Get $1 credit for every $25 spent!

The 2022 Premium Certified Ethical Hacker Certification Bundle

Ending In:
Add to Cart - $34.99
Add to Cart ($34.99)
$2,000
98% off
wishlist
Courses
10
Lessons
961
Enrolled
379

What's Included

Product Details

Access
Lifetime
Content
19.0 hours
Lessons
105

Certified Ethical Hacker Bootcamp

Get a Hands-On Hacking Education & Break Into a Booming Industry

By Joseph Delgadillo | in Online Courses

This course was designed for information security professionals who wish to become certified and move on to a career as a professional pentester. Here, you'll not only get study materials but gain insight into the day-to-day workflow of an ethical hacker. Through live hacking demonstrations, a blueprint for conducting your penetration test, and lessons on how to think like a hacker, you'll get everything you need to break into this lucrative career.

  • Access 105 lectures & 19 hours of content 24/7
  • Discuss hacking terminology
  • Understand the difference between passive & active reconnaissance
  • Learn about scanning & enumeration, networking mapping, social engineering basics, and more
  • Explore Windows & Linux hacking
  • Cover website cloning, anti-virus evasion, credential harvesting, & more
  • Get hacking demonstrations w/ tools like Maltego, FOCA, Harvester, Recon-ng, Nmap, Wireshark, Scapy, & more

Joseph Delgadillo | Best-Selling Instructor

4.3/5 Instructor Rating: ★ ★ ★ ★

Joseph Delgadillo teaches skills ranging from computers and technology to entrepreneurship and digital marketing. He produces valuable educational resources for students who wish to learn skills related to information technology, network security, programming languages, and much more. Take a course with him for a practical, down-to-earth approach to learning and to get an over-the-shoulder view of how experts are successful in their respective fields.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Your First Program
  • Introduction to Ethical Hacking
    • What is an ethical hacker? - 7:22
    • Terminology crash course pt.1 - 9:24
    • Terminology crash course pt.2 - 13:29
    • Terminology crash course pt.3 - 8:25
    • Confidentiality, integrity, and availability - 13:18
    • Legal considerations - 11:29
    • Section 1 Powerpoint
  • Reconnaissance: Surveying the Attack Surface
    • Surveying the attack surface - 10:24
    • Recon types - 7:44
    • Passive recon pt.1 - 7:21
    • Passive recon pt.2 - 10:02
    • Active recon - 15:01
    • Recon walk-through and tools summary - 14:08
    • Section 2 Powerpoint
    • DEMO - Maltego real world example - 7:04
    • DEMO - FOCA to examine metadata - 4:57
    • DEMO - Harvester - 2:02
    • DEMO - Information collection using Recon-ng - 6:24
  • Scanning and Enumeration: Getting Down to Business
    • Scanning & enumeration - 8:10
    • Identifying active hosts pt.1 - 9:45
    • Identifying active hosts pt.2 - 13:17
    • Identifying active services - 18:23
    • OS and services fingerprinting - 14:41
    • Network mapping - 9:46
    • Final thoughts - 11:04
    • Section 3 Powerpoint
    • DEMO - Nmap syntax pt.1 - 14:21
    • DEMO - Nmap syntax pt.2 - 15:32
    • DEMO - Nmap hosts discovery - 12:19
    • DEMO - Nmap service discovery - 17:10
    • DEMO - Nmap scripts - 11:17
    • DEMO - masscan - 10:57
  • Network Presence
    • Network insecurity - 4:01
    • Sniffing and spoofing - 12:45
    • Sniffing tools - 8:57
    • Spoofing, crypto, and wifi - 15:00
    • Section 4 Powerpoint
    • DEMO - tcpdump - 10:53
    • DEMO - Wireshark - 11:24
    • DEMO - Ettercap - 12:55
    • DEMO - SSL Burp Suite - 15:12
    • DEMO - Scapy - 10:15
  • Attacking
    • Security overview windows architecture - 17:51
    • Security overview credentials security - 15:32
    • Security overview memory corruption and exploitation - 15:31
    • Windows hacking basics - 20:08
    • Local access and privilege escalation - 20:13
    • Dumping hashes and cracking passwords - 18:12
    • Linux attacking basics pt.1 - 12:44
    • Linux attacking basics pt.2 - 13:50
    • References - 5:25
    • Section 5 Powerpoint
    • DEMO - Windows msf exploit pt.1 - 13:05
    • DEMO - Windows msf exploit pt.2 - 15:20
    • DEMO - Post exploitation - 13:13
    • DEMO - Mimikatz - 7:09
    • DEMO - Dumping hashes - 3:23
    • DEMO - Hashcat - 8:21
    • DEMO - Konboot - 12:57
    • DEMO - Post exploitation Windows cmd - 14:08
    • DEMO - Post exploitation Windows powershell - 13:09
    • DEMO - Online password cracking pt.1 - 14:51
    • DEMO - Online password cracking pt.2 - 12:02
    • DEMO - Attacking Linux targets pt.1 - 10:07
    • DEMO - Attacking Linux targets pt.2 - 12:35
  • Web Hacking
    • Introduction to web hacking - 2:47
    • Web security architecture overview pt.1 - 16:40
    • Web security architecture overview pt.2 - 12:20
    • Attacking the web server pt.1 - 10:28
    • Attacking the web server pt.2 - 10:59
    • Attacking the platform pt.1 - 18:33
    • Attacking the platform pt.2 - 8:13
    • Attacking the technology pt.1 - 21:00
    • Attacking the technology pt.2 - 17:20
    • OWASP top 10 pt.1 - 9:21
    • OWASP top 10 pt.2 - 21:12
    • Attacking the business logic pt.1 - 10:37
    • Attacking the business logic pt.2 - 15:07
    • Tools and methodology - 20:15
    • References - 7:41
    • Section 6 Powerpoint
    • DEMO - OWASP Mutillidae - 8:50
    • DEMO - SQL injection - 7:04
    • DEMO - SQLMAP intro - 8:21
    • DEMO - SQLMAP practice - 25:04
    • DEMO - Burpsuite - 37:03
    • DEMO - Burpsuite xsshunter - 16:12
    • DEMO - mitmproxy - 10:27
    • DEMO - Skipfish pt.1 - 4:30
    • DEMO - Skipfish pt.2 - 4:29
  • Social Engineering: Hacking Humans
    • Social engineering basics - 14:41
    • Social engineering methods - 15:44
    • Tools and techniques pt.1 - 14:35
    • Tools and techniques pt.2 - 11:49
    • Tools and techniques pt.3 - 9:04
    • Physical security considerations - 12:53
    • Final thoughts - 5:15
    • Section 7 Powerpoint
    • DEMO - Social engineering intro - 10:43
    • DEMO - Social engineering toolkit prep - 9:01
    • DEMO - Credential harvesting - 2:06
    • DEMO - Website cloning - 6:19
    • DEMO - Automating an attack - 2:59
    • DEMO - Antivirus evasion pt.1 - 8:17
    • DEMO - Antivirus evasion pt.2 - 11:43

View Full Curriculum


Access
Lifetime
Content
8.0 hours
Lessons
104

Free Tools for Penetration Testing & Ethical Hacking

Wireshark, Nmap, Metasploit & Maltego: Learn Hackers' Tools on Web Hacking, Network Scanning and Password Cracking

By Oak Academy | in Online Courses

This course is expertly designed to teach everyone from complete beginners right through to pro hackers. You'll go from beginner to extremely high-level, and I will take you through each step with hands-on examples. It covers the web’s favorite ethical hacking / pen-testing hacker tools as used by hackers, geeks, ethical hackers, and security engineers (as well as black hat hackers). You will learn the theory, background, and trendy free tools used to leverage the most updated attacks in the hacking world with real-world examples and demos.

