Learn Step by Step Network Hacking and Penetration Testing
4.4 (257 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
4,408 students enrolled

Learn Step by Step Network Hacking and Penetration Testing

Learn how to hack networks and web applications like black hat hackers, and learn how to secure them from these hackers.
4.4 (257 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
4,409 students enrolled
Created by Gabriel Avramescu
Last updated 8/2019
English [Auto-generated]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 5.5 hours on-demand video
  • 2 articles
  • 22 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Understand and perform the basic steps in order to performa penetration testing of an infrastructure or other computers in the network
  • Be able to gather information about your target
  • You will learn how to find open ports your target
  • You will learn how to find vulnerabilities in your target infrastructure
  • Exploit found vulnerabilities
  • Sniff and analyze network traffic
  • You will learn how to exploit Windows and Linux Systems
  • Understand and perform attacks using Metasploit
  • Understand cryptography
  • Understand the difference between backdoors, viruses and worms. Learn the basics of how to analyse them
  • Hack wireless networks
  • Understand the penetration testing process
  • As a network administrator you will learn how to secure your network
  • Basic IT skills
  • Basic knowledge of Linux and/or Windows
  • Understand basic computer networking

In order to protect yourself from hackers, you must think as one.

In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking.

You will learn hacking tools, methodologies and techniques. This is a both practical and theoretical step-by-step course.

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. 

Below are the main topics, both theoretical and practical, of this course: 

  • Introduction to Ethical Hacking, Footprinting and Reconnaissance

    • This section will teach you how to gather information about your target server, you will learn how to discover the DNS server used, open ports and services, un-published directories, sensitive files. This information is very important as it increases the chances of being able to successfully gain access to the target website.

  • Scanning Networks, Enumeration and Vulnerabilities  and System Hacking 

    • In this section you will learn how to discover and exploit a large number of vulnerabilities, this section is divided into a number of sub-sections, each covering a specific vulnerability, firstly you will learn what is that vulnerability, then you will learn how to exploit this vulnerability.

  • Sniffing 

    • Learn how to capture encrypted and unencrypted data, passwords and such (HTTP, telnet, HTTPS, etc)

  • Metasploit 

    • Use This framework to exploit numerous vulnerabilities and crate backdoors

  • Trojans, Backdoors, Viruses and Worms 

  • Cryptography 

  • Penetration testing on Wireless Networks

  • Penetration Testing

NOTE: This course is created only for educational purposes  and all the attacks are launched in  an isolated lab environment.

Who this course is for:
  • Anyone who want to learn the ethical hacking and penetration testing process
  • Network and Security Engineers
  • IT students
  • Anyone who wants to start a career in it security field or as "ethical hacker"
Course content
Expand all 44 lectures 06:46:06
+ Introduction to Ethical Hacking. Footprinting and Reconnaissance
6 lectures 39:27

In this video I will introduce myself and speak about the course content.

Preview 01:13

The first step in any penetration testing is to gather as much information as possible about the target. In this vide I will go trough what information gathering is, different types and tools to perform that.

Preview 24:55

Join our online classroom!

Join Our Online Classroom!

The most easy way to perform information gathering is to do it using search engines. This is a passive method.

Preview 04:17

In this video we will go trough active information gathering using different tools and techniques.

Demo - Scanning and Enumeration

As a homework, you will be challenged to perform information gathering in the lab we will provide.

Do it yourself - Information Gathering Exercise
18 pages
+ Scanning Networks, Enumeration and Discovering Vulnearbilities
8 lectures 38:10

In this video we will go trough different types of scanning and enumeration techniques.

Scanning and enumeration

In this vide we will talk about what a vulnerability is and how we can find them.

Vulnerabilties Identification

Using a security scanner such as Nessus could be very helpful in finding security vulnerabilities. In this video you will learn how you can install it.

Demo - Installing Nessus Scanner

In this video you will learn how you can use Nessus in order to find security vulnerabilities.

Demo - Use Nessus to Discover Vulnerabilities

In this vide you will learn how to use Nikto open-source free software in order to find security vulnerabilities in web servers.

Demo - Using Nikto to discover Web Vulnerabilities

In this vide you will learn how to use Paros open-source free software in order to find security vulnerabilities in web applications.

Demo - Using Paros for Vulnerability Discovery

In this vide you will learn how to use Dirbuster open-source free software in order to find hidden content in web applications.

Demo - Use Dirbuster to brute force sub-directories and filenames

Another challenge to find different security vulnerabilities that we are going to exploit in the next section of the course.

