Ethical Hacking for Beginners
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
0 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Ethical Hacking for Beginners to your Wishlist.

Add to Wishlist

Ethical Hacking for Beginners

An introduction to building and hacking your own web environment
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
0 students enrolled
Created by Craig Anthony
Last updated 5/2017
Current price: $10 Original price: $80 Discount: 88% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Install a virtual machine
  • Install and operate Kali Linux
  • Install a web server and website
  • Understand the hacker methodology
  • Understand 4 common hacking techniques
View Curriculum
  • You should have a PC with enough disk space and memory to install a virtual machine and a new operating system

You've likely heard about hacking—perhaps in movies or on the news—and you've certainly taken steps to protect your online identity from hackers. But what is hacking, who does it, and why? In this comprehensive course on the fundamentals of web hacking, answer these questions and more. Begin by reviewing the hacker methodology, types of hack attacks, and learn to configure test servers to hack yourself! Finally, review network mapping, and think through potential careers in cyber security.

Who is the target audience?
  • People interested in an introduction to web application hacking
  • People interested in a career in cyber security
Compare to Other Ethical Hacking Courses
Curriculum For This Course
11 Lectures
Introduction and Game Plan
3 Lectures 31:48

This introductory video will teach students: what is a hacker? After watching this video, you will know what a hacker is, what a hacker is not, and what you can do to start learning.

Preview 17:03

The hacker methodology follows the stages of the kill chain as developed by Lockheed Martin. When ethical hackers begin training, they follow this methodology to ensure they are thorough. In this lesson you'll learn about the hacker methodology and each stage of the kill chain.

Preview 07:06

In this lesson we will review our plan for the course moving forward. 

Preview 07:39
Building our platform
3 Lectures 28:50

You will be building your vulnerable servers and performing your attacks using the Kali linux distribution. In this lesson I will walk you through the installation of this distro. 

Install Kali Linux

Quiz 2
2 questions

In this lesson we will install Webgoat, a vulnerable web server. By installing Webgoat, you will start learning introductory security attacks. Because hacking outside networks is illegal, throughout this course we will hack into our own servers. This lesson builds one of the two servers we will be hacking into.

Installing Webgoat

Installing Wordpress
Hacking our platform
5 Lectures 52:31

The first stage of ethical hacking to to perform recon. In this lesson I'll walk you through a tried-and-true method for scanning networks. This activity helps you plan your attack and gain useful insight into your target.

Scanning the network

1 question

In this lesson we introduce poorly formed SQL database attacks. When modern web applications pull data from SQL databases, if poorly written they can be vulnerable to attack. This lesson introduces you to that concept.

SQL Injection Attacks

In this lesson I'll walk you through a cross-site scripting attack. This is how you can use a hacked website to infect others with your malware. It's an exciting concept.

XSS Attacks

When hackers are able to download hashed usernames and passwords, they are then able to run dictionary or brute-force attacks against those passwords. In this lesson I'll show how a poorly secured wordpress site lets people actively run a brute force attack against the users passwords.

Brute Force Dictionary Attacks

We need people like you in a cyber security career. Yes, we need ethical hackers, but also non-technical or non-hacker-types who are interested in cyber security. Let me help you get into this exciting career.

Next Steps
About the Instructor
Craig Anthony
4.2 Average rating
13 Reviews
3,544 Students
5 Courses
Test Prep

I've been a test prep and admissions tutors since 2003. I have also been a cyber security consultant since 2014. I started as an SAT and GMAT tutor with Princeton Review. Whilst in uni, I tutored students. I then became director of operations for the Princeton Review in Texas and Thailand. After Princeton Review, I was senior course director for Prep Zone Singapore, wherein I developed a system of instruction that guarantees non-native English speakers excellent SAT marks.


All of my courses are affordable. 

They are also affordable. Why? Because test preparation is inherently unfair. If you have thousands of dollars, you can hire someone like me to sit in your living room and walk you through the lessons. That will always be true. But the information... the strategies, tactics, and knowledge... those should NOT be super expensive.

These courses teach you all you need and afford you the opportunity to ask questions. Take advantage of these in your training and you will do exceptionally well on your exams.