Signup Now
Da bi mogli da pišete na forumu, otvarate nove teme, kao i da vidite download
linkove morate prvo da se registrujete.

Ukoliko Vam nije jasan proces registracije, molimo vas da kliknete OVDE
Ako ste zaboravili lozinku, kliknite OVDE :)

Udemy:The Complete Ethical Hacking Course-Beginner to Advanced

Diskusija u 'Video Tutorijali' započeta od raI10, 27.03.2016.

  1. raI10

    raI10

    Postova:
    657
    Zahvala:
    70
    Pol:
    Muški
    Lokacija:
    ROM
    [​IMG]






    Gain the ability to do ethical hacking and penetration testing by taking this course! Get answers from an experienced IT expert to every single question you have related to the learning you do in this course including installing Kali Linux, using VirtualBox, basics of Linux, Tor, Proxychains, VPN, Macchanger, Nmap, cracking wifi, aircrack, DoS attacks, SLL strip, known vulnerabilities, SQL injections, cracking Linux passwords, and more topics that are added every month!

    If you are like me, you are reading more now because you want to know for sure whether this course is worth taking before you invest your money and time in it. More than10,000 people have already completed the process of deciding to take this course and I hope sharing a few of their experiences can prove useful for you here. Here are what three recent students had to say in the reviews in their own words.

    Awesome Course by Penny Garcia.
    - I am 11 videos in and LOVING this course right now. The instructor is very thorough. I would certainly recommend this course to others as I am just starting out in pen testing and hacking and feel that this is what I have been looking for. Thank you so much for putting the time and effort into such an amazing course.

    Best course ever.. by Mahmoud Selman.
    - Thank you guys for such a great course. It's the best one ever on Udemy and worth every penny. You have covered everything inside it. Students be aware! What you are going to learn here in this course is going to blow your mind!! and you got to use what you learn wisely otherwise if you misuse this info you can get from 5 to 10 years in jail. Keep it White hat.

    Very helpful instructor by Deepak Muralidharan.
    - Ermin Kreponic has been very helpful in solving many hiccups pertaining to this course. Especially considering the time difference between us. Much appreciated his help.

    What you can see from reading these three reviews is that students love the technical support Ermin provides through answering questions about all of the subjects presented in the course. The lectures themselves are helpful and will inspire you to try actually doing what you see Ermin do. Then when you try to learn and have problems, you experience the greatest value of the course which is access to the instructor for help. You can ask anything related to the course and Ermin will give you a thoughtful answer which will consistently help you solve the problems you are having in learning ethical hacking and penetration testing.

    Thank you very much for reading so much of the description for this course! The fact that you have spent some of your very valuable time here already reading this course leads me to believe that you will enjoy being a student in the course a lot! Find the "take this course" or "start free preview" button up on the page to give the course a try today!

    If you want to learn more about what the course contains, here is a short list of questions to help you decide if you should take it followed by a deep list of the course lectures below. What you see is just the beginning of what the course includes because Ermin is making new lectures every month for you! You will get to see screen capture live tutorials showing you everything you need to do to get started with ethical hacking and penetration testing including information about all of the topics below!
    - How to install VirtualBox.
    - What to do to create the virtual environment.
    - Installing VirtualBox in a Windows 8.1 environment.
    - Basic Linux terminal.
    - Staying anonymous with tor.
    - Virtual Private Networks (VPN).

    You get lifetime access to this course which already has 20+ hours of HD video tutorials sharing everything you need to be a penetration testing expert and ethical hacker! If you are still not sure, here are three questions you can use to make the final decision!

    1. Do you want to learn how to penetrate networks, exploit systems, break into computers, and compromise routers?
    2. Do you want to use the valuable skills to work for companies that want you to use these skills to test their network security and show them to enhance it?
    3. How would you feel if you could apply these skills to what you already know to greatly advance your career as a network specialist, network administrator, or freelancer online?

