Get $1 credit for every $25 spent!

The 2021 All-in-One Ethical Hacking & Penetration Testing Bundle

Ending In:
Add to Cart - $29.99
Add to Cart ($29.99)
$1,800
98% off
wishlist
Courses
9
Lessons
645
Enrolled
260

What's Included

Product Details

Access
Lifetime
Content
4.0 hours
Lessons
58

Hacking Web Applications & Penetration Testing: Fast Start

Learn the Main Aspects of Ethical Web Hacking & Penetration Testing and Prevent Vulnerabilities

By Oak Academy | in Online Courses

This course is for beginners, so you don’t need to have previous knowledge about hacking, penetration testing, or application development. You’ll learn how to “ethically” hack websites from scratch. You will have the hands-on practices to discover and exploit the most common vulnerabilities such as SQL injection, XSS (Cross-Site Scripting), and CSRF (Cross-Site Request Forgery). You'll learn basic lab environment setup and the basic terms, standards, technologies, and protocols of web applications: HTML, URL, HTTP, and more. You will learn how to find out the vulnerabilities and learn how to exploit and hack those weaknesses.

4.3/5 average rating: ★ ★ ★ ★

  • Access 58 lectures & 4 hours of content 24/7
  • Find out & exploit the most common vulnerabilities such as SQL injection, XSS, and CSRF
  • Set up a lab environment & install the needed virtual machines
  • Learn the basic terms, standards, technologies & protocols of web applications: HTML, URL, HTTP, etc.
  • Use search engines to find out if there are known-vulnerabilities in the website
  • Analyze configurations to understand if they cause any vulnerability
  • Manipulate input fields & the outputs produced by the application
  • Discover authorization, authentication & session management flaws
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★
Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Course Outline

  • Your First Program

  • Introduction

    • 1 - Introduction - 1:19
    • 2 - Virtual Platforms - 1:29
    • 3 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 4 - Lab's Architecture Diagram - 2:11
    • 5 - Using VirtualBox vs VMware
    • 6 - Install & Run Oracle VM VirtualBox - 5:02
    • 7 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 8 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 9 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 10 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 11 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 12 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 13 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 14 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 15 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 16 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 17 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 18 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 19 - Download & Install OWASPBWA - 4:30
    • 20 - Accessing OWASP BWA - 0:54
    • 21 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
    • 22 - Test VMs If They see Each Other - 2:58
  • Technologies & Standards

    • 23 - Basic Terms & Standards - 5:35
    • 24 - HTTP Protocol Basics and SSL - 7:03
    • 25 - Intercepting HTTP Traffic with Burp Suite - 3:46
    • 26 - Intercepting HTTPS Traffic with Burp Suite - 2:50
    • 27 - Web Attacks Classification - 1:36
  • An Automated Tool: OWASP ZAP (Zed Attack Proxy)

    • 28 - Introduction to OWASP ZAP - 3:06
    • 29 - Installation of OWASP ZAP & a Quick Scan - 6:25
    • 30 - Using OWASP ZAP as a Personal Proxy - 4:40
    • 31 - Intercepting HTTPS Traffics with OWASP ZAP - 2:17
    • 32 - Scanning a Website Which Requires Authentication - 14:46
  • Information Gathering & Configuration Management

    • 33 - Information Gathering & Configuration Management Part 1 - 5:09
    • 34 - Information Gathering & Configuration Management Part 2 - 4:26
  • Input - Output Manipulation

    • 35 - SOP, Javascript and Input-Output Validation - 7:42
    • 36 - XSS (Cross Site Scripting) - Reflected XSS - 4:05
    • 37 - XSS (Cross Site Scripting) - Stored and DOM Based XSS - 7:01
    • 38 - BeEF - The Browser Exploitation Framework - 5:39
    • 39 - SQL Injection Part 1 - 4:20
    • 40 - SQL Injection Part 2 - 4:41
    • 41 - SQL Injection Part 3 - 5:20
  • Authentication and Authorization

    • 42 - Authentication - 5:36
    • 43 - Authentication Attacks - 5:13
    • 44 - An Online Dictionary Attack with Hydra - 10:01
    • 45 - Authorization - 5:18
    • 46 - Path Traversal Demo - 3:40
  • Session Management and Cross Site Request Forgery

    • 47 - Session Management - 3:03
    • 48 - Session Fixation & Demo - 4:22
    • 49 - Cross Site Request Forgery - 5:12
  • Information Gathering Through the Internet

    • 50 - Introduction - 6:00
    • 51 - Using Search Engines & Google Hacking to Gather Information - 3:36
    • 52 - Search Engine Tools: SiteDigger and SearchDiggity - 3:59
    • 53 - Shodan - 2:50
    • 54 - Gathering Information About the People - 2:52
    • 55 - Web Archives - 1:53
    • 56 - FOCA Fingerprinting Organisations with Collected Archives - 7:41
    • 57 - The Harvester & Recon-NG - 3:15
    • 58 - Maltego - Visual Link Analysis Tool - 4:38

View Full Curriculum


Access
Lifetime
Content
3.0 hours
Lessons
52

The Complete Social Engineering, Phishing, OSINT & Malware

Discover How Hackers Hack Windows, Linux, & Android by Using Social Engineering

By Oak Academy | in Online Courses

Hackers can access our sensitive information by phishing, vishing, social engineering, putting malware, trojan horse to our devices. With the increase in the number of platforms, there may be enormous backdoors that hackers acquire our information and exploit. Also if you write "how to hack Facebook account" or "how to hack a phone" thousands of resources can be found which shows the seriousness of the situation. This course covers all aspects of social engineering with different techniques and tools. It will start with terminology and integrate practical usage and hands-on experiences.

