Beginners guide to ethical hacking and penetration testing
4.1 (46 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
268 students enrolled

Beginners guide to ethical hacking and penetration testing

A beginners guide to ethical hacking and penetration testing.
4.1 (46 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
268 students enrolled
Created by Jeff M
Last updated 11/2019
English
English [Auto]
Current price: $69.99 Original price: $99.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 9 hours on-demand video
  • 1 article
  • 4 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • A good understanding of the basics for ethical hacking and penetration testing.
Requirements
  • Basic understanding of computers and networking. A Windows, Linux, or OSX machine with (preferably) 8 GB or more of memory and 50 GB of drive space free to follow along.
Description

Hacking (both good and bad) seems to be in the news on a daily basis now. Large data breaches, phishing attacks, voter registration hacked, Smartphones hacked, etc. In this course we go over the basics for ethical hacking and penetration testing. We go step by step building a virtual lab, loading various tools and learning how a malicious hacker thinks and operates. Phishing, password hacking, methodology, OSINT, DDOS attacks, and much more is covered in this course. Learn how a hacker thinks, their methodology and tools in order to help defend from them. You don't need to have a high technical knowledge. In this course I try to break things down in order for you to follow along and understand. As with any course that I offer. If you have any questions during or even after you finish? Feel free to message me and I will do my best to get back to you and help you out.

Who this course is for:
  • Anyone that wants to learn ethical hacking, penetration testing, network security, personal security or is curious.
Course content
Expand 87 lectures 08:46:22
+ Introduction
87 lectures 08:46:22

Welcome to the course! I am very happy to see you here and a I hope that you find this course both informative and useful. At any time if you have any questions feel free to contact me.

Preview 04:01

In this video we go over what you will need for this course.

Preview 02:46

In this video we discuss some quick disclaimers about this course.

Preview 02:05

What's the color of your hat? In this video we discuss the types of hats a hacker wears.

Preview 02:09

What color hats do hackers have?

What color is your hat?
1 question

Is there really more than one type of hacker? In this video we talk about the various types of hackers.

Types of hackers
04:47

In this video we talk about Black box, white box, and grey box hacking.

What's in the box?!
02:04

In this video we discuss the 5 critical phases of hacking.

Hacking Phases
06:58

What is the correct order for the phases of hacking?

Hacking phases
1 question

There are various teams when it comes to hacking and penetration testing.

Team colors
02:10

Taking good notes as a hacker, penetration tester, or network security person is critical. In this video we take a look at Cherrytree.

Taking notes
06:36

This is a downloadable form for Pentesting and OSINT based on the EC-Council form. Feel free to use or mark up as you wish.

Agreement form (example)
00:53

In this video we take a look at some useful browser plugins.

Browser plugins
08:20

In this video we talk about the browser plugin no script.

No script
11:16

In this video we learn what pivoting means in terms of hacking, and why it's so important.

Pivoting
02:35

In this video we go over how to setup a virtual lab in VirtualBox.

Setting up Virtualbox (Windows) & Local laws
13:01

In this video we go over how to setup a virtual lab in VMware player (Windows and Linux only).

VMware Player
06:33

In this video we go over some basic Linux commands.

Basic linux commands
16:08

In this video we go over a very basic tutorial on TCP/IP.

Very basic TCP/IP
05:05

Traveling back in time through the internet with the Way back machine.

Internet archive
02:06

In this video we leverage the site have I been pwned and pwned passwords.

Have i been pwned and pwned passwords
06:12

In this video we find out how to resurrect dead internet pages.

Resurect pages plugin
02:57

In this video we go over website reconnaissance basics.

Websites
06:14

In this video we learn how to do basic people reconnaissance.

People searching
08:29

Google hacking! Well we aren't really hacking Google itself, but leveraging it's deeper tools.

Google Hacking
06:35

Doing some reconnaissance with Google maps and streets.

Google maps, streetview, and Wigle
05:25

Discovering network devices with netdiscover.

Netdiscover
02:58

Maltego, one of the best tools in your arsenal! In this video we learn what it is and what it can do for us.

Maltego
12:10

In this video we go over some hardware recon options.

Hardware
03:14

In this video we talk about what vishing is (not phishing) and how it can be done.

Vishing
05:50

In this video we take a look a the vulnerability scanner OpenVAS.

Install instructions if it's not installed: https://www.kali.org/penetration-testing/openvas-vulnerability-scanning/

OpenVas
11:28

Shodan is one of the best scanners on the internet. You can search out just about any internet connected device on this.

Shodan
04:58

Similar to Haveibeenpwned, we look at how this can be leveraged for OSINT and hacking.

Dehashed
03:48

A incredibly powerful and free network packet sniffing scanning tool.

Wireshark
05:20

Nmap is a network scanning tool, Zenmap is the GUI version.

Nmap/Zenmap
08:39

Just a quick clarification on Zenmap.

Nmap/Zenmap clarification
01:04

In this video we go over what a dictionary attack is vs a brute force attack.

Password lecture. Dictionary vs Brute force
06:47

In this video we learn how to harvest credentials using SET (The Social Engineer Toolkit).

