Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Meditation Personal Transformation Life Purpose Emotional Intelligence CBT
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Data Science
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

The Complete Ethical Hacking Course for 2016/2017!

Gain the knowledge hackers use to compromise systems and use it to protect your own!
Rating: 3.5 out of 53.5 (3,298 ratings)
122,093 students
Created by Ermin Kreponic
Last updated 11/2017
English
English, Italian [Auto], 
30-Day Money-Back Guarantee

What you'll learn

  • Get started using Fedora (Linux)
  • Understand the basics of terminal
  • Troubleshoot networks using Wireshark
  • Stay anonymous online
  • Set up a VPN server
  • Hack wireless networks
  • Crack passwords and encryption using HashCat
  • Clone websites
  • Protect & defend your own network
  • Learn how to deploy a keylogger from a USB: Works out of the box for Windows 7 8 8.1 and 10

Requirements

  • A computer to follow along with exercises in the course
  • USB drive to install Linux
  • Wireless card & router access
  • Various programs used to demo attacks (FREE)
  • An eager mind!

Description

If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world! Join us now and receive over 80 lectures & 15 hours of HD video, and 1 on 1 assistance from experienced network security professionals! We will cover the following topics in this course:

  • Introduction to ethical hacking
  • Linux installation, terminal basics, and Wireshark Setup
  • Staying anonymous online, proxy servers, and accessing the dark side of the internet using TOR
  • Aircrack-ng, HashCat, and wifi hacking
  • Defending your own networks from attacks
  • Cloning websites
  • Arduino USB keylogger that works out of the box for Windows 7, 8, 8.1, and 10
  • Windows power shell scripting

This course will receive monthly updates based on students requests, and our goal is to make this the #1 network security course online!

DISCLAIMER The attacks demonstrated in this course can cause serious damage and are only shown for educational purposes. The intent of this course is to give you the tools to defend your own networks, share skills that are valuable to companies all over the world, and help you to better understand the challenges that information security professionals face on a daily basis.

English & Spanish subtitles available.

Thank you for taking the time to read this, and we hope to see you in the course!

Who this course is for:

  • This course was designed for students in the IT/Network Security field
  • No previous experience is required

Course content

15 sections • 92 lectures • 16h 9m total length

  • Preview16:23

  • Create a USB for Installation
    10:10
  • Installation Procedure Part 1
    11:16
  • Installation Procedure Part 2
    06:22
  • Improve Safety and Anonymity of your Browser
    07:08
  • Fedora KDE Desktop Orientation (optional)
    14:44
  • Terminal Basics Part 1
    16:03
  • Terminal Basics Part 2
    11:46
  • Wireshark Setup Part 1
    05:02
  • Wireshark Setup Part 2
    07:54

  • How to Connect to the Internet via Proxy Part 1
    17:47
  • How to Connect to the Internet via Proxy Part 2
    02:50
  • How to set up a Proxy Server for Traffic Monitoring Part 1
    19:52
  • How to set up a Proxy Server for Traffic Monitoring Part 2
    09:55
  • How to set up a Proxy Server for Traffic Monitoring Part 3
    14:39
  • How to set up a Proxy Server for Traffic Monitoring Part 4
    19:04
  • How to set up a Proxy Server for Traffic Monitoring Part 5
    09:23
  • How to Connect to a VPN
    07:48
  • How to set up your own VPN Server Part 1
    10:14
  • How to set up your own VPN Server Part 2
    09:23
  • How to set up your own VPN Server Part 3
    13:32
  • How to set up your own VPN Server Part 4
    05:58
  • Monitor VPN Server Traffic
    09:45
  • Tor Browser
    11:21
  • How to set up a Tor Relay Part 1
    18:32
  • How to set up a Tor Relay Part 2
    05:44

  • Installing aircrack-ng
    16:20
  • Capturing WPA2 Handshake
    12:55
  • Crunch Password Generator Installation
    09:18
  • Crunch Password Generator Rule Sets
    18:50
  • Crunch Password Generator in Combination with aircrack-ng
    13:51
  • Installing NVIDIA Drivers
    15:11
  • Installing HashCat
    08:39
  • Preparing the Capture File for HashCat
    02:09
  • HashCat Part 1
    13:15
  • HashCat Part 2
    14:13
  • Changing your mac address
    13:32
  • Set up a Sandboxed Environment for our Hotspot Part 1
    18:16
  • Set up a Sandboxed Environment for our Hotspot Part 2
    11:52
  • Setting up an Open Wireless Hotspot Part 1
    08:39
  • Setting up an Open Wireless Hotspot Part 2
    03:40
  • Setting up the Fake DNS Resolutions Part 1
    05:51
  • Setting up the Fake DNS Resolutions Part 2
    03:08
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 1
    07:48
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 2
    08:51
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 3
    05:04
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 4
    13:07
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 5
    10:48
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 6
    19:47
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 7
    03:36
  • Disconnect Clients from a Wireless Access Point
    13:37

  • How to Clone Websites
    06:45

  • Bitsquatting Part 1
    14:26
  • Bitsquatting Part 2
    20:05
  • Bitsquatting Part 3
    18:11
  • Bitsquatting Part 4
    19:38
  • Bitsquatting Part 5
    10:15

  • Overview
    03:58
  • Requirements
    05:15

  • Installing Windows VM Part 1
    10:01
  • Installing Windows VM Part 2
    07:03
  • Install CodeBlocks with a Compiler
    04:17
  • Download and Compile the Keylogger
    09:00

  • Set up a Server for Keylogger
    15:51
  • Upload the Keylogger to the Server
    14:02

  • Download Arduino
    02:36
  • Set up Arduino and Teensyduino
    05:44
  • Confirm that everything works
    08:43
  • Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 1
    09:33
  • Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 2
    05:39
  • Generate Files in System32
    09:58
  • Sets of Commands to be Executed Part 1
    11:54
  • Sets of Commands to be Executed Part 2
    09:21
  • Call Functions and Run Commands
    04:29

Instructor

Ermin Kreponic
IT Expert
Ermin Kreponic
  • 4.2 Instructor Rating
  • 63,706 Reviews
  • 786,597 Students
  • 17 Courses

Strongly motivated young IT expert, Linux enthusiast with a passion for troubleshooting network related problems. With an exceptional eye for details and a sense of urgency when it comes down to problem solving.

Skills
- Advanced knowledge of Linux command line
- Installation, configuration and maintenance of servers that run under Unix/Linux type
operating systems
To name a few: DNS, TFTP, FTP, SSH, APACHE, SMTP, VSFTP and some others
- Troubleshooting a wide range of network related problems. Meaning, digging deep for
packets on any given network.
Using one of my favourite tools for capturing and filtering packets on the network, Wireshark,
and resolving end-user issues
- Good understanding of Cisco routers and IOS operating system
- Configuration and implementation of Linux firewall namely Iptables
- Supervision and filtration of network traffic
- Tightening down security and pen testing networks for possible vulnerabilities
- Good knowledge of network gear brands and their strengths or weaknesses
- Preforming system back up
- Fair knowledge of Bash scripting
- equipment installation, upgrades, patches, and configuration.


Personal note:

I do not sleep much, but that is not only because I work hard, rather instead it is
because I enjoy this line of work,
it is extremely rewarding in every way that matters

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.