UrduCourses

( UC-IEHP )

Ethical Hacking, Penetration Testing & Networking For Complete Beginners

14 Days

Learning Pace

Beginner

Level

10 hrs 45 min

Course Duration

Lifetime

Access

GET CERTIFIED

Assignments

Improve your retention with marked assignments to make your elearning more effective

Revise As You Learn

With the help of over 150 Multiple Choice Questions, Revise your what you learned in the class

Access on Any Device

Access your classes whenever you want, wherever you want, on any device Whether it's mobile or your smart tv

Lifetime LMS Access

Learn your new skill in a beautifully designed learning management system which you will have access of for lifetime

24/7 WhatsApp Support

WhatsApp Messenger Support Available For all questions related to the course, Whenever you feel stuck in the course or have a question related to any topic covered in the class, you will be answered

COURSE CURRICULUM

Introduction To Ethical Hacking - 1hr 35m

Topics Covered

What is Hacking?
Types of Hackers
Cyber Attacks Explained
What are Attack Vectors?
Cyber Attack types
Malware Explained
What is Virus?
What is Worm?
Trojans Explained
Ransomware
What are Spyware
File-Less Malware
How to protect yourself
Defence-in-Depth
Asset/Risk/Threat/Vulnerability
What is Dark Web?
Phases of Hacking
Virtualization Explained
Installing VirtaulBox
Installing Kali Linux VM
Installing Metasploitable VM
Installing Ubunto VM
Installing Windows 10 VM

Networking Basics - 1hr 26m

Topics Covered

Hardware Explained
What is Firmware?
Software Explained
Transmission Modes
What is Network?
Problems in Network
OSI Model Explained
TCP/IP Explained
OSI Model Real Life Example
Types of Addresses
What is IP Address?
IPv4 Explained
Classes of IPv4
What is Network ID?
What is Broadcast ID?
What is Subnet Mask?
Convert Binary to Decimal
Private vs Public IP
Networking Devices
How to Change Your IP?

Networking Basics Continued - 2hr 18m

Topics Covered

Network Topologies
Network Types
What is Local Area Network?
What is Wide Area Network?
How VPN works?
Using a VPN
What is MAC Address?
Convert Hexadecimal to Decimal
IPv4 Headers Explained
Datagram Explained
Trace route of any website
Subnetting
Network Requirement Subnetting
Variable Length Subnet Mask

Networking Deep Dive- 1hr 15m

Topics Covered

What is Supernetting
Supernetting Real Life Examples
Domain Name System
How hosts file Work?
Root Servers
What is DHCP?
DORA Process Explained
SMTP Explained
What is Address Resolution?
Wi-Fi Explained
FTP
POP3
IMAP
HTTP vs HTTPS
Ports Explained

Kali Linux Walkthrough- 1hr 12m

Topics Covered

How to access all tools with one click
Kali Linux Settings Manager
Creating Launcher
Kali Linux Terminal
View current directory in cli
Change directories in Terminal
Listing directories
Check permissions of files & Directories
Create new files using cli
View content of a file in Terminal
Command-line text editor
Creating Python file
How mkdir works?
Copy & Move files using only Terminal
Removing Files & Folders with cli
whoami
root vs kali
Changing users within Terminal
Change permissions
passwd & shadow file
Adding new user in kali linux
sudoers file
Deleting unwanted users
ifconfig & iwconfig
Using ping in terminal
Check other devices connected to same network
Starting & Stopping Services
Apache2
SimpleHTTPServer
Auto start services when Kali stars
Updating Kali with single command
sudo apt-get upgrage

Cracking Passwords & More- 1hr 29m

Topics Covered

Command manual
Finding live systems on network
Booting up Metasploitable
Scan systems connected to same router
NMAP
Deepmagic Tool
How to gather information of a domain?
Collecting subdomains & their IPS
Get Name Server information of a domain
Collecting useful emails
Bruteforcing DNS information
Collect Mail exchange Servers
Port scanning hosts connected to same network
Finding Services & their versions running on hosts
Identify technologies used by websites
Scan web servers for weaknesses
Burp Suite Walkthrough
Setting target in Burp Suit
Sniffing Bank Login Credentials with Burp Suit
Generate your own wordlists for brute forcing
Mangling your wordlists
Scanning target host to Generate wordlist
What are Hashes?
Decrypting MD5 hash to simple text
Crack other windows user account passwords

Exploiting Linux & Windows 10 - 1hr 30m

Topics Covered

Msfconsole
What are exploits?
Payloads Explained
Hacking Linux through irc port
Changing files of hacked linux using Kali terminal
Hacking Metasploitable through ftp port
Getting root access of Metasploitable
Getting vnc credentials of target host
Graphical root access of metasploitable
Entering into linux by ssh port
What is verbosity in Msfconsole
Brute forcing passwords using wordlist
Armitage
Finding attacks in Armitage against Linux
Generating Payloads using MSFvenom
Hacking windows 10 Using Payload
Sniffing Windows 10 keystrokes of target
Installing Linux subsystem in Windows 10
Using Linux tools in windows 10

Demo Lectures

Module 1 - Topic: How To Protect Yourself

Module 2 - Topic: OSI Model Real Life Example

Module 3 - Topic: How VPN Works

Module 4 - Topic: What is Supernetting?

Module 5 - Topic: Running A Server Within Kali Linux

Module 6 - Topic: Cracking Other Account Passwords

Module 7 - Topic: Exploiting Windows 10 Machine

What Other Students Have To Say

Our Pricing

PKR 1,999

one time payment

Got Any Questions?

If you need more details about the course then reach out to us on our WhatsApp support by taping/clicking on button below

Open chat
Need Help?
Scan the code
How Can We Help You?