Pay What You Want: White Hat Hacker Bundle

5 Reviews
8 Courses
-

Pay What You Want: White Hat Hacker Bundle

5 Reviews
8 Courses
-

How It Works

Beat the Leader's price and get featured on the Leaderboard!

Beat the average price and you'll take home the entire bundle.

If what you pay is less than the average, you'll still take home something great.

Price locked in for: 15:00
Beat the average price$18.61
Pay what you want

What's Included In This Bundle ($1,271.00) Value

Wi-Fi Hacking with Kali
$200.00 ValueWi-Fi Hacking with Kali
Web Security: Common Vulnerabilities & Their Mitigation
$50.00 ValueWeb Security: Common Vulnerabilities & Their Mitigation
Information Security Management Fundamentals
$95.00 ValueInformation Security Management Fundamentals
Certified Information Systems Security Professional
$149.00 ValueCertified Information Systems Security Professional
 Networks From Scratch to Advanced Implementation
$149.00 Value Networks From Scratch to Advanced Implementation
Learn Ethical Hacking From Scratch
$180.00 ValueLearn Ethical Hacking From Scratch
Python For Android Hacking Crash Course: Trojan Perspective
$199.00 ValuePython For Android Hacking Crash Course: Trojan Perspective
The Complete Ethical Hacking Course for 2016-2017
$249.00 ValueThe Complete Ethical Hacking Course for 2016-2017
PM

Pierre Mierzwa

$230.00

Leaderboard Champion

Rank
User
Paid
2
R
Randy Welch
$229.00
3
R
Robert Morris
$228.00
4
D
David Parsons
$227.00
5
И
Иван Иваново
$226.00
6
M
Michael LaFontaine Jr
$225.00
7
M
Michael Lunney
$200.00
8
J
Joseph Sagiv
$180.00
9
M
Matthew Langsenkamp
$175.00
10
B
Bill McGuire
$175.00

Product Details

The Complete Ethical Hacking Course for 2016-2017
  • Certification included
  • Experience level required: All levels
  • Access 52 lectures & 9.5 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

52 Lessons (9.5h)

  • Introduction
    EHIntro16:23
  • Setup
    Create a USB for Installation10:10
    Installation Procedure Part 111:16
    Installation Procedure Part 26:22
    Improve safety and anonymity of your browser7:08
    General Orientation14:44
    Terminal Basics Part 116:03
    Terminal Basics Part 211:46
    Wireshark Setup Part 15:02
    Wireshark Setup Part 27:54
  • Anonymity Online
    How to connect to the Internet via proxy Part 117:47
    How to connect to the Internet via proxy Part 22:50
    How to set up a proxy server for traffic monitoring Part 119:52
    How to setup a proxy server for traffic monitoring Part 29:55
    How to setup a proxy server for traffic monitoring Part 314:39
    How to setup a proxy server for traffic monitoring Part 419:04
    How to setup a proxy server for traffic monitoring Part 59:23
    How to connect to a VPN7:48
    How to setup your own VPN server Part 110:14
    How to setup your own VPN server Part 29:23
    How to setup your own VPN server Part 313:32
    How to setup your own VPN server Part 45:58
    Monitor VPN server traffic9:45
    Tor Browser11:21
    How to setup a tor relay Part 118:32
    How to setup a tor relay Part 25:44
  • Wireless
    Installing aircrack-ng16:20
    Capturing WPA2 Handshake12:55
    Crunch password generator installation9:18
    Crunch password generator rule sets18:50
    Crunch password generator in combination with aircrack-ng13:51
    Installing NVIDIA Drivers15:11
    Installing HashCat8:39
    Preparing the capture file for HashCat2:09
    HashCat Part 113:15
    HashCat Part 214:13
    Changing your mac address13:32
    Set up a sandboxed environment for our hotspot Part 118:16
    Set up a sandboxed environment for our hotspot Part 211:52
    Setting up an open wireless hotspot Part 18:39
    Setting up an open wireless hotspot Part 23:40
    Setting up the fake DNS resolutions Part 15:51
    Setting up the fake DNS resolutions Part 23:09
    Fighting against HTTPS, site cloning and credentials harvesting Part 17:48
    Fighting against HTTPS, site cloning and credentials harvesting Part 28:51
    Fighting against HTTPS, site cloning and credentials harvesting Part 35:04
    Fighting against HTTPS, site cloning and credentials harvesting Part 413:07
    Fighting against HTTPS, site cloning and credentials harvesting Part 510:48
    Fighting against HTTPS, site cloning and credentials harvesting Part 619:47
    Fighting against HTTPS, site cloning and credentials harvesting Part 73:36
    Disconnect clients from a Wireless Access Point13:37
  • Site Cloning
    How to clone websites6:45

The Complete Ethical Hacking Course for 2016-2017

EK
Ermin Kreponic

Ermin Kreponic is a strongly motivated young IT expert, Linux enthusiast with a passion for troubleshooting network related problems. He has an exceptional eye for details and a sense of urgency when it comes down to problem solving.

Description

The world of ethical hacking and network security is constantly changing, which is what makes this course, specifically built with the most up to date information, so valuable. Whether you're completely new to ethical hacking, or just want to hone your skills with the newest technologies, this course will get you right up to speed with this exciting and lucrative career path.

  • Access 52 lectures & 9.5 hours of content 24/7
  • Get an introduction to ethical hacking
  • Learn Linux installation, terminal basics, & Wireshark setup
  • Understand how to stay anonymous online, how to use proxy servers, & how to access the dark web using TOR
  • Discover Aircrack-ng, HashCat, & WiFi hacking
  • Defend your own networks from attacks
  • Clone websites

Specs

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
  • This item is excluded from coupons.
Your cart is empty. Continue Shopping!
Processing order...