Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS AWS Certified Developer - Associate CompTIA Security+
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 4.5 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Ethical Hacking

Learn Ethical Hacking From Scratch

Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts.
Rating: 2.3 out of 52.3 (5 ratings)
34 students
Created by Ashwin Pk
Last updated 2/2019
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Ethical Hacking

Requirements

  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For WiFi cracking (10 lectures ONLY) - Wireless adapter that supports monitor mode (more info provided in the course).
  • Basic Computer Knowleadge Is Enough

Description

Welcome to my comprehensive course on Ethical Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking. The first thing you will learn is some basic information about ethical hacking and the different fields in penetration testing.


You will learn to hack Android Phones

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in my lab.

The course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other. We will start by talking about how we can exploit these systems to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level -- by the time you finish, you will have knowledge about most penetration testing fields.

Gaining Access - In this section you will learn two main approaches to gain full control over any computer system:

  • Server Side Attacks: In this approach you will learn how to gain full access to computer systems without the need for user interaction. You will learn how to gather information about a target computer system such as its operating system, open ports, installed services and discover weaknesses and vulnerabilities. You will also learn how to exploit these weaknesses to gain full control over the target. Finally you will learn how to generate different types of reports for your discoveries.

  • Client Side Attacks - If the target system does not contain any weaknesses then the only way to gain access to it is by interacting with the user. In this approach you will learn how to launch a number of powerful attacks to fool the target user and get them to install a backdoor on their device. This is done by creating fake updates and serving them to the user or by backdoornig downloaded files on the fly. You will also learn how to gather information about the target person and use social engineering to deliver a backdoor to them as an image or any other file type.

Post Exploitation - In this section you will learn how to interact with the systems you compromised so far. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, spy on the target and even use the target computer as a pivot to hack other computer systems.

NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

NOTE: This course is totally a product of Ashwin Pk and no other organisation is associated with it or a certification exam. Although, you will receive a Course Completion Certification from US, apart from that NO OTHER ORGANISATION IS INVOLVED.

Who is the target audience?

  • Anybody who is interested in learning ethical hacking / penetration testing

  • Anybody who wants to learn how hackers hack computer systems

  • Anybody who wants to learn how to secure their systems from hackers

Who this course is for:

  • Beginner Ethical Hackers
  • Ethical Hackers
  • IT Students
  • Python Developers

Course content

12 sections • 51 lectures • 4h 38m total length

  • Preview02:26
  • What Is Hacking & Types Of Hackers
    02:02

  • Setting Our Lab - Introduction
    05:18
  • Installing Kali Linux
    09:10
  • Preview07:54

  • Basic Overview Of Kali Linux
    08:24
  • The Linux Terminal And Basic Linux Commands
    16:56

  • Preview08:32
  • Veil - Computer Virus Part 2
    06:04
  • Veil - Generating An Virus
    07:59
  • Creating Our Own Server
    06:17
  • Listening To Incoming Connections
    07:31
  • Using Our Virus Globally
    09:58

  • Converting Virus Into Image
    09:44
  • Spoofing The Extension
    07:09

  • Preview05:37
  • Meterpreter - File System Commands
    05:16
  • Meterpreter - Maintaining Access
    07:29
  • Meterpreter - Keylogging
    03:01

  • Android Hacking
    09:05
  • Android Meterpreter
    04:44
  • Android Advanced Hacking
    08:30

  • Hacking Passwords - Fb,Insta,Gmail
    05:34
  • Hacking Passwords Advanced - Fb,Insta,Gmail
    06:49
  • Hacking Passwords - Undectable Method
    04:27

  • Introduction To Beef
    01:35
  • Hooking Targets With Beef
    04:39
  • Capturing ScreenShot Of Target
    03:05
  • Using Beef Globally
    06:11
  • Redirecting Target To Any Website
    01:49
  • Force Target To Watch Youtube Video
    03:52
  • Steal FacebookGmail Password Using Beef
    04:02

  • Login To Facebook,Instagram Without Password
    01:57
  • How To Get Cookies
    03:20
  • How To Use Cookies To Login - Facebook
    03:25

Instructor

Ashwin Pk
Ethical Hacker, Pentester & Computer Scientist
Ashwin Pk
  • 4.2 Instructor Rating
  • 129 Reviews
  • 417 Students
  • 4 Courses

My name is Ashwin, I am an ethical hacker, a computer scientist, and the founder and CTO of Frankeey. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.

I have been teaching ethical hacking on tamil in my website frankeey

And now started to teach on udemy. I am sure that you will love my courses

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.