Ethical Hacking Fundamental Course - Learn From Scratch
4.0 (726 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
28,000 students enrolled

Ethical Hacking Fundamental Course - Learn From Scratch

Network & Security , kali linux , Ethical Hacking , Cyber Security , CISSP , Ethical Hacking, Penetration Testing
4.0 (726 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
28,000 students enrolled
Created by Sunil K. Gupta
Last updated 4/2017
English
English [Auto]
Current price: $119.99 Original price: $199.99 Discount: 40% off
3 days left at this price!
30-Day Money-Back Guarantee
This course includes
  • 11 hours on-demand video
  • 1 article
  • 10 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • • You will become a professional ethical hacker by learning all the required essentials of ethical hacking
  • • You will have a complete understanding of Ethical Hacking and Penetration Testing Techniques and Concepts
  • • The lab intensive environment gives each student in-depth knowledge and practical hands-on experience
  • • Study material as PDF file is also provided inside the course which you can download it and keep handy to refer as and when required
  • • You will be confident to take Job interviews related to Cyber Security Industry
  • 100 detailed videos about ethical hacking & computer security
  • Learn about the different fields of ethical hacking
  • Install Kali Linux - a penetration testing operating system
  • Learn linux basics
  • Learn Network Penetration Testing
  • A number of practical attacks that can be used without knowing the key to the target network
  • Create a fake Wi-Fi network with internet connection & spy on clients
  • Crack WEP/WPA/WPA2 encryptions using a number of methods.
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • Gather information about people, such as emails, social media accounts, emails and friends
  • Send emails from ANY email account without knowing the password for that account
  • Exploit file upload vulnerabilities & gain full control over the target website
  • Discover, exploit & fix local file inclusion vulnerabilities
  • Bypass login forms and login as admin using SQL injections
  • Read / Write files to the server using SQL injections
  • Discover reflected XSS vulnerabilities
  • Hook victims to BeEF using XSS vulnerabilities
  • Fix XSS vulnerabilities & protect yourself from them as a user
  • Discover Stored XSS vulnerabilities
  • Learn the right way to write SQL queries to prevent SQL injections
  • Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections
  • Discover, fix, and exploit SQL injection vulnerabilities
  • Discover, exploit and fix code execution vulnerabilities
  • Find all websites hosted on the same server as the target website
  • Find all subdomains associated with a website
  • Understand how browsers communicate with websites
  • Backdoor any file type such as pictures, pdf's ...etc.
  • Create undetectable backdoors
  • Gain control over computer systems using fake updates
  • Exploit buffer over flows and code execution vulnerabilities to gain control over systems
  • Discover open ports, installed services and vulnerabilities on computer systems
  • Gain access to any account accessed by any client in your network.
  • Network basics & how devices interact inside a network
  • Learn linux commands and how to interact with the terminal
  • Install windows & vulnerable operating systems as virtual machines for testing
  • Set up a lab environment to practice hacking
  • Know what is hacking, ethical hacking and diffirent types of hackers
Requirements
  • • Basic Knowledge of Computer and Networking is recommended before taking this course
  • • Even a beginner who want to learn Ethical Hacking and Penetration Testing can take this course
  • • A computer or laptop or android mobile with internet connection to follow this course lectures.
  • • A note book and pen is recommended to take notes during the entire course.
Description

                                                       

                          ** 21000+ Students in our course **  -  12.5+ hours content of ethical hacking

 

  • This Cyber Security Training will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
  • The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. 
  • This course is a Complete Course of Ethical Hacking and Pentesting .


                                                              Social Proofs  -

 

  • Students loved this course – 50+  Students have rated this course with 4 or 5 start ratings -
  • 1. Osazeme Usen says “The author has depth in the
    subject he is tutoring. He explained in detail how to get going. Practicals are included using Kali Linux. This is impressive :)”
  •  2. Rahul Chakrabarty says “The lessons are good and to the point.The concepts are clearly understandable and explained well.”
  • 3. Hargun Singh says“Awesome content and nice presentation.”
  • Students will also learn about nmap ,metasploit and other kali linux tools. When a student leaves this intensive class they will have hands on understanding and experience in Ethical Hacking and Security in Offensive Way . Enroll Now !!!!!

