Learn Ethical Hacking from Entry to Expertise
3.7 (530 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
3,247 students enrolled

Learn Ethical Hacking from Entry to Expertise

5 Courses Bundle to Make You Expertise in Hacking from basics to advanced levels of Web & mobile apps pen-testing.
3.7 (530 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
3,247 students enrolled
Created by InSEC- Techs
Last updated 6/2019
English
English [Auto]
Current price: $27.99 Original price: $39.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 49.5 hours on-demand video
  • 8 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • You will learn Linux and Windows CLI Tutorials
  • You will learn from basics to ADVANCED level of Ethical Hacking course to become Professional Penetration Tester
  • You will learn & Expertise WiFi Hacking in Depth
  • You will learn Hacking / pentesting web sites & server (in WAPT Course)
  • You will learn Metasploit (Basics to advanced Level)
  • You will learn mobile apps (Android & iOS ) penetration testing
  • You will learn total 5 courses.
  • You will become pro Pen-Tester with all skills to handle Penetration Testing projects as an employee or Freelancer.
Requirements
  • Basics computer knowledge & computer networking
Description

This course is 5 courses bundled as single course title "Learn Ethical Hacking: Entry to Expertise Level: 5 Courses Pack" the biggest Course to Make You MASTERS in Hacking,Courses covers from basics to advanced levels of Web & mobile apps pen-testing.

Course 1: Ethical Hacking

Course 2: Web Application Penetration Testing

Course 3: Penetration Testing with Metasploit

Course 4: Android Application Penetration Testing

Course 5: iOS Application Penetration Testing

------------------------------------------------------------------------------------------------------------------------------------------------

(Upon Enrolling to this course , every student on request will receive FREE ACCESS to INSEC-TECHS individual courses after 31 days from the date of enrollment of this course, so that student can generate total 5 Course
 completion certificates. )

-------------------------------------------------------------------------------------------------------------------------------------------------

About Course 1: Ethical Hacking

InSEC-Techs Ethical Hacking  Course is IT Security (Offensive) Security Course that teaches you how to find vulnerabilities (bugs or loopholes,  like coding mistakes, configuration mistakes or errors etc) in any  applications and Network infrastructures including networking devices,  mobiles etc- Web Application Penetration is specific to digging the same  specific to web applications-

In this course you will learn how to find critical information that helps you to hack into computer / applications, later tool, techniques  and technologies that help you to penetrate (hack) into your target-  Ethical Hackers have high demand and have excellent job scope around the  world- You can just dig information in job portals about the job scope  and salaries paid

  Ethical Hacking Course is most comprehensive Ethical Hacking Course that is made for students to make their career in the  domain of IT-Security and we IST team help students in making the career  , right from helping them in resume preparation, interview question  bank etc.

About Course 2: Web Application Penetration Testing


Web Application Penetration Testing (WAPT) Course is IT Security (Offensive) Security Course that teaches you how to find  (Manual & Tool based teachniques) vulnerabilities (bugs or loopholes, like coding mistakes, configuration  mistakes or errors etc)  specific to web applications & web servers.

This course is highly comprehensive made of 78 video lectures of 17 hours and PDF & Vulnerable Website materials for practice.

About Course 3: Penetration Testing with Metasploit

From Wikipedia:  The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in  penetration testing and IDS signature development. Its best-known  sub-project is the open source  Metasploit Framework, a tool for  developing and executing exploit code against a remote target machine.  Other important sub-projects include the Opcode Database, shellcode  archive and related research. The Metasploit Project is well known for  its anti-forensic and evasion tools, some of which are built into the  Metasploit Framework. 95% of Security professionals use distribution like Kali Linux/Backtrack which consists tons of tools that aids pen-testers to perform audits and Metasploit Framework is highly sophisticated tool. The course is designed as a complete guide to understand and handle Metasploit Tool efficiently in real time

About Course 4: Android Application Penetration Testing

Android Application Penetration Testing is a division of PENETRATION TESTING Domain that concentrates on PenTesting Android applications on Android devices like mobiles and  tablets. 
This course is intended students/professionals who are  intended to make career in mobile penetration testing domain. 
The  course covers in and out of , actually Hacking (Penetration)    Android Apps and INSEC-TECHS have developed vulnerable  Android Apps for students to practice Labs. INSEC-TECHS will share  14 such applications to learn Hacking Android Mobile Applications with  crack challenges. Both InSEC-Techs iOS and Android Application  Penetration Testing course is a highly practical and hands on video  course. This course focuses on beginners as well as advanced users.  Instructor has created all the required vulnerable applications in order  for you to practice all the hands-on exercises demonstrated in this  course in a legal environment. This course begins with very basics  keeping beginners in mind. Even if you have worked on some Android app  security assessments, there will be something new for you. After  completing this course, you will learn where to start iOS app  penetration testing, Pentesting iOS Apps, Network monitoring on iDevices  and finally some automated tools to complete the task. It contains more  than 14 challenges to crack. Instructor explains all the solutions when  and where it is required. 