Credential harvesting with SET
06:54

In this video we learn how to hook people using the Beef framework.

Beef
06:53

In this video we learn how to make a working keylogger using (s)AINT.

Making a keylogger with (s)AINT
07:46

In this video we see our keylogger in action.

Keyloggers and keepass and saint running
10:10

In this video we learn how to build a portable hacking toolkit using a USB drive.

Hardware hacking: Build a USB toolkit
14:31

In this video we demo our new toolkit.

Hardware hacking: Build a USB toolkit demo
02:47

In this video we learn how to bypass a Windows 8.1 x64 password using Kali (also installed on our USB toolkit).

Bypassing Windows 8.1 password with Kali boot USB
04:38

In this video we turn a Android phone into a Kali Linux hacking device.

Kali Nethunter: Hardware hacking
04:14

We demo our Android phone.

Kali Nethunter: Hardware hacking part 2
04:26

In this video we demo Hak5's USB Rubber Ducky a HID hacking device.

Hardware hacking: The Hak5 USB Rubber Ducky
10:34

In this video we take a look at some basic Android hacking tools.

Android hacking basics
07:49

We launch a man in the middle attack with Zanti and a android phone.

Android Zanti MiTM
06:40

In this video we learn all about phishing.

Phishing
16:47

In this video we talk about powershell and batch files in hacking.

Powershell and batch (bat) files
06:45

We start making viruses that can go undetected by anti virus software with the Fat Rat.

The Fat Rat
17:02

In this video we learn about Denial of service attacks and Distributed denial of service attacks.

DDOS/DOS
10:59

We start brute forcing server directories with dirbuster.

Dirbuster
05:57

In this video we talk about what a man in the middle attack is and what can be done using it.

MITM
03:22

Metasploit is one of the most important programs to learn for hacking and penetration testing.

Metasploit
09:49

In this video we take a look at Armitage, a graphical version for Metasploit.

Armitage
07:23

Phishing with Wifiphisher program.

Wifi Phishing with Wifiphisher
08:16

This is Sparta! A program to scan and break into computers and servers.

Sparta
05:21

In this video we build a simple virus to crash a computer using 1 small line of code and notepad.

Making a simple virus (forkbomb example)
03:43

In this video we go over why it's important to make a alias.

Creating a alias
03:56

In this video we learn how to hide files.

Steganography
07:34

In this video we talk about Tor.

Covering tracks: Tor
07:56

In this video we learn how to setup a simple honeypot to help keep the bad-guys (and girls) out of our network.

IDS/Honeypot (Intrusion Detection System) Pentbox
06:22

Do you really think deleting a file really get's rid of it? In this video we talk about file deletion and recovery.

File delete and recovery
09:50

In this video we learn how to hide our self using proxy chains.

Proxy chains
07:40

In this video we discuss how to cover our tracks.

Covering tracks: Clearing logs
02:56

In this video we go over tailgaiting, shoulder surfing, dumpster diving.

Tailgating, shoulder surfing, dumpster diving
03:10

In this video we learn how to change our MAC address to avoid detection.

MAC changer
04:17

In this video we are cracking zip and rar passwords.

John the ripper zip and rar files
04:16

Transfer files over the Tor network.

Onionshare
04:21

In this video we take a look at how to setup a Man in the middle attack using Kali Linux, Ettercap, and Wireshark.

If you have problems sniffing the traffic, enter the following in the Kali terminal: sysctl -w net.ipv4.ip_forward=1

Man in the middle attack with Ettercap and Wireshark
06:27

In this video we take a look at the Fern wireless cracker program.

Fern wireless hacking brute force
03:57

In this video we take a look at the easy way to crack Wireless passwords on Windows.

Hacking Windows wireless passwords (easy)
02:28

In this video we take a look at staying anonymous with sadd.io

Covering tracks: https://sadd.io/
05:24

In this video we take a look at disposable emails.

Guerrilla Mail
01:50

In this video we launch a attack start to finish.

Launching an attack
11:58

In this video we talk about moving beyond this course and advancing your skillset.

Moving beyond this course
02:52

In this video we go over some additional media.

Media
02:50

Get paid to hack? Check out bug bounties.

Bug bounty programs
07:27

Where is it ok to hack?

Where is it ok to hack? Quiz
1 question

In this video we take a look at some places that want you to hack them.

Places that want you to hack them (sort of)
03:35

Congratulations on finishing the course.

In closing
02:24

As a bonus for buying this game, I am putting up a free download for one of the games I made: The hacking intern. It's a short CTF style game in a 8 bit style. At some point I will go back and redesign this from top to bottom, but for now, enjoy!

Bonus: The hacking intern game
00:00

In this video we take a look at how to use the Cherrytree templates that are in this course.

Bonus: How to use Cherrytree templates
04:59

In this section we do program a simple menu driven Bat program and make a Linux script.

Bonus: Bat program and Scripting for Linux
10:54
Bonus: Locking picking basics Part 1
02:46

In this video we go over lock picks and actually picking a lock. If the audio is too hard to hear let me know.

Bonus Lock picking basics Part 2
02:58
Bonus: I am ROOT
03:58
Bonus: Kali Linux 2019 4 released
02:50