Ultimate Ethical Hacking Boot Camp - Beginner to Pro
- Life Time Access
- Certificate on Completion
- Access on Android and iOS App
Welcome to The Ultimate Ethical Hacking Boot Camp.
Learn Ethical Hacking from a world famous Ethical Hacker who has professional endorsements from people like Mark Cuban Billionaire tech entrepreneur, Star of Shark Tank, and the legendary cyber security expert John McAfee.
Seely "thinks entirely out of the box, and has consistently looked to leverage his skills for the good of society,"
McAfee said in a statement.
This course is jam packed with content and will take an absolutely beginner in Cybersecurity & ethical hacking from zero to being able to actually hack wireless routers, crack passwords, and understand the reasons why those things work. You will be getting live video demonstrations, lectures, and in some video's ill be on camera explaining something.
We talk about the process of hacking, from gathering information in the Recon phase, to more involved looks at our targets in the scanning phase. Enumeration and System hacking bring the basic "hacking process" to a close, but that is not the end of things, far from it.
Many of today's large hacks and data breaches that you see all over the news are the result of very clever & persistent social engineers. Social Engineers figure out that you can't always hack the machines, and sometimes its much easier to hack the unsuspecting person using the machine. Learn valuable skills in conducting Social Engineering Penetration Tests as well as how to protect against social engineering attacks.
You are going to enjoy the demos in the course as they will walk you through the whole process and not just the highlights. You can follow along with every single demo and make them into practice courses for yourself.
In just a few hours, you will already be figuring out new ways to use the software tools and tricks I have shown you and come up with new things to try. It is kind of addicting once you get into it.
I can't promise a prestigious job right out of the gate, but I can promise you that you will learn way more in this course than you thought was possible, and you will want to learn even more.
Get rid of the mystery and learn what real hackers know. If you are excited at the idea of being an ethical hacker, then there is no better place to start than right here.
Who is the target audience?
- Anyone with a basic tech/computer background that wants to learn about ethical hacking and Cybersecurity
- Anyone already in the information security field who wants to get some practical experience and brush up on skills
- A basic understanding of computers
- A basic understanding of networking
- Windows/Linux/Mac Operating system and hardware capable of running virtual machines, or spare hardware to run the other operating systems necessary to perform the Practice Demos
- Setup a testing lab for penetration testing
- Identify and hack into wireless access points
- Recover lost passwords with password cracking tools
- Simulate a phishing attack to steal usernames and passwords with a decoy website
Welcome to Ultimate Ethical Hacking Boot Camp. In this lecture you will meet your instructor and hear more about what is to come in the rest of the course.
In case you are so impatient to know what is in this video (i understand that feeling completely) here is a brief rundown.
I introduce myself, Bryan Seely as the instructor of this course. Yes it is called a Boot Camp. No, push ups are not involved. No, I will not yell at you.
This is nothing like Marine Corps Boot Camp or any other Military Boot Camp. No Marines were harmed during the making of this course. No soldiers or airman were harmed either. A sailor friend of mine was almost harmed when he kept distracting me from finishing this, but as much as I wanted to, No sailors were harmed either.
In this lecture you will learn what ethical hacking is, and what separates black hat hackers from white hat hackers. There are laws and codes of conduct that are important to know. Unless you don't think that staying out of jail is important. If you don't, by all means, skip this section and do whatever the hell you please. Shoot me a message with your full name so I can watch the news for when you get in trouble.
This lecture discusses the various options and career paths that ethical hackers can choose from once they set off down the path of pentesting / ethical hacking.
Careers in the cybersecurity space are wide open right now.
You could stay an engineer / pentester / keyboard guru the entire duration of your career and still have a ton of different jobs.
Malware analysis, network pentesting, mobile application pentesting, web app pentesting.
And the best part is, people keep making technology more and more complex, which makes it much more susceptible to the "whoops, huge design / security flaw" surprise down the road.
Make sure to take a look at the basics of what you like about jobs:
People all around or No people anywhere around
Work from home vs work from the road
Programming and coding secure software or taking secure code and ripping it apart to find the problems.
This is a quick tip for how to setup a Wireless pentesting lab on the cheap. You don't need to go to Best Buy or Fry's and buy another 150$ router just to do a few lab simulations or practice on at home.
