Cyber Security White Hat Hacking v10
Learn the fundamentals of ethical hacking with real-world tools and techniques in White Hat Hacking v10
Is a hands-on training program designed to teach you how to think like an ethical hacker and defend against real-world cyber threats. You’ll explore the latest tools, techniques, and methodologies used in ethical hacking, penetration testing, and network defense. Perfect for beginners and IT professionals, this course builds a solid foundation in cybersecurity to help you launch or advance your career in the field.
Learn ethical hacking from scratch with real-world tools
Understand network vulnerabilities and attack vectors
Master penetration testing techniques step by step
Gain skills in system security and defense strategies
Explore tools like Kali Linux, Nmap, Metasploit & more
Earn a certificate to boost your cybersecurity career
1. Build and Configure your White Hat Hacking Lab
2. Building a LAB Concepts
3. Building a LAB Networking
4. Deploy a Kali Linux VM
5. Adding Metasploitable to Your Lab
6. Adding Windows to Your Lab
7. Configure a Static IP on Kali
8. Ethics and Hacking
9. Hacking Vocabulary
10. InfoSec Concepts
11. Attack Categories_ Types_ and Vectors
12. Five Phases of Hacking
13. Footprinting and Reconnaissance Concepts
14. Search Engine Tools
15. Hacking Using Google
16. Website Recon Tools
17. Metagoofil Metadata Tool
18. Email Headers for Footprinting
19. Using WHOIS for Recon
20. DNS Tools
21. Network Scanning Overview
22. Network Scanning Methodology
23. Port Discovery
24. Stealth Idle Scanning
25. OS and Application Fingerprinting
26. Vulnerability Scanning
27. Network Mapping Tools
28. NMAP
29. Scapy
30. Hping3
31. Proxy Servers
32. Using Public Proxy Services
33. Shellshock
34. Enumeration Concepts
35. NetBIOS Enumeration
36. SNMP Enumeration Concepts
37. SNMP Enumeration Tools
38. LDAP Enumeration Concepts
39. LDAP Enumeration Example
40. NTP Enumeration
41. SMTP Enumeration
42. System Hacking Overview
43. Password Cracking Concepts
44. Password Attack Example MITM and Sniffing
84. SQL Injection
85. Wireless Hacking Overview
86. Wireless Topologies and Vocabulary
87. Standards and Regulations
88. RF Fundamentals
45. Rainbow Crack Lab Setup
46. Rainbow Crack Demonstration
47. Password Reset Hacking
48. DHCP Starvation
49. Remote Access
50. NTFS Alternate Data Streams Exploit
51. Steganography with OpenPuff
52. Steganography with SNOW
53. Covering Tracks
54. Malware Overview
55. Spyware
56. Buffer Overflow
57. Trojan Overview
58. Creating a Trojan
59. Virus Overview
60. Virus Creation
61. Detecting Malware
62. Malware Analysis
63. File Verification via Hash
64. Sniffing Overview
65. CAM Table Attack and Port Security
66. DHCP Snooping
67. Dynamic ARP Inspection (DAI)
68. Social Engineering Concepts
69. Social Engineering Phases
70. Social Engineering Prevention
71. DoS and DDoS Overview
72. DoS and DDoS Prevention
73. Session Hijacking Overview
74. Reducing the Risk of Session Hijacking
75. Firewall Evasion
76. Firewall ACL Example
77. NAT and PAT Fundamentals
78. IDSIPS Evasion
79. Honeypots
80. Hacking Web Servers
81. OWASP Broken Web Application Project
82. Web App Vulnerabilities WordPress
83. SQL Introduction
89. Antenna Fundamentals
90. WLAN Frame Types
91. WLAN Frame Flow
92. Uncovering Hidden SSIDs
93. Bypassing MAC Address Filters
94. Breaking WPA2 Wireless
95. Rogue Wireless Access Points
96. Wireless Mis-Association Attacks
97. MITM Using Wireless Bridging
98. Protecting Wireless
99. Using an Android VM
100. Malware for Mobile
101. Mobile Device Risks
102. Improving Mobile Security
103.Cloud Computing Overview
104. Cloud Computing Security Concerns
105. Cloud Computing Security Benefits
106. IoT Security Overview
107. IoT Web_ Cloud_ and Mobile Interfaces
108. Symmetrical Encryption Concepts
109. Hashing Concepts for Data Integrity
110. Asymmetrical Encryption Concepts
111. Control Types
112. Multifactor Authentication
113. CIA Confidentiality_ Integrity_ and Availability
114. Quantifying Risk
115. Separation of Duties
116. Centralized Identity Management
117. Kerberos and Single Sign On (SSO)
118. Backups and Media Management
119. Operations Security Controls
120. Physical Security Controls
121. Incident Response
122. VPNs
123. Disaster Recovery Planning
124. Pen Testing Tips
125. Useful Tools
126. Case Study for Security
127. Additional Resources
Don’t miss out on this opportunity to upskill with Learn Ezy!
Add your email to the mailing list to get the latest updates.