Be A White Hat Hacker and Pen Tester

Master Practical White Hat Hacking Techniques and Pen Testing
3.0 (59 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
3,784 students enrolled
Take This Course
  • Lectures 24
  • Length 4.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2015 English

Course Description

Become a white hat hacker and learn all the practical techniques for penetration testing with this amazing course which will provide conceptual framework to your security training. The course not only covers theoretical concepts but cover the practical demonstrations of various tools like Metaspoilt, Scapy and WireShark.

The course is divided into the following main sections:

Ethical Hacking Concepts

-What is Ethical Hacking? Know about different types of hackers. Get to know about hacktivism and practical pen testing techniques

Real World Information Gathering

-Learn about foot printing and reconnaissance, Email harvesting, Learn and master SSL scan, Maltego, Whatweb, HttpRecon. Work on techniques like IP address geolocation, DNS and Mail Server Enumeration

Scanning and Vulnerability Gathering

-Learn to use scapy for packet crafting and port scanning, Learn to use network scanning techniques and work on vulnerability identification

Network Attacking Techniques

Master techniques for password cracking, MITM, Sniffing SSL and RDP attacks

Web Exploitation Techniques

Learn about password attacks, SQL Injections, RCE and DOS attacks

Wireless Network Security

Standards in Wireless security, WEP encryption, Wireless sniffing, Protecting Wireless networks


Learn to use the metaspoilt tool for your projects

Detection Evasion

Learn about the detection evasion techniques

This exhaustive course covers everything you need to know about white hat hacking. Get the Knowledge, Get the Expertise.

What are the requirements?

  • Students should have some background in testing and knowledge of web servers, networks and web technologies

What am I going to get from this course?

  • Master Ethical Hacking
  • Apply concepts learnt to ethically hack Systems and Networks
  • Understand Security Paradigms and will be able to create more secure systems and software
  • Act as a security and Pen testing consultant

Who is the target audience?

  • Students who want to be system security professionals
  • Students who want to learn Ethical Hacking

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Introduction To Ethical Hacking

Introduction to the Ethical Hacking Course

Section 2: Introduction to Ethical hacking and Penetration testing

The lecture explains the basic concepts behind Pen testing and Ethical Hacking

Section 3: Real World information gathering

The Lecture covers topics such as foot printing reconnaissance, harvesting company emails and maltego


Learn to use Maltego.


Learn all about search engines and concepts such as SSL scan, whatweb and ip address geolocation


This Lecture cover concepts such as DNS enumeration and Mail server enumeration

Section 4: Scanning and Vulnerability gathering

Learn to use Scapy for vulnerability accessment


Learn all about vulnerability Identification and assesment


Learn practical avoidance techniques and concepts

Section 5: Network attacking techniques

Learn the major network attacking techniques


A practical demo for wifi hack

Section 6: Desktop Hacking Techniques

Learn all about the desktop hacking techniques


Learn the concepts behind Linux and Windows Hacking

Section 7: Web Exploitation Techniques
Web Exploitation - Basic Techniques
Web Testing Tools
Exploiting and Counter Measures
Section 8: Wireless network Security

Learn all about wireless networks, standards and wifi security threads

Wireless network Security - Breaking WEP Encryption

Learn to do wireless sniffing with wire shark

Section 9: Metasploit

Introduction to Metaspoilt


Lecture describes the advance Metaspoilt features


Learn the practical techniques to use Metaspoilt

Section 10: Detection Evasion

Learn detection evasion techniques such as encryption and Obfuscation

Section 11: Summary

Course Summary

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Eduonix Learning Soultions, 1+ Million Students Worldwide | 200+ Courses

Eduonix creates and distributes high quality technology training content. Our team of industry professionals have been training manpower for more than a decade. We aim to teach technology the way it is used in industry and professional world. We have professional team of trainers for technologies ranging from Mobility, Web to Enterprise and Database and Server Administration.

Instructor Biography

Ready to start learning?
Take This Course