    The course is designed as a complete guide to understand and practice Android Mobile app hacking  efficiently in real time. We provide you material and references to get more  understanding and learning this tool. The course is very well  structured, explaining the terminologies , functionality and lab  practicals are very well shown as feeding baby a banana. 

About Course 5: iOS Application Penetration Testing

iOS Application Penetration Testing is a division of PENETRATION TESTING Domain that concentrates on Pen-Testing iOS Mobile Apps. This course is intended students/professionals who are intended to make career in mobile penetration testing domain.

The course covers in and out of , actually Hacking (Penetration) iOS Apps and INSEC-TECHS have developed vulnerable iOS Apps for students to practice Labs. INSEC-TECHS will share 11 such applications to learn Hacking iOS Mobile Applications. iOS Application Penetration Testing course is a highly practical and hands on video course. This course focuses on beginners as well as advanced users. Instructor has created all the required vulnerable applications in order for you to practice all the hands-on exercises demonstrated in this course in a legal environment. This course begins with very basics keeping beginners in mind. Even if you have worked on some iOS app security assessments, there will be something new for you. After completing this course, you will learn where to start iOS app penetration testing, Pentesting iOS Apps, Network monitoring on iDevices and finally some automated tools to complete the task. It contains more than 14 challenges to crack. Instructor explains all the solutions whenand where it is required.

The course is designed as a complete guide to understand and practice iOS Mobile app hacking efficiently in real time.  We provide you material and references to get more understanding and
learning this tool.The course is very well structured, explaining the terminologies , functionality and lab practicals are very well shown

Who this course is for:
  • Anyone with basic knowledge of computers
  • Anyone who want to make careen in Hacking/PenTesting domain.
  • Anyone who want to explore the knowledge on Cyber Security.
Course content
Expand all 317 lectures 49:37:23
+ Demo Videos for all 5 Courses.
18 lectures 02:53:32
+ Course 1: Ethical Hacking
66 lectures 15:03:08

This is Lesson 1 of Ethical Hacking , covering Introduction to Ethical Hacking. Please check video 1 in Demo Section to learn this lesson.

0 Ethical Hacking
18:28
2 Basics Of Linux
19:57
3-Windows Command Line Tools
21:08
4-Internet Governance
07:13

Hi ,

Download Virtualbox application from https://www.virtualbox.org/

Download VMWare application from https://www.vmware.com/in.html

Download Kali Linux OS from https://www.kali.org/downloads/

Download UBUNTU from https://www.ubuntu.com/

You must have purchased Windows OS of your own.

