Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS AWS Certified Developer - Associate CompTIA Security+
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 21 hours on-demand video
  • 17 articles
  • 32 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Ethical Hacking

Hacking in Practice: Intensive Ethical Hacking MEGA Course

2020 Edition! Practical Ethical Hacking Techniques. The most intensive ethical hacking course. Over 27+ HOURS OF VIDEO.
Rating: 4.6 out of 54.6 (3,091 ratings)
32,284 students
Created by IT Security Academy, Hacking School
Last updated 11/2020
English
English [Auto], Italian [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Ethical hacking skills.
  • Hacking theory and practice.
  • IT security trends.
  • Security myths.
  • Learn about Wi-Fi network standards and protection.
  • Get to know about Wi-Fi threats.
  • Improve your grasp on Windows security.
  • Understand what security boundaries are.
  • Find out how to fight malware.
  • Discover secret tips on access control in Windows.
  • Learn how Windows authentication works.
  • Prevent identity spoofing.
  • Find out the mechanisms of Windows authorisation.
  • Learn about Windows 7 security mechanisms.
  • Get to know how to encrypt data in Windows.
  • Wi-Fi network standards and protection.
  • Wi-Fi network threats.
  • How to prevent identity spoofing.

Requirements

  • General IT knowledge
  • No programming skills needed on IT Sec Beginner course

Description

LAST UPDATED: 11/2020

Ethical Hacking in Practice: Intensive Ethical Hacking MEGA Course - get ready for 2020!

Practical ethical hacking techniques. This is one of the best and the most intensive ethical hacking courses on-line. 27+ HOURS

BONUS: Finishing this ethical hacking course, you will get a free voucher for ISA CISS Examination!

This EXTENDED version contains over 239+ detailed lectures and over 27+ HOURS of VIDEO training. It's one of the most comprehensive ITsec and ethical hacking courses on Udemy.

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.

IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you practical skills. You’re welcome to join us and start your training now.

About the ethical hacking training

Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.

This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing.

Warning: While this comprehensive hacking training includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these techniques to infiltrate networks or IT systems without permission and consent.

Become CISS – Certified IT Security Specialist by covering the following topics:

  • Security and Hacking Myths Debunked

  • Beginner to Advanced IT Security

  • Microsoft Windows Threats and WiFi Weaknesses

  • Current Black-Hat Threats and Trends

  • Designing More Secure Networks

  • Encrypted Data, Identify Spoofing, and Windows Authorization

  • IT Security Academy Exam Preparation


Boost Network Security and Identify Weaknesses

Ethical hackers identify network security threats to prevent criminal hacking attempts. The best way to do this, is to understand how cyber criminals evaluate and test your network for vulnerabilities.

Contents and Overview

This course is designed for anyone seeking a career in IT security / Ethical Hacking, as well as programmers and technology enthusiasts who want to develop hacking and prevention skills. A basic understanding of IT and infrastructure is recommended but not required.

With 239 lectures and over 23+ hours of content, you will start with the basics of hacking / IT security and progress to the advanced curriculum in a matter of days.

Who this course is for:

  • Hacking enthusiasts
  • Ethical Hackers
  • Future IT Sec Professionals
  • IT Students
  • Programmers
  • IT enthusiasts

Course content

24 sections • 246 lectures • 27h 20m total length

  • Welcome to the course
    00:05
  • Preview01:31
  • Preview14:08

  • Why is this section here?
    00:08
  • Introduction to Application Security
    08:19
  • Attacks on applications
    10:18
  • SQL Injection
    08:10
  • EXERCISE: Analyze the application
    13:31
  • Blind SQL Injection
    09:33
  • Automated SQL Injection
    11:44
  • Cross-site scripting - XSS
    10:10
  • Application Attacks - notes for the examination
    00:00
  • Program security assessment
    05:10
  • Unsafe applications
    10:11
  • Program Security Assessment - notes for the examination
    00:00
  • Check your knowledge and get ready for the exam
    3 questions

  • Introduction to Current Cyber Threats
    04:46
  • IT Prehistory
    04:41
  • Let’s look a few years back
    04:42
  • Cyber crimes - an evolution not revolution
    04:25
  • Current Cyber Threats - notes for the examination
    18 pages

