4.23 out of 5
4.23
3937 reviews on Udemy

Learn Ethical Hacking: Beginner to Advanced!

Learn ethical hacking, penetration testing and network security skills with our comprehensive course!
Instructor:
Joseph Delgadillo
170,581 students enrolled
English [Auto]
Ethical Hacking
Linux Commands
Kali Linux
Creating a Secure Environment
Footprinting
Scanning
Website Penetration Testing
Wireless Cracking
Man in the Middle Attacks
System Hacking
Python Programming Fundamentals
Coding Custom Pentesting Tools
Tips for Building a Career in Cyber Security

If you would like to master ethical hacking, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux and Python hacking with over 28 hours of HD video tutorials! We will cover the following topics in this course:

  • How to setup a Kali Linux system

  • Essential Linux system commands

  • How to create a secure penetration testing environment

  • Footprinting

  • Scanning

  • Website penetration testing

  • WPA2 wireless network cracking

  • Man in the middle attacks

  • System hacking using Metasploit

  • Python programming fundamentals

  • Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)

  • Tips for building a career in cyber security

This course was designed for absolute beginners, so no previous ethical hacking or programming knowledge is necessary. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the tutorials is available within the discussion forum.

Still not sold? Check out some of these great reviews!

“Great course, beginner friendly. And most importantly, great instructor and great community.”

“It’s really detailed and helps you get started well!”

“Thank you for all the changes and all the new stuff you keep adding. I have more than a few ethical hacking courses and this is the best one, at least so far. I had my doubts when I got it due to it being so short but I am really happy that I did. Great job, keep it up!”

Thank you for taking the time to read this and we hope to see you in the course!

Introduction and Installation

1
Introduction to the course
2
VirtualBox installation
3
Kali Linux installation
4
Enabling full-screen

Basic Linux Commands

1
Basic commands part 1
2
Basic commands part 2
3
Basic commands part 3

Creating a Secure Hacking Environment

1
Changing IP address and wireless adapter setup
2
Creating a bootable Kali USB drive
3
Essential networking terms
4
Essential hacking terms
5
Additional Kali tools to install
6
Changing our MAC address with macchanger

Footprinting

1
Google hacking
2
Nikto basics
3
Whois tool
4
Email harvesting
5
Shodan
6
Zone transfer with Dig

Scanning

1
Installing Metasploitable
2
Nmap part 1
3
Nmap part 2
4
Nmap part 3
5
Zenmap
6
TCP scans
7
Nmap bypassing defenses
8
Nmap scripts part 1
9
Nmap scripts part 2

Website Penetration Testing

1
Installing OWASP
2
HTTP request
3
HTTP response
4
Burpsuite configuration
5
Editing packets in Burpsuite
6
Whatweb and Dirb
7
Password recovery attack
8
Burpsuite login bruteforce
9
Hydra login bruteforce
10
Session fixation
11
Injection attacks
12
Simple command injection
13
Exploiting command injection vulnerability
14
Finding blind command injection
15
SQL basics
16
Manual SQL injection part 1
17
Manual SQL injection part 2
18
SQLmap basics
19
XML injection
20
Installing XCAT and preventing injection attacks
21
Reflected XSS
22
Stored XSS
23
Changing HTML code with XSS
24
XSSer and XSSsniper

Wireless Cracking

1
Wireless attacking theory
2
Enabling monitor mode
3
Capturing handshake with airodump
4
RockYou.txt
5
Cracking with Aircrack
6
Cracking with Hashcat
7
Creating password lists with Crunch
8
Creating password lists with Cupp
9
Rainbow tables part 1
10
Rainbow tables part 2
11
Installing Fluxion
12
Finding and cracking hidden networks
13
Preventing wireless attacks

Man in the Middle Attacks

1
ARP protocol basics
2
Man in the middle attack theory
3
Installing MITMf
4
Manual ARP spoofing
5
Problems while installing MITMf
6
HTTP traffic sniffing
7
DNS spoofing and HTTPS password sniffing
8
Hooking browsers with BEEF
9
Screenshotting targets browser
10
Cloning any webpage
11
Ettercap basics

System Hacking with Metasploit

1
MSFconsole environment
2
Metasploit modules explained
3
Bruteforcing SSH with Metasploit
4
Attacking Tomcat with Metasploit
5
Getting Meterpreter with command injection
6
PHP code injection
7
2 Metasploitable exploits
8
Wine installation
9
Creating Windows payloads with Msfvenom
10
Encoders and Hex editor
11
Windows 10 Meterpreter shell
12
Meterpreter environment
13
Windows 10 privilege escalation
14
Preventing privilege escalation
15
Post exploitation modules
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.2
4.2 out of 5
3937 Ratings

Detailed Rating

Stars 5
1809
Stars 4
1443
Stars 3
532
Stars 2
81
Stars 1
70
03b477b400fdf07d810d78bf663504a8
Course available for 1 day
30-Day Money-Back Guarantee

Includes

29 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion

External Links May Contain Affiliate Links read more

Join our Telegram Channel To Get Latest Notification & Course Updates!
Join Our Telegram For FREE Courses & Canva PremiumJOIN NOW