4.2/5 average rating: ★ ★ ★ ★

  • Access 104 lectures & 8 hours of content 24/7
  • Set up the laboratory
  • Discover network scanning tools
  • Get to know tools for vulnerability scan, exploitation, & password cracking
  • Know the tools to gather information over the internet
  • Learn hackers' tools for web app hacking, social engineering, phishing, & network layer attacks

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Web & Mobile Development, IOS, Android, Ethical Hacking, IT

4.5/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction & Setup the Laboratory
    • 1 - Introduction - 0:44
    • 2 - Setting Up the Laboratory - 0:40
    • 3 - Virtual Platforms - 1:29
    • 4 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 5 - Lab's Architecture Diagram - 1:29
    • 6 - Using VirtualBox vs VMware
    • 7 - Install & Run Oracle VM VirtualBox - 5:02
    • 8 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 9 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 10 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 11 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 12 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 13 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 14 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 15 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 16 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 17 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 18 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 19 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 20 - Set Up a Victim: Metasploitable Linux - 3:12
    • 21 - Set Up a Victim: OWASP Broken Web Applications - 5:24
    • 22 - Free MS Windows Virtual Machines in VMware Fusion - 5:54
    • 23 - Free MS Windows Virtual Machines in Oracle VM VirtualBox - 2:55
    • 24 - Set Up a Victim: Windows Systems - 0:59
    • 25 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
    • 26 - Check the network: Be sure if VMs can see each other - 2:58
  • Network Scan Tools - Part I
    • 27 - Wireshark: Sniffing the Network Traffic - 8:32
    • 28 - Wireshark: Following a Stream - 2:43
    • 29 - Wireshark: Summarise the Network - 6:23
    • 30 - Introduction to TCPDump - 5:26
    • 31 - TCPDump in Action - 9:02
    • 32 - Hping for Active Scan and DDoS Attacks - 7:53
  • Network Scan Tools - NMAP
    • 33 - Introduction to Nmap - 4:12
    • 34 - Ping Scan to Enumerate Network Hosts - 5:02
    • 35 - Introduction to Port Scan - 1:12
    • 36 - SYN Scan - 6:09
    • 37 - Port Scan Details - 8:15
    • 38 - TCP Scan - 7:15
    • 39 - UDP Scan - 4:15
    • 40 - Version Detection - 6:42
    • 41 - Operating System Detection - 6:02
    • 42 - Input & Output Management in Nmap - 8:31
    • 43 - Introduction to Nmap Scripting Engine (NSE) - 3:16
    • 44 - Nmap Scripting Engine: First Example - 7:47
    • 45 - Nmap Scripting Engine: Second Example - 2:24
    • 46 - Some Other Types of Scans: XMAS, ACK, etc. - 2:55
    • 47 - Idle (Stealth) Scan - 7:47
  • Vulnerability Scan Tool: Nessus
    • 48 - Nessus: Introduction - 1:57
    • 49 - Nessus® Home vs Nessus® Essentials
    • 50 - Download Nessus - 5:35
    • 51 - Install & Setup Nessus - 3:41
    • 52 - Download & Install Nessus - 1:40
    • 53 - Creating a Custom Policy - 5:42
    • 54 - Scanning - 7:01
    • 55 - Reporting - 2:25
  • Exploitation Tool: Metasploit Framework (MSF)
    • 56 - Introduction to MSF Console - 2:15
    • 57 - MSF Console: Search Function & Ranking of the Exploits - 3:34
    • 58 - MSF Console: Configure & Run an Exploit - 7:51
    • 59 - Meeting with Meterpreter - 3:01
    • 60 - Meterpreter Basics on Linux - 8:26
    • 61 - Meterpreter Basics on Windows - 5:41
  • Post-Exploitation Tool: Metasploit Framework (MSF)
    • 62 - Meterpreter for Post-Exploitation - 1:29
    • 63 - Incognito Extension of Meterpreter - 3:28
    • 64 - Mimikatz in Meterpreter - 3:57
    • 65 - Post Modules of Metasploit Framework (MSF) - 2:05
    • 66 - Managing Post Modules of MSF - 6:55
  • Password Cracking Tools
    • 67 - Hydra: Cracking the Password of a Web App - 10:17
    • 68 - Hydra: Online SSH Password Cracking - 6:28
    • 69 - Cain and Abel: Install & Run - 3:48
    • 70 - Cain and Abel: Gathering Hashes - 4:43
    • 71 - Cain & Abel: A Dictionary Attack - 8:58
    • 72 - Cain & Abel: A Brute Force Attack - 3:36
    • 73 - John the Ripper - 7:32
  • Information Gathering Over the Internet Tools
    • 74 - SearchDiggity: A Search Engine Tool - 3:18
    • 75 - Shodan - 2:54
    • 76 - FOCA: Fingerprinting Organisations with Collected Archives - 7:26
    • 77 - The Harvester & Recon-NG - 3:26
    • 78 - Maltego - Visual Link Analysis Tool - 4:41
  • Web App Hacking Tools
    • 79 - Burp Suite: Intercepting the HTTP Traffic - 3:48
    • 80 - Burp Suite: Intercepting the HTTPS Traffic - 2:52
    • 81 - Zed Attack Proxy (ZAP): A Web App Vulnerability Scanner - 3:06
    • 82 - ZAP: Installation & Quick Scan - 6:29
    • 83 - ZAP: As a Personal Proxy - 4:44
    • 84 - ZAP: Intercepting the HTTPS Traffic - 2:21
    • 85 - ZAP: An Advanced Scan - Scanning a Website that Requires to Login - 14:49
    • 86 - SQLMap: Leveraging an SQL Injection Exploit - 10:05
  • Social Engineering and Phishing Tools
    • 87 - Veil: Introduction - 2:33
    • 88 - Veil: In Action - 5:16
    • 89 - FatRat: Introduction - 4:23
    • 90 - FatRat: In Action - 11:11
    • 91 - Empire Project: Installation - 4:10
    • 92 - Empire in Action - Part I - 8:11
    • 93 - Empire in Action - Part II - 4:23
    • 94 - Social Engineering Toolkit (SET) for Phishing - 6:31
  • Network Layer & Layer-2 Attacks Tools
    • 95 - GNS3: Let's Create Our Network - Download & Install - 3:22
    • 96 - GNS3: Setting Up the First Project - 8:01
    • 97 - GNS3: Tool Components - 3:00
    • 98 - GNS3: Building the Network - 15:44
    • 99 - GNS3: Attaching VMware VMs (Including Kali) to the Network - 6:31
    • 100 - GNS3: Configuring Switch & Router (Cisco) and creating VLANs - 5:14
    • 101 - Macof for MAC Flood - 7:13
    • 102 - Ettercap for ARP Cache Poisoning - 14:15
    • 103 - Yersinia for DHCP Starvation - 10:19
    • 104 - Thank You! - 0:08

View Full Curriculum


Access
Lifetime
Content
4.0 hours
Lessons
59

Ethical Hacking: Network Scan by Nmap & Nessus

Discover Networks & Check Devices with Vulnerabilities by Using Nmap

By Oak Academy | in Online Courses

To be able to perform successful penetration testing or ethical hacking. First, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding with an ethical hacking operation. In this course, you`ll discover the secrets of ethical hacking and network discovery using Nmap. You’ll learn all the Nmap details, which is the most known and de facto network scanning tool. Then in further lessons, you’ll scan the vulnerabilities of the network you discovered by using Nessus. Nessus is the most known vulnerability scanner and is in third place among the most popular cybersecurity tools.

4.2/5 average rating: ★ ★ ★ ★

  • Access 59 lectures & 4 hours of content 24/7
  • Understand the main terminology of Network Scanning & Finding Vulnerabilities in devices in a network
  • Use Nmap with full knowledge & experience
  • Scan a network for scripts
  • Learn about networking scan types
  • Learn how to use Nmap

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Web & Mobile Development, IOS, Android, Ethical Hacking, IT

