Network Ethical Hacking for Beginners (Kali 2020, Hands-on)
4.4 (283 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
14,980 students enrolled

Network Ethical Hacking for Beginners (Kali 2020, Hands-on)

Learn to Hack Like Hackers and Secure Your System Like Security Experts - ethical hacking - white-hat hacker, Kali Linux
4.4 (283 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
14,980 students enrolled
Last updated 5/2020
English
English
Current price: $139.99 Original price: $199.99 Discount: 30% off
11 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3.5 hours on-demand video
  • 7 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • How to prepare the penetration testing lab, and more cool stuff are inside...
  • How to get comfortable with Kali Linux by getting the important required commands.
  • How to use Linux commands & how to interact with the command terminal.
  • How to change your system MAC address (Spoof) to stay anonymous.
  • How to attack any close wireless network and get all details about it (including target network MAC address, SSID, Encryption Type, ...etc).
  • How to get the MAC addresses for all clients connected to the target network without even knowing the password of the target router.
  • How to perform fake-authentication attack to target router without even knowing the password of the target network.
  • How to perform De-Authentication attacks without even knowing the password of the target network.
  • How to perform ARP attack without even knowing the password of the target network.
  • How to Perform (word list) Attacks to get passwords.
  • How to hack wireless networks to step by step.
  • How to Hack the Wi-Fi passwords for WEP, WPA, and WPA2.
  • How to Sniff Data from the network you hacked.
  • How to perform ARP spoofing attack to be the man in the middle MITM to intercept user names and passwords.
  • How to scan network for more details about connected devices.
  • How to know who is connected to the network you hacked.
  • How to use many tools, tricks and techniques to hack networks.
  • How to hide your virus in any other file extension (jpg, pdf, docx, xlsx..)
  • How to hack Mic, Camera, and Keyboard keys (Key Logger)..
  • Many other cool stuff about network hacking.
  • How to generate your own viruses.
  • How to gain access to remote computers.
  • How to keep yourself protected from the above mentioned attacks
Requirements
  • Love to learn hacking
  • enthusiasm to learn
  • Love Computers and Operating Systems
Description

Welcome to the Network Ethical Hacking course!
Hacking is a science similar to any other science. In this course I am going to show you the basics of hacking which will support you to start by yourself to develop your hacking skills to an advanced level.

This course considers you have No prior knowledge in hacking or in Linux operating system, & by the end of it you'll be able to hack systems like great hackers and keep yourself secured like security experts!

This course is practical but it will not ignore the theory. We will start with Kali Linux basics, then will try to make you comfortable with Linux environment. Then we will learn how to install the needed software (VirtualBox, Kali Linux, Windows 10) as virtual machines then we will start the hacking adventure.

The course is divided into 5 sections, (Introduction, Pre-Attack Phase, Attack Phase, Post-Attack Phase, and How to Keep Yourself Protected).

In Summary, in this course YOU Will LEARN THE FOLLOWING:

- How to prepare the penetration testing lab.

- How to get comfortable with Kali Linux by getting the important required commands.

- How to use Linux commands & how to interact with the command terminal.

- How to change your system MAC address (Spoof) to stay anonymous.

- How to attack any close wireless network and get all details about it (including target network MAC address, SSID, Encryption Type, ...etc).

- How to get the MAC addresses for all clients connected to the target network without even knowing the password of the target router.

- How to Perform (word list) Attacks to get passwords.

- How to perform fake-authentication attack to target router without even knowing the password of the target network.

- How to perform De-Authentication attacks without even knowing the password of the target network.

- How to perform ARP attack without even knowing the password of the target network.

- How to hack wireless networks to step by step.

- How to get Wi-Fi passwords for WEP , WPA and WPA2.

- How to Sniff Data from the network you hacked.

- How to perform ARP spoofing attack to be the man in the middle MITM to intercept user names and passwords.

- How to know who is connected to the network you hacked.

- How to scan network for more details about connected devices.

- How to intercept network traffic.

- How to use many tools, tricks and techniques to hack networks.

-How to generate your own viruses.

- How to hide your virus in any other file extension (jpg, pdf, docx, xlsx..)

- How to gain access to remote computers.

- How to hack Mic, Camera, and Keyboard keys (Key Logger)..

- Many other cool stuff about network hacking.

- How to keep yourself protected from the above mentioned attacks.


*** You will get 3.5 hours of hacking and hacking techniques ***

*** You will start from 0 to reach a good level of understanding and practical use of Linux and hacking tools ***


Notes:

  • This course is created for educational purposes only, all the attacks are launched in my own lab or against systems that I have permission to test.

