Ethical Hacking for Beginners [Video]

Access cutting-edge content as it's created

Want to access this video course right now? Watch as we develop it as part of our Alpha program.

Ethical Hacking for Beginners [Video]

Jack Simpson

Hack your way to a secure and threat free environment using the best-in-class tools and techniques

Access cutting-edge content as it's created

Want to access this video course right now? Watch as we develop it as part of our Alpha program.

$0.00
$19.00
$29.99p/m after trial
RRP $94.99
Subscription
Video
Start 30 Day Trial
Subscribe and access every Packt eBook & Video.
 
  • 4,000+ eBooks & Videos
  • 40+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 
Code Files

Video Details

ISBN 139781786466075
Course Length4 hours

Video Description

This video course provides a good starting point to learn ethical hacking and identify threats and vulnerabilities to secure your IT environment.

We'll begin by introducing you to the best tools around, which will be essential to get you started with penetration testing. Next, we'll introduce you to a basic technique that is used in hacking, which is Reconnaissance. You'll get hands on experience working with Metasploit and testing the effectiveness of different defenses. Next, you'll learn about sniffing and how effective the Man in the Middle attack can be. We'll take you through a coffee shop scenario to help you understand better. You'll get a hang of bypassing different defenses, after which, you'll learn how hackers use the network to gain access into different systems.

This course will keep you updated with latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems.

Style and Approach

A real-world scenario based video course that takes a gradual learning curve, building up your knowledge about security, right from scratch.

Table of Contents

First Steps
Course Overview
Kali, ParrotOS, and Other Operating Systems Being Used
Basic Terminologies
Reconnaissance
What is Reconnaissance
Working with nmap
Shodan
Search Engines are Your Friend
Other Types of Reconnaissance

What You Will Learn

  • Stage attacks to your own advantage
  • Work with the Metasploit toolkit to test the effectiveness of defenses
  • Incorporate Sniffing with the Man in the Middle attack
  • Bypass modern security defenses to understand the ins and outs of security
  • Understand how networks are used by attackers
  • Work with Aircrack-ng and honeypots for defense intelligence

Authors

Table of Contents

First Steps
Course Overview
Kali, ParrotOS, and Other Operating Systems Being Used
Basic Terminologies
Reconnaissance
What is Reconnaissance
Working with nmap
Shodan
Search Engines are Your Friend
Other Types of Reconnaissance

Video Details

ISBN 139781786466075
Course Length4 hours
Read More

Read More Reviews