4.5/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • 1 - Introduction - 0:42
    • 2 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 3 - Lab's Architecture Diagram - 1:29
    • 4 - Using VirtualBox vs VMware
    • 5 - Install & Run Oracle VM VirtualBox - 5:02
    • 6 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 7 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 8 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 9 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 10 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 11 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 12 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 13 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 14 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 15 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 16 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 17 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 18 - Free Windows Operating Systems on VMware Fusion - 5:54
    • 19 - Free Windows Operating Systems on Oracle VM VirtualBox - 2:55
    • 20 - Windows Systems as Victim - 0:59
    • 21 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
  • Scan Types
    • 22 - Scan Types Definitions: Active Scan & Passive Scan - 2:50
    • 23 - Passive Scan - Wireshark - 6:37
    • 24 - Passive Scan - ARP Tables - 6:20
    • 25 - Active Scan - 8:30
  • Nmap Introduction & Basics
    • 26 - Nmap Introduction - 4:14
    • 27 - TCP/IP Basics - Layers and Protocols - 9:26
    • 28 - TCP/IP Basics - An Example: DNS Query - 5:19
    • 29 - TCP/UDP Basics - 7:11
  • Nmap in Action - 1 : Scan Types
    • 30 - Ping Scan - 4:59
    • 31 - SYN Scan - 7:31
    • 32 - Port Scan - 8:15
    • 33 - TCP Scan - 7:11
    • 34 - UDP Scan - 4:11
  • Nmap in Action - 2 : Detection & Management
    • 35 - Version Detection - 7:10
    • 36 - Operating System Detection - 5:58
    • 37 - Input-Output Management - 8:28
    • 38 - Lab Exercise - 1 - 0:49
  • Nmap in Action - 3 : Script Scanning
    • 39 - Introduction - 3:40
    • 40 - First Script Example - 7:43
    • 41 - Second Script Example - 2:21
    • 42 - Third Script Example - 2:48
    • 43 - Nmap Aggressive Scan
  • Nmap in Action - 4 : Timing and IPS/IVS Evasion
    • 44 - Bypassing IPS/IDS Devices - 6:07
    • 45 - Timing - 5:45
  • Nmap in Action - 5 : Some Other Scans
    • 46 - NULL, FIN, XMAS and ACK Scan - 2:55
    • 47 - Idle Scan - 7:44
  • Vulnerability Scan and Introduction to Nessus
    • 48 - Introduction to Vulnerability Scan - 9:29
    • 49 - Nessus® Home vs Nessus® Essentials
    • 50 - Introduction to Nessus - 1:57
    • 51 - Downloading Nessus - 1:40
    • 52 - Installing Nessus - 3:41
  • Nessus in Action
    • 53 - Creating Policy - 5:39
    • 54 - Scanning - 7:06
    • 55 - Reporting - 2:20
    • 56 - Lab Exercise - 2 - 2:47
    • 57 - An Aggressive Scan with Nessus: Start - 4:23
    • 58 - An Aggressive Scan with Nessus: Results - 7:17
    • 59 - An Aggressive Scan with Nessus: Results with Windows Targets - 2:45

View Full Curriculum


Access
Lifetime
Content
14.0 hours
Lessons
17

EC-Council Certified Ethical Hacker - CEH v11

Learn How to Become an Ethical Hacker with All Essential Skills & Hands-on Tools

By Mohamed Atef | in Online Courses

This course covers the Certified Ethical Hacker CEH v11 is a Beginner Level Cyber Security Certification, a well-known universal certification being issued by EC-COUNCIL world wide. It is also the in-demand certification by most of the famous organizations. Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques and methodologies used by hackers and information security professionals to lawfully hack an organization.

  • Access 17 lectures & 14 hours of content 24/7
  • Emerging Attack Vectors
  • Operation Technology
  • Hacking Web Applications
  • Cloud Computing
  • Modern Exploit Technologies
  • Modern Case Studies
  • Enhanced Focus on Malware Analysis and Reverse Engineering
  • Thousands of Techniques, Tricks, Tools, & More

Mohamed Atef | ICT Consultant, Senior Penetration Tester


Mohamed Atef is an ICT Consultant, Senior Penetration testing, and certified instructor with more than 20 years of experience delivering professional and academic courses and 2 books published.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • First Section
    • Module 01 - Introduction to Ethical Hacking - 20:26
    • Module 02 - Footprinting and Reconnaissance - 36:52
    • Module 03 - Scanning Networks - 51:48
    • Module 05 - Vulnerability Analysis - 41:24
    • Module 06 - System Hacking - 140:54
    • Module 08 - Sniffing - 43:22
    • Module 09 - Social Engineering - 23:19
    • CEH v11 - 020 - 40:37
    • Module 10 - Denial-of-Service - 33:50
    • Module 11 - Session Hijacking - 34:39
    • Module 12 - Evading IDS, Firewalls and Honeypots - 73:51
    • Module 13 - Hacking Web Servers - 33:29
    • Module 14 - Hacking Web Applications - 117:16
    • Module 16 - Hacking Wireless Networks - 59:44
    • Module 17 - Hacking Mobile Platforms - 39:55
    • Module 18 - IoT and OT Hacking - 36:50
    • Module 19 - Cloud Computing - 41:46

View Full Curriculum


Access
Lifetime
Content
20.0 hours
Lessons
237

Hacking in Practice: Certified Ethical Hacking MEGA Course

Explore Today's Cyber Threats & Shut Them Down with 20+ Hours of Practical Training

By IT Security Academy | in Online Courses

With a few lines of code, cybercriminals can access protected networks, view encrypted files, and even steal identities online—if there's not an ethical hacker standing in their way. This extensive course contains over 20 hours of practical training designed to help you thwart these criminals as a certified professional. You'll start with an introduction to cyber threats and IT security myths. Then you'll move on to security policies, risk management, disaster recovery, and even get a free voucher for the ISA CISS examination when you complete the course, setting you up to validate your skills right away.

4.5/5 average rating: ★ ★ ★ ★

 

  • Access 237 lectures & 20 hours of content 24/7
  • Follow step-by-step instructions for advanced hacking techniques
  • Familiarize yourself with current cyber threats & hacking trends
  • Explore designing more secure networks
  • Dive into encrypted data, identify spoofing, & windows authorization

