Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Blogging Freelancing Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Complete Ethical Hacking and Penetration Testing Course

My Ethical Hacking course includes Web Hacking, Phishing, NMAP, Password Cracking, Penetration Testing, Metasploit &more
Rating: 4.2 out of 54.2 (35 ratings)
355 students
Created by Oak Academy
Last updated 2/2021
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Learn Ethical Hacking with Penetration Testing
  • Setting Up The Laboratory
  • Install Kali Linux - a penetration testing operating system
  • Install Windows & vulnerable operating systems as virtual machines for testing
  • Discover vulnerable applications
  • What is TCP/IP model
  • What is OSI model
  • How to scan TCP or UDP services?
  • Exploit vulnerabilities to gain control over systems
  • Vulnerability scanning, Exploit, Post Exploit, Payload
  • Learn about script scanning
  • Gain control over computer systems using server side attacks
  • Gathering password hashes, cracking passwords, taking screenshots, logging keystrokes etc.
  • Using backdoors to persist on the victim machine
  • Information Gathering Over the Internet Tools
  • Web App Hacking Tools
  • Social Engineering Toolkit (SET) for Phishing
  • The very latest up-to-date information and methods
  • What is Port ? What is TCP/UDP port ?

Requirements

  • 8 GB (Gigabytes) of RAM or higher (16 GB recommended)
  • 64-bit system processor is mandatory
  • 20 GB or more disk space
  • Enable virtualization technology on BIOS settings, such as “Intel-VTx”
  • Modern Browsers like Google Chrome (latest), Mozilla Firefox (latest), Microsoft Edge (latest)
  • All items referenced in this course are Free
  • A computer for installing all the free software and tools needed to practice
  • A strong desire to understand hacker tools and techniques
  • Be able to download and install all the free software and tools needed to practice
  • A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
  • Nothing else! It’s just you, your computer and your ambition to get started today

Description

Welcome to Complete Ethical Hacking and Penetration Testing Course.

My Complete Ethical Hacking and Penetration Testing Course is for everyone! If you don’t have any previous experience on a Ethical Hacking, not a problem! 

This course is expertly designed to teach everyone from complete beginners, right through to pro hackers. You'll go from beginner to extremely high-level and I will take you through each step with hands-on examples.

And if you are a pro-Ethical Hacker, then take this course to quickly absorb the latest skills, while refreshing existing ones.

The good news is: 

All applications and tools recommended are free. So you don’t need to buy any tool or application.

Before attending the course please read below the course requirements.

This course is focused on the practical side of penetration testing and ethical hacking but I also will share with you the theory side of each attack. Before jumping into Penetration Testing or other practices with Ethical Hacking tools you will first learn how to set up a lab and install needed software on your machine.   In this course, you will have a chance to keep yourself up-to-date and equip yourself with a range of Ethical Hacking skills.

When you finish this course you will learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that you can directly apply when you get back to work. I am coming from the field and I will be sharing my 20 years' experience with all of you. So you will also learn tips and tricks from me so that you can win the battle against the wide range of cyber adversaries that want to harm your environment.  

Requirements

CPU: 64-bit Intel i5/i7 (4th generation +) - x64 bit 2.0+ GHz processor or more recent processor is mandatory for this class (Important - Please Read: a 64-bit system processor is mandatory)

Virtualization Technology: Enable virtualization technology on BIOS settings, such as “Intel-VTx”.

