Uthena is completely renewed!

Sign up and sell your own courses with PLR licenses learn more

Discover our newest courses view courses

Thinkific  |  SKU: UTSTA812THICOU25

Start White Hat Hacking in 2019!

An ethical hacking course for beginners taking you from wondering what hackers do to setting up a lab, learning Kali Linux, and conducting your own penetration testing!

$37.81

License Type

Choose for a PLR license and you can modify the course to your needs ánd retain 100% of revenue when you sell the course.

About Thinkific

Curriculum

1. Introduction to Ethical Hacking! What is it?
- Introduction
- Why learn hacking

2. Setting Up the Lab Environment
- Lab Introduction
- Installing Kali Linux Using a Pre-Built Image
- Installing Kali Linux Using an ISO Image
- Installing Windows
- Installing Metasploitable
- How To Create Snapshots

3. Kali Linux Basics
- Kali Linux Overview
- Terminal & Basic Linux Commands
- Updating Source List & Installing Programs

4. Network Penetration Testing
- Network Penetration Testing Introduction
- How Networks work
- Connecting A Wireless Adapter
- Changing MAC addresses
- Wireless Monitor Modes & How to Change Them

5. Network Penetration Testing - Pre Connection Attacks
- Packet Sniffing Using Airodump-ng1
- Targeted Packet Sniffing Using Airodump-ng1
- De-authentication Attack (Disconnecting Any Device From A Network)
- Creating a Fake Access Point - Theory
- Creating a Fake Access Point - Practical

6. Network Penetration Testing - Gaining Access To Networks
- Gaining Access to the Networks Introduction
- Cracking WEP Encryption - Theory
- Cracking WEP Encryption (Basic Case)
- Cracking WEP Encryption (Fake Authentication)
- Cracking WEP Encryption (ARP Replay Attack)
- Cracking WPA & WPA2 Encryption (Exploiting WPS) - Theory
- Cracking WPA & WPA2 Encryption (Exploiting WPS) - Practical
- Cracking WPA & WPA2 Encryption (Using Wifite)
- Cracking WPA & WPA2 Encryption (Capturing Handshake) - Theory
- Cracking WPA & WPA2 Encryption (Capturing Handshake) - Practical
- Creating a Wordlist Using Crunch
- Launching a Wordlist Attack To Crack WPA & WPA2 Password
- Securing Yourself From Above Attacks

7. Network Penetration - Post Connection Attacks
- Introduction to Post Connection Attacks
- Gathering Information Using Netdiscover
- Introduction To nmap & How To Use It
- Network Scanning Using nmap
- Network Scanning Using Zenmap
- MITM Attack - ARP Poisoning (Theory)
- MITM Attack - ARP Poisoning Using arpspoof
- MITM Attack - ARP Poisoning Using MITMf
- Bypassing HTTPS Using MITMf
- Session Hijacking & Stealing Cookies
- DNS Spoofing Using MITMF
- Capturing Keystrokes & Running Any Code On Target's Browser
- Launching MITM Attacks In A Real Environment
- Basic Overview Of Wireshark
- Capturing & Analysing Packets Using Wireshark
- Reading Usernames Passwords & Cookies From Packet Capture

8. Network Penetration - Detection & Security
- Detecting ARP Poisoning Attacks
- Detecting Suspicious Activities Using Wireshark

9. Gaining Access to Computers - Server Side Attacks
- Introduction to Gaining Access To Computers
- Introduction to Server Side Attacks
- Information Gathering & Exploiting a Misconfiguration
- Using a Public Exploit To Hack Into a Server
- Exploiting a Remote Code Execution Vulnerability
- Installing & Setting Up Metasploit Community
- Initializing A Scan Using Metasploit Community
- Analyzing Scan Results & Exploiting Vulnerabilities
- Installing & Setting Up Nexpose
- Initializing a Scan Using Nexpose

Payment & Security

Payment methods

  • American Express
  • Apple Pay
  • Google Pay
  • Maestro
  • Mastercard
  • Shop Pay
  • Union Pay
  • Visa

Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.

Start White Hat Hacking in 2019!

Would you like to learn what hackers do to setting up a lab, learn Kali Linux and conduct your own penetration testing because this will help you level up your cyber security and ethical hacking career?

In this course you will learn:

Introduction to Ethical Hacking! What is it?
Setting Up the Lab Environment
Kali Linux Basics
Network Penetration Testing
Network Penetration Testing - Pre Connection Attacks
Network Penetration Testing - Gaining Access To Networks
Network Penetration - Post Connection Attacks
Network Penetration - Detection & Security
Gaining Access to Computers - Server Side Attacks

This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!

