Hacking in Practice: Certified Ethical Hacking MEGA Course
4.2 (3,009 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
31,626 students enrolled

Hacking in Practice: Certified Ethical Hacking MEGA Course

2020 Edition! Practical Ethical Hacking Techniques. The most extensive ethical hacking course. Over 27+ HOURS OF VIDEO.
4.2 (3,009 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
31,624 students enrolled
Last updated 7/2020
English
English [Auto], Italian [Auto]
Current price: $126.99 Original price: $194.99 Discount: 35% off
14 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 21 hours on-demand video
  • 17 articles
  • 32 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Ethical hacking skills.
  • Hacking theory and practice.
  • IT security trends.
  • Security myths.
  • Learn about Wi-Fi network standards and protection.
  • Get to know about Wi-Fi threats.
  • Improve your grasp on Windows security.
  • Understand what security boundaries are.
  • Find out how to fight malware.
  • Discover secret tips on access control in Windows.
  • Learn how Windows authentication works.
  • Prevent identity spoofing.
  • Find out the mechanisms of Windows authorisation.
  • Learn about Windows 7 security mechanisms.
  • Get to know how to encrypt data in Windows.
  • Wi-Fi network standards and protection.
  • Wi-Fi network threats.
  • How to prevent identity spoofing.
Requirements
  • General IT knowledge
  • No programming skills needed on IT Sec Beginner course
Description

LAST UPDATED: 07/2020

Ethical Hacking in Practice: Certified Ethical Hacking MEGA Course - get ready for 2020!

Practical ethical hacking techniques. This is one of the best and the most extensive ethical hacking courses on-line. 27+ HOURS

BONUS: Finishing this ethical hacking course, you will get a free voucher for ISA CISS Examination!

This EXTENDED version contains over 239+ detailed lectures and over 27+ HOURS of VIDEO training. It's one of the most comprehensive ITsec and ethical hacking courses on Udemy.

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.

IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You’re welcome to join us and start your training now.

About the ethical hacking training

Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.

This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing.

Warning: While this comprehensive hacking training includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these techniques to infiltrate networks or IT systems without permission and consent.

Become CISS – Certified IT Security Specialist by covering the following topics:

  • Security and Hacking Myths Debunked

  • Beginner to Advanced IT Security

  • Microsoft Windows Threats and WiFi Weaknesses

  • Current Black-Hat Threats and Trends

  • Designing More Secure Networks

  • Encrypted Data, Identify Spoofing, and Windows Authorization

  • IT Security Academy Exam Preparation


Boost Network Security and Identify Weaknesses

Certified hackers identify network security threats to prevent criminal hacking attempts. The best way to do this, is to understand how cyber criminals evaluate and test your network for vulnerabilities.

Contents and Overview

This course is designed for anyone seeking a career in IT security / Ethical Hacking, as well as programmers and technology enthusiasts who want to develop hacking and prevention skills. A basic understanding of IT and infrastructure is recommended but not required.

With 239 lectures and over 23+ hours of content, you will start with the basics of hacking / IT security and progress to the advanced curriculum in a matter of days.

Who this course is for:
  • Hacking enthusiasts
  • Ethical Hackers
  • Future IT Sec Professionals
  • IT Students
  • Programmers
  • IT enthusiasts
Course content
Expand all 246 lectures 27:20:47
+ Application Security
12 lectures 01:27:14
Why is this section here?
00:08
Introduction to Application Security
08:19
Attacks on applications
10:18
SQL Injection
08:10
EXERCISE: Analyze the application
13:31
Blind SQL Injection
09:33
Automated SQL Injection
11:44
Cross-site scripting - XSS
10:10
Application Attacks - notes for the examination
00:00
Program security assessment
05:10
Unsafe applications
10:11
Program Security Assessment - notes for the examination
00:00

