Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Zero To Mastery

Complete Ethical Hacking Bootcamp: Zero to Mastery

via Zero To Mastery

Overview

Become a security expert and get hired this year by learning Ethical Hacking & Penetration Testing from scratch. You'll learn by using real techniques used by black hat hackers and then learn how to defend against them.
  • Learn Ethical Hacking from scratch
  • Learn all 5 phases of Penetration Testing
  • Learn Python from scratch so you are able to write your own tools for Ethical Hacking
  • Setting up your Hacking Lab: Kali Linux and Virtual Machines (works with Windows / Mac / Linux)
  • Create additional virtual vulnerable machines that we can practice our attacks on
  • Create trojans, viruses, keyloggers for Ethical Hacking
  • Learn how to bypass Firewalls & Intrusion Detection Systems with Advanced Scanning
  • Learn how to crack Wireless Access Point passwords
  • Bug Bounty: discover all types of Web Application Bugs that could cause a threat
  • Learn how to gain access to any type of machine: Windows / Linux / MacOS
  • Sniff passwords over the local area network with Man In The Middle Attacks
  • SQL Injection, XSS, Command Injection and other techniques
  • Learn how to trick people into opening your program (i.e Social Engineering)
  • Learn Advanced Metasploit Framework usage
  • Learn the basics of Linux and Linux Terminal
  • Master Information Gathering and Footprinting
  • Learn how to perform Vulnerability Analysis
  • Perform advanced scanning of an entire network
  • Perform Deauthentication Attack to disconnect everyone from the Wireless Access Point
  • Learn Website Application Penetration Testing from scratch
  • Learn Advanced Nmap Usage
  • Code your own Advanced Backdoor that you can use in your Penetration Tests
  • Create Persistence on target machines
  • Perform newest Windows 7 + 10 exploits & attacks
  • Learn how to gain access to a router in various ways
  • Learn Networking & different Networking Protocols
  • Combine programming knowledge and Ethical Hacking knowledge so you can mix techniques and adapt them to different situations

