Pay What You Want: The Complete White Hat Hacker Certification Bundle

20 Reviews
9 Courses
-

Pay What You Want: The Complete White Hat Hacker Certification Bundle

20 Reviews
9 Courses
-

How It Works

Beat the Leader's price and get featured on the Leaderboard!

Beat the average price and you'll take home the entire bundle.

If what you pay is less than the average, you'll still take home something great.

Price locked in for: 15:00
Beat the average price$18.14
Pay what you want

What's Included In This Bundle ($1668) Value

Rootkits & Stealth Apps: Creating & Revealing 2.0
$99.00 ValueRootkits & Stealth Apps: Creating & Revealing 2.0
Hack People, Systems & Mobile Devices
$349.00 ValueHack People, Systems & Mobile Devices
How to Build a $120,000/Year Career as a Web Penetration Tester
$201.00 ValueHow to Build a $120,000/Year Career as a Web Penetration Tester
Website Hacking & Penetration Testing
$200.00 ValueWebsite Hacking & Penetration Testing
Ethical Hacking Using Kali Linux From A to Z
$150.00 ValueEthical Hacking Using Kali Linux From A to Z
From Zero to Hero in Web, Network & WiFi Hacking
$210.00 ValueFrom Zero to Hero in Web, Network & WiFi Hacking
Be A White Hat Hacker & Pentester
$59.00 ValueBe A White Hat Hacker & Pentester
Start Ethical Hacking in 2022
$200.00 ValueStart Ethical Hacking in 2022
Ethical Hacking Mastery in 2022 from Beginner to Advanced
$200.00 ValueEthical Hacking Mastery in 2022 from Beginner to Advanced
JM

Joseph Matassino

$200.00

Leaderboard Champion

Rank
User
Paid
2
FM
Frank Miali
$200.00
3
KS
Kevin Stordal
$50.00
4
GC
Gabriele Cramer-Knebel
$50.00
5
SM
Sven Milstein
$50.00
6
SM
Simon Mitchell
$50.00
7
GL
Gidon Leizer
$50.00
8
OW
Ori White
$36.00
9
nk
norbert knobel
$40.00
10
NW
Nathan Wall
$38.00

Product Details

  • Experience level required: All levels
  • Access 97 lectures & 18 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