5-1Settingup-Lab
12:55
5-2Lab-Windows Server Installation
25:10
5-3Lab-Ubuntu-installation
11:54
5-4Lab-backtrack-installation
11:13
5-5Lab-BT Tools-Instllation-on-Ubuntu
09:16
5-6 Installing Kali Linux
27:50
5-7. Make Kali Linux full screen in Virtaul Box
16:29
5-8-XAMPP-Installation
10:03
6-Reconnaisance
26:14
7-1-Google Hacking
18:24
8and9-1-Scanning and Enumeration
25:40
8and9-2-APS
04:46
8and9-3-Nmap
09:18
8and9-4-LBD
02:05
8and9-5-Scan
02:51
8and9-6-DumpSec
06:42
10-System Hacking Part 1
12:06
10-System Hacking Part 2
08:43
10-System Hacking Part 3
08:34
10-System Hacking Part 4
05:04
11-1-Proxy Servers
27:28
11-3Proxy-tor
03:39
12- Keyloggers
05:16
13-Trojans
20:23
14-Virus
17:40
15-Social Engineering
15:39
16-Email Hacking
21:42
17-1-Sniffing
09:23
17-2-SniffWireshark
19:22
17-3-cain-able
08:28
18-1Session-Hijack
08:06
18-2Session-Hijack
05:14
18-3Session-Hijacking
02:41
19-Web Server Hacking
28:03
20-1-SQL Injection
06:57
20-2-SQL Injection
25:03
21-1-Cross Site Scripting
11:18
21-2-Cross Site Scripting
20:58
22-CSRF Part 1
10:39
22-CSRF Part 2-TESTER DEMO
07:09
22-CSRF Part 3 - Countermesures
02:14
23- Remote File Inclusion
05:44
24 and 25 Introduction to Exploit Writing- Buffer Overflows
37:10
26-Reverse-Engineering
34:43
27Cryptography
24:43
28-Firewalls
28:49
29-Denial Of Service Part - 1
07:15
29-Denial Of Service Part - 2
07:15
30-Physical Security
08:18
31-Wireless Hacking
11:06
32-Metasploit Part 1
20:52
32-Metasploit Part 2
08:17
33-Penetration Testing Part 1
04:44
33-Penetration Testing Part 2
10:53
33-Penetration Testing Part 3
05:27
34-Router Hacking
26:30
35-Mobile Hacking
34:35
36-Web App Pentesting Part 1
11:47
36-Web App Pentesting Part 2
02:38
36-Web App Pentesting Part 3
02:47
36-Web App Pentesting Part 4
08:15
36-Web App Pentesting Part 5
01:55
+ Course 2: Web Application Penetration Testing
80 lectures 16:55:24
1-WAPT Course Introduction
24:04
2-Introduction to Web Applications
12:43
3-Uses of Web Applications
07:50
4-Client Server Architecture
15:11
5-Working with Protocols – Video 1
24:25
6-Working with Protocols – Video 2
12:46
7-Web Application Technologies – Video 1
17:05
8-Web Application Technologies – Video 2
12:25
9-Protocol Status Codes – Video1
15:09
10-Protocol Status Codes – Video 2
07:28
11-1-Web Server & Client — Video 1
11:35
11-2-Web Server & Client — Video 2
05:24
11-3-Web Server & Client — Video 3
13:38
11-4-Web Server & Client — Video 4.mp4
06:11
12-Necessity of Web Application Security
17:26
13-Offensive & Defensive Security Mechanism
15:14
14-1-OWASP Video 1
03:55
14-2-OWASP Video 2
29:07
14-3-OWASP Video 3
20:43
14-4-OWASP Video 4
09:14
14-5-OWASP Video 5
04:05
14-6-OWASP Video 6
04:38
14-7-OWASP Video 7
09:16
14-8-OWASP Video 8
02:00
14-9-OWASP Video 9
08:35
15-1 Mastering Security using WEB DOJO
02:15
15-2 Mastering Security using WEB DOJO – Video 2
39:15
16-Core Defence Mechanisms
11:45
17-1 Mapping Web Application – Video 1
07:27
17-2 Mapping Web Application – Video 2
05:26
17-3 Mapping Web Application – Video 3
07:48
18-2 ByPassing Client-side controls – Video 2
29:26
18-3 ByPassing Client-side controls – Video 3
11:22
18-4 ByPassing Client-side controls – Video 4
06:17
18-5 ByPassing Client-side controls – Video 5
12:07
18-6 ByPassing Client-side controls – Video 6
14:49
19-1 Attacking Authentications – Video 1
18:21
19-2 Attacking Authentications – Video 2
09:52
19-3 Attacking Authentications – Video 3
04:38
20-1 Attacking Session Management – Video 1
25:07
20-2 Attacking Session Management – Video 2
08:03
20-3 Attacking Session Management – Video 3
03:02
20-4 Attacking Session Management – Video 4
07:40
20-5 Attacking Session Management – Video 5