IT Security Academy | IT Security Certified Professionals

4.0/5 Instructor Rating: ★ ★ ★ ★


IT Security Academy is a company that associates with IT Security Professionals. Now it's proud to share its knowledge online. Certified experts (MCSE: MS, CISSP, CEH) have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction to cyber threats
    • Introduction to Current Cyber Threats - 4:46
    • IT Prehistory - 4:41
    • Let’s look a few years back - 4:42
    • Cyber crimes – an evolution not revolution - 4:25
    • Current Cyber Threats – notes for the examination
  • IT security popular myths
    • Popular myths about IT security – origins - 5:33
    • Myths #1 – you’ll never be hacked - 5:55
    • Myths #2 – you don’t need any protection software or hardware - 5:11
    • Myths #3 – IT security is always a priority - 1:13
    • Popular Myths About Computer System Security – notes for the examination
  • IT security trends
    • Trends in IT Security - 3:44
    • The birth of technology society - 3:16
    • EXERCISE: How much info can you gather? - 3:59
    • Fake identity - 5:03
    • Online privacy - 6:14
    • Analyzing sniffing software - 3:33
    • Cyber War - 8:23
    • Changing IT Security Trends – notes for the examination
  • Data security
    • Objective #1 – Data security – Introduction - 6:58
    • Confidentiality of data - 5:33
    • EXERCISE: Finding confidential data with search engines - 6:05
    • Integrity of data - 7:04
    • Data security – notes for the examination
  • Security policies
    • Security policies – introduction - 1:56
    • What is security? - 3:53
    • Information security - 4:13
    • Information security – level up - 4:04
    • Security issues - 4:50
    • Why are security solutions fallible? - 5:42
    • Security policy issues - 4:50
    • Introduction to threat modelling and classification - 5:14
    • Threat modelling – STRIDE - 4:06
    • STRIDE: Spoofing identity - 5:03
    • STRIDE: Tampering with data - 4:28
    • STRIDE: Denial of Service - 3:51
    • Threat Modelling and Classification – notes for the examination
  • Risk management
    • Introduction to Risk Management - 1:27
    • Attack Methods - 6:42
    • Local attacks - 2:56
    • Target scanning and enumeration techniques #1 - 5:52
    • Target scanning and enumeration techniques #2 - 3:30
    • Passive scanning - 5:36
    • Attack Methodologies – notes for the examination
    • Introduction to risk assessment - 6:20
    • DREAD: Risk assessment model - 4:50
    • DREAD: Exploitability - 5:24
    • EXERCISE: Risk Assessment - 7:17
    • Risk Assessment – notes for the examination
    • Introduction to Social Engineering and rogue software - 4:19
    • Manipulation tactics - 9:01
    • EXERCISE: Social Engineering attacks - 6:44
    • SE with KALI / BackTrack - 7:06
    • Rogue Software - 2:28
    • Fraud tools #1 - 7:10
    • Fraud tools #2 - 6:32
    • Social Engineering and Rogue Software – notes for the examination
  • Defence in depth
    • Introduction to Defence in depth - 1:32
    • How to use Defence in depth model? - 5:45
    • DiD: OS and LAN layers - 6:39
    • DiD: Perimeter and Physical Access Layers - 6:06
    • DiD: Demonstration - 2:48
    • Automated attack targeting a service - 5:23
    • Automated user-targeting attack - 4:31
    • The Defence in Depth Model – notes for the examination
    • Introduction to Immutable laws of security – Law #1 - 4:35
    • Law #2 - 2:56
    • Law #3 - 2:23
    • Law #4 - 1:52
    • Law #5 - 3:28
    • Law #6 - 2:07
    • Law #7 - 1:11
    • Law #8 - 1:43
    • Law #9 - 3:57
    • Law #10 - 0:48
    • Laws for administrators - 5:59
    • Immutable Laws of Security – notes for the examination
  • Disaster recovery
    • Introduction to Disaster Recovery - 1:33
    • How to reduce losses? - 5:24
    • Ensuring continous availability - 4:08
    • Threat discovery #1 - 4:28
    • Threat discovery #2 - 3:40
    • Audit users and keep control accounts - 5:18
    • High risk users - 3:23
    • Collecting and analysing evidence - 7:13
    • Forensics example - 3:52
    • CONFICKER: CASE STUDY - 7:11
    • How to reduce losses – notes for the examination
  • Computer network security - network protocols
    • Network security – introduction - 5:44
    • OSI MODEL #1 – Physical layer - 5:45
    • OSI MODEL #2 – Data link layer - 4:46
    • Threats: MAC spoofing - 5:54
    • Threats: ARP Poisoning - 6:38
    • EXERCISE: Data Link Layer Attack - 7:32
    • OSI MODEL #3 – Network layer - 6:58
    • TCP Tunnelling over ICMP - 7:39
    • Network Protocols – notes for the examination
  • Transport protocols
    • OSI MODEL #4 – Transport Layer - 6:04
    • Threats: Enumerating Remote Computers - 3:40
    • EXERCISE: Transport Layer Attack using METASPLOIT – part 1 - 5:27
    • EXERCISE: Transport Layer Attack using METASPLOIT – part 2 - 5:13
    • OSI MODEL #5 – Session Layer - 3:33
    • Transport Protocols – notes for the examination
  • Application protocols
    • OSI MODEL #6 – Presentation Layer - 6:52
    • OSI MODEL #7 – Application Layer - 3:48
    • EXERCISE: Application Layer Attacks - 6:03
    • KALI / Backtrack: Attack Demonstration - 3:34
    • Man-in-the-Middle and Denial of Service Attacks - 2:49
    • Modifying Transmitted Packets - 4:45
    • Unencrypted protocols - 2:58
    • Application Protocols – notes for the examination
  • Designing secure computer networks
    • Designing Computer Networks – introduction - 2:18
    • Subnetting IPv6 - 3:18
    • Subnetting IPv4 - 7:01
    • IPv6 address notation - 6:46
    • DMZ: DeMilitarized Zone - 6:28
    • Subnetting – notes for the examination
    • Protocols and services: IP SEC - 9:33
    • IP SEC: Phase 1 - 7:27
    • Network Address Translation - 12:18
    • Network access control: RADIUS - 10:04
    • Protocols and Services – notes for the examination
  • Network administration and monitoring
    • Introduction to Monitoring Transmitted Data - 1:07
    • Monitoring Transmitted Data – Basic information - 8:03
    • Intrusion detection systems - 7:43
    • Why are firewalls and NDIS not enough? - 5:41
    • Wireshark – Introduction to network analysis - 6:29
    • How to use Wireshark? - 8:27
    • Analyzing captured data - 5:43
    • How to analyze telnet protocol? - 8:09
    • Intrusion detection - 7:48
    • Scanning computers - 7:47
    • Monitoring transmitted data – notes for the examination
  • Wireless networks security
    • Wireless Networks - 1:16
    • WIFI security solutions – introduction - 5:44
    • WIFI – working principles - 5:48
    • Other wireless technologies - 2:56
    • Threats and risks - 4:38
    • Ineffective solutions - 4:11
    • Authentication methods - 8:31
    • 802.11 WEP - 7:06
    • 802.11 WPA - 6:24
    • Standards and Security Solutions – notes for the examination
    • Threats of WIFI networks - 5:58
    • Client Attacks: Launching a rogue access point - 7:03
    • Client Attacks: Evil twin - 4:51
    • Client Attacks: Denial of service - 9:17
    • EXERCISE: WPA attack - 3:24
    • Wi-Fi Security Threats – notes for the examination
  • Operating systems security
    • Operating systems security – introduction - 9:10
    • Security boundaries - 4:44
    • Three core - 7:15
    • EXERCISE: OS boundaries - 7:54
    • Process isolation - 6:30
    • Kernel Mode Code Signing - 6:24
    • Java Virtual Machine and code access security - 4:17
    • OS Security Boundaries – notes for the examination
    • Malware - 12:09
    • EXERCISE: Vulnerability attacks - 10:26
    • EXERCISE: Identifying suspicious processes - 6:54
    • Demonstration: Process Explorer - 9:13
    • EXERCISE: Removing malware - 8:38
    • Rootkits - 6:14
    • EXERCISE: Detecting rootkits - 11:07
    • EXERCISE: Security evaluation - 6:00
    • Malware – notes for the examination
  • Access control
    • Authentication and authorisation – Introduction - 1:57
    • Authentication - users - 6:56
    • How secure is your password? - 5:03
    • Authentication protocols and services - 8:25
    • LM Hash - 7:02
    • Cached Credentials - 4:29
    • KERBEROS - 11:30
    • Authentication – notes for the examination
    • Identity Theft - 9:13
    • EXERCISE: Offline attacks - 12:22
    • Using online cracking services - 8:41
    • Identity Theft – notes for the examination
  • Windows security
    • Windows Security – what you’ll learn - 1:17
    • User Account Control - 6:22
    • UAC configuration - 8:02
    • Additional Security Features – ASLR and DEP - 11:39
    • PatchGuard - 1:34
    • Techniques and Methods – notes for the examination
    • Encryption – key protection - 9:31
    • Drive encryption - 8:25
    • BitLocker - 7:57
    • BitLocker To Go Reader - 4:43
    • File and folder encryption – EFS - 7:30
    • EXERCISE: EFS - 5:36
    • Encryption – notes for the examination
  • Application security
    • Introduction to Application Security - 8:18
    • Attacks on applications - 10:18
    • SQL Injection - 8:10
    • EXERCISE: Analyze the application - 13:31
    • Blind SQL Injection - 9:33
    • Automated SQL Injection - 11:44
    • Cross-site scripting – XSS - 10:10
    • Program security assessment - 5:10
    • Unsafe applications - 10:11
    • Application Attacks – notes for the examination
    • Program Security Assessment – notes for the examination
  • Application security - Configuration and management
    • Here’s what you’ll learn in this module - 1:05
    • Software updates - 2:39
    • MS Update - 6:53
    • System Center Configuration Manager - 2:46
    • Managing applications - 8:26
    • Blocking applications - 7:35
    • Software restrictions policies - 5:57
    • EXERCISE: Application control rules - 12:11
    • Isolating applications - 6:30
    • How to protect users without interrupting their work – notes for the examination
  • Cryptography
    • Introduction to cryptography - 9:42
    • History of ciphers - 10:57
    • Symmetric and asymmetric ciphers - 6:13
    • Symmetric-key algorithms - 5:49
    • Block ciphers - 6:01
    • Data encryption standard - 6:51
    • DES-X - 7:35
    • Advanced encryption standards - 5:28
    • Block cipher modes - 7:16
    • Stream Ciphers – RC4 - 3:40
    • Asymmetric-key algorithms - 8:11
    • RSA - 5:33
    • ELGAMAL - 2:05
    • HASH functions - 5:56
    • Digital signature - 5:56
    • Hybrid Schemes - 6:24
    • Symmetric and Asymmetric Ciphers – notes for the examination
  • Public Key Infrastructure
    • Introduction to cryptology - 2:12
    • Public key infrastructure - 6:10
    • Implementing public key infrastructure - 5:39
    • What will PKI allow you? - 6:29
    • EXERCISE: Certificates - 8:37
    • Certificate life cycle - 6:24
    • Planning the PKI - 8:33
    • PKI Administration - 7:29
    • Public Key Infrastructure – Trust but verify – notes for the examination

View Full Curriculum


Access
Lifetime
Content
9.0 hours
Lessons
93

Learn Website Hacking From Scratch

Learn How to Hack Sites Like A Black Hat Hacker & How to Protect Them Like A White Hat Hacker

By iSecur1ty | in Online Courses

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. As you gain a complex understanding of websites, you will then learn how you can exploit them to carry out a number of powerful cyber attacks. You'll track from a beginning to advanced level and by the time you finish, you'll be able to launch attacks and test the security of websites and apps the same way that black hat hackers would, and be able to fix these vulnerabilities.

