Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Life Purpose Meditation Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ Unreal Engine Blueprints 2D Game Development Blender
2021-01-02 06:51:02
30-Day Money-Back Guarantee

This course includes:

  • 28.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Ethical Hacking

Learn Ethical Hacking: Beginner to Advanced!

Learn ethical hacking, penetration testing and network security skills with our comprehensive course!
Rating: 4.3 out of 54.3 (4,282 ratings)
211,098 students
Created by Joseph Delgadillo
Last updated 11/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Ethical Hacking
  • Linux Commands
  • Kali Linux
  • Creating a Secure Environment
  • Footprinting
  • Scanning
  • Website Penetration Testing
  • Wireless Cracking
  • Man in the Middle Attacks
  • System Hacking
  • Python Programming Fundamentals
  • Coding Custom Pentesting Tools
  • Tips for Building a Career in Cyber Security

Requirements

  • An eager and open mind!

Description

If you would like to master ethical hacking, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux and Python hacking with over 28 hours of HD video tutorials! We will cover the following topics in this course:

  • How to setup a Kali Linux system

  • Essential Linux system commands

  • How to create a secure penetration testing environment

  • Footprinting

  • Scanning

  • Website penetration testing

  • WPA2 wireless network cracking

  • Man in the middle attacks

  • System hacking using Metasploit

  • Python programming fundamentals

  • Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)

  • Tips for building a career in cyber security

This course was designed for absolute beginners, so no previous ethical hacking or programming knowledge is necessary. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the tutorials is available within the discussion forum.

Still not sold? Check out some of these great reviews!

"Great course, beginner friendly. And most importantly, great instructor and great community."

"It's really detailed and helps you get started well!"

"Thank you for all the changes and all the new stuff you keep adding. I have more than a few ethical hacking courses and this is the best one, at least so far. I had my doubts when I got it due to it being so short but I am really happy that I did. Great job, keep it up!"

Thank you for taking the time to read this and we hope to see you in the course!

Who this course is for:

  • Students who are interested in ethical hacking and network security.

Course content

14 sections • 148 lectures • 28h 44m total length

  • Preview04:40
  • VirtualBox installation
    15:36
  • Kali Linux installation
    13:54
  • Enabling full-screen
    18:16

  • Basic commands part 1
    09:41
  • Basic commands part 2
    21:04
  • Basic commands part 3
    12:45

  • Changing IP address and wireless adapter setup
    04:51
  • Creating a bootable Kali USB drive
    04:54
  • Essential networking terms
    10:15
  • Essential hacking terms
    17:58
  • Additional Kali tools to install
    08:30
  • Changing our MAC address with macchanger
    06:24

  • Google hacking
    13:08
  • Nikto basics
    10:55
  • Whois tool
    06:39
  • Email harvesting
    06:07
  • Shodan
    10:24
  • Zone transfer with Dig
    07:08

  • Preview06:58
  • Nmap part 1
    15:32
  • Nmap part 2
    11:43
  • Nmap part 3
    12:24
  • Zenmap
    07:52
  • TCP scans
    15:50
  • Nmap bypassing defenses
    17:23
  • Nmap scripts part 1
    09:28
  • Nmap scripts part 2
    13:59

  • Installing OWASP
    08:26
  • HTTP request
    09:57
  • HTTP response
    10:27
  • Burpsuite configuration
    12:49
  • Editing packets in Burpsuite
    12:20
  • Whatweb and Dirb
    10:10
  • Password recovery attack
    15:32
  • Burpsuite login bruteforce
    11:01
  • Hydra login bruteforce
    08:44
  • Session fixation
    13:51
  • Injection attacks
    05:31
  • Simple command injection
    11:04
  • Exploiting command injection vulnerability
    07:38
  • Finding blind command injection
    13:39
  • SQL basics
    10:21
  • Manual SQL injection part 1
    13:12
  • Manual SQL injection part 2
    20:49
  • SQLmap basics
    16:34
  • XML injection
    15:54
  • Installing XCAT and preventing injection attacks
    05:50
  • Reflected XSS
    10:46
  • Stored XSS
    11:56
  • Changing HTML code with XSS
    07:28
  • XSSer and XSSsniper
    13:32

  • Wireless attacking theory
    10:49
  • Enabling monitor mode
    04:39
  • Capturing handshake with airodump
    14:35
  • RockYou.txt
    13:53
  • Cracking with Aircrack
    15:31
  • Cracking with Hashcat
    14:55
  • Creating password lists with Crunch
    18:20
  • Creating password lists with Cupp
    07:10
  • Rainbow tables part 1
    16:34
  • Rainbow tables part 2
    05:38
  • Installing Fluxion
    06:17
  • Finding and cracking hidden networks
    08:18
  • Preventing wireless attacks
    07:57

  • ARP protocol basics
    10:28
  • Man in the middle attack theory
    07:18
  • Installing MITMf
    06:36
  • Manual ARP spoofing
    12:47
  • Problems while installing MITMf
    06:18
  • HTTP traffic sniffing
    08:29
  • DNS spoofing and HTTPS password sniffing
    24:18
  • Hooking browsers with BEEF
    16:01
  • Screenshotting targets browser
    11:00
  • Cloning any webpage
    08:53
  • Ettercap basics
    06:57

  • MSFconsole environment
    16:05
  • Metasploit modules explained
    12:11
  • Bruteforcing SSH with Metasploit
    15:17
  • Attacking Tomcat with Metasploit
    08:49
  • Getting Meterpreter with command injection
    25:05
  • PHP code injection
    05:43
  • 2 Metasploitable exploits
    06:57
  • Wine installation
    12:01
  • Creating Windows payloads with Msfvenom
    10:00
  • Encoders and Hex editor
    18:42
  • Windows 10 Meterpreter shell
    11:57
  • Meterpreter environment
    11:25
  • Windows 10 privilege escalation
    11:28
  • Preventing privilege escalation
    06:21
  • Post exploitation modules
    14:10
  • Getting Meterpreter over Internet with port forwarding
    10:39
  • Eternalblue exploit
    20:15
  • Persistence module
    13:14
  • Hacking over the internet with Ngrok
    10:24
  • Android device attack with Venom
    09:54
  • The real hacking begins now!
    02:25

  • Variables
    13:40
  • Raw input
    10:46
  • If-else statements
    10:17
  • For loops
    06:30
  • While loops
    08:23
  • Python lists
    08:03
  • Functions
    14:33
  • Classes
    10:20
  • Importing libraries
    06:59
  • Files in Python
    11:42
  • Try and except rule
    05:11

Instructor

Joseph Delgadillo
Best-Selling Instructor
Joseph Delgadillo
  • 4.2 Instructor Rating
  • 55,886 Reviews
  • 1,133,503 Students
  • 13 Courses

The digital age is upon us. Would you like to build/protect the systems that shape our future?

I am here on Udemy to produce valuable educational resources for students who wish to learn skills related to information technology, network security, programming languages and much more. Enroll in one of my courses for a practical, down to earth approach to learning.






  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.