Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Blogging Freelancing Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Become Ethical Hacker in 15 Hours

Let us help you to create an ethical hacking career. Learn penetration testing and more, become Ethical hacker in hours
Rating: 4.1 out of 54.1 (2 ratings)
50 students
Created by Oak Academy
Last updated 2/2021
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Setting Up The Laboratory
  • Install Kali Linux - A Penetration Testing Operating System
  • Install Windows & Vulnerable Operating Systems as Virtual Machines For Testing
  • Discover vulnerable applications
  • Vulnerability scanning,
  • Exploit, Post Exploit
  • Gain Control Over Computer Systems Using Server Side Attacks
  • Exploit Vulnerabilities to Gain Control Over Systems
  • Gatheri Password Hashes
  • Cracking Passwords
  • Learn Free Web App Hacking Tools
  • The Very Latest Up-To-Date Information and Methods

Requirements

  • 8 GB (Gigabytes) of RAM or higher (16 GB recommended)
  • 64-bit system processor is mandatory
  • 20 GB or more disk space
  • A strong desire to understand hacker tools and techniques
  • Modern Browsers like Google Chrome (latest), Mozilla Firefox (latest), Microsoft Edge (latest)
  • Be able to download and install all the free software and tools needed to practice
  • Nothing else! It’s just you, your computer and your ambition to get started today

Description

Hi there,

  • Are you ready to gain new cybersecurity skills to improve your career opportunities?

  • Are you looking for a career in penetration testing?

If you are planning an Ethical Hacking career and if this is something that interests you then you are at the right place.

OAK Academy wants you to know we’re here to help.

Last year, Penetration Testers ranked as one of the 3 most in-demand jobs in the growing cybersecurity job market, and with our guided learning you’ll gain real-world, hands-on experience with the latest technologies. Our Become Ethical Hacker in 15 Hours provides you with the latest free tools and resources to grow your knowledge and achieve your career goals.

Our video courses cover a broad range of topics and are accessible anytime, anywhere. You can gain real, hands-on experience from the comfort of your own home.

No experience? Not a Problem

If you don’t have any previous experience in Ethical Hacking, not a problem!  Our Become Ethical Hacker in 15 Hours is for everyone!

This course is expertly designed to teach everyone from complete beginners, right through to pro hackers.  With this course, you will have a chance to learn to identify and expose weaknesses in an organization’s network with the same methods black hat hackers use to exploit their victims.

And if you are a pro-Ethical Hacker, then take this course to quickly absorb the latest skills, while refreshing existing ones.


Free Ethical Hacking Tools

The good news is: 

All applications and tools recommended are free. So you don’t need to buy any tool or application.

This course is focused on the practical side of penetration testing and ethical hacking but I also will share with you the theory side of each attack. Before jumping into Penetration Testing or other practices with Ethical Hacking tools you will first learn how to set up a lab and install needed software on your machine.  

When you finish this course you will learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that you can directly apply when you get back to work. So you will also learn all the tips and tricks so that you can win the battle against the wide range of cyber adversaries that want to harm your environment.  

Why would you want to take this course? 

Our answer is simple: The quality of teaching.

When you enroll, you will feel the OAK Academy`s seasoned developers' expertise. 

Step-by-Step Way, Simple and Easy With Exercises

By the end of the course, you’ll have a firm understanding of the Ethical Hacking and Penetration Testing and valuable insights on how things work under the hood and you'll also be very confident, and hungry to learn more. T

Video and Audio Production Quality

All our videos are created/produced as high-quality video and audio to provide you the best learning experience.

You will be,

  • Seeing clearly

  • Hearing clearly

  • Moving through the course without distractions

You'll also get:

Lifetime Access to The Course

Fast & Friendly Support in the Q&A section


Dive in now to our Become Ethical Hacker in 15 Hours course

We offer full support, answering any questions.

See you in the course!


IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.  

