• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

57 Courses

An Introduction to Ethical Hacking with Kali Linux

By Packt

Learn how to assess servers and applications through Kali Linux and exploit vulnerabilities that compromise the security and data integrity of the systems.

An Introduction to Ethical Hacking with Kali Linux
Delivered Online On Demand3 hours 19 minutes
£29.99

The Complete Ethical Hacking Course

4.7(160)

By Janets

Register on the The Complete Ethical Hacking Course today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The The Complete Ethical Hacking Course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The The Complete Ethical Hacking Course Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the The Complete Ethical Hacking Course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.  Course Content Introduction to Ethical Hacking What is an Ethical Hacker 00:07:00 Terminology Crash Course pt. 1 00:09:00 Terminology Crash Course pt. 2 00:14:00 Terminology Crash Course pt. 3 00:08:00 Legal Considerations 00:11:00 Reconnaissance - Surveying the Attack Surface Surveying the Attack Surface 00:10:00 Recon Types 00:08:00 Passive Recon Part 1 00:07:00 Passive Recon Part 2 00:10:00 Active Recon 00:15:00 Recon Walkthrough Tools Summary 00:14:00 Maltego Demo 00:07:00 FOCA Demo 00:05:00 DEMO - Harvester 00:02:00 Scanning and Enumeration - Getting Down to Business Scanning & enumeration 00:08:00 Identifying Active Hosts pt. 1 00:10:00 Identifying Active Hosts pt. 2 00:13:00 Identifying Active Services 00:18:00 OS and Services Fingerprinting 00:15:00 Network Mapping 00:10:00 Final Thoughts 00:05:00 DEMO - Nmap Syntax pt. 1 00:14:00 DEMO - Nmap Syntax pt. 2 00:16:00 DEMO - Nmap Hosts Discovery 00:12:00 DEMO - Nmap Service Discovery 00:17:00 DEMO - Nmap Scripts 00:11:00 DEMO - Masscan 00:11:00 Network Presence Network Insecurity 00:04:00 Sniffing and Spoofing 00:13:00 Sniffing Tools 00:09:00 Spoofing, Crypto and Wifi 00:15:00 DEMO - tcpdump 00:11:00 DEMO - Wireshark 00:11:00 DEMO - Ettercap 00:13:00 DEMO - Burp Suite 00:15:00 DEMO - Scapy 00:10:00 Attacking Security Overview pt. 1: Windows Architecture 00:18:00 Security Overview pt. 2: Credentials Security 00:16:00 Security Overview pt. 3: Memory Corruption and Exploitation 00:16:00 Windows Hacking Basics 00:20:00 Local Access and Privilege Escalation 00:20:00 Dumping Hashes and Cracking Passwords 00:18:00 Linux Attacking Basics pt. 1 00:13:00 Linux Attacking Basics pt. 2 00:14:00 References 00:08:00 DEMO - Windows MSF Exploit pt. 1 00:13:00 DEMO - Windows MSF Exploit pt. 2 00:15:00 DEMO - Post Exploitation Activities 00:13:00 DEMO - Mimikatz 00:07:00 DEMO - Hashcat 00:08:00 DEMO - Konboot 00:13:00 DEMO - Post Exploitation Windows CMD 00:14:00 DEMO - Post Exploitation Windows Powershell 00:13:00 DEMO - Attacking Linux targets pt. 1aa 00:10:00 DEMO - Attacking Linux targets pt. 1 00:13:00 Web Hacking Introduction to Web Hacking 00:03:00 Web Security Architecture Overview pt. 1 00:17:00 Web Security Architecture Overview pt. 2 00:12:00 Attacking the Web Server pt. 1 00:10:00 Attacking the Web Server pt. 2 00:11:00 Attacking the Platform pt. 1 00:19:00 Attacking the Platform pt. 2 00:08:00 Attacking the Technology pt. 1 00:21:00 Attacking the Technology pt. 2 00:17:00 OWASP Top 10 pt. 1 00:09:00 OWASP Top 10 pt. 2 00:21:00 Attacking the Business Logic pt. 1 00:11:00 Attacking the Business Logic pt. 2 00:15:00 Tools and Methodology 00:20:00 References 00:05:00 DEMO - OWASP Mutillidae 00:09:00 SQLI 00:07:00 SQL Map Intro 00:08:00 SQL Map 00:25:00 DEMO - Burpsuite 00:37:00 DEMO - Burpsuite XSS Hunter 00:16:00 DEMO - mitmproxy 00:10:00 DEMO - Skipfish pt.1 00:05:00 DEMO - Skipfish pt.2 00:05:00 Social Engineering - Hacking Humans Social Engineering Basics 00:15:00 Social Engineering Methods 00:16:00 Tools and Techniques pt. 1 00:15:00 Tools and Techniques pt. 2 00:12:00 Tools and Techniques pt. 3 00:09:00 Physical Security Considerations 00:13:00 Final Thoughts99 00:11:00 DEMO - Credential harvesting 00:02:00 DEMO - Website cloning 00:06:00 DEMO - Automating an attack 00:03:00 DEMO - Anti-virus evasion pt. 1 00:08:00 DEMO - Anti-virus evasion pt. 2 00:12:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

The Complete Ethical Hacking Course
Delivered Online On Demand18 hours 13 minutes
£25

CompTIA PenTest+ (Ethical Hacking)

4.7(160)