97 Lessons (18h)

  • Introduction and Installation!
    Before We Begin!4:43
    Virtual Box Install Tutorial15:37
    Kali Linux Install Tutorial13:57
    Going Full Screen in Kali Linux!18:17
  • Basic Commands!
    Basic Commands Part 19:41
    Basic Commands Part 221:06
    Basic Commands Part 312:48
  • Prepare Your Lab!
    Changing IP address and setting up Wireless Adapter4:53
    Creating Bootable Kali USB5:00
    Important Networking Terms10:18
    Important Hacking Terms18:05
    Few Things to Do After Installing Kali Linux8:32
    Changing Our Mac Address - Macchanger6:27
  • Footprinting!
    Google Hacking13:11
    Nikto Basics10:55
    Whois Tool6:40
    Email Harvesting6:08
    Shodan10:25
    Zone Transfer With Dig7:09
  • Scanning!
    Installing Metasploitable7:00
    Nmap Part 115:34
    Nmap Part 211:43
    Nmap Part 312:25
    Zenmap7:55
    TCP scans15:52
    Nmap Bypassing Defences17:24
    Nmap Scripts 19:30
    Nmap Scripts 214:00
  • Web Penetration Testing!
    Installing Owasp8:27
    HTTP request10:01
    HTTP Response10:30
    Burpsuite Configuration12:51
    Editing Packets in Burpsuite12:21
    Whatweb & Dirb10:12
    Password Recovery Attack15:35
    Burpsuite Login Bruteforce11:06
    Hydra Login Bruteforce8:48
    Session Fixation13:55
    Injection Attacks5:35
    Simple Command Injection11:10
    Exploiting Command Injection Vulnerability7:44
    Finding Blind Command Injection13:46
    Basics Of SQL10:27
    Manual SQL Injection Part 113:17
    Manual SQL Injection Part 221:00
    SQLmap basics16:37
    XML Injection16:00
    Installing XCAT and Preventing Injection Attacks5:53
    Reflected XSS10:52
    Stored XSS12:01
    Changing HTML Code with XSS7:34
    XSSer & XSSsniper13:40
  • WPA2 Cracking
    Wireless Attacks Theory10:52
    Putting Network Card in Monitor Mode4:41
    Capturing Handshake With Airodump14:40
    RockYou.txt14:00
    Cracking with Aircrack15:35
    Cracking with Hashcat15:00
    Making Password Lists With Crunch18:22
    Making Password Lists With Cupp7:12
    Rainbowtables Part 116:36
    Rainbowtables Part 25:40
    Installing Fluxion6:20
    Finding and Cracking Hidden Network8:22
    Preventing Wireless Attacks8:00
  • Man In The Middle
    ARP Protocol Basics10:30
    MITM Attack Theory7:22
    Installing MITMf6:38
    Manual Arpspoofing12:50
    Problems While Installing MITMf6:21
    HTTP Traffic Sniffing8:32
    DNS Spoofing and HTTPS Password Sniffing24:20
    Hooking Browsers With BEEF16:04
    Screenshotting Targets Browser11:03
    Cloning Any Webpage8:56
    Ettercap Basics7:00
  • System Hacking
    MSFconsole Enviroment16:10
    Metasploit Modules Explained12:14
    Bruteforcing SSH with Metasploit15:20
    Attacking Tomcat With Metasploit8:53
    Getting Meterpreter With Command Injection25:08
    PHP Code Injection5:46
    2 Metasploitable Exploits7:00
    Wine installation12:04
    Crafting Windows Payloads With Msfvenom10:04
    Encoders & Hexeditor18:45
    Windows 10 Meterpreter Shell12:01
    Meterpreter Enviroment11:30
    Windows 10 Privilege Escalation11:30
    Preventing Privilege Escalation6:23
    Post Exploitation Modules14:13
    Getting Meterpreter Over Internet With Port Forwarding10:43
    Eternalblue Exploit20:20
    Persistence Module13:19
    Hacking Over Internet With Ngrok10:26
    Android Device Attack With Venom9:55
    Real Hacking Begins Now!2:26
  • Python Basics
    Variables13:45
    Raw_input10:49
    IF ELSE statement10:20
    FOR loop6:33
    WHILE loop8:24
    Python Lists8:07
    Functions14:33
    Classes10:25
    Importing Libraries7:01
    Files in Python11:44
    Try and Except rule5:14
  • Coding Advance Backdoor
    Theory Behind Reverse Shell6:50
    Simple Server Code12:43
    Connection With Reverse Shell7:10
    Sending and Receiving Messages10:49
    Sending Messages With While True Loop7:54
    Executing Commands On Target System9:37
    Fixing Backdoor Bugs & Adding Functions20:10
    Installing Pyinstaller2:26
    First Performance Test of Our Backdoor18:01
    Trying to Connect Every 20 seconds12:26
    Creating Persistence Part 16:12
    Creating Persistence Part 216:50
    Changing Directory11:55
    Uploading & Downloading Files22:32
    Downloading Files From Internet22:45
    Starting Programs From Our Backdoor6:47
    Capturing Screenshot On Target PC18:46
    Embedding Backdoor In Image Part 113:29
    Embedding Backdoor In Image Part 28:40
    Checking For Administrator Privileges12:11
    Adding Help Option8:52
  • Creating Keylogger For Backdoor
    Importing Pynput10:24
    Simple Keylogger10:00
    Adding Report Function10:36
    Writing Keystrokes To a File14:00
    Adding Keylogger To Our Reverse Shell Part 123:01
    Adding Keylogger To Our Reverse Shell Part 27:42
    Final Project Test14:26
  • Basic Authentication Bruteforcer
    Printing Banner11:21
    Adding Available Options11:16
    Starting Threads For Bruteforce8:26
    Making Function To Run The Attack11:05
    Bruteforcing Router Login9:40
    Bypassing Antivirus With All Your Future Programs13:43
    Sending Malware With Spoofed Email15:16
    Whats Next4:15

Ethical Hacking Mastery in 2022 from Beginner to Advanced

JB
Jerry Banfield

Instructor

Jerry Banfield has been an online entrepreneur since 2011, having served hundreds of clients in over 20 countries and managed billions of Facebook ads. He has learned how to drive large amounts of organic Google and YouTube traffic to his website, and teaches online courses sharing his experience with students worldwide. A member of the MENSAsociety, Jerry holds degrees from the University of South Carolina and the University of South Florida.

Description

Ethical hacking is an extremely valuable job skill that continues to grow in demand as more websites and software are created. Ethical hacking is just hacking used for good, to help people secure their websites, their applications, and their online properties. In this beginner to advanced course, you'll start with the absolute basics and work your way up to an advanced section where you'll build your own advanced tools.

  • Access 97 lectures & 18 hours of content 24/7
  • Learn the basics of ethical hacking
  • Code your own command & control center that can receive connections from many PCs
  • Discuss backdoor, keyloggers, & other advanced tools
  • Learn to code in Python & C

Specs

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.