Hacking For Beginners

Perform your first hack in the next 2 hours!

Last updated 2022-01-10 | 4.6

- Learn the four components required to perform ethical hacking
- Deep dive into packets and protocols
- Identify vulnerabilities manuall
- semi-automatically and automatically

What you'll learn

Learn the four components required to perform ethical hacking
Deep dive into packets and protocols
Identify vulnerabilities manuall
semi-automatically and automatically
Compromise a remote target and take full control over it

* Requirements

* Basic computer knowledge
* NO previous hacking knowledge required
* NO Linux knowledge required
* NO programming knowledge required

Description

VERY IMPORTANT: This course provides access to Hackers Academy labs. You will be required to create an account on Hackers Academy website.

Short, concise and straight to the point. This is how this course will guide to into your first hack in two hours!

You want to learn hacking but you don't know where to start? Then this is the course for you. Hacking for beginners course requires zero experience, zero programming knowledge and zero Linux knowledge. 

We start with the assumption that you know nothing about hacking, networks or the web. And step by step we will build up your knowledge so you can perform you first hack in two hours!



Zero Programming

We know how frustrating programming can be for beginners. And this why you will need zero programming to complete this course. As a matter of fact, you’ll be hacking into your first target with out reading or writing a single line of code!



Zero Networking

Networking is essential for you to become a hacker. Having said that we designed this course with the expectation that you have zero knowledge of networking. You’ll be surprised what you’ll be able to learn by the end of this course though!



Zero Linux

We would be lying if we said you don’t need to learn Linux to become a hacker. We would also be lying if we said you can’t hack without knowing Linux. This is why we will get you started assuming you have zero Linux knowledge.



NOTE: this course is for students with ZERO knowledge about hacking. If you already have experience in ethical hacking, then we invite you to take our other more advanced courses.


***********************************************

This is literally the first course that I've stuck with on Udemy. I really appreciate your work. I am learning a lot more than I thought I would as the topics are dealt with in a curiosity-bringing way. I am also taking detailed notes and am documenting all my solutions for the missions needed for future reference. Again, I really appreciate your ability to teach and explain, as every teacher can't provide clarity as you do. - VH ★★★★★


********************************************

Thank-You for this awesome course, it was indeed very informative. To be very honest, the whole internet is full of knowledge but you guys put all that in an order where people like us can consume and understand easily, now this is what I call having a method to madness!! - MA ★★★★★

************************************************

Who this course is for:

  • Anyone wanting to learn the absolute basics of hacking

Course content

12 sections • 64 lectures

Help! Preview 00:35

Access the labs Preview 00:06

IMPORTANT: Lab Instructions Preview 00:09

CAPS lab issue Preview 00:11

Introduction to Kali Linux Preview 07:56

Kali Linux GUI Preview 05:07

First Commands in Kali Linux Preview 00:19

Kali Linux - Terminal Shortcuts Preview 06:38

Kali Linux - root Preview 07:02

Kali Linux - Basic Commands Preview 06:48

Kali Linux - Package Management Preview 03:27

How to download files into Kali labs Preview 00:02

Download PCAP File Preview 00:08

Introduction to Wireshark Preview 06:39

Wireshark TCP Handshake Analysis Preview 08:32

Wireshark Display Filters Preview 02:58

Wireshark Capture Filters Preview 06:00

Port Scanning First Run Preview 05:33

Port Scanning Techniques Preview 04:48

Port Scanning Packet Analysis Preview 06:02

Port Scanning With Service Detection Preview 05:31

Port Scanning Service Detection Packet Analysis Preview 04:34

Vulnerabilities and Exploits Preview 04:16

CVE and CVSS Preview 03:28

Manual Vulnerability Research Preview 03:37

Semi-automated Vulnerability Research Preview 04:09

Scripted Vulnerability Research Preview 04:57

Vulnerability Scanning Preview 09:40

Vulnerability Reporting Preview 04:53

Vulneraility Report Preview 00:01

Exploitation Key Terms Preview 05:59

What Is A Remote Shell? Preview 08:05

What Is A Backdoor? Preview 04:09

Exploiting A Backdoored FTP Preview 04:18

Creating Your Own Backdoor Preview 05:04

How The Backdoor FTP Exploit Works Preview 08:34

Introduction to Metasploit Preview 04:52

Metasploit Auxiliary Preview 08:41

Metasploit Auxiliary Search Preview 03:36

Metasploit Search Preview 08:48

Exploiting Backdoored FTP With Metasploit Preview 07:37

Managing Metasploit Multiple Sessions Preview 10:47

Install A Tool Preview 00:09

Exploiting Tomcat Manually Preview 09:20

Exploiting Tomcat with Metasploit Preview 10:43

Metasploit Meterpreter Shell Preview 07:36