Syllabus

  •   Introduction
    • Complete Ethical Hacking Bootcamp: Zero to Mastery
    • Course Outline
    • Exercise: Meet Your Classmates and Instructor
    • What is Ethical Hacking?
    • Course Resources + Guide
    • Understanding Your Video Player
    • Set Your Learning Streak Goal
  •   Setting Up Our Hacking Lab
    • What is a Virtual Machine?
    • Why Linux?
    • Virtual Box and Kali Linux Download
    • Note: Kali Linux Updates All The Time!
    • Creating Our First Virtual Machine
    • Note: Common Errors With Your First VM
    • Kali Linux Installation
    • Networking Basics
    • Full Screen Mode & Network Settings
    • Troubleshooting Network Connecting in Kali Linux
    • Note: Getting Familiar With Kali Linux!
    • 5 Stages Of A Penetration Test
    • Let's Have Some Fun (+ Free Resources)
  •   Linux Operating System
    • Navigating Through Linux System
    • Creating Files & Managing Directories
    • Network Commands & Sudo Privileges In Kali
    • Note: Linux File System & Additional Commands
  •   Reconnaissance & Information Gathering
    • What is Information Gathering?
    • Obtaining IP Address, Physical Address Using Whois Tool
    • Whatweb Stealthy Scan
    • Aggressive Website Technology Discovering on IP Range
    • Note: Same Tools Different Results!
    • Gathering Emails Using theHarvester & Hunter.io
    • How To Download Tools Online
    • Finding Usernames With Sherlock
    • Bonus - Email Scraper Tool In Python 3
    • Unlimited Updates
  •   Scanning
    • Theory Behind Scanning
    • TCP & UDP
    • Installing Vulnerable Virtual Machine
    • Installing Vulnerable Virtual Machine on M-series MacBooks
    • Netdiscover
    • Performing First Nmap Scan
    • Different Nmap Scan Types
    • ZTM Nmap Cheatsheet
    • Discovering Target Operating System
    • Detecting Version of Service Running on an Open Port
    • Filtering Port Range & Output Of Scan Results
    • What is a Firewall/IDS?
    • Using Decoys and Packet Fragmentation
    • Security Evasion Nmap Options
    • Note: Time To Switch Things Up!
    • Course Check-In
  •   Python Coding Project #1 - Portscanner
    • The 2 Paths
    • Note: Do We Need To Learn Programming To Be An Ethical Hacker?
    • Coding a Portscanner in Python 3
  •   Vulnerability Analysis
    • Finding First Vulnerability With Nmap Scripts
    • Manual Vulnerability Analysis & Searchsploit
    • Nessus Installation
    • Discovering Vulnerabilities With Nessus
    • Scanning Windows 7 Machine With Nessus
    • Let's Cool Down For A Bit!
    • Implement a New Life System
  •   Exploitation & Gaining Access
    • What is Exploitation?
    • What is a Vulnerability?
    • Reverse Shells, Bind Shells ...
    • Metasploit Framework Structure
    • Msfconsole Basic Commands
    • Our First Exploit - vsftp 2.3.4 Exploitation
    • Misconfigurations Happen - Bindshell Exploitation
    • Information Disclosure - Telnet Exploit
    • Software Vulnerability - Samba Exploitation
    • Attacking SSH - Bruteforce Attack
    • Exploitation Challenge - 5 Different Exploits
    • Explaining Windows 7 Setup
    • Eternal Blue Attack - Windows 7 Exploitation
    • DoublePulsar Attack - Windows Exploit
    • BlueKeep Vulnerability - Windows Exploit
    • Note: We Can Also Target Routers!
    • Routersploit
    • Router Default Credentials
  •   SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
    • Note: Not Everything Will Work Smooth!
    • Setting Up Vulnerable Windows 10
    • Crashing Windows 10 Machine Remotely
    • Exploiting Windows 10 Machine Remotely
  •   Gaining Access (Viruses, Trojans, Payloads ...)
    • Generating Basic Payload With Msfvenom
    • Advance Msfvenom Usage Part 1
    • Advance Msfvenom Usage Part 2
    • Generating Powershell Payload Using Veil
    • TheFatRat Payload Creation
    • Note: My Payloads Are Getting Detected By An Antivirus!
    • Hexeditor & Antiviruses
    • Making Our Payload Open An Image
  •   Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
    • Post Exploitation Theory
    • Meterpreter Basic Commands Part 1
    • Meterpreter Basic Commands Part 2
    • Elevating Privileges With Different Modules
    • Creating Persistence On The Target System
    • Post Exploitation Modules
    • Exploitation Recap
  •   Python Coding Project #2 - Backdoor
    • What Are We Creating?
    • Connecting Server And Backdoor
    • Processing Instructional Commands
    • Sending and Receiving Data
    • Executing Commands And Compiling The Program
    • Changing Directory Inside Of Our Backdoor
    • Uploading & Downloading Files
    • Testing All The Commands
    • Note: You Can Continue Building Onto This Project!
    • Exercise: Imposter Syndrome
  •   Website Application Penetration Testing
    • Website Penetration Testing Theory
    • HTTP Request & Response
    • Information Gathering & Dirb Tool
    • Burpsuite Configuration
    • ShellShock Exploitation
    • Command Injection Exploitation
    • Getting Meterpreter Shell With Command Execution
    • Reflected XSS & Cookie Stealing
    • Stored XSS
    • HTML Injection
    • SQL Injection
    • CSRF Vulnerability
    • Hydra Bruteforce Attack Example 1
    • Hydra Bruteforce Attack Example 2
    • Burpsuite Intruder
  •   Python Coding Project #3 - Login Bruteforce, Directory Discovery
    • Creating 2 Programs
    • Bruteforcer In Python
    • Hidden Directory Discovery
  •   Man In The Middle - MITM
    • Theory - Man In The Middle Attack
    • Bettercap ARP Spoofing
    • Ettercap Password Sniffing
    • Manually Poisoning Targets ARP Cache With Scapy
  •   Bonus - Wireless Access Point Cracking
    • Wireless Cracking Theory
    • Putting Wireless Card In Monitor Mode
    • Deauthenticating Devices & Grabbing Password
    • Aircrack Password Cracking
    • Hashcat Password Cracking
  •   Bonus: Gaining Access To An Android Device
    • Android Hacking Theory
    • Android VM Install
    • Gaining Access With Android Meterpreter
    • Evil Droid
    • Is it Flappy Bird or Malware
    • Hack Any Device On Any Network With Ngrok
  •   Bonus: Introduction To Anonymity
    • Anonymity Theory
    • Tor Browser
    • Proxychains With Nmap
    • Installing VPN in Kali Linux
    • Whoami Anonymity Tool
  •   Bonus: Hacking Active Directory
    • Enumerating Active Directory
    • Exploiting Active Directory
    • Escalating Privileges on the Domain
  •   Where To Go From Here?
    • Thank You!
    • Review This Course!
    • Become An Alumni
    • Learning Guideline
    • ZTM Events Every Month
    • LinkedIn Endorsements
    • What's Next?
    • Practice
    • Bug Bounty
    • Coding For Hackers
    • Exploit Development
  •   Learn Python Basics
    • Watch Python Intro Section
  •   Learn Python Intermediate
    • Watch Python Fundamentals Sections
    • Modules in Python
    • Quick Note: Upcoming Videos
    • Optional: PyCharm
    • Packages in Python
    • Different Ways To Import
  •   Learn Python 3: Error Handling
    • Watch Error Handling Section
  •   Learn Python 4: File I/O
    • Watch Python File I/O Section
    • Next Steps

Taught by

Aleksa Tamburkovski and Andrei Neagoie

Reviews

Start your review of Complete Ethical Hacking Bootcamp: Zero to Mastery

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.