Disclaimer: This course is strictly for educational purposes and does not support any illegal activities. Participants are expected to use the knowledge responsibly, within legal and ethical boundaries. Completion of the course does not guarantee success in the field of ethical hacking. Some course exercises may involve security risks. The provided certificate is for course achievement and not an industry-recognized certification.
This course is designed to be practical, insightful, and transformative. By the end, you’ll have the skills to think like a hacker, but also the ethical responsibility to secure networks and protect data. Special emphasis is placed on hands-on exercises and real-world application.
NOTE: To access your e-learning course with us, you need a Golem Karrierewelt customer account. To purchase your e-learning course, simply use the same e-mail address that you want to use to access the e-learning course. Your customer account is of course free of charge for you.
You will learn:
- Crack WEP/WPA/WPA2 with various methods.
- Explore AI's role in cybersecurity.
- Intercept and analyze network traffic.
- Perform attacks without knowing network credentials.
- Execute Man-in-the-Middle (MITM) attacks.
- Detect and prevent ARP poisoning.
- Control client connections on a network.
- Hack devices on the same network.
- Gather key information about networks and connected devices.
- Use 20+ ethical hacking tools like Ettercap, Wireshark, and Aircrack-ng
Requirements:
- Basic IT skills.
- No prior Linux, programming, or hacking knowledge required.
- Computer with a minimum of 4GB RAM.
- Operating System: Windows / macOS / Linux.
- For Wi-Fi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
- An eager and open mind!
Who is this course for?
- Anybody interested in learning ethical hacking and penetration testing.
- Individuals looking to understand how hackers exploit computer systems.
- Those interested in network penetration testing.
- Learners looking for a hands-on tutorial beyond beginner-level concepts.
- Enthusiasts of Kali Linux and general ethical hacking tools.
- Aspiring cybersecurity professionals.
After your purchase:
1) Log in to your Golem Karrierewelt account and click on the relevant order. Then simply click on "view online" and off you go.
2) You will receive an order confirmation after your purchase. Simply click on "View order" to be redirected to the checkout page, which will then show the "To my courses" button. Click on this button and off you go.
3) You can click on this link directly after purchase: "My e-learning courses".
4) Have you used the price advantage and purchased access for multiple people? Please inform all authorized persons that a free Golem Karrierewelt account is required to access the e-learning courses. Those entitled to access will automatically receive an invitation to their account from us and must activate it once to access the courses.
course details:
This course emphasizes hands-on, practical experience while also covering essential theoretical concepts. We'll start by setting up a fully functional lab environment on your system (Windows, Mac OS X, or Linux). As you progress, you'll gain a deep understanding of Linux, computer systems, networks, and the intricacies of how devices communicate. Using this knowledge, you’ll learn to perform powerful attacks that exploit network vulnerabilities.
course content: 8 sections - 50 lessons - 4 hrs. 50 min. total duration
1. Introduction
1.1 Introduction and Course Outline
1.2 Why Learn Network Security!
2. Preparation & Basics
2.1 Network Basics
2.2 Basic Terminology of Ethical Hacking and network Security
2.3 Needed Software
2.4 Installing Virtual Box on your Windows
2.5 Kali Linux installation within a virtual environment
2.6 Install and configure Kali Linux (+PDF)
2.7 Basic Overview Of Kali Linux
2.8 Linux Cmds and more
2.9 Change your MAC Address in KALI
2.10 12-Enable Moniter Mode
2.11 Enable Moniter Mode PART-2
2.12 Enable monier Mode PART-3
3. Pre-Connection Attacks
3.1 Packet Sniffing Basics Using Airodump-ng
3.2 Targeted Packet Sniffing Using Airodump-ng
3.3 Deauthentication Attack (Disconnecting Any Device)
4. Gaining Access - WEP cracking
4.1 Gaining Access Introduction
4.2 Theory Behind Cracking WEP Encryption
4.3 Basic Case
4.4 Associating With Target Network Using Fake Authentication Attack
4.5 Packet Injection - ARP Request Reply Attack
4.6 Packet Injection - Fragmentation Attack
5. Gaining Access - WPAWPA2 cracking
5.1 Introduction to WPA WPA2 Cracking
5.2 Exploiting the WPS Feature
5.3 How to Capture a Handshake
5.4 Cracking the Key Using a Wordlist Attack
5.5 Cracking WPAWPA2 Using Aircrack-ng
5.6 Crack Wifi ( WPA) using FERN Cracker
5.7 How to Configure Wireless Security Settings To Secure Your Network
6. Post-Connection Attacks - MITM
6.1 Post Connection Attacks Introduction
6.2 Discovering Connected Clients using Net Discover
6.3 Gathering More Information Using Zenmap
6.4 ARP Posioning Theory
6.5 ARP Poisoning Using arpspoof
6.6 Performing MITM Attack
6.7 Wireshark - Basic Overview: How To Use It With MITM Attacks
6.8 Use Wireshark For Sniffing Data and Analysing HTTP Traffic
7. Post-Connection Attacks - Gaining full control
7.1 Backdoors and Payloads Basics
7.2 Creating Your Own Payload PART-1
7.3 Creating Your Own Payload PART-2
7.4 Creating Your Own Payload Using VEIL-EVASION PART-3.1
7.5 Creating Your Own Payload Using VEIL-EVASION PART-3.2
7.6 Creting a PAYLOAD using MSF-VENOM
7.7 Deducting The PAYLOAD - VEIL-EVASION
7.8 Detecting ARP Poisoning Attacks
7.9 The WannaCry Ransomware Attack Global Cybersecurity Crisis
7.10 Data Breaches and Cyber Attacks Analyzing Causes Consequences
8. PDF-AI Impact Cybersecurity
8.1 AI Impact on Cybersecurity Jobs
8.2 Finding Jobs in Cybersecurity and Network Security