[UDEMY] Ethical Hacker Certification course [FTU]
- Category Other
- Type Tutorials
- Language English
- Total size 3.9 GB
- Uploaded By SunRiseZone
- Downloads 792
- Last checked 1 day ago
- Date uploaded 6 years ago
- Seeders 11
- Leechers 8
Infohash : DF586B0B4CD56D00C5A0675B3265F11DD9DF8530
Get certified
Created by : Amit Huddar
Last updated : 2/2019
Language : English
Caption (CC) : Included
Torrent Contains : 254 Files, 23 Folders
Course Source : https://www.udemy.com/ethical-hacker-certification-course/
What you'll learn
• a to z on ethical hacking
• can even write certification exams
Requirements
• Basic computer and Internet browsing knowledge
• One should have a laptop powered with windows or linux OS
Description
In this course you will learn from a to z on ethical hacking you can even write certification exams,
at the end of this course you will get a certificate.
this course is for beginners i have covered all sort of topics such as web hacking,remote hacking(metasploit),wireless hacking.
In remote hacking you can hack windows linux android all kinds of operating systems.
Web application hacking you'll learn attacks such as xss, sql injection, DOS and DDOS attack,sniffing
Most of the course on EHC costs more than 500$,but ours is cheaper to help out the students
this course is more practical than theory,i belive in learning by doing.
check out the intro to see what all i have covered in this course
Who this course is for :
• Who want to become certified ethical hacker
• Anyone interested in hacking
• Who want to pursue ethical hacking as carrier
• Who want to earn by hacking legallly.
For More Udemy Free Courses >>> https://ftuforum.com/
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.ftuforum.com/

Files:
[FTUForum.com] [UDEMY] Ethical Hacker Certification course [FTU] 10. Footprinting- 1. Any Who.mp4 (21.1 MB)
- 1. Any Who.vtt (1.9 KB)
- 2. Spokeo online tool.mp4 (13.8 MB)
- 2. Spokeo online tool.vtt (1.2 KB)
- 1. HTTrack Web Site Copier Tool.mp4 (20.6 MB)
- 1. HTTrack Web Site Copier Tool.vtt (1.7 KB)
- 2. Footprinting a Webserver using IDServe.mp4 (35.2 MB)
- 2. Footprinting a Webserver using IDServe.vtt (2.5 KB)
- 3. Footprinting Webserver using Httprecon Tool.mp4 (38.7 MB)
- 3. Footprinting Webserver using Httprecon Tool.vtt (2.8 KB)
- 4. Web Data Extractor.mp4 (23.1 MB)
- 4. Web Data Extractor.vtt (2.0 KB)
- 1. DOS Introduction.html (3.3 KB)
- 2. DOS Attack With LOIC - Mac pc.mp4 (33.6 MB)
- 2. DOS Attack With LOIC - Mac pc.vtt (2.2 KB)
- 3. How to detect DOS attack.mp4 (25.1 MB)
- 3. How to detect DOS attack.vtt (1.8 KB)
- 4. How to DOS Websites - Slowloris in windows.mp4 (23.8 MB)
- 4. How to DOS Websites - Slowloris in windows.vtt (1.9 KB)
- 5. How To Detect DDOS Attack.mp4 (25.8 MB)
- 5. How To Detect DDOS Attack.vtt (2.1 KB)
- 6. How to DOS Websites - Slowloris using kali linux.mp4 (33.2 MB)
- 6. How to DOS Websites - Slowloris using kali linux.vtt (2.3 KB)
- 7. Performing a DOS Attck with Anonymous DoSer.mp4 (11.8 MB)
- 7. Performing a DOS Attck with Anonymous DoSer.vtt (1.0 KB)
