Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Life Purpose Meditation Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Network Ethical Hacking for beginners (Kali 2020 - Hands-on)

Learn How Hackers Think, Hack, & Secure Your System Like Security Experts, Ethical Hacking, Kali 2020, Cyber Security.
Rating: 4.3 out of 54.3 (2,237 ratings)
139,681 students
Created by Hamza Sheikh
Last updated 10/2020
English
English, Arabic, 
30-Day Money-Back Guarantee

What you'll learn

  • This Course subtitles are available with these languages: English - Spanish - Arabic - Turkish - Portuguese - French - Chinese - German - Greek - Italian - Russian.
  • How to hack wireless networks to step by step.
  • How to Sniff Data from the network you hacked.
  • How to generate your own viruses.
  • How to attack any close wireless network and get all details about it.
  • How to gain access to remote computers.
  • How to perform fake-authentication attack to target router without even knowing the password of the target network.
  • How to perform De-Authentication attacks without even knowing the password of the target network.
  • How to keep yourself protected from the above mentioned attacks
  • How to Perform (word list) Attacks to get passwords.
  • How to Hack the Wi-Fi passwords for WEP, WPA, and WPA2.
  • How to get comfortable with Kali Linux by getting the important required commands
  • How to use Linux commands & how to interact with the command terminal.
  • How to perform ARP spoofing attack to be the man in the middle MITM to intercept user names and passwords.
  • How to scan network for more details about connected devices.
  • How to know who is connected to the network you hacked.
  • How to use many tools, tricks and techniques to hack networks.
  • How to hide your virus in any other file extension (jpg, pdf, docx, xlsx..)
  • How to hack Mic, Camera, and Keyboard keys (Key Logger)..
  • Many other cool stuff about network hacking.
  • How to change your system MAC address (Spoof) to stay anonymous.
  • How to perform ARP attack without even knowing the password of the target network.

Requirements

  • Love to learn hacking.
  • Basic IT Skills.
  • Computer with 4GB memory minimum.
  • For WiFi cracking - Wireless adapter.

Description

Welcome to the Network Ethical Hacking course!

This Course subtitles are available with the following languages: English - Spanish - Arabic - Turkish - Russian - French - Chinese - German - Greek - Italian -Portuguese.

Hacking is a science similar to any other science. In this course I am going to show you the basics of hacking which will support you to start by yourself to develop your hacking skills to an advanced level. This course considers you have No prior knowledge in hacking or in Linux operating system, & by the end of it you'll be able to hack systems like great hackers and keep yourself secured like security experts!

This course is practical but it will not ignore the theory. We will start with Kali Linux basics, then will try to make you comfortable with Linux environment. Then we will learn how to install the needed software (VirtualBox, Kali Linux, Windows 10) as virtual machines then we will start the hacking adventure.

The course is divided into 5 sections, (Introduction, Pre-Attack Phase, Attack Phase, Post-Attack Phase, and How to Keep Yourself Protected).

In Summary, in this course YOU Will LEARN THE FOLLOWING:

- How to prepare the penetration testing lab.

- How to get comfortable with Kali Linux by getting the important required commands.

- How to use Linux commands & how to interact with the command terminal.

- How to change your system MAC address (Spoof) to stay anonymous.

- How to attack any close wireless network and get all details about it (including target network MAC address, SSID, Encryption Type, ...etc).

- How to get the MAC addresses for all clients connected to the target network without even knowing the password of the target router.

- How to Perform (word list) Attacks to get passwords.

- How to perform fake-authentication attack to target router without even knowing the password of the target network.

- How to perform De-Authentication attacks without even knowing the password of the target network.

- How to perform ARP attack without even knowing the password of the target network.

- How to hack wireless networks to step by step.

- How to get Wi-Fi passwords for WEP , WPA and WPA2.

- How to Sniff Data from the network you hacked.

- How to perform ARP spoofing attack to be the man in the middle MITM to intercept user names and passwords.

- How to know who is connected to the network you hacked.

- How to scan network for more details about connected devices.

- How to intercept network traffic.

- How to use many tools, tricks and techniques to hack networks.

