Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,530 --> 00:00:02,670
Hello and welcome.
2
00:00:02,760 --> 00:00:03,690
My name is Zaid
3
00:00:03,780 --> 00:00:09,270
I'm an ethical hacker a computer scientist and I'll be your instructor for this course and this girl
4
00:00:09,270 --> 00:00:12,170
should learn how to become an ethical hacker from scratch.
5
00:00:12,270 --> 00:00:15,250
So will I assume that you have no experience in ethical hacking.
6
00:00:15,300 --> 00:00:19,620
And by the end of it you'll be at a high intermediate level.
7
00:00:19,620 --> 00:00:24,870
The first section of section of this course will teach you how to create your own lab so that you can
8
00:00:24,870 --> 00:00:27,640
practice ethical hacking on your own computer.
9
00:00:27,690 --> 00:00:33,720
You'll learn how to install Linux systems interact with them and set up other systems to try and hack
10
00:00:33,780 --> 00:00:35,180
into them.
11
00:00:35,430 --> 00:00:40,590
Then we're going to move in into our four main penetration testing sections in each of these sections
12
00:00:40,590 --> 00:00:40,620
.
13
00:00:40,620 --> 00:00:44,570
The first thing that you're going to learn is how that particular system works.
14
00:00:44,700 --> 00:00:48,270
And then we're going to learn how to test the security of that system.
15
00:00:48,270 --> 00:00:52,850
So for example on the network penetration testing the first thing you're going to learn is how networks
16
00:00:52,860 --> 00:00:55,080
work how devices interact with each other.
17
00:00:55,170 --> 00:01:00,570
And then you to learn how to try and hack into these devices and into networks surrogate learn how to
18
00:01:00,570 --> 00:01:02,700
control all the connections around you.
19
00:01:02,790 --> 00:01:08,220
You'll learn how to set up a fake access point and the people interconnect into it so you can capture
20
00:01:08,220 --> 00:01:10,470
all the data they send or receive.
21
00:01:10,500 --> 00:01:16,770
You'll also learn how to get the password for any Wi-Fi network whether uses WEP WPA or WPA to encryption
22
00:01:16,770 --> 00:01:17,540
.
23
00:01:17,730 --> 00:01:24,870
You also learn a very large number of powerful attacks which will allow you to gain access to any account
24
00:01:24,900 --> 00:01:27,420
accessed by any computer in your network.
25
00:01:27,480 --> 00:01:34,080
You'll be able to get usernames passwords images pictures anything that computers on your network send
26
00:01:34,200 --> 00:01:34,830
or receive.
27
00:01:34,860 --> 00:01:36,590
You'll be able to capture it.
28
00:01:37,230 --> 00:01:41,100
Once we're done with that section we're going to move into the gaining access section and what you're
29
00:01:41,100 --> 00:01:44,430
going to learn how to gain access to computer systems.
30
00:01:44,460 --> 00:01:50,430
So we're going to learn that now based on two methods server side attacks and client side attacks and
31
00:01:50,430 --> 00:01:55,350
the server side attacks we're going to learn how to discover weaknesses in two programs installed on
32
00:01:55,350 --> 00:02:00,450
the target computer and use those weaknesses to gain full access to that computer.
33
00:02:00,450 --> 00:02:04,530
Then we're going to move into the client side attacks and which we're going to be learning the client
34
00:02:04,530 --> 00:02:11,490
using social engineering create an undetectible doctors or doctors or look like images or pictures.
35
00:02:11,550 --> 00:02:19,110
You'll also learn how to gain access to any computer if that computer exists in your network using fake
36
00:02:19,290 --> 00:02:23,360
updates or using fake downloads.
37
00:02:23,790 --> 00:02:28,320
Once done we're going to move into the post exploitation section in which you're going to learn how
38
00:02:28,320 --> 00:02:31,170
to control the devices that you already have.
39
00:02:31,290 --> 00:02:36,210
So we're going to see how you can open the web cam manage the file systems download or upload files
40
00:02:37,290 --> 00:02:43,110
capture all the keystrokes that the person enters on their keyboard or even use that computer in order
41
00:02:43,110 --> 00:02:45,240
to gain access to other computers.
42
00:02:45,240 --> 00:02:51,300
So again use a computer as a pivot then we're going to move into the last section of our penetration
43
00:02:51,300 --> 00:02:55,860
testing section which is going to be the Web site penetration testing.
44
00:02:55,990 --> 00:03:00,370
You're going to learn how to gather information about Web sites very comprehensive information.
45
00:03:00,450 --> 00:03:06,510
And we're going to see how to discover and exploit a large number of very serious vulnerabilities.
46
00:03:07,110 --> 00:03:11,850
Once done with each of these sections you're going to learn how to protect yourself and how to protect
47
00:03:11,850 --> 00:03:15,600
your systems from the attacks discussed in these sections.
5137
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.