toggle menu

Asterisc.in

Real-World Ethical Hacking: Hands-on Cybersecurity

Get course
4.0
6 reviews
Enrolled: 34 students
Duration: 10 hours
Lectures: 4
Video: 9 hours
Level: Advanced

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.Also known as “white hats,” ethical hackers are security experts that perform these assessments.

  • Ethical Hacking Tutorial
  • Ethical Hacking
  • Types of Hackers
  • Famous Hackers
  • Environmental setup
  • Network Penetration Testing
  • Basic of Network
  • Pre-connection Attacks
  • Pre-connection Attacks
  • Wireless Interface in Monitor mode
  • About airodump-ng
  • Run airodump-ng
  • Deauthenticate
  • Gaining Access
  • WEP Introduction
  • WEP Cracking
  • Fake Authentication Attack
  • ARP Request Replay Attack
  • WPA Theory
  • Handshake Theory
  • Capturing Handshakes
  • Creating Wordlist
  • Cracking Wordlist
  • Securing Network from Attacks
  • Post Attacks
  • Post-Connection Attacks
  • Netdiscover
  • Zenmap
  • MITM Attacks
  • ARP spoofing using arpspoof
  • ARP spoofing using MITMf
  • Bypassing HTTPS
  • DNS Spoofing
  • Gaining Access Intro
  • Server-side Attacks
  • Server-side Attack Basics
  • Attacks – Metasploit basics
  • Exploiting a Code Execution Vulnerability
  • Installing MSFCMSFC Scan
  • MSFC Analysis
  • Installing Nexpose
  • Nexpose Scanning
  • Nexpose Analysis
  • Client-side attacks
  • Installing Veil
  • Overview of Payloads
  • Generating a Veil Backdoor
  • Listening for Connections
  • Testing the Backdoor
  • Fake bdm1 Update
  • Protecting Against
  • Delivery Methods
  • Introduction
  • Meterpreter
  • Filesystem Commands
  • Methods to Maintain access
  • What is a Website?
  • Attacking a Website
  • Information Gathering
  • Whois Lookup
  • Netcraft
  • Robtex
  • Discovering Subdomain
  • Analysing Discovering Files
  • What Problem Hacking Identify
  • Hacking Process
  • Importance of Ethical hacking
  • Miscellaneous Hackers
  • Clients and Servers
  • Password Cracking Penetration testing
  • Routers and Firewall
  • Vulnerability Assessment vs Penetration Testing
  • Cross-site Scripting
  • Defend against Password Cracking
  • Magecart attack
  • Nexpose
  • Post Exploitation Concept
  • Website vs Webpage
  • Meterpreter
  • MITM Attack Progression
  • Prevention of MITM Attack
  • Usages and Tips
  • Simple WEP Crack
  • Methods of attacking DNS spoofing attack
  • Metasploit commands
  • Metasploit Interface
  • How to prevent DNS cache poisoning and spoofing
  • Risk of DNS spoofing and Poisoning
  • Basic Msfconsole commands
  • Configuring event payloads

Starting Course

1
Nvidia New Technologies Slides
15 minutes

Welcome to your first slider tutorial. This slides will start with a simple introduction. Then, You will open up google cause I"ll show you where you can download the blender software and which version of it will we be using in the entire course period.

Note: The download link is available with the lecture, plus the .pdf file is also included for you to download if you still need help downloading the software. 

2
Quiz: Mobile / Native Apps
170 questions

After Intro

1
Realistic Graphic on UE4
2
Volta GPU for optimization.
14 Minutes

The Tensor Core GPU Architecture designed to Bring AI to Every Industry. Equipped with 640 Tensor Cores, Volta delivers over 100 teraflops per second (TFLOPS) of deep learning performance, over a 5X increase compared to prior generation NVIDIA Pascal architecture.

3
Deep Learning
Faq Content 1
Faq Content 2

Productivity Hacks to Get More Done in 2018

— 28 February 2017

  1. Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
  2. Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
  3. Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!


4.0
4 out of 5
6 Ratings

Detailed Rating

Stars 5
3
Stars 4
0
Stars 3
3
Stars 2
0
Stars 1
0

{{ review.user }}

{{ review.time }}
 

Show more
Please, login to leave a review