Course curriculum

1. Introduction to Ethical Hacking! What is it?
- Introduction
- Why learn hacking

2. Setting Up the Lab Environment
- Lab Introduction
- Installing Kali Linux Using a Pre-Built Image
- Installing Kali Linux Using an ISO Image
- Installing Windows
- Installing Metasploitable
- How To Create Snapshots

3. Kali Linux Basics
- Kali Linux Overview
- Terminal & Basic Linux Commands
- Updating Source List & Installing Programs

4. Network Penetration Testing
- Network Penetration Testing Introduction
- How Networks work
- Connecting A Wireless Adapter
- Changing MAC addresses
- Wireless Monitor Modes & How to Change Them

5. Network Penetration Testing - Pre Connection Attacks
- Packet Sniffing Using Airodump-ng1
- Targeted Packet Sniffing Using Airodump-ng1
- De-authentication Attack (Disconnecting Any Device From A Network)
- Creating a Fake Access Point - Theory
- Creating a Fake Access Point - Practical

6. Network Penetration Testing - Gaining Access To Networks
- Gaining Access to the Networks Introduction
- Cracking WEP Encryption - Theory
- Cracking WEP Encryption (Basic Case)
- Cracking WEP Encryption (Fake Authentication)
- Cracking WEP Encryption (ARP Replay Attack)
- Cracking WPA & WPA2 Encryption (Exploiting WPS) - Theory
- Cracking WPA & WPA2 Encryption (Exploiting WPS) - Practical
- Cracking WPA & WPA2 Encryption (Using Wifite)
- Cracking WPA & WPA2 Encryption (Capturing Handshake) - Theory
- Cracking WPA & WPA2 Encryption (Capturing Handshake) - Practical
- Creating a Wordlist Using Crunch
- Launching a Wordlist Attack To Crack WPA & WPA2 Password
- Securing Yourself From Above Attacks

7. Network Penetration - Post Connection Attacks
- Introduction to Post Connection Attacks
- Gathering Information Using Netdiscover
- Introduction To nmap & How To Use It
- Network Scanning Using nmap
- Network Scanning Using Zenmap
- MITM Attack - ARP Poisoning (Theory)
- MITM Attack - ARP Poisoning Using arpspoof
- MITM Attack - ARP Poisoning Using MITMf
- Bypassing HTTPS Using MITMf
- Session Hijacking & Stealing Cookies
- DNS Spoofing Using MITMF
- Capturing Keystrokes & Running Any Code On Target's Browser
- Launching MITM Attacks In A Real Environment
- Basic Overview Of Wireshark
- Capturing & Analysing Packets Using Wireshark
- Reading Usernames Passwords & Cookies From Packet Capture

8. Network Penetration - Detection & Security
- Detecting ARP Poisoning Attacks
- Detecting Suspicious Activities Using Wireshark

9. Gaining Access to Computers - Server Side Attacks
- Introduction to Gaining Access To Computers
- Introduction to Server Side Attacks
- Information Gathering & Exploiting a Misconfiguration
- Using a Public Exploit To Hack Into a Server
- Exploiting a Remote Code Execution Vulnerability
- Installing & Setting Up Metasploit Community
- Initializing A Scan Using Metasploit Community
- Analyzing Scan Results & Exploiting Vulnerabilities
- Installing & Setting Up Nexpose
- Initializing a Scan Using Nexpose

About the instructor

What can you do with PLR/MRR license for Start White Hat Hacking in 2019!

  • Private Label Right License (PLR)

    With a PLR license for the course: Start White Hat Hacking in 2019! you can do several things. The main benefits include the option to modify the content, as well as selling the course and keeping the income for yourself.

    [YES] Product may be sold separately
    [YES] Product may be bundled with other products
    [YES] Product can be a bonus for another product
    [YES] Can be added to paid membership sites
    [YES] Can add bonuses to the Product for sale
    [YES] Can be sold as a physical product
    [YES] Can be sold as a digital product
    [YES] You may put your own name on the sales letter
    [YES] You may rename the product
    [YES] You may edit the sales material
    [YES] You may edit the content of the product
    [YES] You may use the source code/material to create new products
    [YES] You may use the name(s) of the author/creator/seller of the Product
    [YES] Can translate the course into other languages
    [YES] Can be used to build a list

    [NO] Can offer Resale Rights
    [NO] Can be used for YouTube or other free video sites
    [NO] Can be added to free membership sites
    [NO] Can be given away for free
    [NO] Can be used or sold on Uthena
    [NO] Can be used or sold on Udemy, Skillshare, or other course platforms you don't own
    [NO] Can offer Master Resale Rights
    [NO] Can offer Private Label Rights

  • Master Resell Rights License (MRR)

    With a MRR license for the course: Start White Hat Hacking in 2019! you can do several things. The main benefit compared to a PLR license include the option to offer resell rights.

    [YES] Product may be sold separately
    [YES] Product may be bundled with other products
    [YES] Product can be a bonus for another product
    [YES] Can be added to paid membership sites
    [YES] Can add bonuses to the Product for sale
    [YES] Can be sold as a physical product
    [YES] Can be sold as a digital product
    [YES] You may put your own name on the sales letter
    [YES] You may rename the product
    [YES] You may edit the sales material
    [YES] You may edit the content of the product
    [YES] You may use the source code/material to create new products
    [YES] You may use the name(s) of the author/creator/seller of the Product
    [YES] Can translate the course into other languages
    [YES] Can be used to build a list
    [YES] Can offer Resale Rights

    [NO] Can be used for YouTube or other free video sites
    [NO] Can be added to free membership sites
    [NO] Can be given away for free
    [NO] Can be used or sold on Uthena
    [NO] Can be used or sold on Udemy, Skillshare, or other course platforms you don't own
    [NO] Can offer Master Resale Rights
    [NO] Can offer Private Label Rights