Who this course is for:

  • People who want to start from scratch and to move more advanced level
  • People who are cyber security experts
  • People who want job transition into Cyber Security
  • System administrators who are on the front lines defending their systems and responding to attacks
  • Other security personnel who are first responders when systems are under attack

Course content

10 sections • 187 lectures • 15h 55m total length

  • Preview02:13

  • Preview01:30
  • Enabling Virtualization (VT-x or AMD-V) in BIOS
    00:42
  • Preview09:36
  • Free Windows Operating Systems on Oracle VM VirtualBox
    00:08
  • OWASP Broken Web Applications
    05:24
  • Installing Metasploitable 2
    03:12
  • Configuring NAT Network for VirtualBox
    01:07
  • Connections of Virtual Machines
    02:58

  • Introduction
    05:24
  • Using Search Engines & Google Hacking to Gather Information
    03:36
  • Shodan
    02:49
  • Web Archives
    01:53
  • The Harvester & Recon-NG
    03:22

  • Passive Scan - Definition
    02:50
  • Passive Scan - ARP Tables
    06:20
  • Passive Scan - Wireshark
    06:36
  • Wireshark: Following Stream
    06:36
  • Wireshark: Summarise Network
    06:19
  • Active Scan
    08:30
  • MitM: Listening to the traffic
    01:45
  • Sniffing
    01:03
  • TCPDump
    05:23
  • How to Expand Sniffing Space?
    05:13
  • ARP Spoof
    03:40
  • ARP Cache Poisoning using Ettercap
    10:35
  • Introduction to Nmap
    04:14
  • Ping Scan
    04:59
  • Introduction to Port Scan
    01:12
  • SYN Scan
    06:07
  • Details of the Port Scan
    08:15
  • TCP Scan
    07:11
  • UDP Scan
    04:11
  • Version Detection in Nmap
    07:10
  • Operating System Detection
    05:58
  • Input & Output Management in Nmap
    08:28
  • Nmap Scripting Engine: Introduction
    03:40
  • Nmap Scripting Engine: First Run
    07:44
  • Nmap Scripting Engine: First Example
    02:21
  • Nmap Scripting Engine: Second Example
    02:48
  • Nmap Aggressive Scan
    00:08
  • How to Bypass Security Measures in Nmap Scans
    06:07
  • Timing of the Scans
    05:45

  • Intro to Nessus
    01:57
  • Download Nessus
    01:46
  • Install Nessus
    03:44
  • Creating Policy
    05:39
  • Scanning
    07:06
  • Reporting
    02:20
  • Lab Exercise - 2
    02:47
  • An Aggressive Scan with Nessus: Start
    04:23
  • An Aggressive Scan with Nessus: Results
    07:17
  • An Aggressive Scan with Nessus: Results with Windows Targets
    02:45

  • Exploit Databases
    01:56
  • Manual Exploitation
    05:39
  • Exploitation Frameworks
    03:36
  • Metasploit Filesystem and Libraries
    04:31
  • The Architecture of MSF
    01:43
  • Auxiliary Modules
    04:36
  • Payload Modules
    06:00
  • Exploit Modules
    03:33
  • Encoder Modules
    02:35
  • Post Modules
    03:24
  • Metasploit Editions
    04:02
  • Metasploit Community
    03:08
  • Metasploit Interfaces
    04:50
  • MSFconsole
    04:53
  • MSFConsole Basic Commands 1
    06:44
  • MSFConsole Basic Commands 2
    07:59
  • MSFConsole Basic Commands 3
    03:32
  • Using Databases in MSF 1
    05:42
  • Using Databases in MSF 2
    03:14
  • More on Exploits in MSF
    03:14
  • Nmap Integration and Port Scanning
    06:17
  • SMB and Samba Enumeration
    05:40
  • MySQL Enumeration
    03:40
  • FTP Enumeration
    04:15
  • SSH Enumeration
    02:30
  • HTTP Enumeration
    06:02
  • SNMP Enumeration
    03:43
  • MTP Enumeration
    03:49
  • Using Shodan with MSF
    04:58
  • Integrating Nessus into MSF
    04:40