By Janets

Register on the CompTIA PenTest+ (Ethical Hacking) today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The CompTIA PenTest+ (Ethical Hacking) is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The CompTIA PenTest+ (Ethical Hacking) Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the CompTIA PenTest+ (Ethical Hacking), all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.  Course Content Section 01: Introduction Introduction 00:09:00 Section 02: Planning And Scoping Planning a Pen Test 00:09:00 Rules of Engagement 00:11:00 Resources and Budget 00:07:00 Impact and Constraints 00:05:00 Support Resources 00:13:00 Legal Groundwork 00:12:00 Scope Considerations 00:11:00 Lab Environment Setup 00:23:00 Project Strategy and Risk 00:09:00 Scope Vulnerabilities 00:14:00 Compliance-Based Assessments 00:05:00 Section 03: Surveying The Target Scanning and Enumeration 00:05:00 Scanning Demo 00:11:00 Packet Investigation 00:08:00 Packet Inspection Demo 00:06:00 Application and Open-Source Resources 00:12:00 Vulnerability Scanning 00:09:00 Vulnerability Scanning Demo 00:17:00 Target Considerations 00:16:00 Nmap Timing and Performance Options 00:07:00 Prioritization of Vulnerabilities 00:09:00 Common Attack Techniques 00:12:00 Credential Attacks 00:15:00 Weaknesses in Specialized Systems 00:18:00 Section 04: Select Your Attack Vector Remote Social Engineering 00:07:00 Spear Phishing Demo 00:10:00 In-Person Social Engineering 00:12:00 Network-Based Exploits 00:07:00 FTP Exploit Demo 00:08:00 Man-in-the-middle Exploits 00:07:00 Wireless Exploits 00:14:00 Application Exploits, Part 1 00:06:00 SQL Injection Demo 00:09:00 Application Exploits, Part 2 00:08:00 Application Exploits, Part 3 00:09:00 Code Vulnerabilities 00:17:00 Local Host Vulnerabilities 00:05:00 Privilege Escalation (Linux) 00:10:00 Privilege Escalation (Windows) 00:06:00 Misc. Privilege Escalation 00:08:00 Misc. Local Host Vulnerabilities 00:08:00 Physical Security 00:11:00 Post-Exploitation Techniques 00:11:00 Persistence and Stealth 00:11:00 Section 05: Selecting Pen Testing Tools Nmap Scoping & Output Options 00:21:00 Pen Testing Toolbox 00:07:00 Using Kali Linux 00:06:00 Scanners & Credential Tools 00:10:00 Code-Cracking Tools 00:05:00 Open-Source Research Tools 00:07:00 Wireless and Web Pen Testing Tools 00:11:00 Remote Access Tools 00:06:00 Analyzers and Mobile Pen Testing Tools 00:03:00 Other Pen Testing Tools 00:05:00 Using Scripting in Pen Testing 00:13:00 Bash Scripting Basics 00:15:00 Bash Scripting Techniques 00:10:00 PowerShell Scripts 00:04:00 Ruby Scripts 00:07:00 Python Scripts 00:07:00 Scripting Languages Comparison 00:11:00 Section 06: Reporting And Communication Writing Reports 00:16:00 Post-Report Activities 00:06:00 Mitigation Strategies 00:05:00 Communication 00:10:00 Order your Certificates & Transcripts Order your Certificates & Transcripts 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

CompTIA PenTest+ (Ethical Hacking)
Delivered Online On Demand10 hours 42 minutes
£25

