The Complete Ethical Hacking Course!
4.0 (2,171 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
173,362 students enrolled

The Complete Ethical Hacking Course!

Learn how to get started as a professional hacker with this complete course!
4.0 (2,165 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
173,362 students enrolled
Created by Joseph Delgadillo
Last updated 11/2018
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 19.5 hours on-demand video
  • 7 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Think like a hacker.
  • Perform effective reconnaissance.
  • Thoroughly scan public networks.
  • Monitor and intercept network traffic.
  • Attack Windows and Linux systems.
  • Penetrate web security.
  • Hack humans using social engineering attacks.
Requirements
  • A basic understanding of computer systems.
  • Various open source pentesting applications.
Description

Would you like to get started as an ethical hacker? Do you want to become a professional penetration tester? Enroll now in The Complete Ethical Hacking Course and learn how to think like a hacker, and become familiar with the toolkit of a professional pentester. This course covers a wide range of topics relating to network security:

  • Introduction to ethical hacking

  • Reconnaissance

  • Scanning and enumeration

  • Network presence

  • Attacking systems

  • Web hacking

  • Social engineering

When you enroll in the course you will immediately receive access to 19+ hours of HD video tutorials, as well as additional supplemental resources for developing the necessary skills to succeed in the field. Learn by doing with demonstrations using popular pentesting tools such as Maltego, FOCA, Recon-ng, Nmap, masscan, tcpdump, Wireshark, Ettercap, Burp Suite, Scapy, Mimikatz, Hashcat, Konboot, Hydra, OWASP, SQLmap, mitmproxy, Skipfish and more!

Thank you for taking the time to read this, and we hope to see you in the course!

Who this course is for:
  • This course was deigned for beginners and moves on to more advanced applications.
Course content
Expand all 98 lectures 19:25:50
+ Introduction to Ethical Hacking
6 lectures 01:03:27
Terminology crash course pt. 2
13:29
Terminology crash course pt. 3
08:25
Confidentiality, integrity, and availability
13:18
Legal considerations
11:29
+ Reconnaissance - Surveying the Attack Surface
10 lectures 01:25:07
Surveying the attack surface
10:24
Recon types and goals
07:44
Passive recon pt. 1
07:21
Passive recon pt. 2
10:02
Active recon
15:01
Recon walk-through and tools summary
14:08
DEMO - Maltego real world example
07:04
DEMO - FOCA to examine metadata
04:57
DEMO - Harvester
02:02
DEMO - Information collection using Recon-ng
06:24
+ Scanning and Enumeration - Getting Down to Business
13 lectures 02:46:41
Scanning & enumeration
08:10
Identifying active hosts pt. 1
09:45
Identifying active hosts pt. 2
13:17
Identifying active services
18:23
OS and services fingerprinting
14:41
Network mapping
09:46
Final thoughts
11:04
DEMO - Nmap syntax pt. 1
14:21
DEMO - Nmap syntax pt. 2
15:32
DEMO - Nmap hosts discovery
12:19
DEMO - Nmap service discovery
17:10
DEMO - Nmap scripts
11:17
DEMO - masscan
10:56
+ Network Presence
9 lectures 01:41:22
Network insecurity
04:01
Sniffing and spoofing
12:45
Sniffing tools
08:57
Spoofing, crypto, and wifi
15:00
DEMO - tcpdump
10:53
DEMO - Wireshark
11:24
DEMO - Ettercap
12:55
DEMO - Burp Suite
15:12
DEMO - Scapy
10:15
+ Attacking
22 lectures 04:49:44
Security overview pt. 1: Windows architecture
17:51
Security overview pt. 2: credentials security
15:32
Security overview pt. 3: memory corruption & exploitation
15:31
Windows hacking basics
20:08
Local access and privilege escalation
20:13
Dumping hashes and cracking passwords
18:12
Linux attacking basics pt. 1
12:44
Linux attacking basics pt. 2
13:50
References
05:25
DEMO - Windows msf exploit pt. 1
13:05
DEMO - Windows msf exploit pt. 2
15:19
DEMO - Post exploitation activities
13:13
DEMO - Mimikatz
07:09
DEMO - Dumping hashes
03:23
DEMO - Hashcat
08:21
DEMO - Konboot
12:57
DEMO - Post exploitation Windows cmd
14:08
DEMO - Post exploitation Windows powershell
13:09
DEMO - Online password cracking pt. 1
14:51
DEMO - Online password cracking pt. 2
12:02
DEMO - Attacking Linux targets pt. 1
10:07
DEMO - Attacking Linux targets pt. 2
12:34
+ Web Hacking
24 lectures 05:24:33
Introduction to web hacking
02:47
Web security architecture overview pt. 1
16:40
Web security architecture overview pt. 2
12:20
Attacking the web server pt. 1
10:28
Attacking the webserver pt. 2
10:59
Attacking the platform pt. 1
18:33
Attacking the platform pt. 2
08:13
Attacking the technology pt. 1
21:00
Attacking the technology pt. 2
17:20
OWASP top 10 pt. 1
09:21
OWASP top 10 pt. 2
21:12
Attacking the business logic pt. 1
10:37
Attacking the business logic pt. 2
15:07
Tools and methodology
20:15
References
07:41
DEMO - OWASP Mutillidae
08:50
DEMO - SQL injection
07:04
DEMO - SQLMAP intro
08:21
DEMO - SQLMAP practice
25:04
DEMO - Burpsuite
37:03
DEMO - Burpsuite XSS Hunter
16:12
DEMO - mitmproxy
10:27
DEMO - Skipfish pt.1
04:30
DEMO - Skipfish pt.2
04:29
+ Social Engineering - Hacking Humans
14 lectures 02:14:56
Social engineering basics
14:41
Social engineering methods
15:44
Tools and techniques pt. 1
14:35
Tools and techniques pt. 2
11:49
Tools and techniques pt. 3
09:04
Physical security considerations
12:53
Final thoughts
05:15
DEMO - Social engineering intro
10:43
DEMO - Social engineering toolkit prep
09:01
DEMO - Credential harvesting
02:06
DEMO - Website cloning
06:19
DEMO - Automating an attack
02:59
DEMO - Anti-virus evasion pt. 1
08:17
DEMO - Anti-virus evasion pt. 2
11:30