Welcome to our comprehensive Cyber Security and Ethical Hacking
Course where we cover everything from basic fundamentals to
advanced tool usage. Here, you will learn Linux command line
operations, Wireless security, Wi-Fi penetration testing, Packet
analysis, password hacking, and much more. The course instructor,
San Malu, brings years of experience in Cyber Security and Reverse
Engineering to provide a hands-on, practical learning experience. This
course is ideal for beginners with no prior knowledge of Ethical
Hacking and we shall take you from Level Zero to being fully proficient
by the end. We shall start with the basics of Linux command line,
including regular and root user operations to modify files, create and
install applications, and even guide you on installing Kali Linux if its
not present on your system. Then, we dive into Wi-Fi security detailing
steps for Wi-Fi penetration testing and how to defend against Wi-Fi
attacks.
Being hands-on learners, practical exercises with South Linux will be
conducted using a variety of tools including Wi-shark, and we will
cover Wire Shark in-depth also known as MapWire or Shark. This
includes various ways to view the frames and packets and how to
identify threats. As a part of the course, we will also demonstrate how
to capture a four-way handshake for password cracking and discuss
defenses against MITM Man In The Middle attacks and Performace
attacks.
The next part of the course will expand the warning signs of a Man-In
The Middle, Capture the Flag and dangerous threats like DNS
Hijacking and Ransomware Attacks. We also cover different Risk
Assessments, Threats, Exploit write up, and Flash Drive Triage. This
segment will cover securing WiMAX, MEMS, IP that is IP metric, WPS
Wi-Fi Protected Access, and WPA-PSK Wi-Fi Protected Sensitive Key.
Course where we cover everything from basic fundamentals to
advanced tool usage. Here, you will learn Linux command line
operations, Wireless security, Wi-Fi penetration testing, Packet
analysis, password hacking, and much more. The course instructor,
San Malu, brings years of experience in Cyber Security and Reverse
Engineering to provide a hands-on, practical learning experience. This
course is ideal for beginners with no prior knowledge of Ethical
Hacking and we shall take you from Level Zero to being fully proficient
by the end. We shall start with the basics of Linux command line,
including regular and root user operations to modify files, create and
install applications, and even guide you on installing Kali Linux if its
not present on your system. Then, we dive into Wi-Fi security detailing
steps for Wi-Fi penetration testing and how to defend against Wi-Fi
attacks.
Being hands-on learners, practical exercises with South Linux will be
conducted using a variety of tools including Wi-shark, and we will
cover Wire Shark in-depth also known as MapWire or Shark. This
includes various ways to view the frames and packets and how to
identify threats. As a part of the course, we will also demonstrate how
to capture a four-way handshake for password cracking and discuss
defenses against MITM Man In The Middle attacks and Performace
attacks.
The next part of the course will expand the warning signs of a Man-In
The Middle, Capture the Flag and dangerous threats like DNS
Hijacking and Ransomware Attacks. We also cover different Risk
Assessments, Threats, Exploit write up, and Flash Drive Triage. This
segment will cover securing WiMAX, MEMS, IP that is IP metric, WPS
Wi-Fi Protected Access, and WPA-PSK Wi-Fi Protected Sensitive Key.