Ethical Hacking Complete Course

By Lead Academy

Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want This course will take you on an exciting journey into the world of cybersecurity. Here you will learn ethical hacking methodologies and methods to identify and address potential security threats. With expert guidance, you will learn penetration testing, data protection and network security. This course at a glance Accredited by CPD UK Endorsed by Quality Licence Scheme Gain a comprehensive understanding of ethical hacking. Strengthen your skills and knowledge required to become an ethical hacker. Understand the basic Linux commands. Learn to create a secure hacking environment. Gain knowledge about scanning, footprinting and website penetration testing. Understand the process of wireless cracking. Learn about the man in the middle attacks. Learn about system hacking with Metasploit. Understand the basic authentication brute force. Why Ethical Hacking Complete Course right for you? This online ethical hacking complete course is the perfect way to kickstart your network security and ethical hacking career. This flexible online course will provide you with a comprehensive understanding of ethical hacking and the skills required to gain proficiency. This professional ethical hacking complete course will also help you understand the process of creating a secure hacking environment by using your expertise in the field. You will also get to have a crash course on Python and coding after taking this course. This popular online course will also help you understand footprinting, scanning, website penetration testing and a lot more. By the end of the course, you will have a theoretical understanding of ethical hacking and the tools and strategies used to become a thriving ethical hacker. Ethical Hacking Complete Course Details Accredited by CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field.   The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Course Curriculum Introduction Introduction to The Course VirtualBox Installation Kali Linux Installation Enabling Full-Screen Basic Linux Commands Basic Commands Part 1 Basic Commands Part 2 Basic Commands Part 3 Creating a Secure Hacking Environment Changing IP Address and Wireless Adapter Setup Creating a Bootable Kali USB Drive Essential Networking Terms Essential Hacking Terms Additional Kali Tools to Install Changing Our MAC Address with Macchanger Footprinting Google Hacking Nikto Basics Whois Tool Email Harvesting Shodan Zone Transfer with Dig Scanning Installing Metasploitable Nmap Part 1 Nmap Part 2 Nmap Part 3 Zenmap TCP Scans Nmap Bypassing Defenses Nmap Scripts Part 1 Nmap Scripts Part 2 Website Penetration Testing Installing OWASP HTTP Request HTTP Response Burpsuite Configuration Editing Packets in Burpsuite Whatweb and Dirb Password Recovery Attack Burpsuite Login Bruteforce Hydra Login Bruteforce Session Fixation Injection Attacks Simple Command Injection Exploiting Command Injection Vulnerability Finding Blind Command Injection SQL Basics Manual SQL Injection Part 1 Manual SQL Injection Part 2 SQLmap Basics XML Injection Installing XCAT And Preventing Injection Attacks Reflected XSS Stored XSS Changing HTML Code with XSS XSSer and XSSsniper Wireless Cracking Wireless Attacking Theory Enabling Monitor Mode Capturing Handshake with Airodump RockYou.txt Cracking with Aircrack Cracking with Hashcat Creating Password Lists with Crunch Creating Password Lists with Cupp Rainbow Tables Part 1 Rainbow Tables Part 2 Installing Fluxion Finding and Cracking Hidden Networks Preventing Wireless Attacks Man in the Middle Attacks ARP Protocol Basics Man in The Middle Attack Theory Installing MITMf Manual ARP Spoofing Problems While Installing MITMf HTTP Traffic Sniffing DNS Spoofing and HTTPS Password Sniffing Hooking Browsers with BEEF Screenshotting Targets Browser Cloning Any Webpage Ettercap Basics System Hacking with Metasploit MSFconsole Environment Bruteforcing SSH with Metasploit Attacking Tomcat with Metasploit Getting Meterpreter with Command Injection PHP Code Injection 2 Metasploitable Exploits Wine Installation Creating Windows Payloads with Msfvenom Encoders and Hex Editor Windows 10 Meterpreter Shell Meterpreter Environment Windows 10 Privilege Escalation Preventing Privilege Escalation Post Exploitation Modules Getting Meterpreter Over Internet with Port Forwarding Eternalblue Exploit Persistence Module Hacking Over The Internet with Ngrok Android Device Attack with Venom The Real Hacking Begins Now! Python Crash Course Variables Raw Input If-Else Statements For Loops While Loops Python Lists Functions Classes Importing Libraries Files in Python Try and Except Rule Coding an Advanced Backdoor Theory Behind Reverse Shells Simple Server Code Connection with Reverse Shell Sending and Receiving Messages Sending Messages with While True Loop Executing Commands on Target System Fixing Backdoor Bugs and Adding Functions First Test Using Our Backdoor Trying to Connect Every 20 Seconds Creating Persistence Part 1 Creating Persistence Part 2 Changing Directory Uploading and Downloading Files Downloading Files from The Internet Starting Programs Using Our Backdoor Capturing Screenshot on The Target PC Embedding Backdoor in an Image Part 1 Embedding Backdoor in an Image Part 2 Checking for Administrator Privileges Adding Help Option Creating a Keylogger for The Backdoor Importing Pynput Simple Keylogger Adding Report Function Writing Keystrokes to a File Adding The Keylogger to Our Reverse Shell Part 1 Adding The Keylogger to Our Reverse Shell Part 2 Final Project Test Basic Authentication Bruteforcer Printing Banner Adding Available Options Starting Threads for Bruteforce Writing Function to Run The Attack Bruteforcing Router Login Bypassing Antivirus with Your Future Programs Sending Malware with Spoofed Email Bonus - Building a Career in Cyber Security What will You Learn in This Section? Why is Ethical Hacking a Valuable Skill? What is The Best Ethical Hacking Certification? Tips for Getting Your First Job As an Ethical Hacker How I Started My Career As an Ethical Hacker How to Price Your Work Who should take this course? This ethical hacking complete course has been designed for those who want to build in ethical hacking. Someone looking to add an advantage to their career in the field of ethical hacking or aspiring to establish their career can also opt for this engaging online course. Entry Requirements There are no academic entry requirements for this Ethical Hacking Complete course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Ethical Hacking Complete Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Certification Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Ethical Hacking Complete Course
Delivered Online On Demand
£25

