Image
Applied Ethical Hacker Course

Applied Ethical Hacker Course

5.00
(1 Rating)
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

With our experience, we have prepared a concentrated content that presents the most valid information in the industry, in the most appropriate order, in the most appropriate time. Focusing on the essence of the subject, we aimed for you to progress rapidly. If you have goals to become a white hat hacker or penetration tester in your career, if you want to gain detailed and applied knowledge about network and web application security, if you want to take your computer and networking knowledge to a higher level, you will love this Applied White Hat Hacker Course. In this course, which has been meticulously prepared by the Boğaziçi University Cyber ​​Security Center Community, you will be able to get answers to all your questions about penetration tests and being an ethical hacker, as well as access to technical knowledge that is valid in the industry.

Show More

What Will You Learn?

  • Developing a self-confidence that is free from details, plain and clear, based on experience and having the most valid information
  • Mastering the working logic of the scanning and vulnerability exploitation tools used by hackers
  • To crack wireless network passwords, learn user data connected to wireless network.
  • Detecting web application vulnerabilities with attacks such as SQL Injection, XSS and CSRF.
  • To know the HTTP method and status codes and to follow the network flow.
  • To detect vulnerabilities in software and networks by obtaining Linux and network knowledge.
  • Listening to the internet connections of the devices on the network, the services and sites they use.
  • Detection of live systems in the network and active information gathering about them.
  • Obtain user, port, service, operating system and version information on the targeted system.
  • Obtaining network, infrastructure, e-mail and corporate information about people, institutions and systems by passive information collection methods.
  • To learn how the vehicles in the course work and how they are detected by the target.
  • To learn directory, file, user and package management in Linux, to use system monitoring tools effectively.
  • To learn the working logic of the Internet, the connection, network, transport and application layers.
  • Knowing TCP/UDP and internet protocols and calculating addressing systems.
  • To be able to use vulnerability exploitation tools such as Metasploit effectively.
  • To be able to organize various network attacks and to know the working logic in their background.
  • Get detailed information about social engineering, phishing attacks (Coming soon)
  • Familiarity with password attack tools, encoding and hashing algorithms (Soon)
  • Using the Netsparker web application vulnerability scanner (Coming soon)
  • Using Nessus, network and vulnerability scan tool (Coming soon)
  • To use Kali Linux and the software it contains effectively.

Course Content

Hacking Kali Linux

  • New Investors
    00:29
  • Patience Patience Patience
    00:48
  • Bad Habits & Consequence
    00:29

White Hat Hacker

Basic Linux Knowledge

Network Basics

Student Ratings & Reviews

No Review Yet
No Review Yet