4.4/5 average rating: ★ ★ ★ ★

  • Access 52 lectures & 3 hours of content 24/7
  • Understand the main terminology of Social Engineering
  • Create & distribute malware
  • Learn how open-source intelligence (OSINT) can be gathered & used for hacking into systems
  • Know how to send fake emails
  • Learn about vishing (Voice Phishing) tools & techniques
  • Learn how to use Empire Project, MSFvenom, Veil, & TheFatRat
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★
Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • 1 - Introduction - 0:58
    • 2 - Virtualisation Platforms - 1:29
    • 3 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 4 - Lab's Architecture Diagram - 1:45
    • 5 - Using VirtualBox vs VMware
    • 6 - Install & Run Oracle VM VirtualBox - 5:02
    • 7 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 8 - Installing Kali using the VMware Image - Step 2 - 0:10
    • 9 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 10 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 11 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 12 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 13 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 14 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 15 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 16 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 17 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 18 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 19 - Free Windows Operating Systems on VMware Fusion - 5:54
    • 20 - Free Windows Operating Systems on Oracle VM VirtualBox - 2:55
    • 21 - Windows Systems as Victim - 0:59
    • 22 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
    • 23 - Connections of Virtual Machines - 2:58
  • Social Engineering Terminologies
    • 24 - Terminologies Part 1 - 5:19
    • 25 - Terminologies Part 2 - 6:08
  • Creating Malware and Malware Tools
    • 26 - Creating Malware and Terminologies - 3:36
    • 27 - MSFvenom Part 1 - 14:08
    • 28 - MSFvenom Part 2 - 2:25
    • 29 - Veil Installation - 2:36
    • 30 - Veil in Action - 5:12
    • 31 - TheFatRat Installation - 4:19
    • 32 - TheFatRat in Action - 11:07
    • 33 - TheFatRat: Overcoming a Problem - 0:46
  • Embedding Malware
    • 34 - Embedding Malware in PDF - 4:04
    • 35 - Embedding Malware in WORD - 9:21
    • 36 - Embedding Malware in Firefox Add-on - 7:02
  • Empire Project
    • 37 - Empire Installation - 4:07
    • 38 - Empire in Action Part 1 - 8:12
    • 39 - Empire in Action Part 2 - 4:23
  • Exploiting Java Vulnerabilities
    • 40 - Exploiting Java Vulnerabilities - 2:24
  • Social Engineering Toolkit
    • 41 - Social Engineering Toolkit - 6:33
  • Phishing and Vishing
    • 42 - Sending Fake Emails - Phishing - 1:11
    • 43 - Vishing - Voice Phishing - 3:40
  • Information Gathering Through the Internet
    • 44 - Introduction - 5:51
    • 45 - Using Search Engines & Google Hacking to Gather Information - 3:36
    • 46 - Search Engine Tools: SiteDigger and SearchDiggity - 3:59
    • 47 - Shodan - 2:50
    • 48 - Gathering Information About the People - 2:52
    • 49 - Web Archives - 1:53
    • 50 - FOCA Fingerprinting Organisations with Collected Archives - 7:41
    • 51 - The Harvester & Recon-NG - 3:15
    • 52 - Maltego - Visual Link Analysis Tool - 4:38

View Full Curriculum


Access
Lifetime
Content
4.0 hours
Lessons
59

Ethical Hacking: Network Scan by Nmap & Nessus

Discover Networks & Check Devices with Vulnerabilities by Using Nmap

By Oak Academy | in Online Courses

To be able to perform successful penetration testing or ethical hacking. First, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding with an ethical hacking operation. In this course, you`ll discover the secrets of ethical hacking and network discovery using Nmap. You’ll learn all the Nmap details, which is the most known and de facto network scanning tool. Then in further lessons, you’ll scan the vulnerabilities of the network you discovered by using Nessus. Nessus is the most known vulnerability scanner and is in the third place of the most popular cybersecurity tools.

4.5/5 average rating: ★ ★ ★ ★

  • Access 59 lecturs & 4 hours of content 24/7
  • Understand the main terminology of Network Scanning & Finding Vulnerabilities in devices in a network
  • Use Nmap with full knowledge & experience
  • Scan a network for scripts
  • Learn about networking scan types
  • Learn how to use Hping
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★
Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • 1 - Introduction - 0:42
    • 2 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 3 - Lab's Architecture Diagram - 1:29
    • 4 - Using VirtualBox vs VMware
    • 5 - Install & Run Oracle VM VirtualBox - 5:02
    • 6 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 7 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 8 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 9 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 10 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 11 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 12 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 13 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 14 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 15 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 16 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 17 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 18 - Free Windows Operating Systems on VMware Fusion - 5:54
    • 19 - Free Windows Operating Systems on Oracle VM VirtualBox - 2:55
    • 20 - Windows Systems as Victim - 0:59
    • 21 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
  • Scan Types
    • 22 - Scan Types Definitions: Active Scan & Passive Scan - 2:50
    • 23 - Passive Scan - Wireshark - 6:37
    • 24 - Passive Scan - ARP Tables - 6:20
    • 25 - Active Scan - 8:30
  • Nmap Introduction & Basics
    • 26 - Nmap Introduction - 4:14
    • 27 - TCP/IP Basics - Layers and Protocols - 9:26
    • 28 - TCP/IP Basics - An Example: DNS Query - 5:19
    • 29 - TCP/UDP Basics - 7:11
  • Nmap in Action - 1 : Scan Types
    • 30 - Ping Scan - 4:59
    • 31 - SYN Scan - 7:31
    • 32 - Port Scan - 8:15
    • 33 - TCP Scan - 7:11
    • 34 - UDP Scan - 4:11
  • Nmap in Action - 2 : Detection & Management
    • 35 - Version Detection - 7:10
    • 36 - Operating System Detection - 5:58
    • 37 - Input-Output Management - 8:28
    • 38 - Lab Exercise - 1 - 0:49
  • Nmap in Action - 3 : Script Scanning
    • 39 - Introduction - 3:40
    • 40 - First Script Example - 7:43
    • 41 - Second Script Example - 2:21
    • 42 - Third Script Example - 2:48
    • 43 - Nmap Aggressive Scan
  • Nmap in Action - 4 : Timing and IPS/IVS Evasion
    • 44 - Bypassing IPS/IDS Devices - 6:07
    • 45 - Timing - 5:45
  • Nmap in Action - 5 : Some Other Scans
    • 46 - NULL, FIN, XMAS and ACK Scan - 2:55
    • 47 - Idle Scan - 7:44
  • Vulnerability Scan and Introduction to Nessus
    • 48 - Introduction to Vulnerability Scan - 9:29
    • 49 - Nessus® Home vs Nessus® Essentials
    • 50 - Introduction to Nessus - 1:57
    • 51 - Downloading Nessus - 1:40
    • 52 - Installing Nessus - 3:41
  • Nessus in Action
    • 53 - Creating Policy - 5:39
    • 54 - Scanning - 7:06
    • 55 - Reporting - 2:20
    • 56 - Lab Exercise - 2 - 2:47
    • 57 - An Aggressive Scan with Nessus: Start - 4:23
    • 58 - An Aggressive Scan with Nessus: Results - 7:17
    • 59 - An Aggressive Scan with Nessus: Results with Windows Targets - 2:45