Intermediate Ethical Hacking Hands-on Training Online

By Lead Academy

Intermediate Ethical Hacking Hands-on Training Course Overview Are you looking to begin your ethical hacking career or want to develop more advanced skills in ethical hacking? Then this intermediate ethical hacking hands-on training course will set you up with a solid foundation to become a confident ethical hacker and help you to develop your expertise in ethical hacking. This intermediate ethical hacking hands-on training course is accredited by the CPD UK & IPHM. CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Whether you are self-taught and you want to fill in the gaps for better efficiency and productivity, this intermediate ethical hacking hands-on training course will set you up with a solid foundation to become a confident ethical hacker and develop more advanced skills. Gain the essential skills and knowledge you need to propel your career forward as a ethical hacker. The intermediate ethical hacking hands-on training course will set you up with the appropriate skills and experience needed for the job and is ideal for both beginners and those currently working as a ethical hacker. This comprehensive intermediate ethical hacking hands-on training course is the perfect way to kickstart your career in the field of ethical hacking. This intermediate ethical hacking hands-on training course will give you a competitive advantage in your career, making you stand out from all other applicants and employees. If you're interested in working as a ethical hacker or want to learn more skills on ethical hacking but unsure of where to start, then this intermediate ethical hacking hands-on training course will set you up with a solid foundation to become a confident ethical hacker and develop more advanced skills. As one of the leading course providers and most renowned e-learning specialists online, we're dedicated to giving you the best educational experience possible. This intermediate ethical hacking hands-on training course is crafted by industry expert, to enable you to learn quickly and efficiently, and at your own pace and convenience. Who is this intermediate ethical hacking hands-on training online course for? This comprehensive intermediate ethical hacking hands-on training course is suitable for anyone looking to improve their job prospects or aspiring to accelerate their career in this sector and want to gain in-depth knowledge of ethical hacking. Entry Requirement There are no academic entry requirements for this intermediate ethical hacking hands-on training course, and it is open to students of all academic backgrounds. As long as you are aged seventeen or over and have a basic grasp of English, numeracy and ICT, you will be eligible to enrol. Assessment Method This intermediate ethical hacking hands-on training online course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Course Curriculum Course Overview Course Overview Virtual Lab Build Video - Downloading ISO and OVA Files for VirtualBox Video and Lab -Creating a Virtual install of Kali using VirtualBox Video and lab - Create a virtual install of Metasploitable2 Video and Lab - Creating Windows 7 Pro Target Machine Using VirtualBox Video - Installing the VirtualBox Extension Pack NMap Video and Lab - Installing the WebMap-Nmap Dashboard Video and Lab - Automated Recon/Enumeration Using nmapAutomator Enumerating a Windows 10 Target Video - Creating a Vulnerable Windows 10 Target Reverse Shells, Privilege Escalation and Persistent Backdoors Video and Lab - Create a Windows Reverse Shell Using the PowerShell Video and Lab - Create a Reverse Shell Using Command Injection Video and Lab - Create a Reverse Shell Using a File Upload Video and Lab - Launch an Automated Meterpreter Session Video and Lab - Upgrade a Dumb Terminal to Fully Functional BASH Shell Video and Lab - Windows 7 Privilege Escalation Using UAC Bypass Video and Lab - Creating a Persistent Backdoor Using a Persistent Service PowerShell Empire Video and Lab - Create Virtual Install of Server 2016 Full GUI Using VirtualBox Video and Lab - Installing PowerShell Empire StarKiller On Kali Linux Video and Lab - Enumerating Active Directory Video and Lab - Post-Exploitation of Windows Using PowerShell Empire Post Exploitation of Microsoft Windows Video and Lab - Advanced Password Hacking with Metasploit Video and Lab - Post-Exploitation of Microsoft Windows video and Lab - Enumerating Active Directory Using RPCClient Video and Lab - Dumping Wi-Fi Credentials Using netsh Practical Pentesting Labs Video and Lab - Heartbleed OpenSSL Exploit Vulnerability Video and Lab - Performing an RDP Brute Force Attack Video and Lab - Exploiting Active Directory using LLMNR/NBT-NS Poisoning Video and Lab - Accessing Kali Across the WAN with NGROK Video and Lab - Pentesting with Netcat Video and Lab - Enumerate DNS Records Using DNSRecon Auditing Wireless Network Video and Lab - Installing a Wireless Adapter in Kali Video and Lab - Hacking a Wireless Network Using Kali Linux Video and Lab - Wireless Deauthentication Attack Video and Lab - PMKID Client-less Wireless Attack Using Bettercap Wireshark Video - Overview of Wireshark 3.2 Video - Wireshark Capture Options Video - Wireshark Toolbar Icons Video - Capturing Wireless Traffic Using Wireshark Video and Lab - Capturing a 3-way TCP Handshake Using Wireshark Web App Penetration Testing Video and Lab - Creating a virtual install of OWASP Video and lab - Setting Up Burp Suite Video and Lab - Attack Web Apps with Burp Suite Using SQL Injection Video and Lab - OS Command Injection Using Commix 3.2x Video - Web Application Firewall Detection Using WAFW00F Video and Lab - Exploit Vulnerable Web Applications Using Command Injection Video and Lab - Using Banner Grabbing to Aid in Reconnaissance Anonymity - Remaining Anonymous While Pentesting Video and Lab - Anonymize Kali Using Whonix CTF - SQL Injection to Shell Walkthrough Video and Lab - Lab Preparation for CTF SQL Injection to Shell Video and Lab - CTF Walkthrough for SQL Injection to Shell Recognised Accreditation CPD Certification Service This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field. Certificate of Achievement Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. Overview Intermediate Ethical Hacking Hands-on Training Course Overview Are you looking to begin your ethical hacking career or want to develop more advanced skills in ethical hacking? Then this intermediate ethical