Why Choose Us?

  • Best Seller

  • Online Courses

  • 24/7 Support

  • Lifetime Access

  • Get Certificate

Cyber Security White Hat Hacking v10

Is a hands-on training program designed to teach you how to think like an ethical hacker and defend against real-world cyber threats. You’ll explore the latest tools, techniques, and methodologies used in ethical hacking, penetration testing, and network defense. Perfect for beginners and IT professionals, this course builds a solid foundation in cybersecurity to help you launch or advance your career in the field.

  • Learn ethical hacking from scratch with real-world tools

  • Understand network vulnerabilities and attack vectors

  • Master penetration testing techniques step by step

  • Gain skills in system security and defense strategies

  • Explore tools like Kali Linux, Nmap, Metasploit & more

  • Earn a certificate to boost your cybersecurity career

Offer curriculum

    1. 1. Build and Configure your White Hat Hacking Lab

    2. 2. Building a LAB Concepts

    3. 3. Building a LAB Networking

    4. 4. Deploy a Kali Linux VM

    5. 5. Adding Metasploitable to Your Lab

    6. 6. Adding Windows to Your Lab

    7. 7. Configure a Static IP on Kali

    8. 8. Ethics and Hacking

    9. 9. Hacking Vocabulary

    10. 10. InfoSec Concepts

    11. 11. Attack Categories_ Types_ and Vectors

    12. 12. Five Phases of Hacking

    13. 13. Footprinting and Reconnaissance Concepts

    14. 14. Search Engine Tools

    15. 15. Hacking Using Google

    16. 16. Website Recon Tools

    17. 17. Metagoofil Metadata Tool

    18. 18. Email Headers for Footprinting

    19. 19. Using WHOIS for Recon

    20. 20. DNS Tools

    21. 21. Network Scanning Overview

    22. 22. Network Scanning Methodology

    23. 23. Port Discovery

    24. 24. Stealth Idle Scanning

    25. 25. OS and Application Fingerprinting

    26. 26. Vulnerability Scanning

    27. 27. Network Mapping Tools

    28. 28. NMAP

    29. 29. Scapy

    30. 30. Hping3

    31. 31. Proxy Servers

    32. 32. Using Public Proxy Services

    33. 33. Shellshock

    34. 34. Enumeration Concepts

    35. 35. NetBIOS Enumeration

    36. 36. SNMP Enumeration Concepts

    37. 37. SNMP Enumeration Tools

    38. 38. LDAP Enumeration Concepts

    39. 39. LDAP Enumeration Example

    40. 40. NTP Enumeration

    41. 41. SMTP Enumeration

    42. 42. System Hacking Overview

    43. 43. Password Cracking Concepts

    44. 44. Password Attack Example MITM and Sniffing

    45. 84. SQL Injection

    46. 85. Wireless Hacking Overview

    47. 86. Wireless Topologies and Vocabulary

    48. 87. Standards and Regulations

    49. 88. RF Fundamentals

    50. 45. Rainbow Crack Lab Setup

    51. 46. Rainbow Crack Demonstration

    52. 47. Password Reset Hacking

    53. 48. DHCP Starvation

    54. 49. Remote Access

    55. 50. NTFS Alternate Data Streams Exploit

    56. 51. Steganography with OpenPuff

    57. 52. Steganography with SNOW

    58. 53. Covering Tracks

    59. 54. Malware Overview

    60. 55. Spyware

    61. 56. Buffer Overflow

    62. 57. Trojan Overview

    63. 58. Creating a Trojan

    64. 59. Virus Overview

    65. 60. Virus Creation

    66. 61. Detecting Malware

    67. 62. Malware Analysis

    68. 63. File Verification via Hash

    69. 64. Sniffing Overview

    70. 65. CAM Table Attack and Port Security

    71. 66. DHCP Snooping

    72. 67. Dynamic ARP Inspection (DAI)

    73. 68. Social Engineering Concepts

    74. 69. Social Engineering Phases

    75. 70. Social Engineering Prevention

    76. 71. DoS and DDoS Overview

    77. 72. DoS and DDoS Prevention

    78. 73. Session Hijacking Overview

    79. 74. Reducing the Risk of Session Hijacking

    80. 75. Firewall Evasion

    81. 76. Firewall ACL Example

    82. 77. NAT and PAT Fundamentals

    83. 78. IDSIPS Evasion

    84. 79. Honeypots

    85. 80. Hacking Web Servers

    86. 81. OWASP Broken Web Application Project

    87. 82. Web App Vulnerabilities WordPress

    88. 83. SQL Introduction

    89. 89. Antenna Fundamentals

    90. 90. WLAN Frame Types

    91. 91. WLAN Frame Flow

    92. 92. Uncovering Hidden SSIDs

    93. 93. Bypassing MAC Address Filters

    94. 94. Breaking WPA2 Wireless

    95. 95. Rogue Wireless Access Points

    96. 96. Wireless Mis-Association Attacks

    97. 97. MITM Using Wireless Bridging

    98. 98. Protecting Wireless

    99. 99. Using an Android VM

    100. 100. Malware for Mobile

    101. 101. Mobile Device Risks

    102. 102. Improving Mobile Security

    103. 103.Cloud Computing Overview

    104. 104. Cloud Computing Security Concerns

    105. 105. Cloud Computing Security Benefits

    106. 106. IoT Security Overview

    107. 107. IoT Web_ Cloud_ and Mobile Interfaces

    108. 108. Symmetrical Encryption Concepts

    109. 109. Hashing Concepts for Data Integrity

    110. 110. Asymmetrical Encryption Concepts

    111. 111. Control Types

    112. 112. Multifactor Authentication

    113. 113. CIA Confidentiality_ Integrity_ and Availability

    114. 114. Quantifying Risk

    115. 115. Separation of Duties

    116. 116. Centralized Identity Management

    117. 117. Kerberos and Single Sign On (SSO)

    118. 118. Backups and Media Management

    119. 119. Operations Security Controls

    120. 120. Physical Security Controls

    121. 121. Incident Response

    122. 122. VPNs

    123. 123. Disaster Recovery Planning

    124. 124. Pen Testing Tips

    125. 125. Useful Tools

    126. 126. Case Study for Security

    127. 127. Additional Resources

About this course

  • $69.00
  • 127 lessons

Discover your potential.. Start today!

Hurry! This Exclusive Deal Ends In

Don’t miss out on this opportunity to upskill with Learn Ezy!

  • 00 Days
  • 00 Hours
  • 00 Minutes
  • 00 Seconds

Get In Touch

Add your email to the mailing list to get the latest updates.

Thank You