View Full Curriculum


Access
Lifetime
Content
5.0 hours
Lessons
86

Ethical Hacking with Metasploit: Exploit & Post Exploit

Learn Ethical Hacking from Scratch with Metasploit, Exploit Vulnerabilities & Become a White Hat Hacker

By Oak Academy | in Online Courses

This monster course covers hacking's fundamental building blocks, penetration testing (Kali Linux), gaining control using Metasploit, and application development. You don’t need to have previous knowledge about all. This course will take you from a beginner to a more advanced level. You will learn how to install the tools, terminology, and how devices communicate with each other. You'll also learn how to scan vulnerabilities with Nessus and gain full access to computer systems via discovering the weaknesses and vulnerabilities. New tools are released every day, and it’s crucial to stay on top of the latest knowledge for being a better security specialist. You will always have up-to-date content for this course at no extra charge.

4.8/5 average rating: ★ ★ ★ ★

  • Access 86 lectures & 5 hours of content 24/7
  • Become an expert in using Metasploit for ethical hacking & network security
  • Set up a lab environment to practice hacking
  • Install Kali Linux, a penetration testing operating system
  • Install Windows & vulnerable operating systems as virtual machines for testing
  • Learn Linux commands & how to interact with the terminal
  • Gain control over computer systems using server side attacks
  • Gather password hashes, cracking passwords, taking screenshots, logging keystrokes & more
  • Use backdoors to persist on the victim machine
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★
Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • 1 - Course Introduction & Overview - 0:59
  • Setting Up The Laboratory - Windows & Mac
    • 2 - Virtualisation Platforms - 1:29
    • 3 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 4 - Lab's Architecture Diagram - 1:25
    • 5 - Using VirtualBox vs VMware
    • 6 - Install & Run Oracle VM VirtualBox - 5:02
    • 7 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 8 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 9 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 10 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 11 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 12 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 13 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 14 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 15 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 16 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 17 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 18 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 19 - Installing Metasploitable - 4:11
    • 20 - Free Windows Operating Systems on VMware Fusion - 5:54
    • 21 - Free Windows Operating Systems on Oracle VM VirtualBox - 2:55
    • 22 - Windows Systems as Victim - 0:59
    • 23 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
    • 24 - Checking Lab Network Connectivity - 2:58
  • Vulnerability Scanning
    • 25 - Introduction to Vulnerability Scanning - 2:10
    • 26 - Nessus® Home vs Nessus® Essentials
    • 27 - Downloading Nessus - 1:40
    • 28 - Installing Nessus - 3:41
    • 29 - Aggressive Scan with Nessus: Start - 4:24
    • 30 - Aggressive Scan with Nessus: Results - 7:17
    • 31 - Aggressive Scan with Nessus: Results with Windows Targets - 2:45
  • Exploitation
    • 32 - Concept and The Terminology - 6:13
    • 33 - Exploit Databases - 1:56
    • 34 - Manuel Exploitation - 5:50
    • 35 - Exploitation Frameworks - 3:36
  • Exploitation with Metasploit
    • 36 - Introduction to MSF - 1:22
    • 37 - Metasploit Framework - 5:01
    • 38 - Msfconsole - 2:13
    • 39 - Msfconsole Initialisation - 2:16
    • 40 - Msfconsole Exploit Search & Ranking - 3:37
    • 41 - Running Msfconsole - 8:14
    • 42 - Meterpreter - 0:54
    • 43 - Running Meterpreter - 2:12
    • 44 - Meterpreter on a Linux System - Basics - 8:36
    • 45 - Meterpreter on a Windows System - Basics - 5:51
  • Hacking Using No Vulnerability:Pass the Hash
    • 46 - Pass the Hash - 4:00
    • 47 - Pass the Hash: Metasploit PsExec - 3:49
    • 48 - Exploit A Machine and Gather Password Hashes - 2:15
    • 49 - Pass The Hash: Try Hashes on The Other Systems - 10:25
  • Post-Exploitation & Persistence
    • 50 - Post-Exploitation - 3:28
    • 51 - What is “Persistence” - 1:28
    • 52 - Meterpreter’s Persistence module - 8:55
    • 53 - Removing the Backdoor - 5:00
    • 54 - Running Meterpreter’s Persistence Module on Windows 8 - 2:56
    • 55 - Next Generation Persistence: Step 1 - 4:41
    • 56 - Next Generation Persistence: Step 2 - 4:32
  • Post Modules and Extensions: Part 1
    • 57 - Meterpreter for Post - Exploitation - 1:37
    • 58 - Meterpreter Core Commands - 1:45
    • 59 - Meterpreter Core Extension - Session Command - 2:31
    • 60 - Meterpreter Core Extension - Migrate Command - 3:34
    • 61 - Meterpreter Core Extension - Channel Command - 2:43
    • 62 - Meterpreter Stdapi Extension - 1:05
    • 63 - Meterpreter Stdapi Extension - File System Commands - 5:19
    • 64 - Meterpreter Stdapi Extension - System Commands - 4:13
    • 65 - Meterpreter Stdapi Extension - User Interface & Webcam Commands - 4:08
  • Post Modules and Extensions: Part 2
    • 66 - Meterpreter Incognito Extension - 3:26
    • 67 - Meterpreter Mimikatz Extension - 3:53
    • 68 - Metasploit Post-Exploitation Modules - 2:01
    • 69 - Gathering Modules - 1:21
    • 70 - Managing Modules - 6:51
  • Password Cracking: Introduction
    • 71 - Password Cracking - 3:06
    • 72 - Password Hash Examples: Windows Hashes - 3:30
    • 73 - Linux Hashes - 2:33
    • 74 - Password Cracking Classification - 2:11
  • Password Cracking: Tools in Action
    • 75 - Password Cracking Tools - 0:08
    • 76 - Online Cracking With HYDRA - 10:01
    • 77 - Cain & Abel - Introduction - 1:01
    • 78 - Cain & Abel - Step 1: Install & First Run - 2:39
    • 79 - Cain & Abel - Step 2: Gathering Hash Dumps - 4:40
    • 80 - Cain & Abel - Step 3: Importing Hash Files - 4:31
    • 81 - Cain & Abel - Step 4: Dictionary Attack - 4:19
    • 82 - Cain & Abel - Step 5: Brute Force Attack - 3:32
    • 83 - Cracking Tool: John The Ripper - 7:28
  • Collecting Sensitive Data
    • 84 - File Shares and End User Computers - 7:27
    • 85 - Real World Examples - 1:40
    • 86 - Summary - 1:48