hacking hands-on training course will set you up with a solid foundation to become a confident ethical hacker and help you to develop your expertise in ethical hacking. This intermediate ethical hacking hands-on training course is accredited by the CPD UK & IPHM. CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Whether you are self-taught and you want to fill in the gaps for better efficiency and productivity, this intermediate ethical hacking hands-on training course will set you up with a solid foundation to become a confident ethical hacker and develop more advanced skills. Gain the essential skills and knowledge you need to propel your career forward as a ethical hacker. The intermediate ethical hacking hands-on training course will set you up with the appropriate skills and experience needed for the job and is ideal for both beginners and those currently working as a ethical hacker. This comprehensive intermediate ethical hacking hands-on training course is the perfect way to kickstart your career in the field of ethical hacking. This intermediate ethical hacking hands-on training course will give you a competitive advantage in your career, making you stand out from all other applicants and employees. If you're interested in working as a ethical hacker or want to learn more skills on ethical hacking but unsure of where to start, then this intermediate ethical hacking hands-on training course will set you up with a solid foundation to become a confident ethical hacker and develop more advanced skills. As one of the leading course providers and most renowned e-learning specialists online, we're dedicated to giving you the best educational experience possible. This intermediate ethical hacking hands-on training course is crafted by industry expert, to enable you to learn quickly and efficiently, and at your own pace and convenience. Who is this intermediate ethical hacking hands-on training online course for? This comprehensive intermediate ethical hacking hands-on training course is suitable for anyone looking to improve their job prospects or aspiring to accelerate their career in this sector and want to gain in-depth knowledge of ethical hacking. Entry Requirement There are no academic entry requirements for this intermediate ethical hacking hands-on training course, and it is open to students of all academic backgrounds. As long as you are aged seventeen or over and have a basic grasp of English, numeracy and ICT, you will be eligible to enrol. Assessment Method This intermediate ethical hacking hands-on training online course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Course Curriculum Course Overview Course Overview Virtual Lab Build Video - Downloading ISO and OVA Files for VirtualBox Video and Lab -Creating a Virtual install of Kali using VirtualBox Video and lab - Create a virtual install of Metasploitable2 Video and Lab - Creating Windows 7 Pro Target Machine Using VirtualBox Video - Installing the VirtualBox Extension Pack NMap Video and Lab - Installing the WebMap-Nmap Dashboard Video and Lab - Automated Recon/Enumeration Using nmapAutomator Enumerating a Windows 10 Target Video - Creating a Vulnerable Windows 10 Target Reverse Shells, Privilege Escalation and Persistent Backdoors Video and Lab - Create a Windows Reverse Shell Using the PowerShell Video and Lab - Create a Reverse Shell Using Command Injection Video and Lab - Create a Reverse Shell Using a File Upload Video and Lab - Launch an Automated Meterpreter Session Video and Lab - Upgrade a Dumb Terminal to Fully Functional BASH Shell Video and Lab - Windows 7 Privilege Escalation Using UAC Bypass Video and Lab - Creating a Persistent Backdoor Using a Persistent Service PowerShell Empire Video and Lab - Create Virtual Install of Server 2016 Full GUI Using VirtualBox Video and Lab - Installing PowerShell Empire StarKiller On Kali Linux Video and Lab - Enumerating Active Directory Video and Lab - Post-Exploitation of Windows Using PowerShell Empire Post Exploitation of Microsoft Windows Video and Lab - Advanced Password Hacking with Metasploit Video and Lab - Post-Exploitation of Microsoft Windows video and Lab - Enumerating Active Directory Using RPCClient Video and Lab - Dumping Wi-Fi Credentials Using netsh Practical Pentesting Labs Video and Lab - Heartbleed OpenSSL Exploit Vulnerability Video and Lab - Performing an RDP Brute Force Attack Video and Lab - Exploiting Active Directory using LLMNR/NBT-NS Poisoning Video and Lab - Accessing Kali Across the WAN with NGROK Video and Lab - Pentesting with Netcat Video and Lab - Enumerate DNS Records Using DNSRecon Auditing Wireless Network Video and Lab - Installing a Wireless Adapter in Kali Video and Lab - Hacking a Wireless Network Using Kali Linux Video and Lab - Wireless Deauthentication Attack Video and Lab - PMKID Client-less Wireless Attack Using Bettercap Wireshark Video - Overview of Wireshark 3.2 Video - Wireshark Capture Options Video - Wireshark Toolbar Icons Video - Capturing Wireless Traffic Using Wireshark Video and Lab - Capturing a 3-way TCP Handshake Using Wireshark Web App Penetration Testing Video and Lab - Creating a virtual install of OWASP Video and lab - Setting Up Burp Suite Video and Lab - Attack Web Apps with Burp Suite Using SQL Injection Video and Lab - OS Command Injection Using Commix 3.2x Video - Web Application Firewall Detection Using WAFW00F Video and Lab - Exploit Vulnerable Web Applications Using Command Injection Video and Lab - Using Banner Grabbing to Aid in Reconnaissance Anonymity - Remaining Anonymous While Pentesting Video and Lab - Anonymize Kali Using Whonix CTF - SQL Injection to Shell Walkthrough Video and Lab - Lab Preparation for CTF SQL Injection to Shell Video and Lab - CTF Walkthrough for SQL Injection to Shell Recognised Accreditation CPD Certification Service This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field. Certificate of Achievement Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQ Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org Course Fee £25 £125 80% OFF 👉 CPD UK Accredited PDF Certificate Included 4 interest-free payments of £6.25 Intermediate Ethical Hacking Hands-on Training Online quantity ENROL NOW Duration: * Hours Instant Access Get In Touch Today Live CHAT WITH US CALL ON - 0300 124 5585 Certificate of Achievement Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Intermediate Ethical Hacking Hands-on Training Online
Delivered Online On Demand
£25

