پیش نیازها:
- این دوره به یک کامپیوتر و اتصال به اینترنت نیاز دارد
- هیچ تجربه یا دانش قبلی در مورد Ethical Hacking لازم نیست. این دوره شما را با همه چیزهایی که باید درباره آزمایش اخلاقی هک کردن و نفوذ بدانید ، آشنا می کند
- دانش پایه Kali Linux
- دانش پایه لینوکس
این دوره برای چه کسی است؟
- هر کسی که علاقه مند به یادگیری اخلاق هک کردن یا تست نفوذ است
- هر کسی که به امنیت سایبری علاقه مند باشد
- هر کسی که می خواهد Metasploit را یاد بگیرد
- هرکسی که علاقه دارد هکر اخلاقی شود

در این دوره با موارد زیر آشنا خواهید شد:
Introduction
Welcome!
Setting Up Your Environment
How To Setup A Virtual Penetration Testing Environment
Downloading and installing Metasploitable2
Installing VMware
How To Install Kali Linux On VMware
Anonymity
How To Setup Proxychains On Kali Linux
How to setup Anonsurf on Kali Linux
How to use a VPN with Proxychains - Maximum anonymity
The Complete DNS guide - How to change your DNS
Getting started with Linux
Adding Users & Changing Passwords
System Services
The Aptitude Package Manager - Installing & Updating packages
Linux File System
Installing Terminator - Productivity tool for Linux
Networking Fundamentals
Understanding the OSI Model
The Network Layer
The Transport Layer
The TCP 3 Way Handshake
Passive Information Gathering
Information Gathering - Whois Lookup & DNS Reconnaisance
Gathering Emails - theharvester
Whois Lookup
Netcraft - Passive Information Gathering
Active Information Gathering
DNS Enumeration
DNSRecon
Installing Nmap on Windows
Installing Nmap on Linux
Installing Zenmap on Linux
Scanning a single target
Scanning multiple targets
Scanning an IP range
Scanning an entire subnet
Scanning a list of targets
Excluding targets from a scan
Excluding targets with a list
Aggressive scanning & OS Detection
Nmap Syn Scan
Nmap UDP Scan
Output Scan Results
Nmap Scripts
Netcat
Banner Grabbing With Netcat
Transferring Data With Netcat
Reverse Shell With Netcat
Getting started with Metasploit
Metasploit for beginners - Modules, Exploits and Payloads
Metasploit for beginners - Understanding Metasploit Modules
Metasploit for beginners - Information gathering - Auxiliary scanners
Metasploit for beginners - Basic Exploitation
Metasploit community Web GUI - Installation and Overview
Web Server Hacking
Web server hacking with Metasploit - Gaining Access
Web server hacking with Metasploit - FTP backdoor command execution
Web server hacking with Metasploit - Metasploit payloads
Nikto - Web Vulnerability Scanner
Exploitation
WordPress hacking with WPScan
Password cracking with John The Ripper
Bruteforce password cracking with Hydra - SSH
Bruteforce password cracking with Medusa
BeEF browser exploitation - Client side attacks
Armitage - Scanning and Exploitation
Veil Evasion - How to generate undetectable payloads
How to generate wordlists with Crunch
Wired and WIreless attacks
MITM - ARP spoofing with arpspoof
MITM - ARP Poisoning with Ettercap
WPA/WPA2 Hacking & Exploitation With Aircrack-ng & airgeddon | Pixie Dust Attack
DDoS Attacks with Xerxes - The most powerful DDoS tool
Post Exploitation & Privilege Escalation
The Complete Meterpreter guide - Privilege escalation and clearning tracks
Generating a PHP backdoor with Weevely - Post exploitation