06:04
21-2 Attacking Access Controls – Video 2
07:56
22-1 Attacking Data Stores – Video 1
19:54
22-2 Attacking Data Stores – Video 2
08:15
22-3 Attacking Data Stores – Video 3
08:23
22-4 Attacking Data Stores – Video 4
18:33
22-5 Attacking Data Stores – Video 5
23:57
22-6 Attacking Data Stores – Video 6
06:00
22-7 Attacking Data Stores – Video 7
03:00
23-1 Attacking Backend components – Video 1
28:33
23-2 Attacking Backend components – Video 2
01:59
23-3 Attacking Backend components – Video 3
01:59
23-4 Attacking Backend components – Video 4
02:53
23-5 Attacking Backend components – Video 5
03:18
24-1Attacking Application Logic Video 1
01:26
24-2 Attacking Application Logic Video 2
07:37
24-3 Attacking Application Logic Video 3
12:21
25-1 Attacking Users – Video 1
40:52
25-2 Attacking Users – Video 2
40:25
26-2 Attacking Users – Video 3
25:06
26-3 Attacking Users – Video 4
02:45
27-1 Automated Customized Attacks – Video 1
23:19
27-2 Automated Customized Attacks – Video 2
04:19
27-3 Automated Customized Attacks – Video 3
17:19
28-1 Exploiting Information Disclosure – Video 1
28:58
28-2 Exploiting Information Disclosure – Video 1
10:52
29-Attacking Native Complied Application
13:41
30-1 Attacking Application Architecture – Video 1
15:30
30-2 Attacking Application Architecture – Video 2
06:26
31-1 Attacking Application Server – Video 1
15:57
31-2Attacking Application Server – Video 2
10:03
33-Finding Vulnerabilities in Source Code
21:52
34-Hackers Methodology & Reporting
20:41
35- Misc. Videos
04:03
35- Misc. Videos
06:59
35- Misc. Videos
03:12
35- Misc. Videos
06:10
+ Course 3: Penetration Testing with Metasploit
60 lectures 04:48:23
0.Course Introduction
03:19
1.Introduction to penetration testing
01:48
2.Introduction to PTES
01:05
3.PTES overview
03:11
4.settinng up lab
03:44
5.Setting up lab -live mode
04:08
6.Installing kali linux
02:49
7.configuring vulnerable thrid party test beds
02:49
8.snapshot and clone
04:26
9.metasploit 101
04:43
10.auxilary scanning
02:45
11.Introduction to exploits
03:21
12.excellent ranking exploits
04:55
13. Normal Ranking Exploits
02:32
14. Payloads
02:56
15. Creating database connectivity
04:52
16. Nessus installtion
04:32
17. Nessus Scanning-2
04:12
18.exploiting vulnerability based on nessus report
03:47
19. MSFConsole
04:25
20. MSFCLI
02:28
21. Armitage
06:16
22. Meterpreter
01:30
23. Working on meterpreter
04:38
24. Getting Meterpreter Access
05:33
25. Meterpreter core commands
08:38
26. Meterpreter-File-Commands
07:54
27. Meterpreter-user interface commands
09:41
28. Meterpreter-system-commands
09:45
29. Meterpreter-networking-commands
01:40
30.changing MAC attributes
11:44
31.introduction to client side attacks
02:23
32.msfpayload, msfencode, msfvenom
01:48
33.binary payload
06:28
34.vnc binary payload
04:04
35.vnc payload courtesy shell DISABLE
01:03
36.linux binary payload
04:14
37.stage-2-binary payload
07:01
38.Exploiting MS-Office documents using macros
06:21
39.exploiting pdf vulnerabilities
06:12
40.Adding persistent backdoor
04:09
41.exploiting software misconfiguration
06:52
42.exploiting fully patched machine
06:39
43.Browser based exploitation
07:03
44.Installing and configuring beef
07:03
45.Working on beef
03:24
46.working on beef modules
05:20
47.Loading MSF modules in to BeEF
04:37
48.Introduction to Social Engineering
12:24
49. SET installation
03:35
50.tabnabbing attack
08:21
51.webjacking
03:14
52.Introduction to Armitage and its installation
05:57
53.Post Exploitation over meterprerter using armitage
04:02
54.Veil-Framework-installation
03:10
55. Evading Anti Viruses using VeilFramework
06:42
56.Integerating Veil script into Armitage
