Learn Ethical Hacking in 2020: Beginner to Advanced!
4.3 (2,867 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
144,526 students enrolled

Learn Ethical Hacking in 2020: Beginner to Advanced!

Learn ethical hacking, penetration testing and network security skills with the most comprehensive course for 2020!
4.3 (2,867 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
144,518 students enrolled
Created by Joseph Delgadillo
Last updated 11/2019
English
English [Auto-generated]
Current price: $119.99 Original price: $199.99 Discount: 40% off
23 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 28.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Ethical Hacking
  • Linux Commands
  • Kali Linux
  • Creating a Secure Environment
  • Footprinting
  • Scanning
  • Website Penetration Testing
  • Wireless Cracking
  • Man in the Middle Attacks
  • System Hacking
  • Python Programming Fundamentals
  • Coding Custom Pentesting Tools
  • Tips for Building a Career in Cyber Security
Requirements
  • An eager and open mind!
Description

If you would like to learn ethical hacking in 2020, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux and Python hacking with over 28 hours of HD video tutorials! We will cover the following topics:

  • How to setup a Kali Linux system

  • Essential Linux system commands

  • How to create a secure penetration testing environment

  • Footprinting

  • Scanning

  • Website penetration testing

  • WPA2 wireless network cracking

  • Man in the middle attacks

  • System hacking

  • Python programming fundamentals

  • Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)

  • Tips for building a career in cyber security

This course was designed for absolute beginners, so no previous ethical hacking or programming knowledge is necessary. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the tutorials is available within the discussion forum.

Still not sold? Check out some of these great reviews!

"Great course, beginner friendly. And most importantly, great instructor and great community."

"It's really detailed and helps you get started well!"

"Thank you for all the changes and all the new stuff you keep adding. I have more than a few ethical hacking courses and this is the best one, at least so far. I had my doubts when I got it due to it being so short but I am really happy that I did. Great job, keep it up!"

Thank you for taking the time to read this and we hope to see you in the course!

Who this course is for:
  • Students who are interested in ethical hacking and network security.
Course content
Expand all 148 lectures 28:44:22
+ Introduction and Installation
4 lectures 52:26
VirtualBox installation
15:36
Kali Linux installation
13:54
Enabling full-screen
18:16
+ Basic Linux Commands
3 lectures 43:30
Basic commands part 1
09:41
Basic commands part 2
21:04
Basic commands part 3
12:45
+ Creating a Secure Hacking Environment
6 lectures 52:52
Changing IP address and wireless adapter setup
04:51
Creating a bootable Kali USB drive
04:54
Essential networking terms
10:15
Essential hacking terms
17:58
Additional Kali tools to install
08:30
Changing our MAC address with macchanger
06:24
+ Footprinting
6 lectures 54:21
Google hacking
13:08
Nikto basics
10:55
Whois tool
06:39
Email harvesting
06:07
Shodan
10:24
Zone transfer with Dig
07:08
+ Scanning
9 lectures 01:51:09
Nmap part 1
15:32
Nmap part 2
11:43
Nmap part 3
12:24
Zenmap
07:52
TCP scans
15:50
Nmap bypassing defenses
17:23
Nmap scripts part 1
09:28
Nmap scripts part 2
13:59
+ Website Penetration Testing
24 lectures 04:37:31
Installing OWASP
08:26
HTTP request
09:57
HTTP response
10:27
Burpsuite configuration
12:49
Editing packets in Burpsuite
12:20
Whatweb and Dirb
10:10
Password recovery attack
15:32
Burpsuite login bruteforce
11:01
Hydra login bruteforce
08:44
Session fixation
13:51
Injection attacks
05:31
Simple command injection
11:04
Exploiting command injection vulnerability
07:38
Finding blind command injection
13:39
SQL basics
10:21
Manual SQL injection part 1
13:12
Manual SQL injection part 2
20:49
SQLmap basics
16:34
XML injection
15:54
Installing XCAT and preventing injection attacks
05:50
Reflected XSS
10:46
Stored XSS
11:56
Changing HTML code with XSS
07:28
XSSer and XSSsniper
13:32
+ Wireless Cracking
13 lectures 02:24:36
Wireless attacking theory
10:49
Enabling monitor mode
04:39
Capturing handshake with airodump
14:35
RockYou.txt
13:53
Cracking with Aircrack
15:31
Cracking with Hashcat
14:55
Creating password lists with Crunch
18:20
Creating password lists with Cupp
07:10
Rainbow tables part 1
16:34
Rainbow tables part 2
05:38
Installing Fluxion
06:17
Finding and cracking hidden networks
08:18
Preventing wireless attacks
07:57
+ Man in the Middle Attacks
11 lectures 01:59:05
ARP protocol basics
10:28
Man in the middle attack theory
07:18
Installing MITMf
06:36
Manual ARP spoofing
12:47
Problems while installing MITMf
06:18
HTTP traffic sniffing
08:29
DNS spoofing and HTTPS password sniffing
24:18
Hooking browsers with BEEF
16:01
Screenshotting targets browser
11:00
Cloning any webpage
08:53
Ettercap basics
06:57
+ System Hacking
21 lectures 04:13:02
MSFconsole environment
16:05
Metasploit modules explained
12:11
Bruteforcing SSH with Metasploit
15:17
Attacking Tomcat with Metasploit
08:49
Getting Meterpreter with command injection
25:05
PHP code injection
05:43
2 Metasploitable exploits
06:57
Wine installation
12:01
Creating Windows payloads with Msfvenom
10:00
Encoders and Hex editor
18:42
Windows 10 Meterpreter shell
11:57
Meterpreter environment
11:25
Windows 10 privilege escalation
11:28
Preventing privilege escalation
06:21
Post exploitation modules
14:10
Getting Meterpreter over Internet with port forwarding
10:39
Eternalblue exploit
20:15
Persistence module
13:14
Hacking over the internet with Ngrok
10:24
Android device attack with Venom
09:54
The real hacking begins now!
02:25
+ Python Crash Course
11 lectures 01:46:24
Variables
13:40
Raw input
10:46
If-else statements
10:17
For loops
06:30
While loops
08:23
Python lists
08:03
Functions
14:33
Classes
10:20
Importing libraries
06:59
Files in Python
11:42
Try and except rule
05:11