    If you answered yes to any of these questions, I would guess based on my experience teaching 50,000+ students on Udemy that you might enjoy this course. If for any reason I am wrong, you have 30 days to ask Udemy for a refund. With 98% of students enjoying this course enough to not ask for a refund and 50+ students posting good reviews, I can guess the odds of you enjoying this course are very high!Thank you very much for reading all of this! Ermin and I hope to see you as a student in the course when we next meet!



    Questions wrote:

    What am I going to get from this course?
    - Over 113 lectures and 25 hours of content!
    - Answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional!
    - Tips for remaining anonymous in hacking and penetration testing activities.
    - A guide to using these skills to get a better job and make money online as a freelancer.
    - The ability to secure and protect any network from hackers and loss of data.
    - A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords.
    - Step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux.

    What is the target audience?
    - You can begin this course with any level of knowledge and quickly start advancing your skills as an information technology and security expert anywhere in the world!
    - If you are working to advance your career on LinkedIn or as a freelancer online, you can use the skills you build in this course to get a better job and to increase your hourly pay rate.
    - If you are hoping to be a better network administrator, you can use this course to learn how to secure networks and protect assets.



    List of content wrote:

    Section 1: Ethical hacking and penetration testing. What is it and how can you use it?
    Section 2: Prerequisites for getting started with this course.
    Section 3: Basic hacking terms you will want to know getting started.
    Section 4: Build your hacking environment!
    Section 5: Set up instructions for Mac users ONLY
    Section 6: How to create a bootable USB of Kali Linux ( optional )
    Section 7: Updates: How to install VirtualBox on Fedora 22 + Kali Sana VM ( OPTIONAL )
    Section 8: Linux Terminal including basic functionalities and CLI.
    Section 9: What is Tor? How can you use it to protect your anonymity online?
    Section 10: ProxyChains for using proxy servers, hiding your ip, and obtaining access.
    Section 11: What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN?
    Section 12: What is a macchanger? How can you use it to change your mac address?
    Section 13: Footprinting with Nmap and external resources.
    Section 14: Attacking wireless networks. Overview of the tools.
    Section 15: Breaking WPA/WPA2 encryption. Wifi hacking and wifi hacker training.
    Section 16: Signal jamming and denial of service.
    Section 17: SSL strips.
    Section 18: Let's have a bit of fun!
    Section 19: Evil twin method! Clone wireless access points to steal data.
    Section 20: Attacking routers to give you free reign over the entire network!
    Section 21: DNS setting hacking to redirect users with post authentication exploitation.
    Section 22: Website attacks with SQL injections.



    [​IMG]


    [​IMG]


    Kod:
    Zao nam je, ali morate biti registrovani/prijavljeni da vidite ovaj sadržaj!

    Kod:
    Zao nam je, ali morate biti registrovani/prijavljeni da vidite ovaj sadržaj!
     
  2. Ombre

    Ombre Član

    Postova:
    1.621
    Zahvala:
    3.010
    The Complete Ethical Hacking Course: Go from Beginner to Advanced!
    English | MP4 | AVC 240kbps | 1280x720 | AAC stereo 65kbps | 25 hours 106 Lectures | Udemy | RAR | 6.63 GB


    [​IMG]

    Gain the knowledge hackers use to compromise systems and use it to protect your own! If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world! Join us now and receive over 25 hours & 106 Lectures of HD video, and 1 on 1 assistance from experienced network security professionals! We will cover the following topics in this course:

    CONTENT

    Folder 01: Ethical hacking and penetration testing. What is it and how can you use it
    001 Introduction to Ethical Hacking. What is it in detail.mp4
    002 What can you do to get the most out of this course.mp4

    Folder 02: Prerequisites for getting started with this course
    003 Prerequisites success tips for getting the most out of this course..mp4