4.6/5 average rating: ★ ★ ★ ★

 

  • Access 93 lectures & 9 hours of content 24/7
  • Learn how to gather information about your target site like discovering the DNS server used & subdomains
  • Discover, exploit, & fix a number of vulnerabilities like file upload, code execution, SQL injection, XSS, & much more
  • Understand what you can do w/ the access gained from vulnerabilities
  • Explore the basic exploitation of attacks & the advanced methods to enhance them
  • Learn how & why vulnerabilities are exploitable, how to fix them, & the right practices to avoid them

Zaid Al-Quraishi | Ethical Hacker, Computer Scientist & CEO of zSecurity

4.6/5 Instructor Rating: ★ ★ ★ ★

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications
  • Basic IT skills
  • No Linux, programming, or hacking knowledge is required
  • Computer with a minimum of 4GB ram/memory
  • Operating system: Windows / OS X / Linux
  • Wireless adapter that supports monitor mode for WiFi cracking lectures

Course Outline

  • Introduction
    • Course Introduction - 2:13
  • First Section
    • Lab Overview & Needed Software - 7:48
    • Installing Kali 2020 As a Virtual Machine Using a Ready Image - 10:34
    • Installing Metasploitable As a Virtual Machine - 4:10
    • Installing Windows As a Virtual Machine - 3:22
  • Preparation - Linux Basics
    • Basic Overview Of Kali Linux - 4:37
    • The Linux Terminal & Basic Linux Commands - 9:07
    • Configuring Metasploitable & Lab Network Settings - 5:38
  • Website Basics
    • What is a Website? - 4:13
    • How To Hack a Website ? - 5:31
  • Information Gathering
    • Gathering Information Using Whois Lookup - 4:41
    • Discovering Technologies Used On The Website - 6:03
    • Gathering Comprehensive DNS Information - 7:01
    • Discovering Websites On The Same Server - 3:43
    • Discovering Subdomains - 5:06
    • Discovering Sensitive Files - 7:26
    • Analysing Discovered Files - 4:17
    • Maltego - Discovering Servers, Domains & Files - 7:43
    • Maltego - Discovering Websites, Hosting Provider & Emails - 4:49
  • File Upload Vulnerabilities
    • What are they? And How To Discover & Exploit Basic File Upload Vulnerabilites - 6:44
    • HTTP Requests - GET & POST - 4:13
    • Intercepting HTTP Requests - 6:46
    • Exploiting Advanced File Upload Vulnerabilities - 4:37
    • Exploiting More Advanced File Upload Vulnerabilities - 4:22
    • [Security] Fixing File Upload Vulnerabilities - 6:22
  • Code Execution Vulnerabilities
    • What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities - 7:26
    • Exploiting Advanced Code Execution Vulnerabilities - 6:06
    • [Security] - Fixing Code Execution Vulnerabilities - 5:49
  • Local File Inclusion Vulnerabilities (LFI)
    • What are they? And How To Discover & Exploit Them - 5:49
    • Gaining Shell Access From LFI Vulnerabilities - Method 1 - 7:10
    • Gaining Shell Access From LFI Vulnerabilities - Method 2 - 10:38
  • Remote File Inclusion Vulnerabilities (RFI)
    • Remote File Inclusion Vulnerabilities - Configuring PHP Settings
    • Remote File Inclusion Vulnerabilities - Discovery & Exploitation - 5:44
    • Exploiting Advanced Remote File Inclusion Vulnerabilities - 2:50
    • [Security] Fixing File Inclusion Vulnerabilities - 5:55
  • SQL Injection Vulnerabilities
    • What is SQL - 5:48
    • Dangers of SQL Injections - 2:53
  • SQL Injection Vulnerabilities - SQLi In Login Pages
    • Discovering SQL Injections In POST - 7:56
    • Bypassing Logins Using SQL Injection Vulnerability - 4:49
    • Bypassing More Secure Logins Using SQL Injections - 6:24
    • [Security] Preventing SQL Injections In Login Pages - 7:43
  • SQL injection Vulnerabilities - Extracting Data From The Database
    • Discovering SQL Injections in GET - 7:01
    • Reading Database Information - 5:26
    • Finding Database Tables - 3:34
    • Extracting Sensitive Data Such As Passwords - 4:31
  • SQL injection Vulnerabilities - Advanced Exploitation
    • Discovering & Exploiting Blind SQL Injections - 5:53
    • Discovering a More Complicated SQL Injection - 7:21
    • Extracting Data (passwords) By Exploiting a More Difficult SQL Injection - 4:47
    • Bypassing Filters - 4:48
    • Bypassing Security & Accessing All Records - 8:36
    • [Security] Quick Fix To Prevent SQL Injections - 6:43
    • Reading & Writing Files On The Server Using SQL Injection Vulnerability - 5:58
    • Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server - 8:27
    • Discoverting SQL Injections & Extracting Data Using SQLmap - 6:47
    • Getting a Direct SQL Shell using SQLmap - 2:58
    • [Security] - The Right Way To Prevent SQL Injection - 4:58
  • XSS Vulnerabilities
    • Introduction - What is XSS or Cross Site Scripting? - 3:09
    • Discovering Basic Reflected XSS - 3:47
    • Discovering Advanced Reflected XSS - 4:34
    • Discovering An Even More Advanced Reflected XSS - 7:04
    • Discovering Stored XSS - 2:56
    • Discovering Advanced Stored XSS - 3:36
  • XSS Vulnerabilities - Exploitation
    • Hooking Victims To BeEF Using Reflected XSS - 5:41
    • Hooking Victims To BeEF Using Stored XSS - 4:09
    • BeEF - Interacting With Hooked Victims - 3:56
    • BeEF - Running Basic Commands On Victims - 4:24
    • BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt - 2:17
    • bonus - installing veil framework - 6:20
    • Bonus - Veil Overview & Payloads Basics - 7:22
    • Bonus - Generating An Undetectable Backdoor Using Veil 3 - 9:46
    • Bonus - Listening For Incoming Connections - 7:20
    • Bonus - Using A Basic Deliver Method To Test The Backdoor & Hack Windows 10 - 7:14
    • BeEF - Gaining Full Control Over Windows Target - 3:40
    • [Security] Fixing XSS Vulnerabilities - 7:17
  • Insecure Session Management
    • Logging In As Admin Without a Password By Manipulating Cookies - 6:07
    • Discovering Cross Site Request Forgery Vulnerabilities (CSRF) - 6:46
    • Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File - 7:00
    • Exploiting CSRF Vulnerabilities To Change Admin Password Using Link - 5:40
    • [Security] The Right Way To Prevent CSRF Vulnerabilities - 8:45
  • Brute Force & Dictionary Attacks
    • What Are Brute Force & Dictionary Attacks? - 3:44
    • Creating a Wordlist - 6:35
    • Launching a Wordlist Attack & Guessing Login Password Using Hydra - 13:32
  • Discovering Vulnerabilities Automatically Using Owasp ZAP
    • Scanning Target Website For Vulnerabilities - 4:11
    • Analysing Scan Results - 4:19
  • Post Exploitation
    • Post Exploitation Introduction - 3:58
    • Interacting With The Reverse Shell Access Obtained In Previous Lectures - 6:59
    • Escalating Reverse Shell Access To Weevely Shell - 7:52
    • Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc - 4:54
    • Bypassing Limited Privileges & Executing Shell Commands - 6:32
    • Downloading Files From Target Webserver - 4:39
    • Uploading Files To Target Webserver - 7:53
    • Getting a Reverse Connection From Weevely - 7:46
    • Accessing The Database - 8:53

View Full Curriculum


Access
Lifetime
Content
9.0 hours
Lessons
82

Network Hacking Continued - Intermediate to Advanced

Learn Advanced Techniques to Hack Into WiFi & Wired Networks

By iSecur1ty | in Online Courses

This advanced network hacking course is designed to build on your foundational knowledge. It aims to break down each attack into smaller components so you can understand how each of these components works. By the end of the course, you'll be able to mix attacks and adopt attacks to suit different situations and different scenarios, as well as the know-how to write your own man in the middle scripts to implement your own man in the middle attacks.