                                                                                                                                           Sunil K. Gupta 

                                                                                                                                    Web Security Specialist

Who this course is for:
  • • This course has been prepared for those who want to learn Ethical Hacking Basics and Advanced Techniques
  • • Cyber Security Professionals, Web Developer, Admins can take this course
  • • Even fresher college students who are aspired to learn and take a bit more efforts to understand and develop there career in Ethical Hacking can take this course.
Course content
Expand all 99 lectures 10:52:27
+ Introduction to Ethical Hacking
4 lectures 20:42

Introduction about course and certification . 

Preview 02:27

DOWNLOAD FREE PDFS WHICH ARE USEFUL IN LATER PART OF VIDEOS 

Preview 00:03

Introduction of Ethical Hacking 

Preview 10:06

Kali llinux Installation pRactical 

Installation of Kali linux
08:06
+ Information Gathering
9 lectures 01:04:32

Information Gathering using Kali - 1

Preview 09:37

Information Gathering about Target 

Information Gathering -1
06:01
Information Gathering -2
05:21
Information Gathering - Kali -3
19:37
Information Gathering -3
05:50

Information Gathering about Target

Information Gathering -4
05:40
Information Gathering - Practical 1
04:01
Information Gathering - Practical 2
03:23
Information Gathering - Practical 3
05:02
+ Network and Web Scanning
5 lectures 27:44

 Scanning about Target 

Scanning Part -1
05:08
Scanning Part -2
06:45

 Scanning about Target 

Scanning Part -3
05:11
Scanning Part -4
05:50
Scanning Part -5
04:50
+ Deep Scanning Phase
5 lectures 31:02

 Deep Scanning about Target 

Deep Scannin Part - 1
06:19
Deep Scannin Part - 2
07:02

 Deep Scanning about Target 

Deep Scannin Part - 3
08:09
Deep Scannin Part - 4
05:26
Deep Scannin Part - 5
04:06
+ Hacking Systems
8 lectures 37:48

System Hacking Theory 

Hacking Systems - 1
04:30
Hacking Systems - 2
04:34
Hacking Systems - 3
04:32
Hacking Systems - 4
04:33

System Hacking Theory

Hacking Systems - 5
04:26
Hacking Systems - Practcal 1
03:57

System Hacking Practical

Hacking Systems - Practcal 2
06:44
Hacking Systems - Practcal 3
04:32
+ Social Engineering Techniques
6 lectures 21:26

Social Engineering Techniques

Social Engineering Techniques - 1
04:15
Social Engineering Techniques - 2
03:23
Social Engineering Techniques - 3
04:51

Social Engineering Techniques

Social Engineering Techniques - 4
02:48
Social Engineering Practical -1
02:53
Social Engineering Practical -2
03:16
+ MITM ( MAN IN THE MIDDLE ATTACK )
11 lectures 49:44

Man in the Middle Attack theory

MITM - 1
03:58
MITM - 2
03:34
MITM - 3
03:07
MITM - 4
03:53
MITM - 5
02:48

Man in the Middle Attack Practical

MITM Practical -1
03:13
MITM Practical -2
05:36
MITM Practical -3
03:18
MITM Practical -4
04:59

Cookie of Facebook

Wireshark Practical Facebook Cookie
06:39

Detect Phishing in your network .

Preview 08:39
+ DOS ATTACK
6 lectures 24:17

Denial of Service Attack  -  1 

DOS ATTACK - 1
04:15
DOS ATTACK - 2
02:46
DOS ATTACK - 3
03:34

Denial of Service Attack  -  4

DOS ATTACK - 4
02:57
DOS ATTACK Practcal - 1
04:34
DOS ATTACK Practcal - 2
06:11
+ Malware (Virus , Worms , Trojan )
7 lectures 31:22

Explanation About Viruses 

Malware - 1
03:53
Malware - 2
04:14
Malware - 3
04:42

Explanation About Viruses

Malware - 4
03:48
Malware - 5
03:28
Malware Practical - 1
05:51
Malware Practical - 2
05:26
+ Hijack Sessions
6 lectures 31:38

Session Hijacking Theory 

Hijack Sessions - 1
02:51
Hijack Sessions - 2
03:25
Hijack Sessions - 3
03:19
Hijack Sessions - 4
03:21

Session Hijacking Practical

Hijack Sessions Practical - 1
11:20
Hijack Sessions Practical - 2
07:22