RAM : 8 GB (Gigabytes) of RAM or higher (16 GB recommended)

Modern Browsers:

  • Google Chrome (latest)

  • Mozilla Firefox (latest)

  • Microsoft Edge (latest)

Disk : 20 GB or more disk space


Here is the list of  what you’ll learn by the end of course,    

Setting Up The Laboratory
Set Up Kali Linux from VM
Set Up Kali Linux from ISO File
Set Up a Victim: Metasploitable Linux
Set Up a Victim: OWASP Broken Web Applications
Set Up a Victim: Windows System


Penetration Test

Penetration Test Types
Security Audit
Vulnerability Scan
Penetration Test Approaches: Black Box to White Box
Penetration Test Phases: Reconnaissance to Reporting
Legal Issues Testing Standards


Network Scan

Network Scan Types
Passive Scan With Wireshark
Passive Scan with ARP Tables
Active Scan with Hping
Hping for Another Purpose: DDos


Nmap for Active Network Scan

Ping Scan to Enumerate Network Hosts
Port Scan with Nmap
SYN Scan, TCP Scan, UDP Scan
Version & Operating System Detection
Input & Output Management in Nmap
Nmap Scripting Engine
How to Bypass Security Measures in Nmap Scans
Some Other Types of Scans: XMAS, ACK, etc.
Idle (Stealth) Scan


Vulnerability Scan

Introduction to Vulnerability Scan
Introduction to a Vulnerability Scanner: Nessus
Nessus: Download, Install & Setup
Nessus: Creating a Custom Policy
Nessus: First Scan
An Aggressive Scan
Nessus: Report Function


Exploitation

Exploitation Terminologies
Exploit Databases
Manual Exploitation
Exploitation Frameworks
Metasploit Framework (MSF)
Introduction to MSF Console
MSF Console & How to Run an Exploit
Introduction to Meterpreter
Gaining a Meterpreter Session
Meterpreter Basics
Pass the Hash: Hack Even There is No Vulnerability

Post-Exploitation

Persistence: What is it?
Persistence Module of Meterpreter
Removing a Persistence Backdoor
Next Generation Persistence
Meterpreter for Post-Exploitation with Extensions: Core, Stdapi, Mimikatz...
Post Modules of Metasploit Framework (MSF)
Collecting Sensitive Data in Post-Exploitation Phase


Password Cracking

Password Hashes of Windows Systems
Password Hashes of Linux Systems
Classification of Password Cracking
Password Cracking Tools in Action: Hydra, Cain and Abel, John the Ripper...

OSINT (Open Source Intelligent) & Information Gathering Over the Internet

Introduction to Information Gathering
Using Search Engines to Gather Information
Search Engine Tools: SiteDigger and SearchDiggity
Shodan
Gathering Information About the People
Web Archives
FOCA - Fingerprinting Organisations with Collected Archives
Fingerprinting Tools: The Harvester and Recon-NG
Maltego - Visual Link Analysis Tool

Hacking Web Applications

Terms and Standards 
Intercepting HTTP & HTTPS Traffics with Burp Suite
An Automated Tool: Zed Attack Proxy (ZAP) in Details
Information Gathering and Configuration Flaws
Input & Output Manipulation
Cross Site Scripting (XSS)
Reflected XSS, Stored XSS and DOM-Based XSS
BeEF - The Browser Exploitation Framework
SQL Injection
Authentication Flaws
Online Password Cracking
Authorisation Flaws
Path Traversal Attack
Session Management
Session Fixation Attack
Cross-Site Request Forgery (CSRF)


Social Engineering & Phishing Attacks

Social Engineering Terminologies 
Creating Malware - Terminologies
MSF Venom
Veil to Create Custom Payloads
TheFatRat - Installation and Creating a Custom Malware
Embedding Malware in PDF Files
Embedding Malware in Word Documents
Embedding Malware in Firefox Add-ons
Empire Project in Action
Exploiting Java Vulnerabilities
Social Engineering Toolkit (SET) for Phishing
Sending Fake Emails for Phishing
Voice Phishing: Vishing