View Full Curriculum


Access
Lifetime
Content
6.0 hours
Lessons
96

Ethical Hacking: Network Fundamentals & Network Layer Attacks

Learn Ethical Hacking with Network Security, Sniffing, Subnetting, ARP Spoof, Password Cracking & Implement MitM Attack

By Oak Academy | in Online Courses

This is a fun, highly practical course where you get to actually look at data going on the networks, like how to sniff the network and gather information from the network. You’re going to use some tools such as TCP Dump and Wireshark. You'll also be doing a deep dive into the Subnetting, ARP Spoofing and MitM attacks, and Password Cracking. It will introduce you to the fundamental concepts of data networking operation, including IP addressing and subnetting, ethernet operation, ports and protocols, and the OSI model. You'll then move forward with hands-on topics to practice penetration testing on your own.

4.4/5 average rating: ★ ★ ★ ★

  • Access 96 lectures & 6 hours of content 24/7
  • Be familiar with fundamental concepts of data networking operation
  • Understand the relationship between IP addresses & MAC address, as well as the difference between a router and a switch
  • Set up a lab & install needed software to practice penetration testing on your own machine
  • Use some tools such as TCP dump & Wireshark
  • See some attacks & techniques to expand the sniffing surface
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★
Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Course Outline

  • Network Fundamentals
    • 1 - Course Introduction and What the Course is? - 1:15
  • Reference Models
    • 2 - What is “Protocol” - 5:36
    • 3 - Reference Models - 0:24
    • 4 - OSI Reference Model - 13:43
    • 5 - OSI vs TCP/IP - 2:32
    • 6 - Demonstration using Wireshark - 7:59
  • Data Link Layer ( Layer 2 )
    • 7 - Standards & Protocols - 3:50
    • 8 - Ethernet: Principles, Frame & Headers - 4:06
    • 9 - ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets - 6:10
    • 10 - ARP Hand-On Practices - 3:14
    • 11 - VLANs – Virtual Local Area Networks - 4:03
    • 12 - WLANs – Wireless Local Area Networks - 7:01
  • Network Layer ( Layer 3 )
    • 13 - Introduction to Network Layer - 1:36
    • 14 - Internet Protocol - IP - 2:49
    • 15 - IPv4 Adressing System - 1:56
    • 16 - IPv4 Packet Header - 2:56
    • 17 - IPv4 Subnetting: Classful Networks - 2:35
    • 18 - IPv4 Subnetting: Subnet Mask - 2:59
    • 19 - IPv4 Subnetting: Understanding - 3:09
    • 20 - IPv4 Shortage - 1:41
    • 21 - Private Networks - 3:59
    • 22 - Private Networks - Demonstration - 3:01
    • 23 - NAT – Network Address Translation - 4:30
    • 24 - IPv6, Packet Header & Addressing - 8:30
    • 25 - DHCP - How the Mechanism Works - 9:23
    • 26 - ICMP – Internet Control Message Protocol - 2:02
    • 27 - Traceroute - 9:50
  • Transport Layer ( Layer 4 )
    • 28 - Introduction to Transport Layer - 2:39
    • 29 - TCP – Transmission Control Protocol - 6:59
    • 30 - TCP Header - 2:27
    • 31 - UDP – User Datagram Protocol - 3:56
  • Application Layer (Layer 5-7)
    • 32 - Introduction to Application Layer - 0:55
    • 33 - DNS – Domain Name System - 5:56
    • 34 - HTTP ( Hyper Text Transfer Protocol ) - 3:09
    • 35 - HTTPS - 1:56
    • 36 - Checklist - What We Have Learned - 1:26
  • Network & Data Link Layer (Layer 2) Attacks
    • 37 - What is Covered? - 1:15
  • Setting Up the Laboratory
    • 38 - Laboratory and Virtual Platforms - 1:29
    • 39 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 40 - Lab's Architecture Diagram - 1:28
    • 41 - Using VirtualBox vs VMware
    • 42 - Install & Run Oracle VM VirtualBox - 5:02
    • 43 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 44 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 45 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 46 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 47 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 48 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 49 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 50 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 51 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 52 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 53 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 54 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 55 - Download & Install OWASPBWA - 4:34
    • 56 - Free MS Windows Virtual Machines in VMware Fusion - 5:54
    • 57 - Free MS Windows Virtual Machines in Oracle VM VirtualBox - 2:55
    • 58 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
  • Using GNS3 and Creating a GNS3 Networks
    • 59 - Download & Install - 3:30
    • 60 - Setting Up the First Project - 7:57
    • 61 - GNS3 Environment - 2:56
    • 62 - Building GNS3 Network - 15:45
    • 63 - Attach Kali (or another VM) to the GNS3 Network - 6:31
    • 64 - Configuring Switch & Router (Cisco) and creating VLANs - 5:14
  • Network Sniffing: The “Man in the Middle” (MitM)
    • 65 - MitM: Listening to the traffic - 1:45
    • 66 - Sniffing - 1:03
    • 67 - TCPDump - 5:23
    • 68 - Wireshark: Capturing the Traffic - 8:34
    • 69 - Wireshark: Following Stream - 2:40
    • 70 - Wireshark: Summarise Network - 6:19
  • Active Network Devices
    • 71 - Router, Switch, Hub - 4:44
  • Expanding Sniffing Space
    • 72 - How to Expand Sniffing Space? - 5:13
    • 73 - MAC Flood: Switching - 3:55
    • 74 - MAC Flood: Using Macof Tool - 7:09
    • 75 - MacFlood - Countermeasures - 1:13
    • 76 - ARP Spoof - 3:40
    • 77 - ARP Cache Poisoning using Ettercap - 10:35
    • 78 - DHCP Starvation & DHCP Spoofing - 3:36
    • 79 - DHCP Mechanism - 6:15
    • 80 - DHCP Starvation - Scenario - 3:59
    • 81 - DHCP Starvation Demonstration with Yersinia - 8:33
    • 82 - VLAN Hopping - 2:04
    • 83 - VLAN Hopping: Switch Spoofing - 1:39
    • 84 - VLAN Hopping: Double Tagging - 3:17
  • Penetration Testing of Network Devices
    • 85 - Reconnaissance: Finding Open Ports & Services Using NMAP - 5:15
    • 86 - Password Cracking - 2:06
    • 87 - Online SSH Password Cracking Using Hydra - 7:58
    • 88 - Compromising SNMP: What is SNMP ? - 5:44
    • 89 - Compromising SNMP: Finding Community Names Using NMAP Scripts - 3:06
    • 90 - Compromising SNMP: Write Access Check Using SNMP-Check Tool - 2:18
    • 91 - Compromising SNMP: Grabbing SNMP Configuration Using Metasploit - 5:53
    • 92 - Weaknesses of network devices - 3:15
  • Auditing Network Devices
    • 93 - Password Creation Methods of Cisco Routers - 7:49
    • 94 - Identity Management - 0:52
    • 95 - ACL – Access Control Lists - 5:12
    • 96 - SNMP Security - 4:15

