All language subtitles for 2. Course Introduction dqe

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 1 00:00:00,846 --> 00:00:01,679 Hello 2 2 00:00:01,679 --> 00:00:02,820 and welcome. 3 3 00:00:02,820 --> 00:00:03,880 My name is Zaid, 4 4 00:00:03,880 --> 00:00:06,320 I'm an ethical worker or computer scientist 5 5 00:00:06,320 --> 00:00:08,470 and I'll be your instructor in this course. 6 6 00:00:09,330 --> 00:00:10,700 In this course I'm gonna teach you 7 7 00:00:10,700 --> 00:00:12,730 ethical hacking from scratch so 8 8 00:00:12,730 --> 00:00:15,040 I'm gonna assume that you have no prior knowledge 9 9 00:00:15,040 --> 00:00:16,630 and by the end of it you will be 10 10 00:00:16,630 --> 00:00:19,280 at a high intermediate level. 11 11 00:00:19,280 --> 00:00:20,810 So we'll start by teaching you 12 12 00:00:20,810 --> 00:00:23,440 how to set up a penetration testing lab 13 13 00:00:23,440 --> 00:00:25,680 and how to install the needed software 14 14 00:00:25,680 --> 00:00:27,793 so you can practice hacking safely. 15 15 00:00:28,750 --> 00:00:30,820 Once done, the course is divided 16 16 00:00:30,820 --> 00:00:34,900 into four main penetration testing sections. 17 17 00:00:34,900 --> 00:00:37,590 The first is the network hacking section 18 18 00:00:37,590 --> 00:00:39,640 where you learn how networks work, 19 19 00:00:39,640 --> 00:00:42,010 how devices communicate with each other 20 20 00:00:42,010 --> 00:00:43,980 and how to exploit this method 21 21 00:00:43,980 --> 00:00:46,410 of communication to control all 22 22 00:00:46,410 --> 00:00:49,970 the connections around you, crack wifi keys 23 23 00:00:49,970 --> 00:00:52,280 and gain access to wifi networks 24 24 00:00:52,280 --> 00:00:56,140 whether they use WEP/ WPA or WPA2 25 25 00:00:56,140 --> 00:00:59,790 and intercept data to capture usernames, 26 26 00:00:59,790 --> 00:01:02,650 passwords, chat messages or anything 27 27 00:01:02,650 --> 00:01:05,473 that anybody does on the same network. 28 28 00:01:07,060 --> 00:01:08,610 Once done with this, we'll move 29 29 00:01:08,610 --> 00:01:10,670 to the gaining access section where 30 30 00:01:10,670 --> 00:01:13,400 you'll learn how to gain access to servers 31 31 00:01:13,400 --> 00:01:15,660 and personal computers. 32 32 00:01:15,660 --> 00:01:17,620 So first, you'll learn how to gather 33 33 00:01:17,620 --> 00:01:20,350 comprehensive information about your target, 34 34 00:01:20,350 --> 00:01:22,130 discover vulnerabilities 35 35 00:01:22,130 --> 00:01:25,220 and exploit them to gain full control 36 36 00:01:25,220 --> 00:01:26,683 over the target system. 37 37 00:01:27,940 --> 00:01:30,200 Not only that but you'll also learn 38 38 00:01:30,200 --> 00:01:33,130 how to generate undetectable back doors 39 39 00:01:33,130 --> 00:01:35,900 and use social engineering to deliver 40 40 00:01:35,900 --> 00:01:38,900 them to your target as a fake update 41 41 00:01:38,900 --> 00:01:43,530 or as a PDF or an image or any other file 42 42 00:01:43,530 --> 00:01:46,060 that they might be interested in. 43 43 00:01:46,060 --> 00:01:48,620 You'll also learn how to spoof emails 44 44 00:01:48,620 --> 00:01:50,750 so when they're delivered to your target 45 45 00:01:50,750 --> 00:01:53,350 they appear as if they're sent from a friend, 46 46 00:01:53,350 --> 00:01:56,030 from their boss or from any address 47 47 00:01:56,030 --> 00:01:58,223 that they are likely to interact with. 48 48 00:01:59,670 --> 00:02:01,640 Once done with all of this, we'll move 49 49 00:02:01,640 --> 00:02:04,080 to the post exploitation section 50 50 00:02:04,080 --> 00:02:06,010 where you'll learn what can you do 51 51 00:02:06,010 --> 00:02:08,010 with the access that you gained 52 52 00:02:08,010 --> 00:02:10,210 in the previous sections. 53 53 00:02:10,210 --> 00:02:11,560 So you'll learn how to interact 54 54 00:02:11,560 --> 00:02:13,890 with the file system, how to execute 55 55 00:02:13,890 --> 00:02:18,090 system commands, record keystrokes, open the webcam 56 56 00:02:18,090 --> 00:02:20,880 and even use the hacked computer 57 57 00:02:20,880 --> 00:02:24,003 as a pivot to hack into other computers. 58 58 00:02:25,100 --> 00:02:27,350 Once done with all of these, we'll move 59 59 00:02:27,350 --> 00:02:29,330 to the website hacking section 60 60 00:02:29,330 --> 00:02:31,470 where you'll learn how websites work, 61 61 00:02:31,470 --> 00:02:33,950 how to gather comprehensive information 62 62 00:02:33,950 --> 00:02:35,950 about a target website 63 63 00:02:35,950 --> 00:02:38,360 and how to discover and exploit 64 64 00:02:38,360 --> 00:02:40,940 a number of dangerous vulnerabilities 65 65 00:02:40,940 --> 00:02:43,810 that allow you to gain full control 66 66 00:02:43,810 --> 00:02:45,463 over the target website. 67 67 00:02:46,570 --> 00:02:48,550 At the end of each section, you'll learn 68 68 00:02:48,550 --> 00:02:50,090 how to secure systems 69 69 00:02:50,090 --> 00:02:52,953 and secure yourself from the discussed attacks. 5603

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.