Network Fundamentals

Reference Models: OSI vs. TCP/IP
Demonstration of OSI Layers Using Wireshark
Data Link Layer (Layer 2) Standards & Protocols
Layer 2: Ethernet - Principles, Frames & Headers
Layer 2: ARP - Address Resolution Protocol
Layer 2: VLANs (Virtual Local Area Networks)
Layer 2: WLANs (Wireless Local Area Networks)
Introduction to Network Layer (Layer 3)
Layer 3: IP (Internet Protocol)
Layer 3: IPv4 Addressing System
Layer 3: IPv4 Subnetting
Layer 3: Private Networks
Layer 3: NAT (Network Address Translation)
Layer 3: IPv6
Layer 3: DHCP - How the Mechanism Works
Layer 3: ICMP (Internet Control Message Protocol)
Layer 3: Traceroute
Introduction to Transport Layer (Layer 4)
Layer 4: TCP (Transmission Control Protocol)
Layer 4: UDP (User Datagram Protocol)
Introduction to Application Layer (Layer 5 to 7)
Layer 7: DNS (Domain Name System)
Layer 7: HTTP (Hyper Text Transfer Protocol)
Layer 7: HTTPS


Network Layer & Layer-2 Attacks

Creating Network with GNS3
Network Sniffing: The “Man in the Middle” (MitM)
Network Sniffing: TCPDump
Network Sniffing: Wireshark
Active Network Devices: Router, Switch, Hub
MAC Flood Using Macof
ARP Spoof
ARP Cache Poisoning using Ettercap
DHCP Starvation & DHCP Spoofing
VLAN Hopping: Switch Spoofing, Double Tagging
Reconnaissance on Network Devices
Cracking the Passwords of the Services of Network Devices
Compromising SNMP: Finding Community Names Using NMAP Scripts
Compromising SNMP: Write Access Check Using SNMP-Check Tool
Compromising SNMP: Grabbing SNMP Configuration Using Metasploit
Weaknesses of the Network Devices
Password Creation Methods of Cisco Routers
Identity Management in the Network Devices
ACLs (Access Control Lists) in Cisco Switches & Routers
SNMP (Simple Network Management Protocol) Security


You'll also get:

  • Lifetime Access to The Course

  • Fast & Friendly Support in the Q&A section

  • Udemy Certificate of Completion Ready for Download


    Enroll now to become a professional Ethical Hacker!

    IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
      

Who this course is for:

  • People who want to start from scratch and to move more advanced level
  • Anyone who wants to learn network scan techniques
  • Leaders of incident handling teams
  • People who want to take their Hacking skills to the next level
  • People who are cyber security experts
  • People who want job transition into Cyber Security
  • System administrators who are on the front lines defending their systems and responding to attacks
  • Other security personnel who are first responders when systems come under attack

Course content

13 sections • 338 lectures • 27h 17m total length

  • Preview02:13
  • Let's Learn Penetration Test Types
    00:28
  • Security Audits
    04:41
  • Vulnerability Scan
    02:45
  • Basic Terminologies
    03:08
  • Penetration Test Approaches
    02:44
  • Planning a Penetration Test
    04:23
  • Penetration Test Phases
    07:00
  • Legal Issues & Testing Standards
    04:18

  • Lab Architecture Diagram
    01:30
  • Preview04:22
  • Installing Kali Linux on VirtualBox
    09:36
  • Installing Metasploitable 2
    04:32
  • Installing Metasploitable 3 Packer
    05:47
  • Installing Metasploitable 3 Vagrant and Plugins
    04:14
  • "Installing Metasploitable 3 VM Creation with Vagrant"
    06:21
  • Downloading and Installing Free Windows 7 and Windows 10
    02:55
  • Preview04:30
  • Lab Connectivity and Taking Snapshots
    02:05