If you told your significant other that you "had" to have the latest and greatest tech to be able to "learn" effectively, then you are probably a fairly capable Social Engineer and that might just be one of your favorite topics. However, you should probably not let your significant other watch this video explaining how you can get a very good wireless router for 2$ at Goodwill.
DO NOT BUY SECOND HAD STUFF AT GOODWILL AND THEN USE IN A REGULAR PRODUCTION ENVIRONMENT.
Everything that is second hand is "insecure" as far as you are concerned.
Hard Drives are the worst. But I don't think I know anyone who buys hard drives from Goodwill. This is the worst idea ever.
Wireless Module Disclaimer
This is important if you want to hack wireless networks using a virtual machine test lab like I setup in my lab.
If you think you "got this" and that your laptop is super top of the line, it isn't.
Go download the PDF in the resources section of Lecture 1 and find the link to the wireless card that you need to buy.
Why are you still reading this.
Go watch the video.
Seriously, this is just getting sad.
This lecture will give you an overview of the lab environment and what you will need to setup a lab environment of your own.
I setup my lab using VMware Workstation, but you absolutely can use other products. I explain the options in more depth in this video.
This lecture talks about the VMware Lab Setup details / configurations for your lab environment.
I also made a bunch of backgrounds (wallpaper) for your virtual machines so that you can easily tell which machine you are on, and know which IP you are without having to open the TCP/IP properties every ten seconds.
I made them from scratch.
I grew the pixels in the garden behind my house and hand placed each pixel with love and care.
This lab will walk you through the setup for Windows XP as a virtual machine inside your VMWare Lab Environment.
This is a good operating system to install because in later additions to this course, and the following courses, you will thank me for mentioning this. XP has an unreal amount of vulnerabilities that are just waiting to be exploited.
This lab will walk you through the setup for Server 2008 as a virtual machine inside your VMWare Lab Environment.
Server 2008 is a very common operating system that you will encounter in the wild. Not like the woods "wild" but more like companies and stuff.
NO, the companies are not in the woods either.
Jeez, chill out about the woods.
This lab will walk you through the setup for Kali Linux from ISO inside your VMWare Lab Environment.
This is a mandatory installation. The practice demos all use Kali.
Just install it. Its fun.
This lecture shows you that you don't have to spend 20 minutes or more installing Kali Linux from the ISO, there are already prebuilt Virtual Machines that boot up instantly without the need for choosing any options whatsoever.
But if I had put this course first, you wouldn't have learned anything ,and then you would probably skip the installation from ISO course and thought to yourself "ill get to that later" but you would never actually do it later, and then you would not be getting the best bang for your buck.
See, I am not only trying to teach you Ethical Hacking, but also important life lessons on not procrastinating and just doing things the right way the first time. And also getting a good value for your investment.
That's like 2 parts of other courses rolled up into mine, free. You are welcome.
This lab will walk you through the setup for WIndows 7 as a virtual machine inside your VMWare Lab Environment.
This is another good installation to perform. Windows 7 is very very very common in corporate environments all over the world still, so you should get this one ready.
This is a demonstration on how to setup windows XP Pro SP2 on VirtualBox inside an OSX Host.
This is for MAC Users who want to setup a virtual hacking lab. This will be showing how to install virtual machines into Oracles VirtualBox Hypervisor.
This is a demonstration on how to setup windows 7 on VirtualBox inside an OSX Host.
MAC USERS-----OSX-Virtual Box - Server 2012
In this lecture we introduce the section called Footprinting. Footprinting is the first of four steps in the traditional hacking process.
This lecture will introduce tools, terms and concepts that will be discussed throughout this section.
Also, I might make some jokes.
This lecture will discuss the process / methodology of the recon phase. This lecture goes into more details as to what is expected during this phase as well as gives helpful tips and suggestions for how to keep track of data acquired during the recon phase.
This lecture talks about "google hacking" which can be a very useful tool when gathering information.
Google hacking is going to change the way you search for stuff for the rest of your life.
For the better. Not worse. Just don't let everyone know, then they will make you do more work for nothing.
This is a demo of various Google hacking techniques that you can use to build on.
Wanna hunt Google.com for Social Security Numbers?