    Folder 03: Basic hacking terms you will want to know getting started
    004 Basic terminology such as white hat, grey hat, and black hat hacking..mp4
    005 Basic terminology including SQL injections, VPN , proxy, VPS, and key loggers..mp4

    Folder 04: Build your hacking environment
    006 Installing VirtualBox with rpm plus why use a virtual machine..mp4
    007 Installing VirtualBox using the default package manager from repositories..mp4
    008 Creating the virtual environment..mp4
    009 Installing VirtualBox in a Windows 8.1 environment..mp4
    010 Kali Linux installation within a virtual environment..mp4
    011 Kali Linux installation after it is running and getting starting using it..mp4
    012 Installing VirtualBox Guest Additions.mp4

    Folder 05: Set up instructions for Mac users ONLY
    013 Installing VirtualBox on a Mac.mp4
    014 Setting up Kali Linux with VirtualBox part 1.mp4
    015 Setting up Kali Linux with VirtualBox part 2.mp4
    016 How to set up a USB passthrough on a Mac part 1.mp4
    017 How to set up a USB passthrough on a Mac part 2.mp4
    018 Kali Linux Live USB on a MacBook Pro part 1 OPTIONAL .mp4
    019 Kali Linux Live USB on a MacBook Pro part 2 OPTIONAL .mp4
    020 Kali Linux Live USB on a MacBook Pro part 3 OPTIONAL .mp4

    Folder 06: How to create a bootable USB of Kali Linux optional
    021 How to create a bootable USB of Kali with persistent storage 4 GB part 1.mp4
    022 How to create a bootable USB of Kali with persistent storage 4 GB part 2.mp4
    023 How to create a bootable USB of Kali with persistent storage 4 GB part 3.mp4
    024 How to create a bootable USB of Kali with persistent storage 4 GB part 4.mp4

    Folder 07: Updates How to install VirtualBox on Fedora 22 Kali Sana VM OPTIONAL
    025 Fedroa 22 VirtualBox set up.mp4
    026 Kali Sana virtual machine installation.mp4
    027 How to install VBox GuestAdditions in Kali Sana.mp4

    Folder 08: Linux Terminal including basic functionalities and CLI
    028 Introduction to the Linux terminal..mp4
    029 Linux Command-Line Interface CLI basics..mp4
    030 The Linux CLI explained in greater detail to give you a good understanding..mp4

    Folder 09: What is Tor How can you use it to protect your anonymity online
    031 Tor part 1..mp4
    032 Tor part 2..mp4

    Folder 10: ProxyChains for using proxy servers, hiding your ip, and obtaining access
    033 Proxychains part 1..mp4
    034 Proxychains part 2..mp4
    035 Proxychains part 3..mp4

    Folder 11: What is a Virtual Private Network VPN and how you can stay anonymous with VPN
    036 VPN part 1..mp4
    037 VPN part 2..mp4

    Folder 12: What is a macchanger How can you use it to change your mac address
    038 Macchanger part 1 updated.mp4
    039 Macchanger part 2 updated.mp4

    Folder 13: Footprinting with Nmap and external resources
    040 Nmap part 1..mp4
    041 Nmap part 2..mp4
    042 External resources using public listings of known vulnerabilities..mp4

    Folder 14: Attacking wireless networks. Overview of the tools
    043 Intro to wifi hacker cracking WPAWPA2..mp4
    044 Aircrack and reaver installation..mp4
    045 Installing aircrack-ng on Windows crunch on Linux..mp4
    046 For Windows Users. How To Set Up USB wireless Adapter with Virtualbox Part 1..mp4
    047 For Windows Users. How To Set Up USB wireless Adapter with VirtualBox part 2..mp4

    Folder 15: Breaking WPAWPA2 encryption. Wifi hacking and wifi hacker training
    048 Aircrack-ng _ crunch usage example_1.mp4
    049 Aircrack-ng _ crunch usage example_2.mp4
    050 Aircrack-ng _ crunch usage example_3.mp4
    051 Cracking WPS pins with reaver part 1..mp4
    052 Cracking WPS pins with reaver part 2..mp4
    053 Cracking WPS pins with reaver part 3..mp4