4.7/5 average rating: ★ ★ ★ ★

 

  • Access 82 lectures & 9 hours of content 24/7
  • Learn how to extend the pre-connection attacks that you already know
  • Extend the deauthentication attack to target multiple clients & multiple networks at once
  • Understand a number of advanced techniques to gain access to various network configurations & encryptions
  • Discover how to manually configure & create a fake access point
  • Create fake captive portals, steal WPA/WPA2 passwords & spy on clients
  • Cover post-connection attacks

Zaid Al-Quraishi | Ethical Hacker, Computer Scientist & CEO of zSecurity

4.6/5 Instructor Rating: ★ ★ ★ ★

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10 - 6:41
    • Course Overview - 5:24
  • Back To Basics/Pre-Connection Attacks
    • Pre-connection Attacks Overview - 1:54
    • Spoofing MAC Address Manually - 3:24
    • Targeting 5Ghz Networks - 6:43
    • Deauthenticating a Client From Protected WiFi Networks - 6:54
    • Deauthenticating Multiple Clients From Protected WiFi Networks - 7:50
    • Deauthenticating All Clients From Protected WiFi Network - 6:04
  • Gaining Access
    • Gaining Access Overview - 2:29
    • Discovering Names of Hidden Networks - 8:11
    • Connecting To Hidden Networks - 5:14
    • Bypassing Mac Filtering (Blacklists & Whitelists) - 9:04
    • Cracking SKA WEP Networks - 9:05
    • Securing Systems From The Above Attacks - 3:17
  • Gaining Access - Captive Portals
    • Sniffing Captive Portal Login Information In Monitor Mode - 9:59
    • Sniffing Captive Portal Login Information Using ARP Spoofing - 8:55
    • Creating a Fake Captive Portal - Introduction - 4:18
    • Creating Login Page - Cloning a Login Page - 7:17
    • Creating Login Page - Fixing Relative Links - 6:53
    • Creating Login Page - Adding Form Tag - 7:44
    • Creating Login Page - Adding Submit Button - 6:44
    • Preparing Computer To Run Fake Captive Portal - 7:57
    • Starting The Fake Captive Portal - 11:57
    • Redirecting Requests To Captive Portal Login Page - 12:19
    • Generating Fake SSL Certificate - 5:54
    • Enabling SSL/HTTPS On Webserver - 7:50
    • Sniffing & Analysing Login Credentials - 6:03
  • Gaining Access - WPA/WPA2 Cracking - Exploiting WPS
    • Exploiting WPS - Introduction - 1:34
    • Bypassing "Failed to associate" Issue - 7:39
    • Bypassing 0x3 and 0x4 Errors - 7:39
    • WPS Lock - What Is It & How To Bypass It - 7:01
    • Unlocking WPS - 8:40
  • Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack
    • Advanced Wordlist Attacks - Introduction - 1:39
    • Saving Aircrack-ng Cracking Progress - 9:44
    • Using Huge Wordlists With Aircrack-ng Without Wasting Storage - 7:35
    • Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage - 10:04
    • Cracking WPA/WPA2 Much Faster Using GPU - Part 1 - 7:19
    • Cracking WPA/WPA2 Much Faster Using GPU - Part 2 - 10:39
  • Gaining Access - WPA/WPA Cracking - Evil Twin Attack
    • What is it & How it Works - 7:21
    • Installing Needed Software - 7:39
    • Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing - 9:38
    • Debugging & Fixing Login Interface - 11:51
  • Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise
    • What is WPA/WPA2 Enterprise & How it Works - 5:24
    • How To Hack WPA/WPA2 Enterprise - 6:47
    • Stealing Login Credentials - 8:11
    • Cracking Login Credentials - 6:38
    • Securing Systems From The Above Gaining Access Attacks - 4:59
  • Post Connection Attacks
    • Post Connection Attacks Overview - 4:22
    • Ettercap - Basic Overview - 7:09
    • Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords - 9:51
    • Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites - 12:44
    • Automatically ARP Poisoning New Clients - 6:53
    • DNS Spoofing Using Ettercap - 5:30
    • Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms - 9:17
  • Post Connection Attacks - Analysing Data Flows & Running Custom Attacks
    • MITMproxy - What is It & How To Install It - 3:47
    • Using MITMproxy In Explicit Mode - 7:12
    • Analysing (Filtering & Highlighting) Flows - 5:13
    • Intercepting Network Flows - 4:51
    • Modifying Responses & Injecting Javascript Manually - 8:45
    • Intercepting & Modifying Responses In Transparent Mode - 7:31
    • Editing Responses & Injecting BeEF's Code On The Fly - 9:16
    • Editing Responses Automatically Based On Regex - 9:13
    • [Bonus] - Stealing Login Info Using Fake Login Prompt - 7:12
    • [Bonus] - Hacking Windows 10 Using A Fake Update - 4:41
  • Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
    • What Do Mean By MITM Scripts? - 6:14
    • Capturing & Printing Requests/Responses - 8:30
    • Filtering Flows & Extracting Useful Data - 9:25
    • Using Conditions To Execute Code On Useful Flows - 9:48
    • Generating Custom HTTP Responses - 8:35
    • Testing Script Locally - 8:29
    • Generating Trojans - Installing The Trojan Factory - 6:16
    • Generating Trojans - Converting Any File (eg:image) To a Trojan - 10:15
    • Testing Script On Remote Computer To Replace Downloads With a Generic Trojan - 7:07
    • Executing Bash Commands & Calling Trojan Factory From Our Script - 8:47
    • Using Variables & More Complex Conditions - 8:42
    • Converting Downloads To Trojans On The Fly - 10:10
    • Configuring The Trojan Factory's MITMproxy Script - 7:32
    • Using The Trojan Factory MITMproxy Script - 7:48
  • Post-Connection Attacks - Doing All Of The Above On HTTPS Websites
    • Bypassing HTTPS With MITMproxy - 6:11
    • Replacing Downloads From HTTPS - 5:12
    • Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites - 6:16
    • Securing Systems From The Above Post Connection Attacks - 5:40

View Full Curriculum


Access
Lifetime
Content
23.0 hours
Lessons
176

Learn Python & Ethical Hacking From Scratch

Learn Python & Ethical Hacking By Writing More Than 20 Hacking Programs

By iSecur1ty | in Online Courses

In this hands-on course, you'll learn by doing! Through an example-driven process, you'll go from zero to hero in Python and discover how you can use it to write programs that can be used to counter cyberattacks. The Ethical Hacking industry is booming and Python is an invaluable asset in breaking into this lucrative field.

4.7/5 average rating: ★ ★ ★ ★

 

  • Access 176 lectures & 23 hours of content 24/7
  • Learn Python programming & Ethical Hacking
  • Write over 20 ethical hacking & security programs
  • Model problems, design solutions & implement them using Python
  • Write cross-platform programs that work on Windows, OS X, & Linux
  • Gain a deep understanding of how computer systems work
  • Convert evil files into Trojans that work & function just like any other file type like an image or a PDF
  • Understand how websites work, the technologies used & how to test them for weaknesses
  • Extract & submit forms from Python