View Full Curriculum


Access
Lifetime
Content
8.0 hours
Lessons
104

Free Tools for Penetration Testing & Ethical Hacking

Wireshark, Nmap, Metasploit & Maltego: Learn Hackers' Tools on Web Hacking, Network Scanning and Password Cracking

By Oak Academy | in Online Courses

This course is expertly designed to teach everyone from complete beginners right through to pro hackers. You'll go from beginner to extremely high-level, and I will take you through each step with hands-on examples. It covers the web’s favorite ethical hacking / pen-testing hacker tools as used by hackers, geeks, ethical hackers, and security engineers (as well as black hat hackers). You will learn the theory, background, and trendy free tools used to leverage the most updated attacks in the hacking world with real-world examples and demos.

42/5 average rating: ★ ★ ★ ★

  • Access 104 lectures & 8 hours of content 24/7
  • Set up the laboratory
  • Discover network scanning tools
  • Get to know tools for vulnerability scan, exploitation, & password cracking
  • Know the tools to gather information over the internet
  • Learn hackers' tools for web app hacking, social engineering, phishing, & network layer attacks
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★
Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction & Setup the Laboratory
    • 1 - Introduction - 0:44
    • 2 - Setting Up the Laboratory - 0:40
    • 3 - Virtual Platforms - 1:29
    • 4 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 5 - Lab's Architecture Diagram - 1:29
    • 6 - Using VirtualBox vs VMware
    • 7 - Install & Run Oracle VM VirtualBox - 5:02
    • 8 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 9 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 10 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 11 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 12 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 13 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 14 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 15 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 16 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 17 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 18 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 19 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 20 - Set Up a Victim: Metasploitable Linux - 3:12
    • 21 - Set Up a Victim: OWASP Broken Web Applications - 5:24
    • 22 - Free MS Windows Virtual Machines in VMware Fusion - 5:54
    • 23 - Free MS Windows Virtual Machines in Oracle VM VirtualBox - 2:55
    • 24 - Set Up a Victim: Windows Systems - 0:59
    • 25 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
    • 26 - Check the network: Be sure if VMs can see each other - 2:58
  • Network Scan Tools - Part I
    • 27 - Wireshark: Sniffing the Network Traffic - 8:32
    • 28 - Wireshark: Following a Stream - 2:43
    • 29 - Wireshark: Summarise the Network - 6:23
    • 30 - Introduction to TCPDump - 5:26
    • 31 - TCPDump in Action - 9:02
    • 32 - Hping for Active Scan and DDoS Attacks - 7:53
  • Network Scan Tools - NMAP
    • 33 - Introduction to Nmap - 4:12
    • 34 - Ping Scan to Enumerate Network Hosts - 5:02
    • 35 - Introduction to Port Scan - 1:12
    • 36 - SYN Scan - 6:09
    • 37 - Port Scan Details - 8:15
    • 38 - TCP Scan - 7:15
    • 39 - UDP Scan - 4:15
    • 40 - Version Detection - 6:42
    • 41 - Operating System Detection - 6:02
    • 42 - Input & Output Management in Nmap - 8:31
    • 43 - Introduction to Nmap Scripting Engine (NSE) - 3:16
    • 44 - Nmap Scripting Engine: First Example - 7:47
    • 45 - Nmap Scripting Engine: Second Example - 2:24
    • 46 - Some Other Types of Scans: XMAS, ACK, etc. - 2:55
    • 47 - Idle (Stealth) Scan - 7:47
  • Vulnerability Scan Tool: Nessus
    • 48 - Nessus: Introduction - 1:57
    • 49 - Nessus® Home vs Nessus® Essentials
    • 50 - Download Nessus - 5:35
    • 51 - Install & Setup Nessus - 3:41
    • 52 - Download & Install Nessus - 1:40
    • 53 - Creating a Custom Policy - 5:42
    • 54 - Scanning - 7:01
    • 55 - Reporting - 2:25
  • Exploitation Tool: Metasploit Framework (MSF)
    • 56 - Introduction to MSF Console - 2:15
    • 57 - MSF Console: Search Function & Ranking of the Exploits - 3:34
    • 58 - MSF Console: Configure & Run an Exploit - 7:51
    • 59 - Meeting with Meterpreter - 3:01
    • 60 - Meterpreter Basics on Linux - 8:26
    • 61 - Meterpreter Basics on Windows - 5:41
  • Post-Exploitation Tool: Metasploit Framework (MSF)
    • 62 - Meterpreter for Post-Exploitation - 1:29
    • 63 - Incognito Extension of Meterpreter - 3:28
    • 64 - Mimikatz in Meterpreter - 3:57
    • 65 - Post Modules of Metasploit Framework (MSF) - 2:05
    • 66 - Managing Post Modules of MSF - 6:55
  • Password Cracking Tools
    • 67 - Hydra: Cracking the Password of a Web App - 10:17
    • 68 - Hydra: Online SSH Password Cracking - 6:28
    • 69 - Cain and Abel: Install & Run - 3:48
    • 70 - Cain and Abel: Gathering Hashes - 4:43
    • 71 - Cain & Abel: A Dictionary Attack - 8:58
    • 72 - Cain & Abel: A Brute Force Attack - 3:36
    • 73 - John the Ripper - 7:32
  • Information Gathering Over the Internet Tools
    • 74 - SearchDiggity: A Search Engine Tool - 3:18
    • 75 - Shodan - 2:54
    • 76 - FOCA: Fingerprinting Organisations with Collected Archives - 7:26
    • 77 - The Harvester & Recon-NG - 3:26
    • 78 - Maltego - Visual Link Analysis Tool - 4:41
  • Web App Hacking Tools
    • 79 - Burp Suite: Intercepting the HTTP Traffic - 3:48
    • 80 - Burp Suite: Intercepting the HTTPS Traffic - 2:52
    • 81 - Zed Attack Proxy (ZAP): A Web App Vulnerability Scanner - 3:06
    • 82 - ZAP: Installation & Quick Scan - 6:29
    • 83 - ZAP: As a Personal Proxy - 4:44
    • 84 - ZAP: Intercepting the HTTPS Traffic - 2:21
    • 85 - ZAP: An Advanced Scan - Scanning a Website that Requires to Login - 14:49
    • 86 - SQLMap: Leveraging an SQL Injection Exploit - 10:05
  • Social Engineering and Phishing Tools
    • 87 - Veil: Introduction - 2:33
    • 88 - Veil: In Action - 5:16
    • 89 - FatRat: Introduction - 4:23
    • 90 - FatRat: In Action - 11:11
    • 91 - Empire Project: Installation - 4:10
    • 92 - Empire in Action - Part I - 8:11
    • 93 - Empire in Action - Part II - 4:23
    • 94 - Social Engineering Toolkit (SET) for Phishing - 6:31
  • Network Layer & Layer-2 Attacks Tools
    • 95 - GNS3: Let's Create Our Network - Download & Install - 3:22
    • 96 - GNS3: Setting Up the First Project - 8:01
    • 97 - GNS3: Tool Components - 3:00
    • 98 - GNS3: Building the Network - 15:44
    • 99 - GNS3: Attaching VMware VMs (Including Kali) to the Network - 6:31
    • 100 - GNS3: Configuring Switch & Router (Cisco) and creating VLANs - 5:14
    • 101 - Macof for MAC Flood - 7:13
    • 102 - Ettercap for ARP Cache Poisoning - 14:15
    • 103 - Yersinia for DHCP Starvation - 10:19
    • 104 - Thank You! - 0:08