- 8. SlowHTTPtest DOS Attack Tool Kali Linux.mp4 (46.4 MB)
- 8. SlowHTTPtest DOS Attack Tool Kali Linux.vtt (3.5 KB)
- 9. Quiz.html (0.1 KB)
- 1. Hydra - Online Password Attacks.mp4 (44.9 MB)
- 1. Hydra - Online Password Attacks.vtt (3.2 KB)
- 2. Crunch Password Generating Tool.mp4 (32.6 MB)
- 2. Crunch Password Generating Tool.vtt (12.0 MB)
- 3. John the ripper tool to crack passwords.mp4 (36.6 MB)
- 3. John the ripper tool to crack passwords.vtt (2.6 KB)
- 4. Quiz.html (0.1 KB)
- 1. DVWA BURP SUITE Session Hijacking.mp4 (28.1 MB)
- 1. DVWA BURP SUITE Session Hijacking.vtt (2.2 KB)
- 2. Session hijacking arps.mp4 (18.8 MB)
- 2. Session hijacking arps.vtt (1.5 KB)
- 3. Stealing cookies.mp4 (22.8 MB)
- 3. Stealing cookies.vtt (3.8 KB)
- 1. Sniffing Passwords Using ETTERCAP.mp4 (20.7 MB)
- 1. Sniffing Passwords Using ETTERCAP.vtt (1.9 KB)
- 2. Sniffing Passwords Using Wireshark.mp4 (16.7 MB)
- 2. Sniffing Passwords Using Wireshark.vtt (1.3 KB)
- 3. Spoofing MAC Address Using SMAC.mp4 (49.4 MB)
- 3. Spoofing MAC Address Using SMAC.vtt (3.2 KB)
- 4. Sniffing a network using the WINARPAtacker Tool.mp4 (38.5 MB)
- 4. Sniffing a network using the WINARPAtacker Tool.vtt (2.6 KB)
- 5. Wireshark installation.mp4 (33.1 MB)
- 5. Wireshark installation.vtt (2.3 KB)
- 6. Wireshark Overview.mp4 (20.6 MB)
- 6. Wireshark Overview.vtt (2.2 KB)
- 7. IP Address smart scanning whois.mp4 (19.6 MB)
- 7. IP Address smart scanning whois.vtt (1.6 KB)
- 8. Sniffing the Network Using the Omnipeek Network Analyzer.mp4 (37.2 MB)
- 8. Sniffing the Network Using the Omnipeek Network Analyzer.vtt (2.7 KB)
- 9. Quiz.html (0.1 KB)
- 1. Trojan Horse Introduction.html (4.8 KB)
- 2. Installing FatRat.mp4 (36.1 MB)
- 2. Installing FatRat.vtt (2.4 KB)
- 3. Generating backdoor for linux - FatRat.mp4 (52.0 MB)
- 3. Generating backdoor for linux - FatRat.vtt (3.0 KB)
- 4. Hack Android with FatRat.mp4 (61.2 MB)
- 4. Hack Android with FatRat.vtt (4.4 KB)
- 1. Create a virus using JPS Virus Tool(Z).mp4 (34.1 MB)
- 1. Create a virus using JPS Virus Tool(Z).vtt (2.5 KB)
- 2. Virus Analysis Using IDA Pro.mp4 (33.9 MB)
- 2. Virus Analysis Using IDA Pro.vtt (2.4 KB)
- 3. Virus Analysis Using OllyDbg.mp4 (33.2 MB)
- 3. Virus Analysis Using OllyDbg.vtt (2.3 KB)
- 4. Virus Analysis Using Virus Total.mp4 (12.1 MB)
- 4. Virus Analysis Using Virus Total.vtt (1.1 KB)
- 5. Quiz.html (0.1 KB)
- 1. Airmon-ng and Airodump-ng.mp4 (29.4 MB)
- 1. Airmon-ng and Airodump-ng.vtt (2.4 KB)
- 2. Breaking a WPS PIN to Get the Password with Bully.mp4 (61.8 MB)
- 2. Breaking a WPS PIN to Get the Password with Bully.vtt (4.9 KB)
- 3. Hacking WPS wifi using reaver kali linux.mp4 (55.4 MB)
- 3. Hacking WPS wifi using reaver kali linux.vtt (4.2 KB)
- 1. Buffer overflow introduction.html (8.1 KB)
- 2. Basic buffer overflow example.mp4 (16.8 MB)
- 2. Basic buffer overflow example.vtt (1.4 KB)
- 3. Basic buffer overflow attack using C.mp4 (71.6 MB)
- 3. Basic buffer overflow attack using C.vtt (5.3 KB)
- 1. Introduction.mp4 (10.0 MB)
- 1. Introduction.vtt (1.0 KB)
- 2. Xamp installation.mp4 (13.4 MB)
