Header Ads

Header ADS

Ethical Hacking free courses: Episode 01; Beginner to Geek!

Ethical Hacking free courses: Episode 01; Beginner to Geek!

People's love for computing is growing day by day. Not just love, computers are slowly becoming more and more necessary. But from any thing you can only get benefits, there will be no problem, that can't happen, can it? So Cyber ​​Crime, Black Hat Hacking,  Deeds Attack ,  Ransomware ,  Malware Etc. have also spread in the world of computing. Just as society needs a ruler when crime increases, so does the cyber world need security specialists or ethical hackers. The best part is that you don't have to worry about qualifications or a livelihood after studying for years like school or college to become an ethical hacker. With the right knowledge and training, you can build yourself into a skilled ethical hacker in a very short time.

Just as the first day of school ends with knowing the name and identity in the first class, today's article will end just as well. When I first posted about cyber security 2 years ago, I mentioned about ethical hacking, and since then I have noticed a lot of interest among you. So I decided that what I really needed to do was learn how to do it right. Many people want to be a hacker, that's a good thing — but before you learn hacking, you must have a good idea about ethical hacking. I am  moral hacking I have already published a detailed article to explain the subject, I would request you to read it first. However, in this introductory episode I will discuss what we are going to learn in this completely free course, and what our goal will actually be.

Ethical Hacking Free Course

If you have been involved with this blog for a long time, you must know that Sabuj Bangla TV has never demanded money to share any knowledge, nor will it in the future. And speaking of which, I love to share knowledge, and of course I also love to create quality content. I am not a certified ethical hacker, I have been practicing hacking since 2010. Everything I have learned so far has been with the help of online, I have never joined any paid course. In fact, if you know the basics, then you can get so much more on the open web, you don't need to join a paid course, but a paid course may be required for a certificate. In this free ethical hacking course I will keep posting one topic at a time from beginner to geek type. There is no end to the knowledge, so there is no guarantee of when this course will end, I will always post the episodes here. And yes, as much as this course will teach, it is already stored on the Internet, but if you learn directly from the Internet, you will be confused. I will describe everything step-by-step here. But don't compare this free course with any paid course, paid courses are trained by many great specialists and experts, I am not an expert, but as much knowledge as I have, I will try to pour everything into this course. So let's find out what you can actually learn from this Ethical Hacking Free Course. Paid courses are trained by many great specialists and experts, I am not an expert, but as much knowledge as I have, I will try to pour everything into this course. So let's find out what you can actually learn from this Ethical Hacking Free Course. Paid courses are trained by many great specialists and experts, I am not an expert, but as much knowledge as I have, I will try to pour everything into this course. So let's find out what you can actually learn from this Ethical Hacking Free Course.


What is in this free course?

Website hacking, The biggest box for storing information on the internet is the various websites. High traffic, huge database rich websites can easily be targeted by black hats. And the website is not a website. Nowadays I don't know how many types of languages ​​and how many types of scripts are used to create websites. Today's most popular website building platforms are CMS, such as WordPress, Joomla, etc. And there is no end to the flaws in the websites created using these CMS. In this course we will learn how to find the errors of different types of websites and how to patch the errors. I will also know the details of how to do a case study on a website by targeting it. Of course I will try to discuss simple things over and over again, maybe for those who already know them,


Hand-to-hand hacking and security testing, the episode that will require direct practical hacking to be shown will be shown in hand-made pen by making screenshots or videos. In this free hacking course I will explain the theory a little less, show more practical. As seen in many online free ethical hacking courses just finishing the course by explaining the theory, the bat will not do that here. I have already shared a lot of basic knowledge here, if you don't know anything, then read them first. (All the necessary article links are provided below!) If necessary, the basics will be highlighted, but the practical will be given more priority. 


Kali Linux (A-Z), there will be talk of hacking and there will be no question of Kali Linux, what could it be? If you are thinking of becoming a cyber security specialist and if you are very serious about this, you must master ink Linux A-Z. This operating system is specifically designed to provide cyber security. I will not say more about this here, but I will say this much, you should never introduce yourself as a hacker without Kali Linux. What happened to the free course, A-Z knowledge about ink will be here! 


Social engineering
 , this line has been mentioned many times in various articles, "It is much easier to hack people than computers" and social engineering means to hack the human brain. Many hack attacks would never have been possible without the help of social engineering. Setting up a huge system and coding many lines is not as easy as hacking a system, just as easily as fooling someone to manipulate a password. Attempts will be made to discuss here from the first stage of social engineering to the intermediate stage. Although I am not a social engineering expert, I will still try to get some articles written by a social engineering expert.


