#1 Ethical Hacking – Cyber Security – CSEH+CEH 2023 – ZU Tech



#1 Ethical Hacking – Cyber Security – CSEH+CEH 2023 – ZU Tech

#1 Ethical Hacking - Cyber Security - CSEH+CEH 2023 - ZU Tech

#1 Ethical Hacking – Cyber Security – CSEH+CEH 2023 – ZU Tech

00:00:00 Being an Ethical Hacker
00:01:48 Mastering Boot Starting Firmware Interfaces
00:17:24 File Allocation Tables
00:29:58 Creating our Ethical Hacking Lab
00:32:37 Getting Started
00:40:09 Installing Virtual Machines
00:48:34 Installing Kali
00:55:59 Installing Metasploitable
01:03:48 What is network protocol and what it does
01:08:04 Layers of TCPIP Model
01:12:14 How emails sent and received over internet
01:14:42 PDU Explained
01:21:01 Basic Use of Switch and Data Transmission
01:26:42 2 Networks Talking with Router in Middle
01:31:31 Introduction to Section and Fundamentals of Media Control Filtering Linux WAP and Bypassing Mac Filtering
01:36:22 Introduction to Passive Information Gathering
01:42:50 What is Cybercrime
01:45:18 Three Types of Cybercrime
01:47:00 Examples to Cybercrime
01:48:57 What is Cyber Security
01:55:56 Firewalls
02:02:46 Windows Firewalls
02:14:39 DMZ
02:23:50 VPN
02:30:56 Introduction to Section
02:49:04 Why is VulnScanning is BAD
02:50:34 Introduction to Passive Information Gathering
02:52:48 Differences Between Recon and Footprinting
02:55:17 Understanding Passive Information Gathering and OSINT
03:00:59 Introduction to OSINT
03:07:14 Principles of Recon
03:10:00 Offensive OSINT
03:13:09 Using SBLSTR for Finding Subdomains
03:18:26 USUFY as Osint Tool
03:22:08 Finding Deleted WebPages
03:28:27 THRVSTR as Osint Tool
03:31:49 Reverse Image Search
03:37:49 GHDB

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
What you’ll learn
”””””””””””””””””””””””””””””’
..Learning the fundamentals of Linux operating system and how to use it for ethical hacking
..Conducting reconnaissance and gathering information using open-source intelligence (OSINT) techniques
…Exploring the different tools and techniques used in ethical hacking
..Identifying vulnerabilities in computer systems and networks
..Ethical hacking, such as reconnaissance, scanning, gaining access, maintaining access, and covering tracks
..Metasploit, a popular penetration testing framework
..SQL injection, cross-site scripting (XSS)
..Nmap, a powerful network scanner
..Wireshark, a network protocol analyzer, to sniff network traffic
..Kali Linux, a popular ethical hacking operating system
..Proxy tools such as Burp Suite and ZAP to intercept and modify HTTP requests and responses
..Social engineering techniques to gain access to systems and networks
..Password cracking tools such as John the Ripper and Hashcat
..Virtual private networks (VPNs) to stay anonymous and secure online
..Network sniffers to capture and analyze network traffic
..Perform reconnaissance using Google Dorking
..SSH (Secure Shell) for secure remote access to a system
..Scanning tools such as Nmap and Masscan
..SQLmap to automate SQL injection attacks
..Kali Linux and other tools to perform real-world hacking scenarios and penetration testing
..Advanced Open-Source Intelligence (OSINT) techniques
..Wireshark to analyze and intercept network traffic
..Wireless network penetration testing and exploit vulnerabilities
..How to identify and exploit SQL injection vulnerabilities in web applications
..Firewalls, IDS, IPS, and other security measures to defend against attacks
..Bypass antivirus software and evade detection when performing hacking attacks
..Denial-of-service attacks and how to mitigate them
..Reverse engineering and analyze software for vulnerabilities
..Password cracking tools and techniques to gain access to sensitive information
..TOR and other anonymization tools to protect your privacy and remain anonymous online
..Web application penetration testing and find vulnerabilities in popular web frameworks

#MasteringBoot #FirmwareInterfaces #InstallingVirtualMachines #Kali #Metasploitable #TCPIPModel #internetPDUExplained #BasicUseofSwitchandDataTransmission #NetworksTalking #RouterinMiddle #LinuxWAPandBypassingMacFiltering #WhatisCybercrime #ThreeTypesofCybercrime #WhatisCyberSecurity #DMZ #VPN #WhyisVulnScanningisBAD #IntroductiontoOSINT #PrinciplesofRecon #OffensiveOSINT #GHDB #UsingSBLSTR #USUFYandTHRVSTRasOsintTooL #BeinganEthicalHacker #MasteringBootStartingFirmwareInterfaces #FileAllocationTables #CreatingourEthicalHackingLab #GettingStarted #InstallingVirtualMachines #InstallingKali #InstallingMetasploitableWhatisnetworkprotocolandwhatitdoesLayersofTCPIPModel #HowemailssentandreceivedoverinternetPDUExplained #BasicUseofSwitchandDataTransmission #NetworksTalkingwithRouterinMiddle #IntroductiontoSectionandFundamentalsofMediaControlFiltering #LinuxWAPandBypassingMacFiltering #IntroductiontoPassiveInformationGathering #WhatisCybercrime #ThreeTypesofCybercrime #ExamplestoCybercrime #WhatisCyberSecurity #Firewalls #WindowsFirewalls #DMZ #VPN #IntroductiontoSection #WhyisVulnScanningisBAD ##UnderstandingPassiveInformationGatheringandOSIN #IntroductiontoOSINT #PrinciplesofRecon #OffensiveOSINT #ReverseImageSearch