The Beginners Guide to Practical Cyber Hacking Skills

Learn real world practical and theoretical cybersecurity skills to prepare you for any career in cyber security
The Beginners Guide to Practical Cyber Hacking Skills
File Size :
5.49 GB
Total length :
8h 33m



Alexander Oni


Last update




The Beginners Guide to Practical Cyber Hacking Skills

What you’ll learn

How to work with the Kali Linux operating system
How to work with NMAP network scanner
Understand the key principles of cybersecurity
How to create a cloned LinkedIn website
How to craft a Phishing email
Understand the Hacking methodology
Develop a strong foundation in Networking principles & technologies
How to calculate hash values with powershell
How to setup hashcat
How to perform brute force attacks
Understand the OWASP top 10
Develop a core understanding of how websites & databases work
How to crawl, audit websites & generate reports with Burpsuite
Perform information gathering with Maltego

The Beginners Guide to Practical Cyber Hacking Skills


Basics of Cybersecurity


Cyber attacks and crimes continue to grow at an alarming rate and as such the demand for cyber security professionals all over the world has never been higher. However getting a job in this exciting industry isn’t as easy as it may seem. In order to be able to apply for a job you not only need to know the basics of cyber security but you also need to have real world practical skills that can make you more attractive to prospective employers. If you want to start a career in cybersecurity, then you need real practical skills. The primary objective of this course is to expose you to a very wide variety of skills that will prepare you for your chosen career path in cybersecurity. Learn SOMETHING about EVERYTHINGIn this course, you will learn both theoretical and practical skills in the following cybersecurity fieldsSecurity AnalysisNetwork SecurityEthical HackingPenetration TestingCyber ManagementOkay but can you tell me exactly what I will learn in this course?With pleasure. You will first learn about the core key principles of cyber security including access control and the CIA triad. You will then learn about virtualization and how to install the Kali Linux operating system locally on your computer with the use of virtual box.Next, you will learn how Phishing truly works behind the scenes and you will even learn how to create a cloned phishing website for LinkedIn.We will then proceed to the next chapter where you will learn about the key networking principles including DNS, DHCP, NAT, ports, protocols and much more.You will then learn how to use the most powerful networking scanning tool – NMAPNext you will learn about hashing with the use of powershell and hashcat. You will also learn how to perform brute force attacks.Section 8 is all about websites, web applications and databases. You will learn about the fundamental programming languages used to build and design websites and also how databases work behind the scenes.You will learn about the OWASP top 10 and also how to use Burpsuite to scan, crawl and audit websites. Social Engineering is a big part of cyber security and you will learn how to use Maltego to gather information about a person or company.Finally you will learn about data management as well as the incident response and disaster recovery plans.Here are some of the cybersecurity tools you will learn how to work with:Kali Linux operating systemVirtual boxMaltegoBurpsuiteHashcatPowershellNMAPand much more


Section 1: Introduction to the Course

Lecture 1 Introduction

Lecture 2 Download the Slides and Resource Handbook

Lecture 3 Connect with Me

Section 2: Cyber Security Principles

Lecture 4 Section Preview

Lecture 5 The CIA & DAD Triads

Lecture 6 Key Principles of Cybersecurity

Lecture 7 CWE and CVE

Section 3: Threats and Attacks Revisited

Lecture 8 Section Preview

Lecture 9 The Bad Guys – Black Hats, Cyber Criminals & Disgruntled Employees

Lecture 10 Malware Revisited

Lecture 11 Ransomware

Lecture 12 Social Engineering

Lecture 13 The Hacking Methodology

Section 4: Virtualization & Kali Linux

Lecture 14 Section Preview

Lecture 15 Installing Virtual Box

Lecture 16 Installing Kali Linux

Lecture 17 Fixing NAT Network Issue

Lecture 18 Kali Linux Walkthrough

Lecture 19 Linux Commands

Lecture 20 Section Review

Section 5: Phishing

Lecture 21 Section Preview

Lecture 22 BlackEye Update

Lecture 23 Creating a LinkedIn Clone Site

Lecture 24 How to Use Zphisher to Craft a Phishing Site

Lecture 25 Crafting our Phishing Email

Lecture 26 Phishing Notes

Lecture 27 Section Review

Section 6: Network Security

Lecture 28 Section Preview

Lecture 29 Home Setup

Lecture 30 Introduction to DHCP & DNS

Lecture 31 Working with DHCP Commands

Lecture 32 Working with DNS Commands

Lecture 33 Ports & Protocols

Lecture 34 Introduction to NAT

Lecture 35 TCP vs UDP

Lecture 36 The TCP 3 Way Handshake

Lecture 37 Hardening Networks

Lecture 38 Windows 10 Firewall Demo

Lecture 39 Creating a Sample Outbound Rule

Lecture 40 Section Review

Section 7: NMAP – The Ultimate Network Scanner

Lecture 41 Section Preview

Lecture 42 Installing NMAP

Lecture 43 Basics of NMAP

Lecture 44 NMAP Port States

Lecture 45 Host Discovery Controls

Lecture 46 Host Discovery Controls – Part 2

Lecture 47 Scanning Techniques

Lecture 48 Firewall and IDS Evasion Techniques

Lecture 49 NMAP Scripting

Lecture 50 Introduction to Zenmap

Lecture 51 Section Review

Section 8: Passwords, Hashes & Brute Force Attacks

Lecture 52 Section Preview

Lecture 53 Hashing

Lecture 54 Calculating Hash Values with Powershell

Lecture 55 Introduction to Hashcat

Lecture 56 Setting Up Hashcat

Lecture 57 Launching a Word List Attack

Lecture 58 Launching a Combinator Attack

Lecture 59 Launching a Mask Attack

Lecture 60 Section Review

Section 9: Websites & Web Security

Lecture 61 Section Preview

Lecture 62 How a Website Works

Lecture 63 HTML, CSS, JavaScript & PHP

Lecture 64 Inspecting and Manipulating Website Code

Lecture 65 Cookies Revisited

Lecture 66 OWASP Top 10

Lecture 67 Understanding Databases & SQL

Lecture 68 Web Attack – SQL Injection

Lecture 69 Web Attack – Cross Site Scripting

Lecture 70 Introduction to Burp Suite

Lecture 71 Setting up Burp Suite with Foxy Proxy

Lecture 72 Crawling, Auditing & Generating Reports with Burp Suite

Lecture 73 Section Review

Section 10: Reconaissance

Lecture 74 Section Preview

Lecture 75 Target Reconnaissance

Lecture 76 Installing Maltego

Lecture 77 Gathering Information

Lecture 78 Gathering more Information

Lecture 79 Building an Attack Strategy

Lecture 80 Using Recon-NG

Lecture 81 Section Review

Section 11: Cyber Management, Incident Response & Auditing

Lecture 82 Section Preview

Lecture 83 Preventing Data Leaks

Lecture 84 Incident Response Plan

Lecture 85 Disaster Recovery Plan

Lecture 86 Business Continuity Plan

Lecture 87 Cyber Security Auditing

Lecture 88 Section Review

Section 12: Conclusion

Lecture 89 Getting your Certificate

Lecture 90 Conclusion

Students who want to start a career in cybersecurity,Working professionals who want to switch careers to cybersecurity

Course Information:

Udemy | English | 8h 33m | 5.49 GB
Created by: Alexander Oni

You Can See More Courses in the IT & Software >> Greetings from

New Courses

Scroll to Top