Do it yourself - Scanning and enumeration, Vulnerability Discovery Exercise
8 pages
+ System Hacking and Vulnerability Exploitation
3 lectures 24:49

Once we have discovered some interesting vulnerabilities, we can go further and take advantage of them. So let's learn how to exploit them.

System hacking - vulnerability exploitation

Knowing how to crack password is one of the most important steps in computer and website hacking. You will learn about different types of cracking passwords, hashes and so on.


In this video you will learn what Authentication is and why is so important when it comes to computer security.

+ Basics of Sniffing
1 lecture 15:00

Getting important data such as username and passwords is always useful, isn't it? In this video I will teach you different sniffing techniques.

+ Metasploit
7 lectures 57:24

Maybe one of the most well-known tools and framework for hacking and exploitation is Metasploit. In this video you will learn what is it, about its modules and how to use it.


In this vide you are going to learn how to exploit a vulnerable FTP server using Metasploit in order to get remote access on the server that it runs on.

Demo - Exploiting FTP Server Vulnerability using Metasploit

Once you have access on a remote server, useful to maintain your access and gather more information about juicy stuff hosted on that server, such as passwords, documents, cookies, wi-fi passwords and so on.

Demo - Post Exploitation Example

Samba, NFS, SMB - some of the most met services running on different systems, even if it is Mac, Linux or Windows. Learning how to find security loopholes and exploit them is essential. In this video you will learn how to do exactly this.

Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the Victim PC

Get root using Metasploit never have been easier than in this video, using a Samba vulnerability.

Demo - Eploiting Samba Service on Linux using Metasploit

Create a backdoor for Windows - learn how in this video.  Use social engineering techniques to deploy it.

Demo - Windows backdoor using Metasploit

Another challenge for you - further exploit using Metasploit.

Do it yourself - Vulnerability Exploitation using Metasploit Exercise
24 pages
+ Trojans, Backdoors, Viruses and Worms
2 lectures 14:14

Want to know more about malware and different types? In this video you will do exactly that.

Trojans and Backdoors

In this video you will learn what is the difference in between computer viruses and worms.

Computer viruses and worms
+ Cryptography
7 lectures 32:55

Are you a geek? No, yes? Nevertheless, you need to know about cryptography. How can you become a hacker without knowing this?

Cryptography concepts

Some basic math is always good when it comes to Cryptographic Algorithms.

Cryptographic Algorithms

And now the time came to learn about cracking cryptography.

Cryptography and cryptanalysis tools. Cryptography attacks

Brute Force SSH? No problem! Learn how in this video, using Medusa.

Demo - Hack SSH passwords using Medusa

Learn how to use Hydra in order to brute force MySQL,. SSH, FTP, Telnet, Cisco and so on.

Hack the SSH Password using Hydra

Learn how to offline crack password hashes using John the Ripper.

Hack Linux Passwords using John the Ripper

This is another challenge for cracking passwords.

Preview 15 pages
+ Penetration Testing on Wireless Networks
3 lectures 17:38

In this lecture you will learn about wireless security.

Penetration Testing on Wireless Networks

In this section you will learn how to crack wifi passwords.

Do it yourself - WiFi Networks Security - practical approach
15 pages

An interesting lecture about Windows Hosted Network Feature (or Bug) and how to take advantage of it.

Case Study – Windows Hosted Network Bug or Feature
+ Penetration Testing Overview. Final words
2 lectures 44:11

Now let's put them all together. Int his video you will learn what a penetration testing is.

Preview 25:56

A bonus video. Network Hacking is beyond network. So let's see top web vulnerabilities according to OWASP.

Bonus - OWASP Top 10 Vulnerabilities
+ (Bonus) Attacking the users trough websites - XSS and Beef-XSS
5 lectures 42:17

Cross-Site-Scripting or XSS is a client-oriented attack used in many social engineering and not only attacks to harvest username and passwords, deploy backdoors, change websites' behavior of interface. In this video you will learn how it is.

Introduction to Cross-Site Scripting and Beef-XSS

Once you understood what a cross-site scripting is, let's move forward and see how we can exploit it in order to steal user's session and impersonate them. Some social engineering is always welcomed.

XSS example - reflected

Stored XSS and stealing credentials goes well hand in hand. In this video we are going to see how we can use this in our advantage.

XSS example - stored

Beef-XSS is a cross-site scripting exploitation framework. In this video you are going to learn how to use it.

Beef-XSS Demo

Time to say good bay, but my door is always open if you want to learn more.

Further information