BlackArch Linux: Ethical Hacking and Penetration Testing

4.8(9)

By Skill Up

Dive into the world of Ethical Hacking and Penetration Testing with BlackArch Linux. Master cybersecurity, vulnerability assessment, and network security.

BlackArch Linux: Ethical Hacking and Penetration Testing
Delivered Online On Demand7 hours 8 minutes
£25

Ethical Hacking and Pentesting Ultimate Hands-on Online Training

By Lead Academy

Ethical Hacking and Pentesting Ultimate Hands-on Online Training Course Overview Are you looking to begin your ethical hacker career or want to develop more advanced skills in ethical hacker? Then this ethical hacker course will set you up with a solid foundation to become a confident ethical hacker and help you to develop your expertise in ethical hacker. This ethical hacking and pentesting ultimate hands-on online training course is accredited by the CPD UK & IPHM. CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Whether you are self-taught and you want to fill in the gaps for better efficiency and productivity, this ethical hacking and pentesting ultimate hands-on online training course will set you up with a solid foundation to become a confident ethical hacker and develop more advanced skills. Gain the essential skills and knowledge you need to propel your career forward as a ethical hacker. The ethical hacking and pentesting ultimate hands-on online training course will set you up with the appropriate skills and experience needed for the job and is ideal for both beginners and those currently working as a ethical hacker. This comprehensive ethical hacking and pentesting ultimate hands-on online training course is the perfect way to kickstart your career in the field of ethical hacker. This ethical hacking and pentesting ultimate hands-on online training course will give you a competitive advantage in your career, making you stand out from all other applicants and employees. If you're interested in working as a ethical hacking and pentesting ultimate hands-on online training or want to learn more skills on ethical hacker but unsure of where to start, then this ethical hacking and pentesting ultimate hands-on online training course will set you up with a solid foundation to become a confident ethical hacker and develop more advanced skills. As one of the leading course providers and most renowned e-learning specialists online, we're dedicated to giving you the best educational experience possible. This ethical hacking and pentesting ultimate hands-on online training course is crafted by industry expert, to enable you to learn quickly and efficiently, and at your own pace and convenience. Who is this Ethical Hacking and Pentesting Ultimate Hands-on Online Training course for? This comprehensive ethical hacking and pentesting ultimate hands-on online training course is suitable for anyone looking to improve their job prospects or aspiring to accelerate their career in this sector and want to gain in-depth knowledge of ethical hacker. Entry Requirement There are no academic entry requirements for this ethical hacking and pentesting ultimate hands-on online training course, and it is open to students of all academic backgrounds. As long as you are aged seventeen or over and have a basic grasp of English, numeracy and ICT, you will be eligible to enrol. Assessment Method This ethical hacking and pentesting ultimate hands-on online training course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Course Curriculum Course Overview Course Overview Building Your Virtual Lab Environment Video - Downloading ISO and OVA Fles for VirtualBox Video and lab - Creating a Virtual install of Kali using VirtualBox Video and Lab - Creating a Virtual Install of CSI Linux 2021.2 Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox Video - Installing the VirtualBox Extension pack Video - Taking a Snapshot of Your Current Configuration Passive Reconnaissance Video and Lab - Gathering Information Using Maltego Video and Lab - Gathering Information Using CSI Linux Investigator Video and Lab - Preparing CSI Linux to Use Shodan Video and Lab - Using Shodan to Find Vulnerable Devices Nmap Video and Lab - Introduction to NMap Video and lab - NMap Scripting Engine (NSE) Video and lab - Scanning for WannaCry Ransomware Scanning for Vulnerabilities Using Nessus Video and Lab - Installing NESSUS Using Docker Video and lab - Scanning for Vulnerabilities Using Nessus Video - Using Your Nessus Scan Results Scanning for Vulnerabilities Using OpenVAS Video and Lab - Installing OpenVAS Using Docker Video and Lab - Scanning for Vulnerabilities Using OpenVAS Exploiting Microsoft Windows Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP Video and Lab - Establishing A VNC Shell Using Meterpreter Video and Lab - Using Meterpreter to backdoor Windows XP Exploiting Linux Video and lab - Installing Metasploitable2 Using VirtualBox Social Engineering Video and Lab - Using the Social Engineering Toolkit (SET) BASH Scripting for Pentesters Video and Lab - Introduction to BASH Scripting Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports Video and Lab - Password Cracking Using Medusa Video and Lab - Passwords Cracking Using Mimikatz Pentesting Wireless Networks Video and Lab - Installing a Wireless Adapter in Kali Video and Lab - Hacking a Wireless Network Using Kali Linux Wireless Deauthentication Attack PMKID Client-less Wireless Attack Using Bettercap Web Based Application Attacks Video and Lab - Installing w3af in Kali Linux Using Docker Video and Lab - Conducting A Website Vulnerability Scan Using w3af Video and Lab - Performing a Browser Based Attack Video and lab - SQL Injection Attack Using SQLmap Browser Exploitation Framework (BeEF) Video - Configure Kali for Exploitation the WAN Video and lab - The Browser Exploitation Framework (BeEF) Remaining anonymous Video and Lab - Anonymize Kali Using Whonix,,,,, Capture The Flag Walkthrough - Mr. Robot Video Walk Through -Key #1 Video Walk through - Key #2 Video Walk Through - Key #3 Capture The Flag Walkthrough - Stapler Video - Capture the Flag - Stapler Part 1 Video - Capture the Flag - Stapler Part 2 Video - Capture the Flag - Stapler Part 3 Order Your Certificate Now Order Your Certificate Now Get Your Insurance Now Get Your Insurance Now Feedback Feedback Certificate of Achievement Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Ethical Hacking and Pentesting Ultimate Hands-on Online Training
Delivered Online On Demand
£25

BlackArch Linux for Hacking and Penetration Testing

4.7(160)

By Janets

Register on the BlackArch Linux for Hacking and Penetration Testing today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The BlackArch Linux for Hacking and Penetration Testing is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The BlackArch Linux for Hacking and Penetration Testing Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the BlackArch Linux for Hacking and Penetration Testing, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content BlackArch Linux for Hacking and Penetration Testing Module 01: Kali Linux Installation and Updates 00:31:00 Module 02: Kali Linux Operating System Configuration 00:32:00 Module 03: Virtualization Basics 00:18:00 Module 04: BlackArch Linux Introduction and Installation 00:43:00 Module 05: BlackArch Configuration 00:33:00 Module 06: Information Gathering and Validation 00:33:00 Module 07: Gathering Information with Maltego 00:15:00 Module 08: Cherrytree for Information Database Storage 00:08:00 Module 09: NMAP Techniques for Information Gathering 00:24:00 Module 10: Dracnmap Scripts for BlackArch 00:09:00 Module 11: Android Hacking with BlackArch 00:24:00 Module 12: Windows 7 Hacking with BlackArch 00:21:00 Module 13: Netcat NC Network Hacking with BlackArch 00:14:00 Module 14: Web Application and Website Hacking with BlackArch 00:26:00 Module 15: BEEF, Browser Injections, and Other Browser Attacks 00:25:00 Module 16: Hacking Facebook with BlackArch 00:12:00 Module 17: Hacking Wireless Networks with BlackArch Tools 00:29:00 Module 18: Man in the Middle Attacks with BlackArch 00:20:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

BlackArch Linux for Hacking and Penetration Testing
Delivered Online On Demand6 hours 57 minutes
£25

Cyber Security & Ethical Hacking

4.7(160)