  • Popular myths about IT security - origins
    05:33
  • Myths #1 - you’ll never be hacked
    05:55
  • Myths #2 - you don’t need any protection software or hardware
    05:11
  • Myths #3 - IT security is always a priority
    01:13
  • Popular Myths About Computer System Security - notes for the examination
    9 pages

  • Trends in IT Security
    03:44
  • The birth of technology society
    03:16
  • EXERCISE: How much info can you gather?
    03:59
  • Fake identity
    05:03
  • Online privacy
    06:14
  • Analyzing sniffing software
    03:33
  • Cyber War
    08:23
  • Changing IT Security Trends - notes for the examination
    32 pages

  • Objective #1 - Data security - Introduction
    06:58
  • Integrity of data
    07:04
  • Data security - notes for the examination
    22 pages
  • Confidentiality of data
    05:33
  • EXERCISE: Finding confidential data with search engines
    06:05

  • Network security - introduction
    05:44
  • OSI MODEL #1 - Physical layer
    05:45
  • OSI MODEL #2 - Data link layer
    04:46
  • Threats: MAC spoofing
    05:54
  • Threats: ARP Poisoning
    06:38
  • EXERCISE: Data Link Layer Attack
    07:32
  • OSI MODEL #3 - Network layer
    06:58
  • TCP Tunnelling over ICMP
    07:39
  • Network Protocols - notes for the examination
    26 pages
  • OSI MODEL #4 - Transport Layer
    06:04
  • Threats: Enumerating Remote Computers
    03:40
  • EXERCISE: Transport Layer Attack using METASPLOIT part 1
    05:27
  • EXERCISE: Transport Layer Attack using METASPLOIT part 2
    05:13
  • OSI MODEL #5 - Session Layer
    03:33
  • Transport Protocols - notes for the examination
    10 pages
  • OSI MODEL #6 - Presentation Layer
    06:52
  • OSI MODEL #7 - Application Layer
    03:48
  • EXERCISE: Application Layer Attacks
    06:03
  • Backtrack: Attack Demonstration
    03:34
  • Man-in-the-Middle and Denial of Service Attacks
    02:49
  • Modifying Transmitted Packets
    04:45
  • Unencrypted protocols
    02:58
  • Application Protocols - notes for the examination
    21 pages

  • Designing Computer Networks - introduction
    02:18
  • Subnetting IPv4
    07:01
  • Subnetting IPv6
    03:18
  • Subnetting - notes for the examination
    20 pages
  • IPv6 address notation
    06:46
  • DMZ: demilitarized Zone
    06:28
  • Protocols and services: IP SEC
    09:33
  • IP SEC: Phase 1
    07:27
  • Network Address translation
    12:18
  • Network access control: RADIUS
    10:04
  • Protocols and Services - notes for the examination
    20 pages

  • Introduction to Monitoring Transmitted Data
    01:06
  • Monitoring Transmitted Data - Basic informations
    08:03
  • Intrusion detection systems
    07:43
  • Why are firewalls and NDIS not enough?
    05:41
  • Wireshark - Introduction to network analysis
    06:29
  • How to use Wireshark?
    08:27
  • Analyzing Captured data
    05:43
  • How to analyze telnet protocol?
    08:09
  • Intrusion detection
    07:48
  • Scanning computers
    07:47
  • Monitoring transmitted data - notes for the examination
    28 pages

  • Wireless Networks
    01:16
  • WIFI security solutions - introduction
    05:44
  • WIFI - working principles
    05:48
  • Other wireless technologies
    02:56
  • Threats and risks
    04:38
  • Ineffective solutions
    04:11
  • Authentication methods
    08:31
  • 802.11 WEP
    07:06
  • 802.11I WPA
    06:24
  • Standards and Security Solutions - notes for the examination
    29 pages
  • Threats of WIFI networks
    05:58
  • Client Attacks: Launching a rogue access point
    07:03
  • Client Attacks: Evil twin
    04:51
  • Client Attacks: Denial of service
    09:17
  • EXERCISE: WPA attack
    03:24
  • Wi-Fi Security Threats - notes for the examination
    19 pages

Instructors

IT Security Academy
IT Security Certified Professional
IT Security Academy
  • 4.1 Instructor Rating
  • 8,893 Reviews
  • 171,697 Students
  • 17 Courses

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Hacking School
IT Security Experts - We turn beginners into professionals.
Hacking School
  • 4.1 Instructor Rating
  • 8,893 Reviews
  • 171,697 Students
  • 17 Courses

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.