View Full Curriculum


Access
Lifetime
Content
8.0 hours
Lessons
85

Complete Web Application Hacking & Penetration Testing

Use Black Hat Hacker Tools & Follow Their Ways to Compromise Web Applications.

By Oak Academy | in Online Courses

Web Applications run the world. From social media to business applications, almost every organization has a web application and does business online. So, we see a wide range of applications being delivered every day. In this course, you will learn how to use black hat hacker tools and follow their ways to compromise web applications. The course starts by figuring out the security issues currently in the field and learning testing methodologies and types. Then you're going to build a lab environment for you to apply what you get from the course. It will also cover user management issues, input validation, and session management problems.

4.1/5 average rating: ★ ★ ★ ★

  • Access 85 lectures & 8 hours of content 24/7
  • Identify the security issues that are currently in the field
  • Learn testing methodologies & types
  • Build a lab environment for you to apply what you get from the course
  • Gather information about the target & how to use that information to model an attack
  • Understand why data validation is absolutely important for web applications
  • Be familiar with some basic attacks on cryptography
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★
Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Course Outline

  • Welcome to Advanced Web Application Penetration Testing
    • 1 - What We Covered In This Course? - 3:17
    • 2 - Current Issues of Web Security - 8:52
    • 3 - Principles of Testing - 5:28
    • 4 - Types of Security Testing - 9:43
    • 5 - Guidelines for Application Security - 5:57
    • 6 - Laws and Ethic - 2:52
  • Setting Up Virtual Lab Environment
    • 7 - Requirements and Overview of Lab - 3:54
    • 8 - Installing VMware Workstation Player - 7:32
    • 9 - Updates for Kali Linux 2020
    • 10 - Installing Kali Linux - 10:44
    • 11 - Installing Vulnerable Virtual Machine: BeeBox - 8:03
    • 12 - Connectivity and Snapshots - 7:17
  • Modern Web Applications
    • 13 - Modern Technology Stack - 3:05
    • 14 - Client-Server Architecture - 3:54
    • 15 - Running a Web Application - 2:17
    • 16 - Core Technologies: Web Browsers - 9:47
    • 17 - Core Technologies: URL - 3:06
    • 18 - Core Technologies: HTML - 4:37
    • 19 - Core Technologies: CSS - 2:18
    • 20 - Core Technologies: DOM - 4:07
    • 21 - Core Technologies: JavaScript - 3:26
    • 22 - Core Technologies: HTTP - 17:19
    • 23 - Core Technologies: HTTPS and Digital Certificates - 6:33
    • 24 - Core Technologies: Session State and Cookies - 3:34
    • 25 - Attack Surfaces - 2:33
    • 26 - Introduction to Burp: Downloading, Installing and Running - 7:53
    • 27 - Introduction to Burp: Capturing HTTP Traffic and Setting FoxyProxy - 9:37
    • 28 - Introduction to Burp: Capturing HTTPS Traffic - 3:11
  • Reconnaissance and Discovery
    • 29 - Intro to Reconnaissance - 3:31
    • 30 - Extract Domain Registration Information: Whois - 4:19
    • 31 - Identifying Hosts or Subdomains Using DNS: Fierce & Theharvester - 6:07
    • 32 - TheHarvester: Modules that require API keys
    • 33 - Detect Applications on The Same Service - 1:09
    • 34 - Ports and Services on The Web Server - 8:44
    • 35 - Review Technology/Architecture Information - 4:36
    • 36 - Extracting Directory Structure: Crawling - 8:16
    • 37 - Minimum Information Principle - 2:55
    • 38 - Using Search Engines: Google Hacking - 6:10
  • Authentication and Authorization Testing
    • 39 - Definition - 2:37
    • 40 - Creating a Password List: Crunch - 7:31
    • 41 - Differece Between HTTP and HTTPS Traffic: Wireshark - 3:43
    • 42 - Attacking Insecure Login Mechanisms - 9:12
    • 43 - Attacking Insecure Logout Mechanisms - 4:50
    • 44 - Attacking Improper Password Recovery Mechanisms - 5:50
    • 45 - Attacking Insecure CAPTCHA Implementations - 8:39
    • 46 - Path Traversal: Directory - 6:43
    • 47 - Path Traversal: File - 5:41
    • 48 - Introduction to File Inclusion Vulnerabilities - 6:23
    • 49 - Local File Inclusion Vulnerabilities - 6:11
    • 50 - Remote File Inclusion Vulnerabilities - 5:51
  • Session Management Testing
    • 51 - Http Only Cookies - 7:15
    • 52 - Secure Cookies - 3:48
    • 53 - Session ID Related Issues - 1:57
    • 54 - Session Fixation - 5:37
    • 55 - Introduction Cross-Site Request Forgery - 7:08
    • 56 - Stealing and Bypassing AntiCSRF Tokens - 7:59
  • Input Validation Testing
    • 57 - Definition - 3:02
    • 58 - Reflected Cross-Site Scripting Attacks - 9:42
    • 59 - Reflected Cross-Site Scripting over JSON - 6:24
    • 60 - Stored Cross-Site Scripting Attacks - 9:56
    • 61 - DOM Based Cross-Site Scripting Attacks - 10:04
    • 62 - Inband SQL Injection over a Search Form - 14:24
    • 63 - Inband SQL Injection over a Select Form - 8:22
    • 64 - Error-Based SQL Injection over a Login Form - 6:47
    • 65 - SQL Injection over Insert Statement - 7:07
    • 66 - Boolean Based Blind SQL Injection
    • 67 - Time Based Blind SQL Injection - 5:34
    • 68 - Detecting and Exploiting SQL Injection with SQLmap - 11:30
    • 69 - Detecting and Exploiting Error Based SQL Injection with SQLmap - 5:10
    • 70 - Detecting and Exploiting Boolean and Time Based Blind SQL Injection with SQLmap - 8:02
    • 71 - Command Injection Introduction - 5:35
    • 72 - Automate Command Injection Attacks: Commix - 5:43
    • 73 - XML/XPATH Injection - 14:07
    • 74 - SMTP Mail Header Injection - 6:51
    • 75 - PHP Code Injection - 6:00
  • Testing Cryptography
    • 76 - Heartbleed Attack - 6:29
    • 77 - Attacking HTML5 Insecure Local Storage - 4:58
  • Using Known Vulnerable Components
    • 78 - Druppal SQL Injection: Drupageddon (CVE-2014-3704) - 7:49
    • 79 - SQLite Manager: File Inclusion (CVE-2007-1232) - 4:52
    • 80 - SQLite Manager: PHP Remote Code Injection - 2:55
    • 81 - SQLite Manager: XSS (CVE-2012-5105) - 6:44
  • Other Attacks
    • 82 - Bypassing Cross Origin Resource Sharing - 9:04
    • 83 - XML External Entity Attack - 8:02
    • 84 - Attacking Unrestricted File Upload Mechanisms - 7:05
    • 85 - Server-Side Request Forgery - 6:35