Check your knowledge and get ready for the exam

Check your knowledge and get ready for the exam
3 questions
+ Introduction to Cyber Threats
5 lectures 18:34
Introduction to Current Cyber Threats
04:46
IT Prehistory
04:41
Let’s look a few years back
04:42
Cyber crimes - an evolution not revolution
04:25
Current Cyber Threats - notes for the examination
18 pages
+ Popular IT Security Myths
5 lectures 17:52
Popular myths about IT security - origins
05:33
Myths #1 - you’ll never be hacked
05:55
Myths #2 - you don’t need any protection software or hardware
05:11
Myths #3 - IT security is always a priority
01:13
Popular Myths About Computer System Security - notes for the examination
9 pages
+ IT Security Trends
8 lectures 34:12
Trends in IT Security
03:44
The birth of technology society
03:16
EXERCISE: How much info can you gather?
03:59
Fake identity
05:03
Online privacy
06:14
Analyzing sniffing software
03:33
Cyber War
08:23
Changing IT Security Trends - notes for the examination
32 pages
+ Data Security
5 lectures 25:40
Objective #1 - Data security - Introduction
06:58
Integrity of data
07:04
Data security - notes for the examination
22 pages
Confidentiality of data
05:33
EXERCISE: Finding confidential data with search engines
06:05
+ Computer Network Security
23 lectures 01:45:42
Network security - introduction
05:44
OSI MODEL #1 - Physical layer
05:45
OSI MODEL #2 - Data link layer
04:46
Threats: MAC spoofing
05:54
Threats: ARP Poisoning
06:38
EXERCISE: Data Link Layer Attack
07:32
OSI MODEL #3 - Network layer
06:58
TCP Tunnelling over ICMP
07:39
Network Protocols - notes for the examination
26 pages
OSI MODEL #4 - Transport Layer
06:04
Threats: Enumerating Remote Computers
03:40
EXERCISE: Transport Layer Attack using METASPLOIT part 1
05:27
EXERCISE: Transport Layer Attack using METASPLOIT part 2
05:13
OSI MODEL #5 - Session Layer
03:33
Transport Protocols - notes for the examination
10 pages
OSI MODEL #6 - Presentation Layer
06:52
OSI MODEL #7 - Application Layer
03:48
EXERCISE: Application Layer Attacks
06:03
Backtrack: Attack Demonstration
03:34
Man-in-the-Middle and Denial of Service Attacks
02:49
Modifying Transmitted Packets
04:45
Unencrypted protocols
02:58
Application Protocols - notes for the examination
21 pages
+ Designing Secure Computer Networks
11 lectures 01:05:13
Designing Computer Networks - introduction
02:18
Subnetting IPv4
07:01
Subnetting IPv6
03:18
Subnetting - notes for the examination
20 pages
IPv6 address notation
06:46
DMZ: demilitarized Zone
06:28
Protocols and services: IP SEC
09:33
IP SEC: Phase 1
07:27
Network Address translation
12:18
Network access control: RADIUS
10:04
Protocols and Services - notes for the examination
20 pages
+ Network administration
11 lectures 01:06:56
Introduction to Monitoring Transmitted Data
01:06
Monitoring Transmitted Data - Basic informations
08:03
Intrusion detection systems
07:43
Why are firewalls and NDIS not enough?
05:41
Wireshark - Introduction to network analysis
06:29
How to use Wireshark?
08:27
Analyzing Captured data
05:43
How to analyze telnet protocol?
08:09
Intrusion detection
07:48
Scanning computers
07:47
Monitoring transmitted data - notes for the examination
28 pages
+ Wireless Networks Security
16 lectures 01:17:07
Wireless Networks
01:16
WIFI security solutions - introduction
05:44
WIFI - working principles
05:48
Other wireless technologies
02:56
Threats and risks
04:38
Ineffective solutions
04:11
Authentication methods
08:31
802.11 WEP
07:06
802.11I WPA
06:24
Standards and Security Solutions - notes for the examination
29 pages
Threats of WIFI networks
05:58
Client Attacks: Launching a rogue access point
07:03
Client Attacks: Evil twin
04:51
Client Attacks: Denial of service
09:17
EXERCISE: WPA attack
03:24
Wi-Fi Security Threats - notes for the examination
19 pages