A to Z Ethical Hacking Course
3.9 (180 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
15,467 students enrolled
Wishlisted Wishlist

Please confirm that you want to add A to Z Ethical Hacking Course to your Wishlist.

Add to Wishlist

A to Z Ethical Hacking Course

Learn ethical hacking a,b,c,d....
3.9 (180 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
15,467 students enrolled
Created by Amit Huddar
Last updated 9/2016
English
Curiosity Sale
Current price: $10 Original price: $200 Discount: 95% off
30-Day Money-Back Guarantee
Includes:
  • 7 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Hack websites
  • Hack Wi-Fi
  • Particiapate in bug bounty programs for hackers
  • Obtain passwords through different methods
  • Will be able to hack systems remotely
  • Create simple html websites which is mandatory for hackers to know
  • Understand all kind of programming languages (which is mandatory for hackers)
View Curriculum
Requirements
  • One should have a laptop powered with windows or linux OS
  • Basic computer knowledge of high school level
Description

As name says course covers A to Z content of ethical hacking, Course is divided into 4 sections basics, web hacking, miscellaneous and wireless hacking.

Instructor has tried his best to cover each and every topic one needs to know to be ethical hacker, for example how to earn as ethical hacker, bug bounty programs, virus, worms, IP address, SQL injections, phishing, cross site scripting, email hacking, metasploit, keylogger,wire shark and many more to know in detail do watch introduction video of the course and also curriculum of the course.

As this course is updated with new videos regularly, instructor feels he can still add a lot of videos into this course, basically this course will be double in size in couple of months.

Who is the target audience?
  • Anyone interested in hacking
  • Who want to pursue ethical hacking as carrier
Students Who Viewed This Course Also Viewed
Curriculum For This Course
92 Lectures
07:08:57
+
Basics
42 Lectures 03:15:55


In this video we will see Hacker vs cracker

Hacker vs Cracker
02:44

In this video we will see

types of hacker.

Types of Hacker
05:15

In this video we will see steps performed by Hacker.

Steps Performed by Hackers
03:23

In this video we will see working of an ethical Hacker.



Working of an Ethical Hacker
04:14

In this video we will see information gathering

Information Gathering
03:08

In this video we will see Introduction to Linux

Introduction to Linux
05:22

In this video we will see pen testing.

Pen Testing
04:46

In this video we will see how an ethical earn.

How an Ethical Earns
07:07

In this video we will see bug bounty hunting.

Brief Introduction of Bug Bounty
05:53

In this video we will see learn bug bounty.

Learn Bug Bounty
04:57

In this video we will see Installing kali linux

Preview 03:00

In this video we will see Dual boot Kali Linux with Windows.




Preview 05:45

In this video we will see live boot

Preview 02:44

In this video we will see setting up kali linux in virtual box..

Setting up Kali Linux in virtual box
08:57

In this video we will see Introduction to Virus, Trojan, Worm etc

Introduction to Virus, Trojan, Worm etc
04:56

In this video we will see trojans brief.


Trojans Brief
03:44

In this video we will see

tips to maintain a virus free pc

Tips to Maintain a Virus free PC
06:36

In this video we will see virus to different OS

Virus to different OS
07:05

In this video we will see how to create harmless virus

How to create harmless virus
03:42

In this video we will see

Ip address

IP address
04:36

In this video we will see

Changing IP address in windows

Changing IP address in windows
04:06

In this video we will see Changing IP From the Command Line in Linux

Changing IP From the Command Line in Linux
01:53

In this video we will see 

web proxy

Web Proxy
03:57

In this video we will see VPN

VPN
03:45

In this video we will see web development

Web Development 1
01:32

In this video we will see web development 2

Web Development 2
03:11

In this video we will see web development 3

Web Development 3
04:31

In this video we will see web development 4

Web Development 4
03:04

In this video we will see web development 5

Web Development 5
06:58

In this video we will see web development 7

Web Development 6
04:40

In this video we will see web development 8

Web Development 7
05:17

In this video we will see

Introduction to web server

Introduction to Web Server
03:25

In this video we will see DVWA1

DVWA 1
03:58

In this video we will see DVWA 2

DVWA 2
05:50

In this video we will see Installing DVWA on windows.

Installing DVWA on Windows
05:11

In this video we will see programming.

Programming
05:26

In this video we will see C programming.

C programming
08:08

In this video we will see C++ program.

C++ program
06:51

In this video we will see Java program.

Java Program
06:38

In this video we will see Python.

Python
05:56
+
Web Hacking
15 Lectures 01:06:54

In this video we will see

login process and sql injections

Login Process and SQL Injections
02:14

In this video we will see

sql injection introduction

SQL Injection Introduction
05:01

In this video we will see

sql injection finding web sites

SQL Injection finding Web Sites
04:38

In this video we will see sql injection using kali linux

SQL Injection using Kali Linux
06:25

In this video we will see

sql injection using havij

SQL Injection using Havij
06:25

In this video we will see SQL in DVWA.