- 2. Xamp installation.vtt (1.6 KB)
- 3. Installation Wamp.mp4 (37.8 MB)
- 3. Installation Wamp.vtt (5.7 KB)
- 4. bWAPP installation.mp4 (49.1 MB)
- 4. bWAPP installation.vtt (4.6 KB)
- 5. Burp Suite Installation.mp4 (43.9 MB)
- 5. Burp Suite Installation.vtt (4.3 KB)
- 1. Cryptography Introduction.html (3.0 KB)
- 2. Basic Data Encripting Using Cryptool.mp4 (40.4 MB)
- 2. Basic Data Encripting Using Cryptool.vtt (2.8 KB)
- 3. Data Encrypting Using Advanced Encryption Package.mp4 (45.1 MB)
- 3. Data Encrypting Using Advanced Encryption Package.vtt (3.1 KB)
- 4. Data Encrypting Using Hashcalc Tool.mp4 (52.6 MB)
- 4. Data Encrypting Using Hashcalc Tool.vtt (3.3 KB)
- 5. Data Encrypting Using MD5 Calculator.mp4 (29.4 MB)
- 5. Data Encrypting Using MD5 Calculator.vtt (2.0 KB)
- 6. Encripting and Decripting Data Using BCTextEncoder.mp4 (27.5 MB)
- 6. Encripting and Decripting Data Using BCTextEncoder.vtt (1.9 KB)
- 7. Quiz.html (0.1 KB)
- 1. HTTP Tunneling Using HTTPort.mp4 (97.6 MB)
- 1. HTTP Tunneling Using HTTPort.vtt (7.3 KB)
- 1. System Hacking Introduction.html (3.0 KB)
- 2. Hiding files using the Stealth Files Tool.mp4 (63.5 MB)
- 2. Hiding files using the Stealth Files Tool.vtt (3.9 KB)
- 3. System Monitoring Using RemoteExec.mp4 (63.1 MB)
- 3. System Monitoring Using RemoteExec.vtt (5.2 KB)
- 1. EHC Last video of this course.mp4 (28.9 MB)
- 1. EHC Last video of this course.vtt (4.5 KB)
- 1. dnsenum Information Gathering Tool Kali Linux.mp4 (37.3 MB)
- 1. dnsenum Information Gathering Tool Kali Linux.vtt (2.8 KB)
- 2. Netdiscover & ARP to Find Internal IP and MAC Addresses.mp4 (35.7 MB)
- 2. Netdiscover & ARP to Find Internal IP and MAC Addresses.vtt (3.0 KB)
- 3. whois web information gathering tool.mp4 (27.1 MB)
- 3. whois web information gathering tool.vtt (2.0 KB)
- 4. Quiz.html (0.1 KB)
- 1. Enumeration Introduction.html (0.8 KB)
- 2. Enumeration Introduction.mp4 (11.1 MB)
- 2. Enumeration Introduction.vtt (1.1 KB)
- 3. Enumerating the System Using Hyena.mp4 (22.6 MB)
- 3. Enumerating the System Using Hyena.vtt (1.5 KB)
- 4. SuperScan Tool for Enumerating NetBIOS.mp4 (18.5 MB)
- 4. SuperScan Tool for Enumerating NetBIOS.vtt (1.4 KB)
- 5. Enumerating a Network Using SoftPerfect Network Scanner.mp4 (12.7 MB)
- 5. Enumerating a Network Using SoftPerfect Network Scanner.vtt (1.2 KB)
- 1. NMAP in kali.mp4 (72.0 MB)
- 1. NMAP in kali.vtt (5.0 KB)
- 2. Installing NMAP in windows.mp4 (21.4 MB)
- 2. Installing NMAP in windows.vtt (1.7 KB)
- 3. Exploring and Auditing a Network Using Nmap1.mp4 (21.5 MB)
- 3. Exploring and Auditing a Network Using Nmap1.vtt (2.0 KB)
- 4. Exploring and Auditing a Network Using Nmap2.mp4 (31.5 MB)
- 4. Exploring and Auditing a Network Using Nmap2.vtt (2.7 KB)
- 5. Exploring and Auditing a Network Using Nmap3.mp4 (17.5 MB)
- 5. Exploring and Auditing a Network Using Nmap3.vtt (1.5 KB)
- 6. Fingerprinting Open Ports Using the Amap.mp4 (17.7 MB)
- 6. Fingerprinting Open Ports Using the Amap.vtt (17.7 MB)
- 7. Angry IP Scanner Script.mp4 (22.9 MB)
- 7. Angry IP Scanner Script.vtt (1.7 KB)
