active Information using DNS transfer Zone, SMB Null Session & SMB Enumeration
- Main Section Three(3) : Hacking WiFi & Wired connection [Covering Part 3]
- Understanding how WiFi & Wired hacking works
- Identifying the target network
- Identifying hidden networks
- Exploiting the target network
- 1.Hacking WEP networks
- 2.Hacking WPA/WPA2 networks
- 3.Hacking WPS enabled networks
- 4.Capturing packets
- 5.Taking advantage of Router misconfigurations
- 6.Post Exploitation
- Different types of attack on the Victim
- 1.Non disrupting techniques
- 2.Eavesdropping
- 3.Creating an access point for Man in the Middle attack
- 4.Creating an Online access point for Man In the Middle attack
- 5.Denial of Service attack (DOS) on the Wireless Network
- 6.Disconnecting any device from the network
- Creating rogue access Point
- Creating Fake Captive portals
- Covering our tracks
- 1.Using Disposable VMs for covering our tracks
- 2.Changing our MAC addresses
- Wireless penetration testing Accessories
- Main Section Four(4) : All the attacks that a hacker can do and you should learn ! [Covering Part 4 to 15 ]
- Scanning Network(Brief Description)
- Learn to Scan Networks
- Learn to Scan out of your own Network
- Network level scanning & Web application level scanning learn both
- Learn to Scan for Vulnerability
- Get Demonstration & Real World examples
- DOS & DDOS attack (Brief Description)
- Understand DOS & DDOS properly
- Learn about the Computer networking OSI model
- DDOS in the world map
- Clearing concept using best tools and services
- Doing DOS & DDOS using HTTP flood, ICMP flood, SYN flood,Slowloris, LOIC , JS LOIC, etc…
- Stressers and Booters for DOS & DDOS
- Tools that hacker community use for DOS & DDOS
- Sniffing Attacks(Brief Description)
- Sniffing using ARP Poisoning & ARP Spoofing
- Sniffing using DNS Poisoning
- Advanced techniques for Sniffing
- Demonstration in every section!
- Session Hijacking(Brief Description)
- Learn Session Hijacking of Network level & Web Application level
- Network Level Session Hijacking using TCP & UDP hijacking, Blind hijacking etc…
- Web application level session hijacking using Cookies, Bruteforce, XSS etc…
- Automating Session hijacking using Burpsuite, Owaspzap, Netsparker etc…
- Social Engineering(Brief Description)
- Social Engineering basics
- The Art of human attacks using social engineering
- Human based Social Engineering vs Computer based Social Engineering
- Learn Social Engineering using Kali Linux such as: Creating payloads, listening for it, uses of metasploit etc…
- Phishing attacks using SET toolkit, Phish5, Phishing emails etc…
- Doing Scams [Learn how to do & take money]
- Learn to do Identity theft
- Buy & Sell Identities
- Real World example included for Social Engineering attack
- Enumeration(Brief Description)
- Learn & Understand Enumeration
- Enumeration using SNMP, SMTP, NTP, NETBIOS, LDAP etc…
- Demonstration of Enumeration using SNMP, SMTP, NTP, NETBIOS, LDAP etc…
- Buffer Overflow hacking(Brief Description)
- Learn to hack using Buffer Overflow
- Basics of Buffer Overflow
- Mastering Buffer Overflow
- Buffer Overflow using Malware
- Buffer Overflow using Programming
- Database hacking & Reporting of Buffer Overflow
- Learning advance techniques of Buffer Overflow
- Compromising the Victim using Buffer Overflow
- Web Application Hacking(Brief Description)
- Learn how to do Web application hacking
- Gathering information for application hacking
- Learn to do web application tampering
- Client side attacks of web application hacking
- Identity management & access control of web application hacking
- Hacking with Malware(Brief Description)
- Learn malware threats from Scratch
- Basics of Trojan Viruses
- Basics of Virus & Worms
- Creating a Trojan Virus
- Creating Virus & Worms
- Cloud Computing Hacking(Brief Description)
- Learn to hack with Cloud Computing
- Cloud computing basics
- Hacking through cloud computing
- Cloud computing using Social Engineering
- Strengthening the security of Cloud Computing
- DDOS prevention and much more for strengthening the security of Cloud computing
- Hacking Systems(Brief Description)
- Learn to hack systems step by step
- Gaining access attacks
- Maintaining access to the Victim’s pc
- Post exploitation after gaining access
- Covering our tracks & evidence
- Main Section Five(5) : Website Hacking & Penetration testing [Covering Part 15 to 16]
- Learn how to Cross Site Scripting(XSS) in great details!
- Hacking using Cross Site Scripting Demonstration
- Learn how to do SQL Injection in great details!
- Blind SQL Injection
- SQL Map to hack a website
- Advanced SQL Injection
- Hacking Using SQL Injection Demonstration
- Learn how to hack a web server
- Web Server hacking advanced techniques
- Hacking Web Servers Demonstration
- Main Section Six(6) : Learn to hack mobile platforms such as: Android, Windows, Blackberry [Covering Part 17]
- Hacking Android phones
- Using Payloads, Malwares, Metasploit, Social Enginerering etc… for hacking mobile phones
- Hacking IOS mobiles
- Hacking Windows mobiles
- Hacking Blackberry mobiles
- Hacking Demonstration for all the platforms!
- Main Section Seven(7) : Defend Hacking attacks & Digital Forensics [Covering Part 18]
- Defend most of the attacks that we learnt
- Learn forensics from scratch
- Learn Kali Linux & Forensics
- Using different tools from Digital Forensics such as : LIBEWF, Guymager, DCFLDD, Hasdeep etc…
- Main Section Eight(8) : Bonus Sections !
- Python & Kali(Brief Description)
- Learning Python Programming language from Scratch
- Making a Web App with Python for clearing our concept & mastering Python
- Python & Kali Linux together
- Writing a TCP Client in Python
- Writing a UDP Client in Python
- Writing a TCP Server in Python
- Developing an application like Netcat in Python
- Metasploit in Hacking(Brief Description)
- Learn Metasploit from Scratch
- Scanning using Metasploit
- Gaining access to the system using Metasploit
- Maintaining access to the System using Metasploit
- Learning advanced uses of Metasploit
- Who this course is for:
- People who want to learn about Cyber Security
- Anybody who is interested in learning ethical hacking & penetration testing
- People who want to get a training to become a Certified Ethical Hacker (CEH)
- People with basics/advanced level knowledge of Hacking and want to take their knowledge to next level
- Anybody who wants to learn how to launch different attacks exactly the same way Black Hat hackers do
- Anybody who wants to learn about Website Hacking & Penetration Testing From Scratch
- Anybody who wants to learn about Digital Forensics
- Anybody who wants to learn Python & Kali Linux
- Anybody who wants to grow their skill to get a better job
- Anybody who wants to advance their career as a freelancer online & increase their hourly pay rate
- Anybody who wants to learn how a hacker would attack their Computer / Websites
- Anybody who wants to secure their Computer / Websites
Reviews
There are no reviews yet.