Uthena

Course description

Would you like to learn how hackers compromise systems because this will help you protect your own and advance your cyber security and ethical hacking career?

In this course you will learn:

  • Introduction
  • Setup
  • Anonymity Online
  • Wireless
  • Site Cloning
  • Bitsquatting
  • Bad USB (USB Keylogger Deployment)
  • Setting up Windows Virtual Machine
  • Server Setup
  • and much more…


This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!

Course curriculum

    1. Create a USB for Installation

      FREE PREVIEW
    2. Installation Procedure Part 1

      FREE PREVIEW
    3. Installation Procedure Part 2

    4. Improve safety and anonymity of your browser

    5. Fedora KDE Desktop Orientation (optional)

    6. Terminal Basics Part 1

    7. Terminal Basics Part 2

    8. Wireshark Setup Part 1

    9. Wireshark Setup Part 2

    1. How to Connect to the Internet via Proxy Part 1

    2. How to Connect to the Internet via Proxy Part 2

    3. How to set up a Proxy Server for Traffic Monitoring Part 1

    4. How to set up a Proxy Server for Traffic Monitoring Part 2

    5. How to set up a Proxy Server for Traffic Monitoring Part 3

    6. How to set up a Proxy Server for Traffic Monitoring Part 4

    7. How to set up a Proxy Server for Traffic Monitoring Part 5

    8. How to Connect to a VPN

    9. How to Setup your own VPN Server Part 1

    10. How to Setup your own VPN Server Part 2

    11. How to Setup your own VPN Server Part 3

    12. How to Setup your own VPN Server Part 4

    13. Monitor VPN Server Traffic

    14. Tor Browser

    15. How to Setup a Tor Relay Part 1

    16. How to Setup a Tor Relay Part 2

    1. Installing aircrack-ng

    2. Capturing WPA2 Handshake

    3. Crunch Password Generator Installation

    4. Crunch Password Generator Rule Sets

    5. Crunch Password Generator in Combination with aircrack-ng

    6. Installing NVIDIA Drivers

    7. Installing HashCat

    8. Preparing the Capture File for HashCat

    9. HashCat Part 1

    10. HashCat Part 2

    11. Changing your MAC Address

    12. Set up a Sandboxed Environment for our Hotspot Part 1

    13. Set up a Sandboxed Environment for our Hotspot Part 2

    14. Setting up an Open Wireless Hotspot Part 1

    15. Setting up an Open Wireless Hotspot Part 2

    16. Setting up the Fake DNS Resolutions Part 1

    17. Setting up the Fake DNS Resolutions Part 2

    18. Fighting Against HTTPS, Site Cloning and Credentials Harvesting Part 1

    19. Fighting Against HTTPS, Site Cloning and Credentials Harvesting Part 2

    20. Fighting Against HTTPS, Site Cloning and Credentials Harvesting Part 3

    21. Fighting Against HTTPS, Site Cloning and Credentials Harvesting Part 4

    22. Fighting Against HTTPS, Site Cloning and Credentials Harvesting Part 5

    23. Fighting Against HTTPS, Site Cloning and Credentials Harvesting Part 6

    24. Fighting Against HTTPS, Site Cloning and Credentials Harvesting Part 7

    25. Disconnect Clients from a Wireless Access Point

    1. How to Clone Websites

    1. Bitsquatting Part 1

    2. Bitsquatting Part 2

    3. Bitsquatting Part 3

    4. Bitsquatting Part 4

    5. Bitsquatting Part 5

About this course

  • $27.81
  • 84 lessons
  • 15 hours of video content

Meet your instructor!

Joseph Delgadillo
Best-Selling Instructor

The digital age is upon us. Would you like to build/protect the systems that shape our future?

I am here on Uthena to produce valuable educational resources for students who wish to learn skills related to information technology, network security, programming languages and much more. Enroll in one of my courses for a practical, down to earth approach to learning.

Take this course today!

"The Complete Ethical Hacking Course!"