  • Introduction to Post-Exploitation
    03:28
  • Persistence Module of Meterpreter
    08:55
  • Removing a Persistence Backdoor
    05:00
  • Persist on a Windows 8 Using Meterpreter's Persistence Module
    02:57
  • Another Way of Persistence: Persistence Exe - I
    04:40
  • Another Way of Persistence: Persistence Exe - II
    04:32
  • Meterpreter for Post-Exploitation
    01:37
  • Meterpreter for Post-Exploitation: Core Extension
    01:45
  • Meterpreter for Post-Exploitation: Core Extension - Session Commands
    02:31
  • Meterpreter for Post-Exploitation: Core Extension - Channel Command
    02:43
  • Meterpreter for Post-Exploitation: Core Extension - Migrate Commands
    03:34
  • Meterpreter for Post-Exploitation: Stdapi Extension
    01:05
  • Meterpreter for Post-Exploitation: Stdapi Extension - File System Commands
    05:19
  • Meterpreter for Post-Exploitation: Stdapi Extension - System Commands
    04:13
  • Meterpreter for Post-Exploitation: Stdapi Extension - User Interface Commands
    04:08
  • Meterpreter for Post-Exploitation: Incognito Extension
    03:26
  • Meterpreter for Post-Exploitation: Mimikatz Extension
    03:53
  • Post Modules of Metasploit Framework (MSF)
    02:01
  • Post Modules: Gathering Modules
    01:21
  • Post Modules: Managing Modules
    06:51
  • MSFvenom Part 1
    14:08
  • MSFvenom Part 2
    02:25
  • TheFatRat Installation
    04:19
  • TheFatRat in Action
    11:08
  • TheFatRat: Overcoming a Problem
    00:46
  • Embedding Malware in PDF
    04:04
  • Embedding Malware in WORD
    09:21
  • Embedding Malware in Firefox Add-on
    07:02
  • Empire Installation
    04:07
  • Empire in Action Part 1
    08:12
  • Empire in Action Part 2
    04:23
  • Exploiting Java Vulnerabilities
    02:24

  • Introduction to Password Cracking
    03:06
  • Password Hashes of Windows Systems
    03:30
  • Password Hashes of Linux Systems
    02:33
  • Classification of Password Cracking
    02:12
  • Password Cracking Tools
    00:08
  • Hydra: Cracking the Password of a Web App
    10:01
  • Password Cracking with Cain & Abel
    01:01
  • Cain & Abel - Step 1: Install & First Run
    02:39
  • Cain & Abel: Gathering Hashes
    04:40
  • Cain & Abel: Importing Hashes
    04:31
  • Cain & Abel: A Dictionary Attack
    04:19
  • Cain & Abel: A Brute Force Attack
    03:32
  • John the Ripper
    07:28