What about "confidential business plans"?
All that stuff and more in one of the most important demos in this course.
This lecture talks about how Social Networking can be a vital tool in the Recon phase.
Social Networking sites are your bread and butter, especially if you are on a budget.
If you don't know what a social networking site is, we are talking about sites like Facebook, Linkedin.com, Google+ and other places where you add friends and connect with other humans.
If you don't know what Facebook is then you must have just awoken from a coma. You should really lay down and grab a newspaper and catch up on a few things before you try to finish the rest of this course. I am flattered that this was the first thing you decided to do post-coma.
In this lecture we introduce the section called Scanning. Scanning is the second of four steps in the traditional hacking process.This lecture will introduce tools, terms and concepts that will be discussed throughout this section.
Warning - Humor found within.
This lecture talks about the Types of scans that you might run if you were scanning a target environment.
We review a lot of different types of scans, some of them even sound made up. Like the Xmas tree scan. I promise its a real thing.
This lecture talks about the various tools that one might use to run the types of scans that one might run if one were scanning a target environment.
This is a demo of how to use NMap and some of its capabilities. You really need to try NMap out, because it will make you think twice about using some garbage shareware or freeware app that is limited where NMap is not.
In this lecture we introduce the section called Enumeration. Enumeration is the third of four steps in the traditional hacking process. This lecture will introduce tools, terms and concepts that will be discussed throughout this section.
This section will have less jokes than other sections, but more than some.
In this lecture we introduce the section called Hacking. Hacking is the final step of the traditional hacking process. This lecture will introduce tools, terms and concepts that will be discussed throughout this section.
In this lecture you will learn how to start hacking with Metasploit.
You cannot be an ethical hacker and use Kali Linux in the real world without understand what Metasploit is and the vast capabilities that it has.
In this lecture we introduce the section called "Wifi Hacking".
Students will learn three out of the four following things.
How to hack a wireless network that has been protected with WEP
How to hack a wireless network that has been protected with WPA2
How to gain root access for Norad / The Pentagon / Area 51 with a wire coat hanger & iPhone 8.
In this lecture, students will get a brief overview about wireless networks and their security. Not a whole bunch of boring history about the guys name that developed the outdated security type.
Heck, we are just gonna end up hacking / breaking these various acronyms, so why waste time on a history lesson. This section has the information you need to know what you will be breaking 5 minutes later.
In this lesson, you will watch with your very own eyes how to hack a Wireless routers wifi network that has been "protected" by WEP
In this lesson, you will watch with your very own eyes how to hack a Wireless routers wifi network that has been "protected" by WPA2.
In this lecture we introduce the subject of cracking passwords.
You will learn fundamentals, methods for cracking passwords, and watch demos of passwords being cracked right before your eyes. You will be amazed.
In this lesson students will learn about cracking passwords on Kali Linux. Kali is packed with a lot of amazing tools and you will be amazed at how simple some of them are to use.
This is a full walk through of hacking a windows password using a wordlist with Kali Linux.
Grabbing a windows SAM file
Getting the password "hash"
Cracking the "hash"
and much more.
In this lecture we introduce the section called Social Engineering. This is not a section for engineering students who need to develop social skills. Although that would probably be a fairly popular course.
This section introduces one of the most common hacking types there is. Social engineering is highly dangerous, so you should know what the bad guys know.
In this lecture you will learn more about Social Engineering and how it is used / who uses it etc.
This is a really important topic if you want to understand the threats that are out there and why so many companies get hacked.
In this lecture you will learn about Phishing & Spear Phishing. If you are looking for spear FISHING, you should try looking at courses under "Hunting & Fishing" .
At no point will you be asked to pick up any solid weapons.
No fish were harmed in the making of this course.
In this lecture you will learn about Maltego. Maltego is an amazing tool for research and social engineering. You should watch the demonstration.
Why are you still reading this?
In this lecture you will learn about the Social Engineers Toolkit. You will watch as your instructor demonstrates some of the capabilities of "SET" by cloning a website and creating a username and password harvesting site in just seconds.
From 0 to 1: Hive for Processing Big DataLoony Corn
CompTIA Network+ Cert.; N10-006. The Total CourseMike Meyers, Total Seminars