  • Content
    01:07
  • What is “Protocol”
    05:36
  • Reference Models
    00:24
  • OSI Reference Model
    13:43
  • OSI vs TCP/IP
    02:33
  • Demonstration using Wireshark
    07:59
  • Standards & Protocols
    03:50
  • Ethernet: Principles, Frame & Headers
    04:06
  • ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets
    06:10
  • ARP Hand-On Practices
    03:14
  • VLANs – Virtual Local Area Networks
    04:03
  • WLANs – Wireless Local Area Networks
    07:01
  • Introduction to Network Layer
    01:37
  • Internet Protocol - IP
    02:49
  • IPv4 Adressing System
    01:56
  • IPv4 Packet Header
    02:56
  • IPv4 Subnetting: Classful Networks
    02:35
  • IPv4 Subnetting: Subnet Mask
    02:59
  • IPv4 Subnetting: Understanding
    03:09
  • IPv4 Shortage
    01:41
  • Private Networks
    03:59
  • Private Networks - Demonstration
    03:01
  • NAT – Network Address Translation
    04:30
  • IPv6, Packet Header & Addressing
    08:30
  • DHCP - How the Mechanism Works
    09:23
  • ICMP – Internet Control Message Protocol
    02:02
  • Traceroute
    09:51
  • Introduction to Transport Layer
    02:40
  • TCP – Transmission Control Protocol
    06:59
  • TCP Header
    02:27
  • UDP – User Datagram Protocol
    03:56
  • Introduction to Application Layer
    00:55
  • DNS – Domain Name System
    05:56
  • HTTP ( Hyper Text Transfer Protocol )
    03:09
  • HTTPS
    01:56

  • Introduction
    05:24
  • Using Search Engines & Google Hacking to Gather Information
    03:36
  • Search Engine Tools: SiteDigger and SearchDiggity
    03:59
  • Shodan
    02:49
  • Gathering Information About the People
    02:52
  • Web Archives
    01:53
  • FOCA Fingerprinting Organisations with Collected Archives
    07:41
  • The Harvester & Recon-NG
    03:22
  • Maltego - Visual Link Analysis Tool
    04:38

  • Passive Scan - Definition
    02:50
  • Passive Scan - ARP Tables
    06:20
  • Passive Scan - Wireshark
    06:36
  • Wireshark: Following Stream
    02:40
  • Wireshark: Summarise Network
    06:19
  • Active Scan
    08:30
  • MitM: Listening to the traffic
    01:45
  • Sniffing
    01:03
  • TCPDump
    05:23
  • Router, Switch, Hub
    04:44
  • How to Expand Sniffing Space?
    05:13
  • MAC Flood: Switching
    03:55
  • MAC Flood: Using Macof Tool
    07:09
  • MacFlood - Countermeasures
    01:13
  • ARP Spoof
    03:40
  • ARP Cache Poisoning using Ettercap
    10:35
  • DHCP Starvation & DHCP Spoofing
    03:36
  • DHCP Mechanism
    06:15
  • DHCP Starvation - Scenario
    03:59
  • DHCP Starvation Demonstration with Yersinia
    08:33
  • VLAN Hopping
    02:05
  • VLAN Hopping: Switch Spoofing
    01:39
  • VLAN Hopping: Double Tagging
    03:17

  • What is Nmap?
    03:44
  • Nmap First Scan
    03:15
  • What is Subnet?
    04:15
  • Interpretation of Nmap Results
    02:04
  • Scanning Specific IPs or Specific Targets With Nmap
    01:57
  • Nmap IP List Creation
    04:07
  • Nmap Random Scan and Exclude Ips
    04:17
  • Print the Nmap Results to the File
    06:23
  • What is Port? Nmap Port Scan
    03:34
  • Scanning Top 20, Top 100 Ports With Nmap
    04:43
  • Scanning Specific Ports With Nmap
    06:00
  • Nmap Syn Scanning
    03:21
  • Nmap TCP Scan
    02:46
  • Namp UDP Scan
    04:12
  • Nmap ACK Scan
    01:54
  • Nmap Fin-Xmas-Null Scan
    03:26
  • Nmap Fast Scan
    01:13
  • Nmap Open Ports Scan
    01:23
  • Nmap No PORT Scan
    02:15
  • Nmap PING and noPING Scan
    03:19
  • Nmap Verbose Command
    02:15
  • Nmap With Service and Version Detection
    03:52
  • Nmap Operating System Detection
    02:30
  • Nmap Timing Templates
    03:36
  • Bypass of IPS & IDS Systems With Nmap
    10:57
  • Nmap Script Engine (NSE)
    10:59
  • Nmap Script Engine Example - 1
    02:53
  • Nmap Script Engine Example - 2
    00:58
  • Writing an NSE Script
    09:52