- 8. Scanning System and Network Resources Using Advanced IP Scanner.mp4 (21.6 MB)
- 8. Scanning System and Network Resources Using Advanced IP Scanner.vtt (1.8 KB)
- 9. Monitoring TCPIP Connections Using the Currports Tool.mp4 (22.4 MB)
- 9. Monitoring TCPIP Connections Using the Currports Tool.vtt (1.8 KB)
- 1. Metasploit Introduction.mp4 (33.6 MB)
- 1. Metasploit Introduction.vtt (2.8 KB)
- 2. Metasploit Basic Commands Part1.mp4 (21.2 MB)
- 2. Metasploit Basic Commands Part1.vtt (2.0 KB)
- 3. Metasploit basic commands Part2.mp4 (45.2 MB)
- 3. Metasploit basic commands Part2.vtt (3.8 KB)
- 4. Search targets in metasploit.mp4 (29.4 MB)
- 4. Search targets in metasploit.vtt (2.1 KB)
- 5. Windows hacking.mp4 (31.6 MB)
- 5. Windows hacking.vtt (2.1 KB)
- 6. Hacking android.mp4 (26.7 MB)
- 6. Hacking android.vtt (2.0 KB)
- 7. Quiz.html (0.1 KB)
- 10. Hack Remote PC Using HTA Attack in SET Toolkit.mp4 (30.4 MB)
- 10. Hack Remote PC Using HTA Attack in SET Toolkit.vtt (2.2 KB)
- 11. MAC address Spoofing with MACChanger.mp4 (41.9 MB)
- 11. MAC address Spoofing with MACChanger.vtt (3.0 KB)
- 12. Quiz.html (0.1 KB)
- 1. Gathering a Information about a Person.mp4 (50.8 MB)
- 1. Gathering a Information about a Person.vtt (3.0 KB)
- 2. Gather Email Info - Maltego tool.mp4 (34.7 MB)
- 2. Gather Email Info - Maltego tool.vtt (2.6 KB)
- 3. Discovering Domain info Emails associated with Target.mp4 (22.5 MB)
- 3. Discovering Domain info Emails associated with Target.vtt (1.7 KB)
- 4. Mass Mailer Attack to Single Email.mp4 (38.3 MB)
- 4. Mass Mailer Attack to Single Email.vtt (3.0 KB)
- 5. Mass Mailer Attack to Multiple Emails.mp4 (36.6 MB)
- 5. Mass Mailer Attack to Multiple Emails.vtt (2.7 KB)
- 6. SocialFish - The Ultimate Phishing Tool(Ngrok Integration).mp4 (27.3 MB)
- 6. SocialFish - The Ultimate Phishing Tool(Ngrok Integration).vtt (2.2 KB)
- 7. Detecting Phishing Page Using PhishTank.mp4 (15.0 MB)
- 7. Detecting Phishing Page Using PhishTank.vtt (1.6 KB)
- 8. Credential Harvest Attack Using Settoolkit.mp4 (28.6 MB)
- 8. Credential Harvest Attack Using Settoolkit.vtt (2.3 KB)
- 9. Create a Payload and Listener -Social Engineering Toolkit.mp4 (84.2 MB)
- 9. Create a Payload and Listener -Social Engineering Toolkit.vtt (5.8 KB)
- 1. Web Applicaton Haking Introduction.mp4 (49.1 MB)
- 1. Web Applicaton Haking Introduction.vtt (4.5 KB)
- 2. Cross site Request Forgery Combined with curl - Web application Hacking.mp4 (34.9 MB)
- 2. Cross site Request Forgery Combined with curl - Web application Hacking.vtt (3.7 KB)
- 3. DVWA Upload and Use cpp php Backdoor shell.mp4 (86.4 MB)
- 3. DVWA Upload and Use cpp php Backdoor shell.vtt (7.7 KB)
- 4. Striker - vulnerability scanner.mp4 (26.6 MB)
- 4. Striker - vulnerability scanner.vtt (2.1 KB)
- 5. Webcruiser - Web Application Scanner.mp4 (51.9 MB)
- 5. Webcruiser - Web Application Scanner.vtt (3.7 KB)
- 6. XAttacker - Website vulenarbility Scanner.mp4 (30.0 MB)
- 6. XAttacker - Website vulenarbility Scanner.vtt (2.2 KB)
- 10. Becon flooding using mdk3.mp4 (40.9 MB)
- 10. Becon flooding using mdk3.vtt (3.3 KB)
