Ethical Hacking - Complete Fast Track Course in 2019
4.7 (3 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
54 students enrolled

Ethical Hacking - Complete Fast Track Course in 2019

Learn computer security and ethical hacking - The complete fast track course in 2019
4.7 (3 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
54 students enrolled
Created by Mumuni Mohammed
Last updated 8/2019
English
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Discover network vulnerabilities.
  • Scan network vulnerabilities.
  • Exploit network vulnerabilities.
  • Learn how to do major and minor attacks.
  • Demonstrating ability to protect yourself and companies on network attacks.
  • Learn about VPNs, Macchangers, Tor and Proxychains.
  • Discover how to protect your network with Firewalls and Honeypots.
  • Learn the best network scanning techniques.
  • Use the best tools to do pen-testing.
Requirements
  • This course is designed for beginners but if you already have basic knowledge on how hacking is done then that would be a plus.
Description

This course focuses on Ethical Hacking and Network Security in 2019.

Take this course to become a network security pen-tester for companies and for individuals. You should also be able to protect any computer after taking this course.

You should be  able to:

  • setup virtualbox

  • install kali linux

  • install windows 7

  • scan for network vulnerabilities.

  • do footprinting and detect footprinting

  • scan for major and minor attacks.

  • detect major and minor attacks.

  • use your firewall to protect your network.

  • use honeypots and vpn to protect your network.

  • use proxychains and macchanger to also protect your network.

  • learn the best techniques in protecting your network.

After taking this course, you should be able to work in any network security company.

Who this course is for:
  • Anyone wanting pure 100% hands-on learning experience with ethical hacking.
  • Anyone wanting to learn the basics ethical hacking and pen-testing.
  • Anybody wanting to learn how hackers hack computer systems
  • Anybody wanting to learn how to secure their systems from hackers and other intruders.
Course content
Expand all 26 lectures 03:30:50
+ Introduction to Network and Computer Security
3 lectures 10:54

You will learn the basic concepts about network and computer security.

You will also learn the basic concepts about ethical hacking.

You will also learn about network weaknesses, network vulnerability assessments and processes.

Preview 04:01
Network Vulnerabilties
03:49
Vulnerability Assessment and Processes
03:04
+ Setting Up Your Environment
4 lectures 37:57
Install Virtualbox
05:08
Install Kali Linux
11:49
Install Windows and Configure Full Screen Mode
10:48
+ Staying Anonymous
6 lectures 59:44
VPN part 2
08:42
Setting Up Tor Browser Part 1
05:21
Setting Up Tor Browser Part 2
17:30
Setting Up Proxychains
10:20
Setting Up Mac Changer
03:53
+ Network Footprinting and Vulnerability Scanning Techniques
3 lectures 35:08
Detection of Network Footprinting
09:04
Vulnerability Scanning Techniques
18:29
+ Network Attacks
5 lectures 31:11
Network Attacks
01:42
Major Network Attacks
11:46
Detection of Major Network Attacks
09:11
Minor Network Attacks
05:44
Detection of Minor Network Attacks
02:48
+ Other Major Network Security Methods
3 lectures 17:36
Configuring Proper Rules on Your Firewalls
08:45
Configuring IDS
02:19
+ Conclusion
1 lecture 03:31
Other Techniques and What is Next!
03:31