Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Personal Transformation Life Purpose Meditation Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Cyber Security

Ethical Hacking Series from Novice to Industry Expert

Be an Ethical Hacker with Practical Industrial knowledge and Standards of Red Team Hacking
Rating: 4.2 out of 54.2 (5 ratings)
34 students
Created by Arsalan Saleem, Secure Techware
Last updated 2/2021
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Setup ethical hacking lab environment
  • Installation of kali Linux penetration testing OS.
  • Basics of network
  • Gathering information about the network
  • Network penetration testing
  • Network vulnerability scanning
  • Network exploitation
  • Basics of MITM and ARP protocols
  • Network sniffing
  • Red team report generation
  • Basics of web servers and web applications
  • Web server information gathering and reconnaissance
  • Web server exploitation with file upload vulnerability
  • Web server exploitation brute force attack
  • Web server exploitation using SQL injection
  • Web server exploitation using OWASP ZAP
  • Social engineering attacks
  • Social engineering-based scenarios

Requirements

  • Basic computer skills
  • NO prior knowledge about ethical hacking is required
  • NO programming knowledge is required
  • Operating System Windows / OS X / Linux

Description

FACT! On average every 39 seconds there is a hacker attack affecting one in three Americans every year!

FACT! 43% cyber-attacks target small business

Did you know that the average pay of an Ethical Hacker is approx. 88k/year in US. In this course we will learn the practical approach which Ethical Hackers follows in real world scenarios.

Our primary focus on this course is showing practical approach but we will NOT Ignore any theoretical concepts as well. We will start this course from very basic and setup Ethical Hacking Lab Environment then we will look some basics of Networking and investigate Internal Networking. In which we will cover scan types, port scanning, advance scanning then we will spend time on vulnerability scanning of internal network. After that we will see how Red Team generates report for executives and for technical department.

After covering these topics, we will move to the second phase of our course which is based on exploitation and we will start with network exploitation and networks sniffing in which we cover ARP Protocol, ARP poisoning and MITM based attacks

In the third phase of this course we will look Web Servers and Web Applications starting with Web Server Information Gathering and Reconnaissance following with File upload vulnerability on Server then we will look brute force attack on Web Applications after we that we will cover SQL Injection and OWASP ZAP

In the end we will look Social Engineering and cover Social Engineering Scenario based attack strategy.

Notes:

  • This Course is created for educational purpose only, all the vulnerability assessment and exploitation are done in our own lab environment which we have fully permissions.

  • This course is fully copy right of Arsalan Saleem & SecureTechware no other organization is associated with it or any certificate exams. But you will get a Course Completion Certificate from Udemy Other then that No Other Organization is Involved in it.

Who this course is for:

  • Anyone who wants to learn about ethical hacking or penetration testing
  • Anyone interested in red team approach in current industry
  • Anyone interested in how to secure systems from hackers

Course content

14 sections • 47 lectures • 4h 16m total length

  • Preview01:44
  • Preview02:00
  • Preview02:59

  • 01-Setting up lab environment
    04:36
  • 02-Installing Kali Linux
    02:49
  • 03-Installing Metasploitable 2
    02:20

  • 01-Scan Types
    03:09
  • 02-Active Scanning
    02:18
  • 03-Data Communication
    07:14
  • 04-Ping Scan
    05:52
  • 05-SYN Scan
    08:00
  • Preview06:41
  • 07-Service and Version Detection
    08:32
  • 08-Output Results
    02:11
  • 09-Scanning with Scripts
    09:58

  • 01-Vulnerability Scanning
    07:06
  • 02-Vulnerability Scan Windows Machine
    05:55
  • 03-Vulnerability Scan Linux Machine
    03:51

  • 01-Internal Network Report Generation
    04:36

  • 01-Exploitation Using Bind Shell
    03:30
  • 02-Exploitation CVE-2008-0166
    06:55
  • 03-Exploitation VNC default password
    02:00

  • 01-Internal Network Sniffing Basics
    04:37
  • 02-Wireshark introduction
    08:00
  • 03-Wireshark packet capturing and analyzing
    04:58
  • 04-ARP Poisoning
    04:24
  • 05-ARP Poisoning Practical
    25:38
  • 06-ARP Poisoning Using MitMF
    07:40
  • 07-Screen Capture Using MitMF
    06:25

  • 01- Web Application Information Gathering
    04:24
  • 02-Basic Server Information
    03:49
  • 03-Sensitive Server Information
    04:39
  • 04-Sensitive Files and Folders
    05:13

  • 01-Setup Burp Suite
    07:51
  • 02-Generating Payload
    01:44
  • 03-File Upload Vulnerability
    06:31
  • 04-How to Fix File Upload Vulnerability
    01:48

  • 01-Web Server Exploitation With Brute Force
    13:25

Instructors

Arsalan Saleem
Software Developer and Security Expert
Arsalan Saleem
  • 4.3 Instructor Rating
  • 952 Reviews
  • 10,481 Students
  • 9 Courses

I'm a Security Expert and Software Developer with 7+ years experience. I love to work on innovative offensive security ideas. I have developed many web application and mobile applications. I have also worked on security of many industrial software's. Currently I'm working on exploit research and use of deep learning with micro controllers in Penetration Testing.   

Secure Techware
Innovate Your Business
Secure Techware
  • 4.3 Instructor Rating
  • 952 Reviews
  • 10,481 Students
  • 9 Courses

SecureTechware believes in the philosophy of innovation for serving the employees, clients and the community effectively. We believe in quality and reliability in order to deliver superior services. Whether it is new development, update or maintenance; our company has a potential to provide the best!

Our vision is to be the innovation leader in the I.T. services. We are determined to have a company culture which is based on quality performance, respect and teamwork. We are a blend of passion and superior skills which helps us to accelerate our success. Our professional and quality services provide clients with competitive edge and success in the marketplace.

Our top priority is client satisfaction. We keep on exploring innovative ideas for our clients in order to provide them with utmost satisfaction. We keep a friendly environment in our dealings with the clients. We are thrived to be the finest solution provider for you!

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.