Ethical Hacking & Penetration Testing
3.6 (25 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
387 students enrolled

Ethical Hacking & Penetration Testing

Build Ethical Hacking and Penetration Testing skills so you can secure your networks and stop malicious attacks
3.6 (25 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
387 students enrolled
Last updated 12/2018
English
English [Auto]
Current price: $135.99 Original price: $194.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 6 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Network and Company Reconnaissance
  • System Scanning and enumeration
  • System Ethical Hacking Techniques and Countermeasures
  • Web Server Ethical Hacking Techniques and Countermeasures
  • Web Application Ethical Hacking Techniques and Countermeasures
  • Malware Causes and Cures
  • Packet Sniffing Techniques and Countermeasures
  • Denial of Service Techniques and Countermeasures
  • Social Engineering Techniques and Countermeasures
  • Session Hijacking Techniques and Countermeasures
  • SQL Injection Techniques and Countermeasures
  • Mobile Ethical Hacking Techniques and Countermeasures
  • Evasion Techniques and Countermeasures
  • Cryptography Uses and Limitations
  • Penetration Testing Overview
  • Security with Cloud Computing
Requirements
  • General computer knowledge
  • A desire to learn ethical hacking techniques
  • Some experience with Windows and Linux is helpful
Description

This course features over 400 lectures to help you build the skills you need to stop malicious attackers from taking over your network.

This course was designed to help system administrators and computer users acquire the understanding of the tools, methods, and thought processes of malicious users who may be trying to attack their networks. The best way to defend your network is know and practice a good offense. This course is designed to give you those skills as quickly as possible.

This course covers a lot of topics:

  • Reconnaissance

  • Scanning and enumeration

  • System hacking,

  • Web server hacking

  • Web application hacking

  • Malware

  • Packet Sniffing

  • Denial of Service

  • Social Engineering

  • Session Hijacking

  • SQL Injection

  • Mobile Hacking

  • Evasion

  • Cryptography

  • Penetration Testing

  • Cloud computing

Get out your black hat and get ready to learn!

Who this course is for:
  • Computer users and System administrators interested in learning how ethical hacking works
Course content
Expand all 413 lectures 05:59:41
+ Information Gathering through Passive Footprinting
11 lectures 27:08
Passive Footprinting Intro
04:21
Passive Social Engineering
04:01
Social Networking
06:45
Passive Footprinting with Google
02:12
Whois
01:08
NSLookup
01:00
Internet Archive
01:01
People Search
01:46
Company Financials
00:57
Job Openings
01:28
Google "Hacking"
02:29
+ Information Gathering through Active Footprinting
12 lectures 20:59
Active Footprinting Intro
02:38
DNS Records
06:26
Zone Transfer
00:41
DNS Brute Force
00:16
Network Mapping
00:14
Web Mirroring
00:19
Httrack Demo
03:00
E-mail Tracking
00:22
Bad E-mail Response Header
00:28
Publicly Available Internal URLs
00:14
DirBuster Demo
03:00
Countermeasures
03:21
+ Scanning and Enumeration
24 lectures 15:01
Scanning and Enumeration Intro
01:18
ICMP Packets
00:19
Firewalking
00:16
TCP Communication
01:36
IPv4 and IPv6
01:02
Port Scanning
00:22
Nmap Demo
02:21
War Dialing
00:20
Vulnerability Scanning
00:28
Banner Grabbing & OS Fingerprinting
00:33
Covert Scanning
00:42
IP Spoofing
00:13
Anonymizers
00:08
Scanning Countermeasures
00:37
Proxies
00:20
The Onion Router (TOR)
00:42
Enumeration Techniques
00:11
Common Enumeration Techniques
00:14
NetBios Null Sessions
00:25
SNMP
00:42
Internal DNS Zone Transfer
00:22
SNMPv3 and NTPv3
00:32
SMTP
00:45
Enumeration Countermeasures
00:33
+ System Hacking
29 lectures 43:52
System Hacking Intro
01:15
Authentication and Passwords
01:59
Password Life Cycle
08:01
Microsoft Authentication and Passwords
00:28
Security Accounts Manager
00:35
Authentication Terminology
02:35
NTLM
02:06
Kerberos
02:25
Linux Authentication and Passwords
03:55
Cracking Passwords
05:39
Privilege Escalation
01:35
DLL Hijacking
00:58
Keyloggers
00:27
Hardware Keyloggers
00:43
Using a Remote Keylogger
00:23
Keylogger Countermeasures
00:48
Spyware
00:38
Advanced Parental Controls
00:29
Spyware Countermeasures
00:22
Packet Sniffing
00:44
Pass the Hash
00:28
Rootkits
00:35
Rootkit Example
02:53
Placing a Rootkit
00:36
Rootkit Countermeasuers
00:19
Covert Hacking
01:25
Covering Your Tracks
00:40
Clearing Event Logs
00:35
Tools to Cover Your Tracks
00:16
+ Malware
27 lectures 20:23
Types of Malware
00:58
Malware History
00:09
Viruses
00:29
Virus Operation
00:14
Worms
00:16
Virus and Worm Life Cycle
00:59
Virus and Worm Symptoms
00:52
Virus Classifications and Characteristics
01:24
Types of Viruses
00:11
Self Preservation Techniques
01:16
Common Distribution Techniques
00:40
Virus Making Tools
00:19
Virus Countermeasures
00:49
Trojans
00:27
Trojan Terminology
01:06
Types of Trojans
00:32
Bind and Reverse Shells
00:54
Other types of Trojans
00:43
Backdoors
00:57
Trojan Analysis
01:16
Common Trojan Port Numbers
00:13
Wrapping Tools
00:52
Historical Examples of Trojans
00:08
Trojan Construction Kits
00:13
Trojan Countermeasures
00:27
Warez and Logic Bombs
01:09
Ransom Ware
02:50
+ Packet Sniffing
24 lectures 10:03
Packet Sniffing Overview
00:27
Packet Sniffing Terminology
00:12
Passive Sniffing
00:21
Active Sniffing
00:23
Address Resolution Protocol
01:32
Network Overview for Sniffing
00:19
Sniffer Placement
00:22
Sniffer Technique
00:14
Wireless Sniffing
00:06
Legalities of Sniffing
00:12
TCP Packet Header
00:26
UDP Packet Header
00:08
IPv4 Packet Header
00:12
ARP Packet Header
00:46
MAC Address Spoofing
00:11
MAC Flooding
00:40
ARP Poisoning
00:28
DNS Spoofing
00:22
Man In The Middle Attack
00:18
Protocols Vulnerable to Sniffing
00:15
IRDP Spoofing
00:23
IDS Evasion
00:49
Firewall Evasion
00:15
Countermeasures
00:42
+ Denial of Service
16 lectures 10:08
Denial of Service Attacks
00:39
Denial of Service Impact
00:18
Denial of Service Classifications
00:49
Common Types of DOS Attacks
00:21
SYN Flood
00:53
UDP Flood
00:40
RST Injection
00:20
XMAS Attack
00:38
Botnet Attack
00:30
Smurf Attack
00:33
Fraggle Attack
00:27
DOS via Buffer Overflow
01:56
Botnet Trojans
00:38
Common Botnet Control Channels
00:24
Denial of Service Symptoms
00:30
DOS Countermeasures
00:32