  • Introduction to Vulnerability Scan
    09:19
  • Introduction to Nessus
    01:57
  • Downloading Nessus
    01:46
  • Installing Nessus
    03:44
  • Creating Policy
    05:39
  • Scanning
    07:06
  • Reporting
    02:20
  • Lab Exercise - 2
    02:47
  • An Aggressive Scan with Nessus: Start
    04:23
  • An Aggressive Scan with Nessus: Results
    07:17
  • An Aggressive Scan with Nessus: Results with Windows Targets
    02:45

  • Exploitation Terminologies
    06:13
  • Exploit Databases
    01:56
  • Manual Exploitation
    05:39
  • Exploitation Frameworks
    03:36
  • Evolution of Metasploit
    04:18
  • Metasploit Filesystem and Libraries
    04:31
  • The Architecture of MSF
    01:43
  • Auxiliary Modules
    04:36
  • Payload Modules
    06:00
  • Exploit Modules
    03:33
  • Encoder Modules
    02:35
  • Post Modules
    03:24
  • Metasploit Editions
    04:02
  • Metasploit Community
    03:08
  • Metasploit Interfaces
    04:50
  • Armitage
    03:16
  • MSFconsole
    04:53
  • MSFConsole Basic Commands 1
    06:44
  • MSFConsole Basic Commands 2
    07:59
  • MSFConsole Basic Commands 3
    03:32
  • Using Databases in MSF 1
    05:42
  • Using Databases in MSF 2
    03:14
  • More on Exploits in MSF
    03:14
  • What is Enumeration?
    02:03
  • Nmap Integration and Port Scanning
    06:17
  • SMB and Samba Enumeration
    05:40
  • MySQL Enumeration
    03:40
  • FTP Enumeration
    04:15
  • SSH Enumeration
    02:30
  • HTTP Enumeration
    06:02
  • SNMP Enumeration
    03:43
  • MTP Enumeration
    03:49
  • Using Shodan with MSF
    04:58
  • Integrating Nessus into MSF
    04:35