By Janets

Register on the Cyber Security & Ethical Hacking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Cyber Security & Ethical Hacking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Cyber Security & Ethical Hacking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Cyber Security & Ethical Hacking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Introduction to Ethical Hacking Hacking Terms 00:07:00 VA vs PT and Rule of Engagement 00:09:00 Methodologies 00:07:00 Type of Pen Testing 00:06:00 Phases of Penetration Test 00:04:00 10 Steps to Follow 00:04:00 Setting up a Penetration Testing Lab What is Linux OS - Benefits 00:04:00 What is Kali Linux 00:03:00 Virtual Box Installation 00:06:00 Kali Linux Installation in VB 00:12:00 Install Metasploitable on Virtual Box 00:09:00 Install DVWA in Kali 00:18:00 Install TOR 00:09:00 Executing Basic Commands in Kali 00:12:00 Executing Advance Commands in Kali 00:14:00 Information Gathering What is Information Gathering 00:04:00 Maltego Part 1 00:07:00 Maltego Part 2 00:06:00 HTTrack 00:05:00 The Harvester 00:02:00 NSLookup 00:03:00 RedHawk 00:05:00 SHODAN 00:09:00 OSNIT Framework 00:05:00 Scanning and Enumeration What is Scanning 00:07:00 What is Nmap 00:05:00 Zenmap GUI 00:17:00 What is Enumeration 00:03:00 Types of Enumeration 00:03:00 Enumeration Using Hyena - 1 00:07:00 Enumeration Using Hyena - 2 00:06:00 VAPT What is Vulnerability Assessment 00:04:00 Phases of Vulnerability Assessment 00:08:00 Vulnerability Scoring Systems 00:09:00 Introduction to Nessus 00:05:00 Create and Configure Nessus Network Policy 00:08:00 Nessus Launch Scan and Analyse Result 00:08:00 Firewalls What is IDS 00:11:00 What Are Firewalls 00:10:00 What is DMZ 00:06:00 IDS Evasion Techniques 00:08:00 Firewall Evasion Techniques 00:09:00 Firewall Pentesting 00:02:00 WAPT Introduction to Web Servers 00:05:00 Types of Web Server Attacks 00:05:00 Web Server Penetration Testing 00:04:00 Countermeasures of Web Servers? 00:05:00 OWASP Top 10 Attacks Part 1 00:05:00 OWASP Top 10 Attacks Part 2 00:07:00 Website Foot Printing Part 1 00:05:00 Website Foot Printing Part 2 00:03:00 Command Execution Low 00:06:00 Command Execution Medium 00:07:00 Configuring Burp Suite 00:16:00 File Upload Low 00:10:00 File Upload Medium 00:07:00 File Upload High 00:08:00 SQL Injection 00:04:00 SQL Injection II 00:05:00 Manual SQL 00:17:00 Automating SQL 00:09:00 Countermeasures of SQL Injection 00:03:00 What Is XSS 00:03:00 Types of XSS 00:06:00 XSS Low 00:11:00 XSS Medium 00:05:00 XSS High 00:11:00 Countermeasures of XSS 00:04:00 What is CSRF 00:06:00 CSRF Practical 00:07:00 What is a Brute Force Attack? 00:05:00 Brute Force Political 00:18:00 Web Application Penetration Testing? 00:09:00 Web Application Countermeasures 00:06:00 Denial of Service What is Denial of Service (DOS)? 00:03:00 Types of DOS attack? 00:05:00 What is a BOTNET? 00:03:00 Malware Threats Introduction to Malware 00:09:00 Trojan 00:08:00 Types of Trojans 00:08:00 Viruses and Worms 00:07:00 Types of Viruses 00:10:00 Countermeasures 00:07:00 Social Engineering Introduction to Social Engineering 00:05:00 Social Engineering 00:06:00 Installing BeEF Framework 00:09:00 Getting User Credentials Using BeEF Framework 00:11:00 Cryptography Introduction to Cryptography 00:05:00 Symmetric Encryption 00:03:00 DES and AES 00:06:00 Asymmetric Encryption 00:03:00 RSA and Diffie 00:07:00 Hashing 00:07:00 Public Key Infrastructure (PKI) and Certificate Authority (CA) 00:10:00 Digital Signatures 00:09:00 Transport Layer Security (TLS) 00:04:00 Calculating One Way Hashes Using HashCal 00:04:00 Basic Data Encryption Advance and Decryption Package 00:05:00 Report Writing Introduction to Report Writing 00:08:00 Component of a Report 00:14:00 Bonus Section Why we need to fix vulnerabilities 00:05:00 Hacker Sponsored Security 00:03:00 Key Terms in Bug Bounty Program 00:05:00 Bug Bounty Definition 00:03:00 Public or Private Bug Bounty Program 00:04:00 What is HackerOne 00:05:00 Why Organizations will hire you 00:08:00

Cyber Security & Ethical Hacking
Delivered Online On Demand12 hours 17 minutes
£25

