Hack Like a Pro - Ethical Hacking from A to Z
4.3 (84 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
5,896 students enrolled

Hack Like a Pro - Ethical Hacking from A to Z

Practical Offensive Security Course
4.3 (84 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
5,896 students enrolled
Created by InForce Cyber
Last updated 12/2019
English
English [Auto-generated]
Current price: $77.99 Original price: $119.99 Discount: 35% off
1 day left at this price!
30-Day Money-Back Guarantee
This course includes
  • 13 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Various methods and techniques required to become an ethical hacker
  • Powerful tools to exploit vulnerabilities and penetrate network and system architectures
  • Linux basic command line utilities
Requirements
  • Basic Networking
Description

This course is created to prepare the students for the certification exams to become ethical hackers. The course content is prepared and structured according to official documentation and requirements to passing successfully the certification exam. You will learn various methods and techniques required to become an ethical hacker, powerful tools to exploit vulnerabilities and penetrate network and system architectures, and of course Linux basic command line utilities.

Who this course is for:
  • Beginner ethical hackers who want to become good penetration testers
Course content
Expand all 59 lectures 13:00:48
+ Introduction
5 lectures 29:08
VMWare
03:36
VirtualBox
03:39
Installing Kali Linux on VMware
10:52
Installing Kali Linux on VirtualBox
04:03
Intro Quiz
1 question
+ Fundamental Linux Knowledge
3 lectures 36:04
Introduction to Linux Command Line
04:30
Linux Command Line
18:45
Linux Command Line - Part 2
12:49
Quiz
1 question
+ Information Gathering
6 lectures 01:22:04
Information Gathering
10:56
Practice with Automated Tools for Information Gathering
20:12
Network Scanning Basics
10:33
Port Forwarding and Host Visilibity
11:37
+ Enumeration
4 lectures 01:07:55
Basics of Enumeration
15:02
Enumeration with wpscan
18:34
Advanced Enumeration using nmap
14:46
+ System Hacking
6 lectures 01:10:09
Introduction to System Exploiting
07:30
Metasploit Basics
13:55
Exploitdb/ Searchsploit
04:06
Hacking Windows 7 with eternalblue
15:30
Generating Payloads
12:00
Hacking Windows with Client Side Attacks
17:08
+ Hacking Web Applications
18 lectures 04:50:55
Hacking Web Application - Theory
40:35
SQL Injection Fundamentals
44:27
SQL Injection with Kali Linux
22:01
Post SQL Injection with Kali Linux
09:28
Login SQL Injection with Kali Linux
06:02
SQLite Injection with Kali Linux
13:52
SQL Injection in User Agent
10:36
Cross-site Scripting (XSS)
21:10
XSS-Storred-GET
10:52
XSS-Reflected-POST
09:12
XSS-Reflected-GET
09:17
XSS-Json
10:14
XSS-Ajax-Json
10:02
PHP Arbitrary Code Injection with Kali Linux
07:33
Remote Code Execution
13:34
Arbitrary Files Upload
22:47
Inspecting robot.txt file
14:35
Quiz
3 questions
+ Hacking Wireless Networks
4 lectures 01:23:55
Hacking Wireless Networks - Theory
05:06
Hacking Wireless Networks using aircrack-ng
26:00
WireShark
15:52
Hacking Wireless Networks with fluxion and Kali Linux
36:57
+ Social Engineering
5 lectures 59:52
Introduction to Social Engineering
08:40
Social Engineering Facebook Attack
13:37
Social Engineering Attacks using BEEF and Kali Linux
15:15
SpearFish
13:55
SET Payloads
08:25
Quiz
1 question
+ Post Exploitation
4 lectures 30:17
Post Exploitation - Theory
04:48
Privilege Escalation
16:00
Becoming Persistent in a Linux System
04:03
Covering Your Tracks
05:26
Quiz
1 question