View Full Curriculum


Access
Lifetime
Content
4.0 hours
Lessons
59

Wi-Fi Hacking & Wireless Penetration Testing Course

WEP, WPA/WPA2, WPS Cracking, Wi-Fi Reconnaissance & Password Cracking

By Oak Academy | in Online Courses

Ethical hacking is a whole new technology in itself. The hacking techniques are rapidly growing in numbers, with hackers every day coming up with new ideas to steal our personal data. One such widely preferred way of hacking is Wi-Fi hacking. Wi-Fi hacking is easier than hacking a device connected to that WiFi. Many free tools can hack the less secure WiFi router. Apart from this, there are also advanced tools that work on backtrack and even hack Wi-Fi routers with high security. In this course, you will learn how to crack the key and get the password to WiFi networks whether they use WEP, WPA, or even WPA2. While you are learning ethically hack, you will also learn how to secure networks from hackers.

3.9/5 average rating: ★ ★ ★ ★ ★

  • Access 59 lectures & 4 hours of content 24/7
  • Learn how to install the tools & some terminology on Wi-Fi hacking
  • Have valuable insights on how things work under the hood
  • Be very confident in crack the key & get the password to WiFi networks
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★
Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • 1 - Introduction - 4:05
    • 2 - Hardware and Software Requirements - 7:02
  • Setting Up the Laboratory
    • 3 - Virtualisation Platform
    • 4 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 5 - Lab's Archtitecture Diagram - 3:23
    • 6 - Using VirtualBox vs VMware
    • 7 - VirtualBox: Install & Run - 5:02
    • 8 - Important Note before Kali Installation
    • 9 - Installing Kali From VMware File for VMware - Step 1 - 3:13
    • 10 - Installing Kali From VMware File for VMware - Step 2 - 4:47
    • 11 - Installing Kali From VMware File for VMware - Step3 - 4:12
    • 12 - Installing Kali From ISO File for VMware - Step 1 - 1:26
    • 13 - Installing Kali From ISO File for VMware - Step2 - 6:48
    • 14 - Installing Kali From ISO File for VMware - Step 3 - 1:47
    • 15 - Installing Kali From ISO File for Virtualbox - Step1 - 1:26
    • 16 - Installing Kali From ISO File for VirtualBox - Step2 - 6:49
    • 17 - Installing Kali From OVA File for VirtualBox - Step 1 - 3:14
    • 18 - Installing Kali From OVA File for VirtualBox - Step 2 - 6:44
    • 19 - Installing Kali From OVA File for VirtualBox - Step 3 - 4:11
    • 20 - Wi-Fi Adapter Settings - 6:16
  • Wi-Fi Network Fundamentals
    • 21 - IEEE-802.11 - 3:54
    • 22 - Basic Terminologies and Concepts - 4:50
    • 23 - Wireless Operating Modes - 6:11
    • 24 - MAC Frame Structure - 2:58
    • 25 - Wireless Packet Types - 5:21
    • 26 - Wireshark: Analysing Packet Types - 6:32
    • 27 - Wi-Fi Network Interaction - 5:03
    • 28 - Wireless Encryption Protocols: WEP vs. WPA - 3:58
    • 29 - WPA 4-Way Handshake - 5:45
    • 30 - WPA2 Personal and Enterprise - 3:16
    • 31 - Wireshark: WEP and WPA - 1:10
    • 32 - Wi-Fi Protected Setup (WPS) - 3:49
  • Wireless Reconnaissance
    • 33 - Wireless Recon with Bettercap - 3:34
    • 34 - Wardriving with Kismet: Installation - 5:56
    • 35 - Wardriving with Kismet: Configuration - 6:45
    • 36 - Wardriving with Kismet: Mapping - 4:50
  • Rogue Access Points
    • 37 - Airbase-ng - 5:46
    • 38 - Evil Twin Attack - 6:42
    • 39 - Wifi Pumpkin 3 - 7:30
    • 40 - Fluxion: Installation - 2:50
    • 41 - Fluxion: Handshake Snooper Attack - 4:54
    • 42 - Fluxion: Captive Portal Attack - 5:28
  • Cracking Wired Equivalent Privacy(WEP)
    • 43 - WEP Cracking - Preparing Attacks - 2:49
    • 44 - WEP Cracking - Fake Authentication Attack - 3:50
    • 45 - WEP Cracking - Deauthentication Attack - 2:59
    • 46 - WEP Cracking - Deauthentication Attack with Bettercap - 1:32
    • 47 - WEP Cracking - ARP Request Replay Attack - 4:15
    • 48 - WEP Cracking - Fragmentation Attack - 5:09
    • 49 - WEP Cracking - ChopChop Attack - 3:47
  • Cracking Wi-Fi Protected Access (WPA)
    • 50 - WPA/WPA2 Cracking - Introduction - 5:13
    • 51 - WPA/WPA2 Cracking - Aircrack-ng - 3:56
    • 52 - WPA/WPA2 Cracking - John The Ripper - 4:09
    • 53 - WPA/WPA2 Cracking - CoWPAtty - 2:52
    • 54 - WPA/WPA2 Cracking - Wifite 2 - 2:20
    • 55 - WPA/WPA2 Cracking with GPUs : Hashcat - 1 - 5:25
    • 56 - WPA/WPA2 Cracking with GPUs : Hashcat - 2 - 3:52
    • 57 - WPA/WPA2 Cracking - Key Reinstallation Attack (KRACK) - 7:12
  • Cracking Wi-Fi Protected Setup (WPS)
    • 58 - WPS Cracking - Wifite 2: PIN Attack - 3:50
    • 59 - What we learned - 1:56