Complete network testing and hacking, 
 hacking and networking are two brothers in one mother's womb. The more skilled you are at networking, the easier it will be for you to hack. I will try to cover every corner of networking here, at least the necessary things. We will learn about any network security testing, find out the bugs, learn how to gain network access. This course will share a complete guide to bypassing faulty networks, as well as discuss in detail how to fix errors. Starting from firewall testing, packet capturing, packet analysis, wifi testing nothing will be left out in this course.


Cryptography is 
 no comparison to encryption to secure data online. Cryptography is a technique that makes it impossible to read by changing common readable language. Since cryptography provides security for the data we need, of course, if there is a weakness in cryptography, it can make up for complete data errors. The most advanced level articles of this course will be on top of this cryptography. We will learn how to find errors in encryption and learn ways to strengthen encryption. This Ethical Hacking Free Course covers all widely used encryption methods such as AES (Advanced Entyption Standard), DES (Data Encryption Standard), RSA (Name of the creators), MD5 (Message Digest-5), SHA (Secure Hash Algorithm). , SSL (Secure Socket Layer) will be discussed in detail.


Hacking with Android,
 
 your Android mobile but don't think like that, if you don't have a computer right now, of course you can learn a lot using an Android phone or tablet. In this course I will release your Android device by making it into a complete hacking machine. With rasaberi-pie using the hacking will be discussed.


Programming (Basic)
 Good programming is definitely a plus point for you. Since I'm not a good programmer myself, I can't share advanced programming here. However, there will be a post discussing everything basic here. There will be more emphasis on Python in particular. 


Database testing and hacking
 Many companies now install their databases on local computers, or access databases from Internet servers. And hackers first target the database to carry out large-scale attacks. Errors in the database can leak information to the entire database, so you need to have detailed knowledge about database testing and patching database errors. In this course we will learn about MySQL and Oracle database security checking, as well as discuss in detail about Database Attack, Database Data Collection, Web Based Database Security. 


Anything to say to you?

You are reading this article and are excited for the upcoming episodes, very good news. But neither I nor any other thousand dollar paid course will ever make you a good hacker / security specialist unless you try it yourself. You just have to be more discriminating with the help you render toward other people. By the way, if you already know a lot or have a good grasp on any one subject of hacking, then help Sabuj Bangla TV to take this course forward. Covering such a huge course of ethical hacking covered by me alone costs a little more, along with a lot of hard work. Although I am not afraid to work or work. But even then your help will move this course forward. If you have the desire and ability to work with this course please email me; ssobuz2018@gmail.com at this address.


And no hacking technique of this course can be used for black hat work. For hacking websites, databases, mobile operating system hacks, computer access etc. I will personally provide the website or database where you can do the testing. But hacking attacks on other people's websites cannot be carried out. Never forget the key mantra of ethical hacking, you must always be 100% honest. And if you use the hacking methods taught in this course for any nefarious purpose, then you are the only one responsible for it.

I will publish all the courses for free with so much effort and you will not do anything, but it will not work. Of course you have to do something here, for all of us. Of course you need to share the course articles as much as possible. The better response I get from you, the faster I will publish all the episodes. You are my inspiration. And it is your responsibility to inspire me.

Be sure  to read all the posts from the Computing ,  Internet ,  Security ,  Mobile ,  Hardware ,  Tech Explained categories of this blog  Don't miss a single post, you will find a lot of basic knowledge here. And remember, the better you can be a specialist, the better you can solidify the basics. If you comment during the website security testing phase, "Brother, what is an IP address?" But that will not be accepted. So read the posts of this blog as much as possible first, it will strengthen your basics. I will discuss the more basic things that will come in that episode.


So this was today's introductory episode, you must have got a clear idea of ​​what we are going to get detailed knowledge on This is a blog, so of course you have the opportunity to express any questions here. Be sure to share with us any of your feedback. And yes, I will publish course articles a few days a week. However, I will try to publish at least 3 episodes a week. Be sure to subscribe to this blog's article notifications by pressing the bell icon, so you never miss new articles. Soon course 0.  The second phase will be released, so always stay tuned! So many thanks so far today for reading this post to the end.

Hope everybody on this site also had a great day.  Stay  well, stay healthy, stay safe with Sobuz  Bangla  TV . Thanks. God bless you.  

Green  Bangla  TV YouTube Channel Link : -

https://www.youtube.com/c/SobuzBanglaTV2019  


No comments

Powered by Blogger.