    Folder 16: Signal jamming and denial of service
    054 Performing denial of service on wireless networks part 1..mp4
    055 Performing denial of service on wireless networks part 2..mp4

    [​IMG]

    Folder 17: SLL strips
    056 SSL strip part 1..mp4
    057 SSL strip part 2..mp4
    058 SSL strip part 3..mp4

    Folder 18: Lets have a bit of fun
    059 Funny things part 1.mp4
    060 Funny things part 2..mp4
    061 Funny things part 3..mp4

    Folder 19: Evil twin method Clone wireless access points to steal data
    062 Evil twin part 1..mp4
    063 Evil twin part 2.mp4
    064 Evil twin part 3..mp4

    Folder 20: Attacking routers to give you free reign over the entire network
    065 Using known vulnerabilities part 1..mp4
    066 Using known vulnerabilities part 2..mp4
    067 Using known vulnerabilities part 3..mp4

    Folder 21: DNS setting hacking to redirect users with post authentication exploitation
    068 Post authentication exploitation DNS part 1..mp4
    069 Post authentication exploitation DNS part 2..mp4
    070 Post authentication exploitation DNS part 3..mp4

    Folder 22: Website attacks with SQL injections
    071 sql-injection-part-1.mp4
    072 sql-injection-part-2.mp4
    073 sql-injection-part-3.mp4
    074 sql-injection-part-4.mp4
    075 sql-injection-part-5.mp4

    Folder 23: Brute-forcing methods for cracking passwords
    076 cracking-hashes.mp4
    077 cracking-linux-password-with-john-the-ripper-part-1.mp4
    078 cracking-linux-password-with-john-the-ripper-part-2.mp4
    079 cracking-windows-password-with-john-the-ripper.mp4
    080 hydra-usage-part-1.mp4
    081 hydra-usage-part-2.

    Folder 24: Denial of Service DoS attacks demonstrated and explained
    082 DoS attack demonstration part 1. Introduction to Denial of Service attacks..mp4
    083 DoS attack demonstration part 2. Combine slowloris.pl with nmap..mp4
    084 DoS attack demonstration part 3 featuring ha.ckers.org..mp4

    Folder 25: Reverse shells. Gain remote control of any device
    085 Intro to Metasploit and reverse shells. What are reverse shells and why use them.mp4
    086 Metasploit reverse shell part 2 starting from a two terminal setup..mp4
    087 Making reverse shells persistent on another system and escalating privileges..mp4
    088 Creating a persistent reverse shell with Metasploit..mp4
    089 Using NetCat to make any kind of connection you might need..mp4
    090 How to upload a reverse shell onto a web server..mp4

    Folder 26: Make your own Keylogger in C
    091 General stuff.mp4
    092 Setting up the Environment part 1.mp4
    093 Setting up the Environment part 2.mp4
    094 Programming basics part 1.mp4
    095 Programming basics part 2.mp4
    096 Programming basics part 3.mp4
    097 Programming basics part 4.mp4
    098 Programming basics part 5.mp4
    099 Basic Keylogger part 1.mp4
    100 Basic Keylogger part 2.mp4
    101 Upper and lowercase letters.mp4
    102 Encompassing other characters part 1.mp4
    103 Encompassing other characters part 2.mp4
    104 Encompassing other characters part 3.mp4
    105 Hide keylogger console window.mp4

    Folder 27: Bonus lectures
    106 Thank you for being a student here What next.mp4

    [​IMG]

    [​IMG]
    Password always: Cassandra

    [​IMG]
    Kod:
    Zao nam je, ali morate biti registrovani/prijavljeni da vidite ovaj sadržaj!
    [​IMG]
     

Preporučite stranicu