Ethical Hacking Foundation
FireShark Academy
7 modules
Hindi
Lifetime access
"अनैतिक हैकिंग की मूलभूत जानकारी - सुरक्षित रखें और सीखें! अब हिंदी में।"
Overview
इस कोर्स में आपको एकिकृत हैकिंग की बुनियाद सीखने का अवसर मिलेगा। इस कोर्स के माध्यम से आप हैकिंग के नैतिकता को समझेंगे और इसका उपयोग ठीक कामों के लिए कैसे किया जा सकता है। आपको हैकिंग के नैतिकता और सुरक्षा के मूल सिद्धांतों का संस्करण मिलेगा जो आपको इस क्षेत्र में एक माहिर बनने में मदद करेगा। इस कोर्स के माध्यम से आपको कंप्यूटर सुरक्षा के महत्वपूर्ण सिद्धांतों की समझ मिलेगी और कैसे हैकर्स द्वारा उनके प्रणालियों में दरार डालने के खतरे को रोका जा सकता है। यह कोर्स आपके लिए उच्च स्तरीय व्यावसायिक नौकरियों के लिए भी एक उत्कृष्ट करियर मार्ग खोल सकता है जो नैतिक हैकिंग और सुरक्षा में अध्ययन करने के लिए प्रेरित करता है।
Key Highlights
इथिकल हैकिंग के बेहतरीन अवश्यकता और महत्व समझें
हैकिंग की विभिन्न प्रकारों की समझ
साइबर सुरक्षा के मूल तत्व सीखें
इस्तेमाल होने वाले हैकिंग टूल्स की जानकारी
कंप्यूटर सिस्टम पर इथिकल हैकिंग कैसे करें
हैकिंग से बचाव के उपाय जानें
सुरक्षित इंटरनेट ब्राउज़िंग के सुझाव
कोर्स समापन के बाद प्रमाणपत्र प्राप्ति की संभावना
What you will learn
हैकिंग की नैतिकता की आधारशिला सीखें
इस पाठ्यक्रम में आप एक नैतिक हैकर बनने के लिए आवश्यक सामग्री सीखेंगे।
लेगल हैकिंग के तरीके सीखें
हैकिंग के कानूनी और नैतिक पहलुओं को समझने के लिए इस पाठ्यक्रम से विस्तारित जानकारी प्राप्त करें।
हैकिंग के नैतिक मूल्यों पर विचार करें
इस पाठ्यक्रम में हैकिंग के नैतिक मूल्यों और इसके पर्यायों पर गहरा विचार करें।
Modules
Introduction
12 attachments • 1 hrs
Introduction to information security(hindi)
Information security threats(hindi)
Introduction to cybersecurity(hindi)
The CIA triad(hindi)
Who are hackers(hindi)
Types of Hackers(hindi)
Introduction to ethical hacking(hindi)
Information warfare(hindi)
Need for ethical hacking(hindi)
Careers in ethical hacking(hindi)
General terminologies(hindi)
How to become an ethical hacker(hindi)
Basics and Environment Lab's setup
25 attachments • 1 hrs
Advantages and limitations of cybersecurity(hindi)
Cyber defense(hindi)
Skills of an ethical hacker(hindi)
Information security policies(hindi)
Vulnerability research(hindi)
Introduction to OS Linux and its evolution(hindi)
Major Linux distribution(hindi)
Advantages of linux(hindi)
Linux for penetration testing(hindi)
Types of hackers(hindi)
Phases of ethical hacking(hindi)
Introduction to penetration testing(hindi)
Introduction to penetration testing(hindi)
Cybersecurity vs ethical hacking(hindi)
Ethical hacking laws and policies(hindi)
Software and hardware requirements for a hacking lab(hindi)
Installing and Configuring VMWare WS
Dual boot vs virtual machine(hindi)
Choosing and Downloading Kali Distro
Configuring vm for kali linux(hindi)
Installing and Configuring kali linux(hindi)
Installing and configuring DVWA(hindi)
Installing and configuring BWAPP(hindi)
Installing metasploitable on VM(hindi)
Installing OWASP broken web application on VMware(hindi)
Linux basics
19 attachments • 54.92 mins
What is linux and unix(hindi)
Introduction to command line(hindi)
Windows command line(hindi)
Linux command line(hindi)
Linux file system(hindi)
NTFS vs. FAT vs. EXT(hindi)
Linux user administration(hindi)
Basic DOS commnds(hindi)
DOS networking commands(hindi)
Kali and linux file system overview(hindi)
Linux elementary commands(hindi)
Linux networking commands(hindi)
History and grep command(hindi)
Working with linux user administration(hindi)
Linux Working with Files, Permissions and Directories(hindi)
Working with Linux file permissions(hindi)
Linux working with groups(hindi)
Linux pacakge manager apt(hindi)
Linux usefu files(hindi)
Networking for Cyber security
15 attachments • 34.84 mins
What is network and networking(hindi)
The OSI model- Open system interconnection(hindi)
More on OSI model-Introduction to TCP-IP model(hindi)
TCP-IP vs. OSI - the difference(hindi)
Data link layer and MAC addresses(hindi)
Network layer and IP addresses(hindi)
Classful IP addressing, private and special addresses(hindi)
Classless IP addressing(hindi)
Transport layer(hindi)