View Full Curriculum


Access
Lifetime
Content
4.0 hours
Lessons
46

Cloud Security with Microsoft Azure For Beginners

Learn the Fundamentals of Cloud Computing & Secure Your Infrastructure on Microsoft Azure Cloud Computing Services

By Oak Academy | in Online Courses

Cloud computing is now one of the trending technologies, and our future will be shaped by cloud computing. The widespread use of cloud services by individuals and the move of many companies' data centers and on-premises servers to the Cloud increases the importance of securing data in the cloud. As companies move their IT assets to the public cloud, security will still be one of the main concerns for this transition. In this course, you’ll learn the fundamentals of cloud computing, as well as how to secure your infrastructure on Microsoft Azure Cloud computing services. This course includes theoretical lessons and hands-on demos to help you gain practical cloud security experience on Microsoft Azure.

4.1/5 average rating: ★ ★ ★ ★

  • Access 45 lectures & 4 hours of content 24/7
  • Understand what cloud is & the 3 models of cloud service
  • Learn about IaaS, PaaS, & SaaS
  • Know the differences between Public, Private, & Hybrid Cloud
  • Define the security scope of cloud computing
  • Know what cloud security frameworks are
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★
Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Course Outline

  • Intro to Cloud
    • 1 - What We Will Learn in Secure Cloud for MS Azure - 1:10
    • 2 - Secure Cloud for MS Azure - 1:37
    • 3 - Secure Cloud for MS Azure - 2 - 8:47
    • 4 - Secure Cloud for MS Azure Module - 2:15
  • Cloud Fundamentals
    • 5 - Introduction into the Cloud - 4:47
    • 6 - Cloud Definitions Essential Characteristics - 3:14
    • 7 - Cloud Service and Deployment Models - 7:01
    • 8 - Cloud Terminologies - 5:30
    • 9 - Cloud Architecture Frameworks - 7:20
    • 10 - CSA Cloud Reference Model - 4:38
    • 11 - CSA Cloud Logical Model - 1:51
    • 12 - Cloud Security Scopes and Responsibilities - 2:01
    • 13 - Cloud Responsibility Matrix - 0:34
  • Cloud Security Models
    • 14 - CSA Cloud Security Model - 2:43
    • 15 - NIST Cloud Security Model - 2:05
    • 16 - Management in the Cloud - CSA - 2:56
    • 17 - Recommendations of CSA for Secure Cloud and Risk Management - 3:14
    • 18 - Cloud Computing Threats - 36:50
    • 19 - Approaches to struggle with Cloud Threats - 10:14
    • 20 - Data Security, Data Security Lifecycle - 3:07
    • 21 - Data Security Entitlement Matrix and Mapping Control - 2:40
    • 22 - Recommendations for Data Security - 3:15
    • 23 - CIS Application Security Framework - 4:12
    • 24 - Application Layer Security Control -WAF - 3:11
    • 25 - Network Layer Security Controls - 2:22
  • Azure Basics - Intro Cloud Security
    • 26 - Azure Cloud Security - Introduction - 3:04
    • 27 - Azure Identity and Access Management - 4:26
    • 28 - Azure AD PIM - 1:44
    • 29 - Azure AD PIM Configuration - 4:28
    • 30 - Azure Key Vault, Introduction and It's Benefits - 2:47
    • 31 - Configure Azure Key Vault - 1:31
    • 32 - Configure HSM Keygen Solution - 1:19
    • 33 - Active Directory Authentication with Key Vault - 1:55
    • 34 - Key Vault and RBAC Implementation Scenario - 4:55
    • 35 - Role Based Access Control Demo - 10:04
    • 36 - Key Vault Best Practices - 2:57
    • 37 - Creating Key Vault and Backup Methods - 9:41
  • Azure Identity and Access Management
    • 38 - Configure Azure MFA - 9:08
    • 39 - Create User, Group and Resource - 5:55
    • 40 - Manage Membership and Ownership - 1:57
    • 41 - Manage User Profile - 2:27
    • 42 - Other Authentication Methods - 4:11
    • 43 - Harden Your Organization's Security Posture with Combining Authentication - 21:17
    • 44 - Harden the User's Password Recovery Management - 11:49
    • 45 - Trying to Breach a User with a Password and MFA - 18:55
    • 46 - Creating and Auditing Access Review for a user - 4:46

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
×
Your Ad Blocker Is On!
Sadly, recent updates to your Ad Blocker are preventing crucial parts of our shop from loading. Frustrating. We know. We hate to nag, but please turn off your Ad Blocker or whitelist us to continue exploring our shop.