Zaid Al-Quraishi | Ethical Hacker, Computer Scientist & CEO of zSecurity

4.6/5 Instructor Rating: ★ ★ ★ ★

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • Introduction - 6:31
    • Teaser - 7:29
    • What is Programming, What is Hacking & Why Learn Them - 6:13
    • Lab Overview & Needed Software - 7:48
    • Installing Kali as a virtual Machine - 10:34
    • Basic Overview of Kali Linux - 5:10
    • The Terminal & Linux Commands - 11:21
    • Python 2 VS Python 3 & Writing Our First Program - 9:08
    • Installing & Using a Python IDE - 9:32
  • Writing a MAC Address Changer - Python Basics
    • What is MAC Address & How To Change it - 7:41
    • Using Python Modules & Executing System Commands - 9:18
    • Implementing a Very Basic MAC Changer - 5:16
    • Variables & Strings - 10:12
    • Using Variables in MAC Changer - 4:36
    • Getting Input From The User - 6:18
    • Handling User Input - 9:40
    • Handling Command-line Arguments - 9:44
    • Initialising Variables Based on Command-line Arguments - 7:51
    • Functions - 9:40
    • Returning Values From Functions - 6:55
    • Decision Making - Theory - 6:53
    • Using Conditional Statements in MAC Changer - 9:05
  • MAC Changer - Algorithm Design
    • What is an Algorithm - 3:15
    • Reading Output Returned By System Commands - 6:24
    • Regular Expressions (Regex) - 8:14
    • Extracting a Substring Using Regex - 6:39
    • Refactoring & Housekeeping - 10:59
    • Implementing The Algorithm to Check The Mac Did Change - 6:11
  • Programming a Network Scanner
    • Introduction & Teaser - 10:11
    • Installing Windows as a Virtual Machine - 3:32
    • What is ARP & What its Used For? - 9:43
    • Designing an Algorithm To Discover Clients Connected To The Same Network - 4:00
    • Using Scapy To Create an ARP Request - 6:48
    • Combining Frames To Broadcast Packets - 9:37
    • Sending & Receiving Packets - 6:57
    • Lists - 8:20
    • Iterating Over Lists & Analysing Packet - 10:09
    • Using Escape Characters To Enhance Program Output - 6:29
    • Dictionaries - 9:37
    • Improving the Program Using a List of Dictionaries - 8:55
    • Iterating Over Nested Data Structures - 7:18
    • Python 3 Compatibility - 6:55
  • Writing an ARP Spoofer
    • What is ARP Spoofing? - 6:20
    • Redirecting the Flow of Packets in a Network Using arpspoof - 5:08
    • Creating an ARP Response - 7:11
    • Sending ARP Responses - 5:34
    • Extracting MAC Address From Responses - 6:59
    • Loops - 8:53
    • More on Loops & Counters - 7:56
    • Dynamic Printing - 6:54
    • Handling Exceptions - 5:16
    • Implementing a Restore Function - 11:55
    • Restoring ARP Tables When an Exception Occures - 5:33
  • Writing a Packet Sniffe
    • Introduction & Teaser - 4:39
    • Sniffing Packets Using Scapy - 7:20
    • Extracting data From a Specific Layer - 6:50
    • Analysing Sniffed Packets & Extracting Fields From Layers - 12:21
    • Analysing Fields & Extracting Passwords - 11:05
    • Extracting URLs - 8:00
    • Capturing Passwords From Any Computer Connected to the Same Network - 8:03
  • Writing a DNS Spoofer
    • Intercepting Packets - Creating a Proxy - 13:00
    • Converting Packets to Scapy Packets - 9:21
    • What is DNS Spoofing - 7:20
    • Filtering DNS Responses - 6:26
    • Analysing & Creating a Custom DNS Response - 7:56
    • Modifying Packets On The Fly - 7:57
    • Redirecting DNS Responses (Preview) - 5:45
  • Writing a File Interceptor
    • Introduction & Teaser (Preview) - 4:27
    • Filtering Traffic Based on the Port Used - 9:22
    • Analysing HTTP Requests - 5:54
    • Intercepting HTTP Requests - 10:19
    • Modifying HTTP Responses on The Fly - 10:47
    • Intercepting & Replacing Downloads on The Network (Preview) - 9:24
  • Writing a Code Injector
    • Introduction & Teaser (Preview) - 1:20
    • Analysing HTTP Responses - 6:49
    • Replacing a Substring Using Regex - 7:15
    • Decoding HTTP Responses - 9:48
    • Modifying HTTP Responses & Injecting Javascript Code in HTML Pages - 8:50
    • Refactoring & Housekeeping - 8:29
    • Debugging Issues - 6:01
    • Using Groups & None-capturing Regex - 8:57
    • Recalculating Content Length - 11:38
    • BeEF Overview & Basic Hook Method - 11:41
    • Hooking Computers Using code_injector - 5:37
    • Basic BeEF Commands - 4:24
    • Delivering Malware Using BeEF - 5:41
  • Bypassing HTTPS
    • How to Bypass HTTPS (Preview) - 10:49
    • Bypassing HTTPS & Sniffing Login Credentials - 8:04
    • Replacing Downloads on HTTPS Pages - 10:56
    • Injecting Code in HTTPS Pages - 8:35
  • Writing an ARP Spoof Detector
    • Running Python Programs on Windows - 9:45
    • Capturing & Analysing ARP Responses - 6:43
    • Detecting ARP Spoofing Attacks - 7:49
  • Writing Malware
    • Introduction & Teaser - 1:57
    • Execute System Command Payload - 9:40
    • Sending Reports By Email - 11:25
    • Filtering Command Output Using Regex - 10:07
    • Stealing WiFi Passwords Saved on a Computer - 9:34
    • Downloading Files From Program - 7:49
    • Writing Files on Disk - 11:24
    • Password Recovery Basics - 8:19
    • Using all the Above to Steal Saved Passwords Remotely - 8:03
    • Interacting With The File System - 9:43
  • Writing Malware - Keylogger
    • Introduction & Teaser (Preview) - 3:41
    • Writing a Basic Local Keylogger - 9:59
    • Global Variables - 8:07
    • Logging Special Keys - 6:58
    • Threading & Recursion - 10:59
    • OOP - Object Oriented Programming Basics - 15:07
    • Constructor Methods & Instance Variables - 8:06
    • Logging Key-strikes and Reporting Them By Email - 11:58
  • Writing Malware - Backdoors
    • Introduction & Teaser - 5:46
    • Client - Server Communication & Connection Types - 7:46
    • Connecting Two Remote Computers Using Sockets - 10:09
    • Sending & Receiving Data Over TCP - 5:19
    • Executing System Commands Remotely - 10:06
    • Implementing a Server - 9:08
    • Implementing Skeleton For Server - Client Communication - 6:58
    • Refactoring - Creating a Listener Class - 8:13
    • Refactoring - Creating a Backdoor Class - 6:23
    • Serialisation - Theory - 11:14
    • Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP - 7:55
    • Serialisation - Reliably Sending & Receiving Data - 6:20
    • Sending Commands as List & Implementing Exit Command - 8:16
    • Interacting With the File System - Implementing "cd" Command - 9:24
    • Reading Files - 7:30
    • Writing Files - 6:52
    • Downloading Files From Hacked Computer - 7:54
    • Implementing Upload Functionality in Listener - 7:53
    • Implementing Upload Functionality in Backdoor - 6:12
    • Handling Unknown Exceptions - 9:37
    • Using the Backdoor to Hack Windows, Linux & OS X - 12:32
  • Writing Malware - Packaging
    • Introduction & Teaser (Preview) - 3:15
    • Converting Python Programs To Windows Binary Executables - 7:12
    • Running Executables Silentely - 7:22
    • Installing Windows Pyinstaller on Linux - 7:43
    • Packaging Programs For Windows From Linux - 8:33
    • Persistence Idea - 8:15
    • Running Programs on Startup - 14:43
    • Creating a Basic Trojan Using Download & Execute Payload - 10:36
    • Creating a Trojan By Embedding Files In Program Code - 8:33
    • Bypassing Anti-Virus Programs - Theory - 5:22
    • Bypassing Anti-Virus Programs - Practical - 9:04
    • Adding an Icon to Generated Executables - 5:14
    • Spoofing File Extension - 9:35
    • Converting Python Programs To OS X Executables - 8:41
    • Converting Python Programs to Linux Executables - 7:23
  • Website / Web Application Hacking
    • Introduction & Teaser - 6:42
    • What is a Website - 4:13
    • How to Hack a Website - 5:31
  • Website Hacking - Writing a Crawler
    • Sending GET Requests To Web Servers - 10:00
    • Discovering Subdomains - 11:43
    • Discovering Hidden Paths in Websites - 10:54
    • Reading Response Content - 6:26
    • Extracting Useful Data From Response - 7:08
    • Filtering Results - 7:10
    • Extracting Unique Links & Storing Them In a List - 6:42
    • Recursively Discovering All Paths On a Target Website - 9:37
  • Writing a Program To Guess Login Information
    • Sending Post Requests to Websites - 11:59
    • Guessing Login Information on Login Pages - 9:05
  • Writing a Vulnerability Scanner
    • Introduction & Teaser - 2:35
    • HTTP Requests - POST VS GET - 7:05
    • Parsing HTML Code - 8:19
    • Extracting HTML Attributes - 10:30
    • Posting Forms - 10:27
    • Building Basic Structure For Vulnerability Scanner - 11:24
    • Using Default Parameters - 5:08
    • Sending Requests in a Session - 9:16
    • Extracting & Submitting Forms Automatically - 10:06
    • Implementing a Method To Run The Scanner - 6:08
    • Discovering XSS Vulnerabilities - 9:07
    • Exploiting XSS Vulnerabilities - 5:08
    • Implementing Code To Discover XSS in Forms - 8:15
    • Implementing Code To Discover XSS in Parameters - 7:43
    • Automatically Discovering Vulnerabilities Using the Vulnerability Scanner - 8:46
  • Bonus Section
    • Bonus Lecture - What's Next??