Ethical Hacking Masterclass

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 28 Hours 44 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about ethical hacking and network security Understand the core competencies and principles of ethical hacking and network security Explore the various areas of ethical hacking and network security Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert ethical hacker Ethical Hacking Masterclass Course Master the skills you need to propel your career forward in ethical hacking and network security. This course will equip you with the essential knowledge and skillset that will make you a confident ethical hacker and take your career to the next level. This comprehensive ethical hacking masterclass course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this ethical hacking masterclass course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective ethical hacking and network security practice and equip you with the essential skills, confidence and competence to assist you in the ethical hacking and network security industry. You'll gain a solid understanding of the core competencies required to drive a successful career in ethical hacking and network security. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for ethical hacker or for people who are aspiring to specialise in ethical hacking and network security. Enrol in this ethical hacking masterclass course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive ethical hacking masterclass course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this ethical hacking and network security can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This ethical hacking masterclass course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This ethical hacking masterclass course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This ethical hacking masterclass course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Introduction To The Course 00:05:00 VirtualBox Installation 00:16:00 Kali Linux Installation 00:14:00 Enabling Full-Screen 00:18:00 Basic Linux Commands Basic Commands Part 1 00:10:00 Basic Commands Part 2 00:21:00 Basic Commands Part 3 00:13:00 Creating a Secure Hacking Environment Changing IP Address And Wireless Adapter Setup 00:05:00 Creating A Bootable Kali USB Drive 00:05:00 Essential Networking Terms 00:10:00 Essential Hacking Terms 00:18:00 Additional Kali Tools To Install 00:08:00 Changing our MAC Address With Macchanger 00:06:00 Footprinting Google Hacking 00:13:00 Nikto Basics 00:11:00 Whois Tool 00:07:00 Email Harvesting 00:06:00 Shodan 00:10:00 Zone Transfer With Dig 00:07:00 Scanning Installing Metasploitable 00:07:00 Nmap Part 1 00:16:00 Nmap Part 2 00:12:00 Nmap part 3 00:12:00 Zenmap 00:08:00 Nmap Bypassing Defenses 00:17:00 Nmap Bypassing Defenses 00:17:00 Nmap Scripts Part 1 00:09:00 Nmap Scripts Part 2 00:14:00 Website Penetration Testing Installing OWASP 00:08:00 HTTP Request 00:10:00 HTTP Response 00:10:00 Burpsuite Configuration 00:13:00 Editing Packets In Burpsuite 00:12:00 Whatweb And Dirb 00:10:00 Password Recovery Attack 00:16:00 Burpsuite Login Bruteforce 00:11:00 Hydra Login Bruteforce 00:09:00 Session Fixation 00:14:00 Injection Attacks 00:06:00 Simple Command Injection 00:11:00 Exploiting Command Injection Vulnerability 00:08:00 Finding Blind Command Injection 00:14:00 SQL Basics 00:10:00 Manual SQL Injection Part 1 00:13:00 Manual SQL Injection Part 2 00:21:00 SQLmap Basics 00:17:00 XML Injection 00:16:00 Installing XCAT And Preventing Injection Attacks 00:06:00 Reflected XSS 00:11:00 Stored XSS 00:12:00 Changing HTML Code With XSS 00:07:00 XSSer And XSSsniper 00:14:00 Wireless Cracking Wireless Attacking Theory 00:11:00 Enabling Monitor Mode 00:05:00 Capturing Handshake With Airodump 00:15:00 RockYou.txt 00:14:00 Cracking With Aircrack 00:16:00 Cracking With Hashcat 00:15:00 Creating Password Lists With Crunch 00:18:00 Creating Password Lists With Cupp 00:07:00 Rainbow Tables Part 1 00:17:00 Rainbow Tables Part 2 00:06:00 Installing Fluxion 00:06:00 Finding And Cracking Hidden Networks 00:08:00 Preventing Wireless Attacks 00:08:00 Man in the Middle Attacks ARP Protocol Basics 00:10:00 Man In The Middle Attack Theory 00:07:00 Installing MITMf 00:07:00 Manual ARP Spoofing 00:13:00 Problems While Installing MITMf 00:06:00 HTTP Traffic Sniffing 00:08:00 DNS Spoofing And HTTPS Password Sniffing 00:24:00 Hooking Browsers With BEEF 00:16:00 Screenshotting Targets Browser 00:11:00 Cloning Any Webpage 00:09:00 Ettercap Basics 00:07:00 System Hacking with Metasploit MSFconsole Environment 00:16:00 Bruteforcing SSH With Metasploit 00:15:00 Attacking Tomcat With Metasploit 00:09:00 Getting Meterpreter With Command Injection 00:25:00 PHP Code Injection 00:06:00 2 Metasploitable Exploits 00:07:00 Wine Installation 00:12:00 Creating Windows Payloads With Msfvenom 00:10:00 Encoders And Hex Editor 00:19:00 Windows 10 Meterpreter Shell 00:12:00 Meterpreter Environment 00:11:00 Windows 10 Privilege Escalation 00:11:00 Preventing Privilege Escalation 00:06:00 Post Exploitation Modules 00:14:00 Getting Meterpreter Over Internet With Port Forwarding 00:11:00 Eternalblue Exploit 00:20:00 Persistence Module 00:13:00 Hacking Over The Internet With Ngrok 00:10:00 Android Device Attack With Venom 00:10:00 Python Crash Course Variables 00:14:00 Raw Input 00:11:00 If-Else Statements 00:10:00 For Loops 00:06:00 While Loops 00:08:00 Python Lists 00:08:00 Functions 00:15:00 Classes 00:10:00 Importing Libraries 00:07:00 Files In Python 00:12:00 Try And Except Rule 00:05:00 Coding an Advanced Backdoor Theory Behind Reverse Shells 00:07:00 Simple Server Code 00:13:00 Connection With Reverse Shell 00:07:00 Sending And Receiving Messages 00:11:00 Sending Messages With While True Loop 00:08:00 Executing Commands On Target System 00:10:00 Fixing Backdoor Bugs And Adding Functions 00:20:00 First test Using Our Backdoor 00:18:00 Trying To Connect Every 20 Seconds 00:12:00 Creating Persistence Part 1 00:06:00 Creating Persistence Part 2 00:17:00 Changing Directory 00:12:00 Uploading And Downloading Files 00:22:00 Downloading Files From The Internet 00:23:00 Starting Programs Using Our Backdoor 00:07:00 Capturing Screenshot On The Target PC 00:19:00 Embedding Backdoor In An Image Part 1 00:13:00 Embedding Backdoor In An Image Part 2 00:09:00 Checking For Administrator Privileges 00:12:00 Adding Help Option 00:09:00 Creating a Keylogger for the Backdoor Importing Pynput 00:10:00 Simple keylogger 00:10:00 Adding Report Function 00:11:00 Writing Keystrokes To A File 00:14:00 Adding The Keylogger To Our Reverse Shell Part 1 00:23:00 Adding The Keylogger To Our Reverse Shell Part 2 00:08:00 Final Project Test 00:14:00 Basic Authentication Bruteforcer Printing Banner 00:11:00 Adding Available Options 00:11:00 Writing Function To Run The Attack 00:11:00 Bruteforcing Router Login 00:10:00 Bypassing Antivirus With Your Future Programs 00:14:00 Sending Malware With Spoofed Email 00:15:00 Bonus - Building a Career in Cyber Security What Will You Learn In This Section 00:03:00 Why Is Ethical Hacking A Valuable Skill 00:23:00 What Is The Best Ethical Hacking Certification 00:17:00 Tips For Getting Your First Job As An Ethical Hacker 00:18:00 How I Started My Career As An Ethical Hacker 00:14:00 How To Price Your Work 00:11:00 Assessment Assessment - Ethical Hacking Masterclass 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Ethical Hacking Masterclass
Delivered Online On Demand
£19