Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)

Course Feature
  • Cost
    Free
  • Provider
    Youtube
  • Certificate
    No Information
  • Language
    English
  • Start Date
    2022-12-09
  • Learners
    No Information
  • Duration
    No Information
  • Instructor
    The Cyber Mentor
Next Course
2.5
957,206 Ratings
This Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1) course is the perfect way to learn the fundamentals of ethical hacking. With over 20 hours of content, this course covers topics such as networking refreshers, IP addresses, MAC addresses, TCP, UDP, the OSI model, subnetting, installing Kali Linux, configuring VirtualBox, common network commands, users and privileges, bash scripting, Python, sockets, building a port scanner, classes and objects, and the 5 stages of ethical hacking. With the help of Alek, Dewalt, Yaseen, Likith, Tuk, Dwight, Grimmie, Joe Helle, Lian, and Rumham, this course is sure to provide the best learning experience. Get trained and certified today with this comprehensive course!
Show All
Course Overview

❗The content presented here is sourced directly from Youtube platform. For comprehensive course details, including enrollment information, simply click on the 'Go to class' link on our website.

Updated in [July 17th, 2023]

The Cyber Mentor Academy's Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1) course provides an introduction to the world of ethical hacking. This course covers topics such as a day in the life of an ethical hacker, effective notekeeping, important tools, networking refresher, IP addresses, MAC addresses, TCP, UDP, and the three-way handshake, common ports and protocols, the OSI model, subnetting, installing VMWare/VirtualBox, configuring VirtualBox, Kali Linux overview, sudo overview, navigating the file system, users and privileges, common network commands, viewing, creating, and editing files, starting and stopping services, installing and updating tools, Bash scripting, Intro to Python, strings, math, variables and methods, functions, Boolean expressions and relational operators, conditional statements, lists, tuples, looping, advanced strings, dictionaries, importing modules, sockets, building a port scanner, user input, reading and writing files, classes and objects, building a shoe budget tool, and the 5 stages of ethical hacking. The course also covers passive recon overview, identifying our target, discovering email addresses, and breached credentials. All course resources and links are available on the course's GitHub page.

Show All
Recommended Courses
automate-security-by-25-ansible-examples-10302
Automate Security By 25+ Ansible Examples
3.0
Udemy 7 learners
Learn More
This course provides an excellent opportunity for new learners to learn the Ansible automation technology with real-life examples. Through this course, learners will be able to understand how to accomplish the most common System Administrator tasks, with each lesson summarizing an Ansible module and providing live demos of code and real-life usage. Additionally, learners will be able to automate mundane activities in Linux related to the Security of a System, such as setting up and verifying the SELinux settings and enabling and verifying the server's compliance. With 25+ Ansible Examples, this course is the perfect way to learn the basics of Ansible and automate security.
learn-linux-security-firewalls-10303
Learn Linux Security - Firewalls
2.0
Udemy 9 learners
Learn More
This course will teach you how to setup and operate your own host-based firewall to protect Linux systems. Learn Linux Security - Firewalls is a comprehensive course that will take you from novice to expert in Linux Firewalls. You will learn how to allow or deny traffic based on port and protocol, manage the flow of inbound and outbound traffic, use application profiles, develop a game plan for testing the firewall, and more. With real world case studies, configuration templates, and live code walkthroughs, you will be able to apply the knowledge you gain from this course to the real world. Get started learning Linux security with this complete course on Linux Firewalls!
linux-security-the-complete-iptables-firewall-guide-10304
Linux Security: The Complete Iptables Firewall Guide
4.7
Udemy 8,246 learners
Learn More
This Linux Security: The Complete Iptables Firewall Guide course is designed to provide learners with a comprehensive understanding of Linux Security and Iptables. It is taught by a DevOps Engineer and Professional Trainer with almost 20 years of experience in Linux Sysadmin, Security Engineering, and Full Stack Development. The course covers topics such as Ipset, advanced matches and targets, NAT, port forwarding, user-defined chains, and more. It also includes quizzes to test the learner's knowledge. Click this course to learn how to create Iptables rules to filter incoming, outgoing, or routed traffic, log malicious traffic, prevent DoS attacks, use Ipset to drop tens of thousands of networks, optimize Iptables firewalls, automate different firewall security tasks, configure NAT and MASQUERADE, and configure port forwarding (DNAT).
learn-linux-security-through-practical-steps-10305
Learn Linux Security Through Practical Steps
4.3
Udemy 1,266 learners
Learn More
This course provides a unique opportunity to learn Linux Security through practical steps. It is designed to help users protect their server from malicious attacks, such as brute force attacks, and increase the level of security on their system. Mihai, Giussepe, and Leela have all praised the course for its clear explanation and simplified approach to complex Linux hardening. The course includes video lectures, exercises, and free updates, as well as a 30-Day Money-Back Guarantee. Learn Linux Security today and take the first step towards protecting your server from malicious attacks.
Favorites (0)
Favorites
0 favorite option

You have no favorites

Name delet
arrow Click Allow to get free Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1) courses!