-How to generate your own viruses.

- How to hide your virus in any other file extension (jpg, pdf, docx, xlsx..)

- How to gain access to remote computers.

- How to hack Mic, Camera, and Keyboard keys (Key Logger)..

- Many other cool stuff about network hacking.

- How to keep yourself protected from the above mentioned attacks.


*** You will get 3.5 hours of hacking and hacking techniques ***

*** You will start from 0 to reach a good level of understanding and practical use of Linux and hacking tools ***


Notes:

  • This course is created for educational purposes only, all the attacks are launched in my own lab or against systems that I have permission to test.

  • This course is totally a product of Mohammad Hamza Sheikh and no other organization is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANIZATION IS INVOLVED.


Kind Regards

Hamza

Who this course is for:

  • Hackers
  • Anyone loves hacking
  • Ethical hackers
  • Security guys
  • Security engineers
  • Pen. testers

Course content

8 sections • 39 lectures • 3h 39m total length

  • Preview03:27

  • Kali Linux History
    05:03
  • Kali Linux File Structure
    05:02
  • Downloading and Installing VirtualBox
    03:29
  • Downloading and Importing Kali Linux to VirtualBox
    05:10
  • Preview05:06
  • Getting Comfortable with Kali Linux Part 1
    08:22
  • Getting Comfortable with Kali Linux Part 2
    07:54
  • How Do Wi-Fi Networks Work?
    00:50

  • First Quiz
    6 questions

  • Discover Close Wi-Fi Networks and Solve Wi-Fi Adapter Issue
    07:56
  • Another Way to Solve Adapter Monitor Mode Issue
    01:44
  • Additional Way to Solve Airodump-ng Issue
    04:54
  • Explaining the Outputof Airodump_ng Command
    03:19
  • Get Hidden Names of Wi-Fi Networks (SSID)
    01:50
  • Preview02:05
  • Solve MAC Address Reset Issue
    03:07
  • Disconnect Connected Clients from Any Close Wi-Fi Network
    05:09
  • Disconnect a Specific Client from Any Close Wi-Fi Network
    02:53
  • Hacking WEP Networks with wifite Tool
    07:28
  • Hacking WEP Network without Tools
    06:57
  • Hacking WPA/WPA2 through WPS Feature
    07:13
  • Preview07:46
  • Hack Wi-Fi (WPA/WPA2) Password Easily
    07:36
  • Scan Connected Clients to Your Network and Solve WiFi Issue
    04:28
  • Scan Opened Ports in Your Network
    07:07
  • Downloading and Installing Windows 10 as a Virtual Machine
    05:14
  • Man in the Middle Attack
    06:20
  • Preview08:06
  • Sniffing HTTPS Traffic
    08:46
  • DNS Spoof Attack
    08:15

  • Second Quiz
    6 questions

  • VEIL Tool- a Tool for Generating Your Own Viruses
    05:00
  • Generating a Backdoor (Virus)
    07:52
  • Gaining Access via Meterpreter
    04:42
  • Moving the Backdoor to Another Virtual Machine
    01:57
  • Meterpreter Commands after Gaining the Access
    10:44
  • Spoof Backdoor Extension Part 1
    08:56
  • Spoof Backdoor Extension Part 2
    03:11
  • Let the Backdoor to Work Outside Your Network
    06:03

  • Third Quiz
    7 questions

  • Protect Yourself from Above mentioned Attacks
    08:07

Instructor

Hamza Sheikh
Computer Scientist & Ethical Hacker
Hamza Sheikh
  • 4.3 Instructor Rating
  • 2,237 Reviews
  • 139,681 Students
  • 1 Course

I am a computer scientist and an ethical hacker with a lot of IT projects and proven record of achievements. A winner of Chief Information Officer and Digital Transformation Awards. I have 12+ years of varied experience in IT technologies, operating systems, ethical hacking and cyber security. A distinguished holder of multiple management and IT certifications including MBA (from UK), ITIL_foundation, Certified Digital Business Leader CDBL, CSSA, MCP, and ITIL Service Operation. I'm an IT savvy who practices cyber security and ethical hacking in real life.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.