- 11. Extracting SAM Hashes Using PWDump7 Tool.mp4 (33.9 MB)
- 11. Extracting SAM Hashes Using PWDump7 Tool.vtt (2.5 KB)
- 12. Manipulating Parameters.mp4 (27.8 MB)
- 12. Manipulating Parameters.vtt (2.1 KB)
- 1. XSS Introduction.mp4 (26.3 MB)
- 1. XSS Introduction.vtt (1.9 KB)
- 2. Types of Cross-Site Scripting Attacks.mp4 (45.0 MB)
- 2. Types of Cross-Site Scripting Attacks.vtt (3.9 KB)
- 3. Cross Site Scripting(XSS) Introduction.html (30.5 KB)
- 4. XSS Basics demonstration.mp4 (27.1 MB)
- 4. XSS Basics demonstration.vtt (1.5 KB)
- 5. finding XSS websites.mp4 (17.3 MB)
- 5. finding XSS websites.vtt (1.9 KB)
- 6. Finding reflected XSS vulenarabilities.mp4 (19.3 MB)
- 6. Finding reflected XSS vulenarabilities.vtt (1.9 KB)
- 7. XSS Stored Low.mp4 (48.8 MB)
- 7. XSS Stored Low.vtt (3.6 KB)
- 8. XSS Stored Medium.mp4 (22.6 MB)
- 8. XSS Stored Medium.vtt (2.1 KB)
- 9. XSS Stored High.mp4 (18.2 MB)
- 9. XSS Stored High.vtt (1.4 KB)
- 10. Extracting data through Union Statement1.mp4 (30.0 MB)
- 10. Extracting data through Union Statement1.vtt (2.5 KB)
- 11. Extracting data through Union Statement2.mp4 (19.0 MB)
- 11. Extracting data through Union Statement2.vtt (1.9 KB)
- 12. Extracting data through Union Statement3.mp4 (48.0 MB)
- 12. Extracting data through Union Statement3.vtt (3.9 KB)
- 13. Extracting data through Union Statement4.mp4 (25.9 MB)
- 13. Extracting data through Union Statement4.vtt (2.4 KB)
- 14. SQL Injection Quiz.html (0.1 KB)
- 15. Quiz.html (0.1 KB)
- 1. SQL Injection Introduction.html (7.4 KB)
- 2. SQL Injection Introduction.mp4 (46.6 MB)
- 2. SQL Injection Introduction.vtt (3.4 KB)
- 3. Havij - SQL Injection Exploitation.mp4 (60.4 MB)
- 3. Havij - SQL Injection Exploitation.vtt (5.3 KB)
- 4. Bypass Login page SQL Injection.mp4 (31.3 MB)
- 4. Bypass Login page SQL Injection.vtt (3.1 KB)
- 5. Boolean Blind SQL Injection Explotiting.mp4 (20.4 MB)
- 5. Boolean Blind SQL Injection Explotiting.vtt (3.9 KB)
- 6. Setting up DVWA1.mp4 (31.7 MB)
- 6. Setting up DVWA1.vtt (2.7 KB)
- 7. Setting up DVWA2.mp4 (54.1 MB)
- 7. Setting up DVWA2.vtt (3.7 KB)
- 8. Checking sql vulnerability.mp4 (18.2 MB)
- 8. Checking sql vulnerability.vtt (1.8 KB)
- 9. Extracting data through Union Statement Theory.mp4 (56.1 MB)
- 9. Extracting data through Union Statement Theory.vtt (4.6 KB)
- Discuss.FTUForum.com.html (31.9 KB)
- FreeCoursesOnline.Me.html (108.3 KB)
- FTUForum.com.html (100.4 KB)
- How you can help Team-FTU.txt (0.2 KB)
- [TGx]Downloaded from torrentgalaxy.org.txt (0.5 KB)
- Torrent Downloaded From GloDls.to.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- https://tracker.fastdownload.xyz:443/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.cyberia.is:6969/announce
- udp://tracker.leechers-paradise.org:6969/announce
- udp://open.stealth.si:80/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://tracker.cyberia.is:6969/announce
- https://opentracker.xyz:443/announce
- https://t.quic.ws:443/announce
- udp://9.rarbg.to:2710/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://open.demonii.si:1337/announce