Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Blogging Freelancing Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Full Ethical Hacking Course

Learn all about ethical hacking and penetration testing.
Rating: 4.5 out of 54.5 (42 ratings)
351 students
Created by Loi Liang Yang
Last updated 3/2021
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Ethical hacking and cybersecurity
  • Penetration testing

Requirements

  • Basic computer knowledge

Description

Introduction to cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.

Introduction to cyber-security

  • Cyber-attack chain

  • Reconnaissance

  • Weaponization

  • Delivery

  • Exploitation

  • Installation

  • Command and Control

  • Actions on Objective

Virtualization on VirtualBox

  • Kali Linux

  • Install, deploy and run Kali Linux

  • Installation and deployment of vulnerable server for testing

Reconnaissance

Information gathering

Assess security vulnerabilities

Scanning engines

  • Nmap scanning

Search engine scanners

Internet scanners

  • Google search engine

Open source intelligence

  • Recon-ng scanning

Security standards

Center for Internet Security (CIS)

Hardening checks for systems

Exploitation

Metasploit framework for ethical hacking

  • Basic commands and usage

  • Module exploration

  • Search for vulnerabilities from scanning results

  • Exploitation of systems

  • Post-exploitation for privilege escalation and scanning

Security hardening and configuration

Social engineering

  • Dark Web with Tor

    • Hacking groups and forums

  • Wireless security assessment with WiFi PineApple

    • Wireless vulnerabilities

  • Social Engineering Toolkit (SET) attacks

  • Direct attacks into Windows 10 with Macros and Powershell

Web, application and database vulnerabilities

Open Web Application Security Project (OWASP) top 10

  • Injection

  • Broken authentication

  • Sensitive data exposure

  • XML External Entities

  • Broken access control

  • Security misconfiguration

  • Cross-Site Scripting

  • Insecure Deserialization

  • Using components with known vulnerabilities

  • Insufficient logging and monitoring

Full SQLMAP tutorial for web penetration testing

BurpSuite tutorial for manual injection on web penetration testing

Payload testing with custom load

Creation of payload

  • Payloads package on injection

  • Fully undetected payloads

  • Buffer overflow for shell

Who this course is for:

  • Beginners to pros interested in learning ethical hacking

Course content

12 sections • 83 lectures • 13h 34m total length

  • Preview12:09
  • Center for Internet Security
    37:58

  • Kali Linux installation
    06:42
  • Weaponizing Windows
    11:20
  • NGROK Connecting Servers To Internet
    03:49

  • Kali Linux features and functions for ethical hacking
    16:42
  • Install Kali Linux on Windows
    03:48

  • NMAP
    33:08
  • Scan for Network Devices
    05:53
  • Uncover Devices
    05:58
  • Detect Web Application Firewalls
    04:53
  • Recon-ng
    06:52
  • Recon-ng 2021
    07:14
  • Maltego
    06:50

  • Android Studio
    08:27
  • Run Android Apps
    04:26
  • Android Debug Bridge
    07:46
  • Control Android Remotely
    07:00
  • Access Phone's SMS Remotely
    10:47
  • Get Shell on Android
    08:36
  • Hide Mobile App
    10:05
  • Reverse Engineering Mobile Apps
    05:55
  • Reverse Engineering Mobile Apps on Data Storage
    16:40
  • Sensitive Data Exposure
    07:20
  • Mobile App Username and Password
    07:09
  • SQL Injection on Mobile App
    06:37
  • Invoke Mobile Apps Externally
    04:34
  • Control Android with Kali Linux
    02:54
  • Get Phone's GPS
    05:11
  • Ghost Framework
    05:44
  • Reset Android Without Password
    11:04

  • Metasploit basics
    28:22
  • Metasploit Post-Exploitation
    34:01
  • Keylogging
    06:48
  • Screen Monitoring
    05:33
  • NMAP Scanning
    10:09
  • Bypass Login Screens
    10:34
  • Shellshock Hacking
    12:07
  • Empire Framework for Hacking
    09:07
  • DefaultUser0 in Windows
    05:44
  • Hiding Shells
    07:55
  • CVE Vulnhub
    06:41
  • ARP Spoofing
    08:46
  • Reset Windows Without Password
    09:25
  • RDP Brute Force Attack
    09:31
  • File Sharing Hacking
    10:53

  • SQL Injection
    26:54
  • Cross-Site Scripting
    18:03
  • Cross-Site Request Forgery
    08:21
  • Web Cookies via Java Web Tokens
    10:58
  • Preview08:27
  • OWASP Juice Shop Authentication Bypass
    06:03
  • OWASP on Mutillidae
    06:05
  • OWASP Path Traversal
    08:15
  • View Other Users' Details
    10:06
  • OWASP JavaScript
    09:55
  • Hacking with Web Developer
    05:46
  • Create Admin Accounts
    06:17
  • OWASP ZAP
    09:37
  • Hack Databases With Metasploit
    11:50
  • Hackazon SQLMAP
    09:05

  • Setup Wireless On Kali Linux
    06:55
  • Wireless Hacking with Bettercap
    04:22
  • WiFi Pineapple Setup
    07:57
  • WiFi Pineapple
    09:34

  • Google hacking
    09:08

  • Social Engineering Toolkit
    07:13
  • Browser Exploitation Framework
    07:55
  • Dark Web
    05:06

Instructor

Loi Liang Yang
Ethical Hacker | Penetration Tester
Loi Liang Yang
  • 4.4 Instructor Rating
  • 48 Reviews
  • 409 Students
  • 3 Courses

Mr Loi Liang Yang is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker and CompTIA Security+ cybersecurity professional who works in a global security company. Mr Loi serves large enterprise clients in building and developing long-term security strategy.

Loi has a cybersecurity channel with more than 5.2 million views and over 201,000 global subscribers tuned to all of his cybersecurity tutorials and lectures. Loi also teaches the next-generation of cybersecurity professionals in ethical hacking and network defence and has trained hundreds of IT professionals in cybersecurity.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.