  • This course is totally a product of Mohammad Hamza Sheikh and no other organization is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANIZATION IS INVOLVED.


Kind Regards

Hamza

Who this course is for:
  • Beginner Hackers
  • Anyone loves hacking
  • Ethical hackers
  • Security guys
  • Security engineers
Course content
Expand all 39 lectures 03:39:08
+ Introduction
1 lecture 03:27

- This course will be splitted into 3 phases (Pre-Attack - Attack - and Post-Attack)

* In this course we are going to explain many cool stuff such as:

- Hacking Wi-Fi networks (WEP - WPA - WPA2)

- Sniffing and analyzing network traffic by being Man in the Middle MITM.

- Perform different types of attacks such as ARP spoofing, DNS spoofing, MITM, Brute Force, Wordlist.. etc

- Generating your own viruses.

- Convert virus to a picture to hide its contents.

- Gain Access to PCs.

and at least will explain how to keep yourself protected from the above mentioned attacks.

Preview 03:27
+ Network Pre-Attack Phase
8 lectures 40:56

You will understand how Linux operating system started and to which distribution family Kali Linux belongs.

Kali Linux History
05:03

You will understand how Kali Linux file structure is to use it in future while installing hacking tools and while dealing with the operating system.

Kali Linux File Structure
05:02

You will be able to download VirtualBox application and install it on your PC. This is the first step towards preparing the penetration testing lab.

Downloading and Installing VirtualBox
03:29

You will be able to download Kali Linux and Import it to VirtualBox.

Downloading and Importing Kali Linux to VirtualBox
05:10

You will be able to solve a common issue faced by many hackers while preparing the hacking lab with VirtualBox.

Preview 05:06

You will be able to start getting into Kali Linux to break the ice and start to get comfortable with this new environment.

Getting Comfortable with Kali Linux Part 1
08:22

You will be able to start getting into Kali Linux to break the ice and start to get comfortable with this new environment.

Getting Comfortable with Kali Linux Part 2
07:54

You will understand how do Wi-Fi networks work to be able to perform advanced attacks in future.

How Do Wi-Fi Networks Work?
00:50
+ Network Attack Phase
21 lectures 01:58:13

You will learn how to scan searching for close Wi-Fi networks. Additionally, you will learn how to solve the external wireless adapter issue which can prevent you from doing wi-fi network scanning.

Discover Close Wi-Fi Networks and Solve Wi-Fi Adapter Issue
07:56
Another Way to Solve Adapter Monitor Mode Issue
01:44
Additional Way to Solve Airodump-ng Issue
04:54
Explaining the Outputof Airodump_ng Command
03:19
Get Hidden Names of Wi-Fi Networks (SSID)
01:50
Solve MAC Address Reset Issue
03:07
Disconnect Connected Clients from Any Close Wi-Fi Network
05:09
Disconnect a Specific Client from Any Close Wi-Fi Network
02:53
Hacking WEP Networks with wifite Tool
07:28
Hacking WEP Network without Tools
06:57
Hacking WPA/WPA2 through WPS Feature
07:13
Hack Wi-Fi (WPA/WPA2) Password Easily
07:36
Scan Connected Clients to Your Network and Solve WiFi Issue
04:28
Scan Opened Ports in Your Network
07:07
Downloading and Installing Windows 10 as a Virtual Machine
05:14
Man in the Middle Attack
06:20
Sniffing HTTPS Traffic
08:46
DNS Spoof Attack
08:15
+ Network Post-Attack Phase
8 lectures 48:25
VEIL Tool- a Tool for Generating Your Own Viruses
05:00
Generating a Backdoor (Virus)
07:52
Gaining Access via Meterpreter
04:42
Moving the Backdoor to Another Virtual Machine
01:57
Meterpreter Commands after Gaining the Access
10:44

Change the extension of your generated virus to a JPG file.

Spoof Backdoor Extension Part 1
08:56

Change the extension of your generated virus to a JPG file.

Spoof Backdoor Extension Part 2
03:11

After sending the backdoor by mail or by social media or by any method, you need to enable port forwarding in your router to be able to listen to this connection by MSFConsole.

Let the Backdoor to Work Outside Your Network
06:03
+ Protecting Yourself from Above mentioned Attacks
1 lecture 08:07

Protect Yourself from Above mentioned Attacks

Protect Yourself from Above mentioned Attacks
08:07