  • Metasploit as Exploitation Tool
    01:52
  • Distributed Ruby Remote Code Execution (drb_remote_codeexec)
    03:14
  • PHP CGI Argument Injection (php_cgi_arg_injection)
    03:08
  • MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
    03:55
  • Java JMX Server Insecure Configuration Java Code Execution (java_jmx_server)
    03:03
  • Elastic Search Dynamic Script Arbitrary Java Execution (script_mvel_rce)
    03:11
  • Sun/Oracle GlassFish Server Authenticated Code Execution (glassfish_deployer)
    05:38
  • Jenkins-CI Script-Console Java Execution (jenkins_script_console)
    05:42
  • WinRM Script Exec Remote Code Execution (winrm_script_exec)
    04:00
  • HTTP Writable Path PUT/DELETE File Access (http_put)
    05:00
  • Exploiting Poorly Configured MySQL Service
    03:08
  • Axis2 / SAP Business Objects Authenticated Code Execution via SOAP
    04:44
  • Using Allports Payload
    06:17
  • Using Resource Files
    06:39
  • Post-Exploitation Meterpreter
    02:18
  • Meterpreter
    03:00
  • Basic Meterpreter Commands 1
    06:10
  • Basic Meterpreter Commands 2
    03:33
  • Basic Meterpreter Commands 3
    04:46
  • Post-Exploitation
    03:28
  • What is “Persistence”
    01:28
  • Meterpreter’s Persistence module
    08:55
  • Removing the Backdoor
    05:00
  • Running Meterpreter’s Persistence Module on Windows 8
    02:57
  • Next Generation Persistence: Step 1
    04:40
  • Next Generation Persistence: Step 2
    04:32
  • Meterpreter for Post - Exploitation
    01:37
  • Meterpreter Core Commands
    01:45
  • Meterpreter Core Extension - Session Command
    02:31
  • Meterpreter Core Extension - Migrate Command
    03:34
  • Meterpreter Core Extension - Channel Command
    02:43
  • Meterpreter Stdapi Extension
    01:05
  • Meterpreter Stdapi Extension - File System Commands
    05:19
  • Meterpreter Stdapi Extension - System Commands
    04:13
  • Meterpreter Stdapi Extension - User Interface & Webcam Commands
    04:08
  • Meterpreter Incognito Extension
    03:26
  • Meterpreter Mimikatz Extension
    03:53
  • Metasploit Post-Exploitation Modules
    02:01
  • Gathering Modules
    01:21
  • Managing Modules
    06:51
  • Enabling Remote Desktop
    05:22
  • Searching for Critical Information
    05:48
  • Packet Sniffing
    06:22
  • Pivoting
    10:02
  • Port Forwarding
    07:45
  • Meterpreter Scripts
    04:25
  • Meterpreter Python / Powershell Extension
    08:06
  • Maintaining Access
    01:58
  • Interacting with the Registry
    06:37
  • Keylogging
    07:04
  • Antivirus Evasion and Cleaning
    02:46
  • MSFvenom
    07:06
  • MSFVenom
    04:12
  • MSFVenom Using Encoders Using Custom Executable Template
    05:31
  • Using Custom Payload Generators
    08:33
  • Cleaning Events and Security Management Logs
    03:35
  • Deceiving File System Using Timestomp
    06:06

  • Creating Malware and Terminologies
    03:36
  • MSFvenom Part 1
    14:08
  • MSFvenom Part 2
    02:25
  • Veil Installation
    02:36
  • Veil in Action
    05:12
  • TheFatRat Installation
    04:19
  • TheFatRat in Action
    11:08
  • TheFatRat: Overcoming a Problem
    00:46
  • Embedding Malware in PDF
    04:04
  • Embedding Malware in WORD
    09:21
  • Embedding Malware in Firefox Add-on
    07:02
  • Empire Installation
    04:07
  • Empire in Action Part 1
    08:12
  • Empire in Action Part 2
    04:23
  • Exploiting Java Vulnerabilities
    02:24
  • Social Engineering Toolkit
    06:34
  • Sending Fake Emails - Phishing
    01:11
  • Vishing - Voice Phishing
    03:03

Instructor

Oak Academy
LONG LIVE TECH KNOWLEDGE
Oak Academy
  • 4.3 Instructor Rating
  • 3,647 Reviews
  • 25,231 Students
  • 152 Courses

Hi there,

By 2024, there will be more than 1 million unfilled computing jobs and the skills gap is a global problem. This was our starting point.

At OAK Academy, we are the tech experts who have been in the sector for years and years. We are deeply rooted in the tech world. We know the tech industry. And we know the tech industry's biggest problem is the “tech skills gap” and here is our solution.

OAK Academy will be the bridge between the tech industry and people who

-are planning a new career

-are thinking career transformation

-want career shift or reinvention,

-have the desire to learn new hobbies at their own pace

Because we know we can help this generation gain the skill to fill these jobs and enjoy happier, more fulfilling careers. And this is what motivates us every day.

We specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to our practical alignment we are able to constantly translate industry insights into the most in-demand and up-to-date courses,

OAK Academy will provide you the information and support you need to move through your journey with confidence and ease.

Our courses are for everyone. Whether you are someone who has never programmed before, or an existing programmer seeking to learn another language, or even someone looking to switch careers we are here.

OAK Academy here to transforms passionate, enthusiastic people to reach their dream job positions.

If you need help or if you have any questions, please do not hesitate to contact our team.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.