Ports and port addressing(hindi)
Proxies and proxy servers(hindi)
Introduction to tor(hindi)
Introduction to VPN(hindi)
Remote login - SSH and telnet(hindi)
Introduction to NAT and Port forwarding(hindi)
Footprinting and Reconnaissance
36 attachments • 1 hrs
Introduction to footprinting and objectives(hindi)
Footprinting through search engines(hindi)
Introduction to OSINT(hindi)
Email footprinting(hindi)
Website footprinting(hindi)
Competitive intelligence(hindi)
Internet archive(hindi)
WGET mirroring(hindi)
Website mirroring with Httrack(hindi)
Whois lookup(hindi)
Introduction to DNS footprinting(hindi)
DNS records resource(hindi)
DNS footprinting with DNS dumpster(hindi)
DNS google com(hindi)
Network footprinting(hindi)
Introduction and working of traceroute(hindi)
Traceroute analysis(hindi)
Introduction to maltego(hindi)
Maltego information gathering with domain name(hindi)
Maltego using the tool efficiently(hindi)
Maltego transform hub(hindi)
Maltego integration with shodan(hindi)
OSINT framework(hindi)
The harvester(hindi)
Shodan introduction and first look(hindi)
Shodan advanced search with dorks(hindi)
Whatweb(hindi)
Wappalyzer(hindi)
Sublist3r(hindi)
Subdomain finder websites(hindi)
netdiscover(hindi)
Major IP block(hindi)
Google Dorks Explained – What is Google Hacking(hindi)
Working with Google Dorks – Google Dorking Practical(hindi)
Footprinting with Social Engineering(hindi)
Footprinting countermeasures(hindi)
Scanning
38 attachments • 1 hrs
What is scanning(hindi)
Basics of scanning(hindi)
Scanning methodology(hindi)
Working with ping command for live hosts(hindi)
Angry IP scanner(hindi)
TCP flags(hindi)
TCP -3 way handshake(hindi)
Introduction to port scanning(hindi)
Port scanning methodology(hindi)
TCP port scanning - TCP coonect scan(hindi)
Types of port scanning - TCP stealth scan(hindi)
Types of port scanning - TCP inverse scanner(hindi)
TCP port scanning - TCP XMAS scan(hindi)
Types of port scanning - ACK flag probe scanning(hindi)
Types of port scanning - UDP scan(hindi)
Introduction to NMAP and first look(hindi)
NMAP - port scanning(hindi)
NMAP - advanced port scanning(hindi)
NMAP -bypass firewall and IDES(hindi)
NMAP - types of scans(hindi)
Port scanning with hping3(hindi)
Port scanning with pentest-tools(hindi)
Colasoft packet builder(hindi)
Introduction to banner grabbing(hindi)
Banner grabbing with ID serve(hindi)
Banner grabing with netcraft(hindi)
Evading IDS and firewalls(hindi) - Made with Clipchamp
Scanning for vulnerabilities(hindi)
Nessus vulnerability scanner(hindi)
NMAP scripting engine(hindi)
Nikto web vulnerability scanner(hindi)
OpenVAS installation and configuration(hindi)
WordPress Vulnerability Scanning with wpscan(hindi)
Mapping network(hindi)
Network topology mapper(hindi)
Spicework network mapper(hindi)
LAN state pro(hindi)
Scanning countermeasures(hindi)
Enumeration
19 attachments • 38.83 mins
Introduction to enumeration(hindi)
Techniques of enumeration(hindi)
NetBIOS enumeration(hindi)
SMB enumeration(hindi)
Working with netbios and SMB enumeration(hindi)
SNMP enumeration(hindi)
LDAP enumeration(hindi)
SMTP enumeration(hindi)
Working with SMTP enumeration(hindi)
DNS enumeration(hindi)
Introduction to DNS zones(hindi)
Introduction to DNS zone transfer(hindi)
DNS zone transfer using host command(hindi)
NSlookup tool(hindi)
DNS zone transfer using NSlookup(hindi)
Dig command(hindi)
NTP enumeration(hindi)
Enumeration countermeasures(hindi)
Port scanning introduction to masscan(hindi)
About the creator
FireShark Academy
FireShark Academy is an online cyber security academy that offers courses and training programs to individuals interested in pursuing a career in the field of cyber security. The academy provides a range of courses on topics such as ethical hacking, digital forensics, network security, and more.
Rate this Course
$ 50.00
$200
Order ID:
This course is in your library
What are you waiting for? It’s time to start learning!
Wait up!
We see you’re already enrolled in this course till Lifetime. Do you still wish to enroll again?