02:12
57.Exploiting Victims machine using Armitage with Veil
03:34
58.Exploiting Victim Machine using customized powershell script
03:48
59.Installing Android Virtual Testbed
06:37
+ Course 4: Android Application Penetration Testing
46 lectures 04:31:45
1.1 Introduction to Android
04:23
1.4 Creating an emulator
04:22
2.1 Android Security Model
06:50
2.2 App Sandboxing
08:00
2.3 Secure Interprocess Communication
10:15
2.4 Application Signing
08:16
2.5 App Permissions
07:25
3.1 App Structure
06:43
3.2 Building a simple app
11:29
4.1 M1 Introduction
02:52
4.21 M2-Shared Preferences
07:17
4.22 M2-Shared Preferences- Look at Code
03:39
4.23 M2 SQLITE
07:41
4.24 M2 SQLITE-Look at Code
03:26
4.31 M3
09:41
4.33 M3
10:13
4.34 M3
07:38
4.41 Unintended Data Leakage — Reading the clipboard
07:16
4.42 Unintended Data Leakage — Reading the clipboard – Look at Code
01:45
4.43 Unintended Data Leakage –Logging
05:09
4.44 Unintended Data Leakage –Logging — Look at Code
02:07
4.51 Poor Authorization and Authentication
03:42
4.61 Broken Cryptography
08:15
4.71 Client Side Attack– SQL Injection at Client Side
03:29
4.72 SQL INJECTION — LOOK AT CODE
02:58
4.73 Frame injection in webviews
02:18
4.74 Frame injection in webviews — Look at Code
02:44
4.81 Security Decisions via untrusted inputs — Intent Spoofing
05:08
4.91 Improper Session Handling
04:04
4-20 Lack of binary protection
02:16
4-21 Reversing android apps with APKTOOL
03:38
4-22 Reversing android apps with dex2jar & JD-GUI
03:23
4-23 Finding Content Provider URIs using APKTOOL.
03:20
5.1 Setting up drozer
05:03
5.2 Intent Spoofing
08:55
5.3 Content Provider Leakage
07:00
5.4 SQL Injection in Content Providers
09:52
6.1 A look at android exploit mitigatioin techniques
03:52
6.2 I m running ARM
02:45
6.3 GDB setup
06:28
6.4 Running a C program on your device
06:42
6.5 Format String Vulnerability
09:54
7.1 Introduction to mobile forensics
09:30
7.2 Mobile forensics - Part 2
05:23
+ Course 5: iOS Application Penetration Testing
47 lectures 05:43:39
2. Credits
03:00
3-introduction to iOS
04:23
4-iOS App basics
04:01
5 iOS Architecture
09:09
6- Settinng up Xcode
07:44
7-adding-functionality-to-helloworld-app
09:58
8 Inbuilt Security Model
09:04
9-SECURITY CONTROLs
07:26
10-JAILBREAKING BASICS
07:40
11-INSTALLATIONS
18:22
12-INSTALLING CHALLANGE APPS
07:48
13-IOS APP DIRECTORY STRUCTURE
12:01
14-SQLITE DATA
10:50
15-PLIST FILES
06:04
16-NSUSER DEFAULTS
03:41
17-CORE-DATA
05:36
18-KEYCHAIN
09:12
19-LOGGING
04:18
20-APP BACKGROUNDING
06:00
21-KEYBOARD CACHE
03:26
22-PASTEBOARD
02:50
23-SQL INJECTION
04:50
24-CROSS-SITE SCRIPTING ATTACKS - XSS
05:12
25-INTERCEPTING HTTP TRAFFIC
08:57
26-INTERCEPTING HTTPS TRAFFIC
07:16
27-MONITORING NETWORK TRAFFIC(TCPIP)
06:15
28-DUMPING CLASS INFORMATION OF PREINSTALLED APPS
06:17
29-DUMPING CLASS INFORMATION OF APPS INSTALLED FROM APP STORE
08:49
30-CYCRIPT BASICS
13:48
31-RUNTIME CODE INJECTION USING CYCRIPT
05:11
32-ACCESSING AND MODIFYING VARIABLES USING CYCRIPT
06:34
33-EXPLOITING AUTHENTICATION USING CYCRIPT
06:34
34-METHOD SWIZZLING USING CYCRIPT
05:47
35-BYPASSING JAILBREAK DETECTION USING CYCRIPT
09:42
36-METHOD SWIZZLING USING SNOOP-IT
12:04
37-APP MONITORING USING SNOOP-IT
03:27
38-RUNTIME ANALYSIS WITH GDB
08:45
39-RUNTIME ANALYSIS USING SNOOP-IT
12:04
40-CYDIA DEFAULT PASSWORD EXPLOITATION WITH METASPLOIT
08:10
41-CRACKING OPENSSH PASSWORDS USING HYDRA
05:21
42-METASPLOIT BINDSHELL ON IDEVICES
07:45
43-METASPLOIT REVERSE SHELL IDEVICES
08:44
44-INTRODUCTION TO REVERSE ENGINEERING
08:46
45-REVERSING IOS APPS-1
04:59
46-REVERSING IOS APPS-2
06:46
47-REVERSING IOS APPS-3
03:46
48-REVERSING IOS APPS-4
05:17