View Full Curriculum


Access
Lifetime
Content
4.0 hours
Lessons
21

Kali Linux Hacker Tools, Tricks and Techniques 2022

Learn Kali Linux Foundational Skills to Work Efficiently & Flawlessly

By Atul Tiwari | in Online Courses

Kali Linux, for newcomers in the cybersecurity field, is the most important course for you if you will make your career in cybersecurity. This is because Kali Linux is the most advanced and foremost used platform for Penetration testers, ethical hackers, security analysts, bug bounty hunters, security administrators, and so on. This course has been structured into several parts to ease understanding and follow the path to becoming an advanced user of Kali Linux.

4.9/5 average rating: ★ ★ ★ ★

  • Access 21 lectures & 4 hours of content 24/7
  • Learn basic information & internals of Kali Linux
  • Learn about Bash Shell Scripting
  • Understand file permissions & directories structures
  • Work with commands & shortcuts in hacker style
  • Use Kali Linux internal tools & commands
  • Understand kali terminal usages
  • Find & locate hidden files and manage processes

Atul Tiwari | Ethical Hacker, Security Evangelist, Penetration Tester

4.4/5 average rating: ★ ★ ★ ★

 

Atul Tiwari has more than 10 years of working experience in the information security field. He also has trained more than 90k students on the topic of Information Security & Penetration Testing in classroom mode and online across 168 countries. With expertise in web application penetration testing, he has performed several penetration tests and security audits, security analyses with private, governments, and security agencies to help assist with coping with cyber threats.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Kali 101
    • Kali linux setup and virtual box settings - 17:00
    • Kali first boot - 2:34
    • Kali linux walkthrough in detail - 14:59
    • Kali grant root privilege - root access to kali - 6:02
    • Kali terminal command basics - 11:55
    • Kali terminal shortcuts - hacker's style - 19:11
    • Kali UnderCover Mode - 3:42
  • Kali files directories and permissions
    • Workspace and panel customizations - 8:33
    • Creating Directories and files - 11:51
    • Finding and locating files and directories - 11:41
    • More Commands and Man page - 13:48
    • Linux file permissions and hidden files - 14:18
    • Linux process manage and kill - 18:22
  • Kali Advanced commanding
    • HTOP extended commands - 6:44
    • ATOP extended commands - 6:19
    • Searching lines head-and-tails-wc-history - 11:45
    • Persistent aliases and real world cases - 14:50
    • Command-line web downloader - 9:07
    • Bash shell scripting - 20:52
    • Boolean expressions AND OR operator - 9:37
    • Working with grep and cut to sort the results - 9:31

View Full Curriculum


Access
Lifetime
Content
10.0 hours
Lessons
67

CompTIA PenTest+ (PT0-001) Ethical Hacking - The Total Course

Hone Your Cybersecurity Skills with Hands-On Abilities in Penetration Testing & Vulnerability Management

By Total Seminars | in Online Courses

Penetration testing and information security are some of the fastest-growing job categories. So whether you're looking to pass the CompTIA PenTest+ certification exam, take your next step in the CompTIA Cybersecurity Pathway, or you're just looking to learn some awesome ethical hacking skills, you’re in the right place. This course focuses on how to be a pentester. A pen tester plans and scopes a pen test engagement with a client finds vulnerabilities, exploits them to get into a network, and reports those findings to the client.

4.5/5 average rating: ★ ★ ★ ★

  • Access 67 lectures & 10 hours of content 24/7
  • Use the tools you’ll need to scan networks, crack passwords, analyze & intercept traffic, discover code vulnerabilities, and compromise resources
  • Recognize vulnerabilities within a system, run exploits, & suggest solutions to a client to remediate the weak points
  • Work within a virtual environment to practice your pen-testing skills, including using Oracle VM manager, Kali Linux, Metasploitable, & DVWA
  • Scope, plan, & execute a pen test engagement from start to finish

Total Seminars | Home of Mike Meyers & his Team of IT Certification Pros

4.7/5 Instructor Rating: ★ ★ ★ ★


Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI, and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars website.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications
  • Basic familiarity with computers & networks

Course Outline

  • Introduction to PenTest+
    • Welcome to CompTIA PenTest+ (PT0-001) Ethical Hacking - 8:40
  • Chapter 1: Planning and Scoping
    • Planning a Pen Test - 8:54
    • Rules of Engagement - 10:41
    • Resources and Budgets - 7:21
    • Impact and Constraints - 5:17
    • Support Resources - 13:26
    • Legal Groundwork - 11:57
    • Scope Considerations - 10:51
    • Lab Environment Setup - 22:56
    • Project Strategy and Risk - 9:24
    • Scope Vulnerabilities - 13:32
    • Compliance-Based Assessments - 5:25
  • Chapter 2: Surveying the Target
    • Scanning and Enumeration - 4:35
    • Scanning and Enumeration Demo - 10:59
    • Packet Investigation - 8:03
    • Packet Inspection Demo - 6:02
    • Application and Open-Source Resources - 11:52
    • Vulnerability Scanning - 8:50
    • Vulnebarility Scanning Demo - 16:31
    • Target and Asset Considerations - 15:39
    • Nmap Timing and Performance Options - 6:43
    • Prioritization of Vulnerabilities - 9:17
    • Common Attack Techniques - 12:17
    • Credential Attacks - 14:41
    • Weaknesses in Specialized Systems - 18:08
  • Chapter 3: Selecting Your Attack Vector
    • Remote Social Engineering - 6:50
    • Spear Phishing Demo - 10:19
    • In-Person Social Engineering - 12:00
    • Network-Based Exploits - 7:19
    • FTP Exploit Demo - 8:28
    • Man-in-the Middle Exploits - 7:18
    • Wireless Exploits - 13:29
    • Application Exploits, Part 1 - 5:41
    • SQL Injection Demo - 8:48
    • Application Exploits, Part 2 - 8:14
    • Application Exploits, Part 3 - 9:15
    • Cross-Site Scripting Demo - 7:11
    • Code Vulnerabilities - 16:48
    • Local Host Vulnerabilities - 5:08
    • Privilege Escalation (Linux) - 9:49
    • Privilege Escalation (Windows) - 6:17
    • Misc. Privilege Escalation - 8:07
    • Misc. Local Host Vulnerabilities - 8:17
    • Physical Security - 11:27
    • Post-Exploitation Techniques - 11:23
    • Persistence and Stealth - 10:55
  • Chapter 4: Selecting Pen Testing Tools
    • Nmap Scoping and Output Options - 21:15
    • Pen Testing Toolbox - 6:59
    • Using Kali Linux - 6:27
    • Scanners and Credential Tools - 10:22
    • Code Cracking Tools - 4:35
    • Open-Source Research Tools - 6:36
    • Wireless and Web Pen Testing Tools - 11:03
    • Remote Access Tools - 6:28
    • Analyzers and Mobile Pen Testing Tools - 2:43
    • Other Pen Testing Tools - 4:39
    • Using Scripting in Pen Testing - 12:46
    • Bash Scripting Basics - 15:10
    • Bash Scripting Techniques - 10:21
    • PowerShell Scripts - 4:16
    • Ruby Scripts - 6:43
    • Python Scripts - 5:59
    • Scripting Languages Comparison - 11:06
  • Chapter 5: Reporting and Communication
    • Writing Reports - 16:02
    • Post-Report Activities - 5:36
    • Mitigation Strategies - 5:13
    • Communication - 9:54

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.