  • Types of Security Testing
    09:43
  • Burp: Downloading, Installing and Running
    07:53
  • Burp: Capturing HTTP Traffic and Setting FoxyProxy
    09:37
  • Burp: Capturing HTTPS Traffic
    03:11
  • Intro to Reconnaissance
    03:31
  • Extract Domain Registration Information: Whois
    04:19
  • Identifying Hosts or Subdomains Using DNS: Fierce & Theharvester
    06:07
  • Detect Applications on The Same Service
    01:09
  • Ports and Services on The Web Server
    08:44
  • Review Technology/Architecture Information
    04:36
  • Extracting Directory Structure: Crawling
    08:17
  • Minimum Information Principle
    02:56
  • Using Search Engines: Google Hacking
    06:10
  • Definition
    02:37
  • Creating a Password List: Crunch
    07:31
  • Difference Between HTTP and HTTPS Traffic: Wireshark
    03:43
  • Attacking Insecure Login Mechanisms
    09:12
  • Attacking Insecure Logout Mechanisms
    04:50
  • Attacking Improper Password Recovery Mechanisms
    05:50
  • Attacking Insecure CAPTCHA Implementations
    08:39
  • Path Traversal: Directory
    06:43
  • Path Traversal: File
    05:41
  • Local File Inclusion Vulnerabilities
    06:11
  • Remote File Inclusion Vulnerabilities
    05:51
  • Http Only Cookies
    07:15
  • Secure Cookies
    03:48
  • Session ID Related Issues
    01:57
  • Session Fixation
    05:37
  • Introduction Cross-Site Request Forgery
    07:08
  • Stealing and Bypassing AntiCSRF Tokens
    07:59
  • Reflected Cross-Site Scripting Attacks
    09:42
  • Reflected Cross-Site Scripting over JSON
    06:24
  • Stored Cross-Site Scripting Attacks
    09:56
  • DOM Based Cross-Site Scripting Attacks
    10:04
  • Inband SQL Injection over a Search Form
    14:24
  • Inband SQL Injection over a Select Form
    08:22
  • Error-Based SQL Injection over a Login Form
    06:47
  • SQL Injection over Insert Statement
    07:07
  • Boolean Based Blind SQL Injection
    06:53
  • Time Based Blind SQL Injection
    05:34
  • Detecting and Exploiting SQL Injection with SQLmap
    11:30
  • Detecting and Exploiting Error Based SQL Injection with SQLmap
    05:10
  • Detecting and Exploiting Boolean and Time Based Blind SQL Injection with SQLmap
    08:02
  • Command Injection Introduction
    05:35
  • Automate Command Injection Attacks: Commix
    05:43
  • XML/XPATH Injection
    14:07
  • SMTP Mail Header Injection
    06:51
  • PHP Code Injection
    06:00
  • Heartbleed Attack
    06:29
  • Attacking HTML5 Insecure Local Storage
    04:58
  • Druppal SQL Injection: Drupageddon (CVE-2014-3704)
    07:49
  • SQLite Manager: File Inclusion (CVE-2007-1232)
    04:52
  • SQLite Manager: PHP Remote Code Injection
    02:55
  • SQLite Manager: XSS (CVE-2012-5105)
    06:44
  • Bypassing Cross Origin Resource Sharing
    09:04
  • XML External Entity Attack
    08:02
  • Attacking Unrestricted File Upload Mechanisms
    07:05
  • Server-Side Request Forgery
    06:35

  • BONUS
    04:45

Instructor

Oak Academy
LONG LIVE TECH KNOWLEDGE
Oak Academy
  • 4.3 Instructor Rating
  • 3,647 Reviews
  • 25,247 Students
  • 152 Courses

Hi there,

By 2024, there will be more than 1 million unfilled computing jobs and the skills gap is a global problem. This was our starting point.

At OAK Academy, we are the tech experts who have been in the sector for years and years. We are deeply rooted in the tech world. We know the tech industry. And we know the tech industry's biggest problem is the “tech skills gap” and here is our solution.

OAK Academy will be the bridge between the tech industry and people who

-are planning a new career

-are thinking career transformation

-want career shift or reinvention,

-have the desire to learn new hobbies at their own pace

Because we know we can help this generation gain the skill to fill these jobs and enjoy happier, more fulfilling careers. And this is what motivates us every day.

We specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to our practical alignment we are able to constantly translate industry insights into the most in-demand and up-to-date courses,

OAK Academy will provide you the information and support you need to move through your journey with confidence and ease.

Our courses are for everyone. Whether you are someone who has never programmed before, or an existing programmer seeking to learn another language, or even someone looking to switch careers we are here.

OAK Academy here to transforms passionate, enthusiastic people to reach their dream job positions.

If you need help or if you have any questions, please do not hesitate to contact our team.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.