SQL in DVWA
07:50

In this video we will see Cross site scripting

Cross site scripting [XXS] 1
04:50

In this video we will see Cross site scripting  XSS2

Cross site scripting [XXS] 2
05:18

In this video we will see  Cross site scripting XSS 3

Cross site scripting [XXS] 3
05:25

In this video we will see XXS in DVWA

XXS in DVWA
05:43

In this video we will see

Phishing Introduction

Phishing Introduction
02:08

In this video we will see Phishing Page Development Introduction

Phishing Page Development Introduction
01:54

In this video we will see

creating phishing page using kali linux

Creating Phishing Page using Kali Linux
03:30

In this video we will see Developing Phishing site

Developing Phishing Site
02:54

In this video we will see AdWords

Phishing- Facebook Hacking AdWords
02:39
+
Miscellaneous
10 Lectures 47:48

In this video we will see

encryption

Encryption
04:25

In this video we will see Keylogger

Keylogger
02:36

In this video we will see demonstration free keylogger

Demonstration Free Keylogger
09:23

In this video we will see 

top hackers

Top Keyloggers
07:13

In this video we will see email hacking 1

Email Hacking
06:00

In this video we will see Email tracing.

Email Tracing
02:11

In this video we will see

check gmail account is hacked or not.

Check Gmail Account is Hacked or not
02:03

In this video we will see CCTV Camera Google Hacking

CCTV Camera Google Hacking
02:05

In this video we will see

windows hacking and security.

Windows Hacking and Security
05:49

In this video we will see

windows password cracking.

Windows Password Cracking
06:03
+
Wireless Hacking
25 Lectures 01:58:20

In this video we will see

wireless hacking.

Wireless Hacking
04:46

In this video we will see

wireless Hacking Continue.

Wireless Hacking Continue
02:20

In this video we will see

before WEP

before WEP
02:52

In this video we will see Wep Kali 2.0

Wep Kali 2.0
05:37

In this video we will see

MAC address.

MAC Address
05:33

In this video we will see

MAC address filtering.

MAC Address Filtering
02:01

In this video we will see Changing MAC Address on Windows, Linux and Mac

Changing MAC Address on Windows, Linux and Mac
02:51

In this video we will see

wifi hacking using reaver.

wifi hacking using reaver
04:18

In this video we will see

Reaver in depth.

Reaver in Depth
08:12

In this video we will see

Sniffers Introduction.

Sniffers Introduction
02:57

In this video we will see

WireShark.

WireShark
04:37

In this video we will see wireshark to Capture Filter and Inspect Packets

wireshark to Capture Filter and Inspect Packets
06:08

In this video we will see

metasploit.

Meta Sploit
07:11

In this video we will see

metasploit cont.

Meta Sploit 2
06:44

In this video we will see

metasploit 3

Meta Sploit 3
04:48

In this video we will see

Robots

Robots
02:12

In this video we will see

guessing.

Guessing
04:51

In this video we will see recover deleted files.

Recover Deleted Files
06:37

In this video we will see

team viewer.

Team Viewer
10:25

In this video we will see

DOS attack introduction.

DOS Attack Introduction
05:02

In this video we will see 

DOS attack tools.

DOS attack Tools
01:46

In this video we will see

DOS counter measure.

DOS Counter Measure
01:22

In this video we will see

Social engineering introduction.

Social Engineering Introduction
03:47

In this video we will see

prevention from hackers

Prevention From Hackers
04:10

In this video we will see top hackers.

Top Hackers
07:13
About the Instructor
Amit Huddar
3.4 Average rating
1,533 Reviews
56,022 Students
11 Courses
Scientist, Engineer, Android Developer,Trainer and CEO

Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company "Softdust", which develops products using new technology such as Android Wear (smartwatch and Google Glass). He believes wearable gadgets are the future of personal computing.

He believe 2017 to 2025 is meant for app developers

Many made millions out of app development, yet he believe it's just beginning.

He is CEO of Softdust  (software firm).

Amit opted to study Computer Science Engineering in 2013 at SSIT. He started his software company in his first year of Engineering and it became successful, so he dropped out in September, 2014.

He has worked on non-conventional forms of energy.

Amit demonstrated his design of a tidal energy power plant model at a national level and won awards from prestigious institutes including the ISRO (Indian Space Research Organisation) and NITK (National Institute of Technology Karnataka).

He is quantum physicist too.

Amit worked on practical application of quantum leap with fellow scientists at IISc (Indian Institute of Science), India’s leading research institute and also ranked as 23rd best in the world.

He applies and believes in the law of attraction.

Whilst the basic principles of reasoning from physics are important to him, so equally is the law of attraction also important. This plays a very important role in his life.

Skills: Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, building custom Linux OS, cloud computing, penetration testing, Kali Linux and Hacking.
Languages spoken: English, Hindi, Kannada.