Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS AWS Certified Developer - Associate CompTIA Security+
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 24.5 hours on-demand video
  • 1 article
  • 4 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Ethical Hacking

Practical Ethical Hacking - The Complete Course

2020 Launch! Learn how to hack like a pro by a pro. Up to date practical hacking techniques with absolutely no filler.
Rating: 4.7 out of 54.7 (19,325 ratings)
166,663 students
Created by Heath Adams, TCM Security, Inc.
Last updated 12/2020
English
English [Auto], Turkish
30-Day Money-Back Guarantee

What you'll learn

  • Practical ethical hacking and penetration testing skills
  • Network hacking and defenses
  • Active Directory exploitation tactics and defenses
  • Common web application attacks
  • How to hack wireless networks
  • Learn how to write a pentest report
  • Understand the security threats affecting networks and applications
  • OWASP Top 10
  • IT security trends
Curated for the Udemy for Business collection

Requirements

  • Basic IT knowledge
  • For Mid-Course Capstone: A subscription to hackthebox is suggested, but not required to complete the course.
  • For Wireless Hacking: A wireless adapter that supports monitor mode (links provided in course).
  • For Active Directory Lab Build: A minimum of 16GB of RAM is suggested. Students can still participate in the course, but may experience slow lab environments.

Description

Welcome to this course on Practical Ethical Hacking.  To enjoy this course, you need nothing but a positive attitude and a desire to learn.  No prior knowledge is required.

In this course, you will learn the practical side of ethical hacking.  Too many courses teach students tools and concepts that are never used in the real world.  In this course, we will focus only on tools and topics that will make you successful as an ethical hacker.  The course is incredibly hands on and will cover many foundational topics.

In this course, we will cover:

  1. A Day in the Life on an Ethical Hacker.  What does an ethical hacker do on a day to day basis?  How much can he or she make?  What type of assessments might an ethical hacker perform?  These questions and more will be answered.

  2. Effective Notekeeping.  An ethical hacker is only as good as the notes he or she keeps.  We will discuss the important tools you can use to keep notes and be successful in the course and in the field.

  3. Networking Refresher.  This section focuses on the concepts of computer networking.  We will discuss common ports and protocols, the OSI model, subnetting, and even walk through a network build with using Cisco CLI.

  4. Introductory Linux.  Every good ethical hacker knows their way around Linux.  This section will introduce you to the basics of Linux and ramp up into building out Bash scripts to automate tasks as the course develops.

  5. Introductory Python.  Most ethical hackers are proficient in a programming language.  This section will introduce you to one of the most commonly used languages among ethical hackers, Python.  You'll learn the ins and outs of Python 3 and by the end, you'll be building your own port scanner and writing exploits in Python.

  6. Hacking Methodology. This section overviews the five stages of hacking, which we will dive deeper into as the course progresses.

  7. Reconnaissance and Information Gathering.  You'll learn how to dig up information on a client using open source intelligence.  Better yet, you'll learn how to extract breached credentials from databases to perform credential stuffing attacks, hunt down subdomains during client engagements, and gather information with Burp Suite.

  8. Scanning and Enumeration.  One of the most important topics in ethical hacking is the art of enumeration.  You'll learn how to hunt down open ports, research for potential vulnerabilities, and learn an assortment of tools needed to perform quality enumeration.

  9. Exploitation Basics.  Here, you'll exploit your first machine!  We'll learn how to use Metasploit to gain access to machines, how to perform manual exploitation using coding, perform brute force and password spraying attacks, and much more.

  10. Mid-Course Capstone.  This section takes everything you have learned so far and challenges you with 10 vulnerable boxes that order in increasing difficulty.  You'll learn how an attacker thinks and learn new tools and thought processes along the way.  Do you have what it takes?

  11. Exploit Development.  This section discusses the topics of buffer overflows.  You will manually write your own code to exploit a vulnerable program and dive deep into registers to understand how overflows work.  This section includes custom script writing with Python 3.

  12. Active Directory.  Did you know that 95% of the Fortune 1000 companies run Active Directory in their environments?  Due to this, Active Directory penetration testing is one of the most important topics you should learn and one of the least taught.  The Active Directory portion of the course focuses on several topics.  You will build out your own Active Directory lab and learn how to exploit it.  Attacks include, but are not limited to: LLMNR poisoning, SMB relays, IPv6 DNS takeovers, pass-the-hash/pass-the-password, token impersonation, kerberoasting, GPP attacks, golden ticket attacks, and much more.  You'll also learn important tools like mimikatz, Bloodhound, and PowerView.  This is not a section to miss!

  13. Post Exploitation.  The fourth and fifth stages of ethical hacking are covered here.  What do we do once we have exploited a machine?  How do we transfer files?  How do we pivot?  What are the best practices for maintaining access and cleaning up?

  14. Web Application Penetration Testing.  In this section, we revisit the art of enumeration and are introduced to several new tools that will make the process easier.  You will also learn how to automate these tools utilize Bash scripting.  After the enumeration section, the course dives into the OWASP Top 10.  We will discuss attacks and defenses for each of the top 10 and perform walkthroughs using a vulnerable web applications.  Topics include: SQL Injection, Broken Authentication, Sensitive Data Exposure, XML External Entities (XXE), Broken Access Control, Security Misconfigurations, Cross-Site Scripting (XSS), Insecure Deserialization, Using Components with Known Vulnerabilities, and Insufficient Logging and Monitoring

  15. Wireless Attacks.  Here, you will learn how to perform wireless attacks against WPA2 and compromise a wireless network in under 5 minutes.

  16. Legal Documentation and Report Writing.  A topic that is hardly ever covered, we will dive into the legal documents you may encounter as a penetration tester, including Statements of Work, Rules of Engagement, Non-Disclosure Agreements, and Master Service Agreements.  We will also discuss report writing.  You will be provided a sample report as well as walked through a report from an actual client assessment.

  17. Career Advice.  The course wraps up with career advice and tips for finding a job in the field.

At the end of this course, you will have a deep understanding of external and internal network penetration testing, wireless penetration testing, and web application penetration testing.  All lessons taught are from a real-world experience and what has been encountered on actual engagements in the field.


Note: This course has been created for educational purposes only.  All attacks shown were done so with given permission.  Please do not attack a host unless you have permission to do so.


Questions & Answers Team Availability and Rules

The Q&A team responds to most questions within 2 business days.  Specific Q&A rules are as follows:

1. Please encourage each other and help each other out. The support team is here to help, but are not staffed 24/7.

2. Support assistance will only be provided for course related material only. If you are using a tool or method in your labs that is not taught in the course, it is better asked in Discord on an appropriate channel outside of #course-chat.

3. Avoid spoilers for the mid-course capstone. If you are assisting another user or asking a question related to this section, please try to not provide direct answers/solutions.

4. Be kind to others and be patient. This field consists of patience, self-motivation, self-determination, and lots of Googling. Do not demand help or expect answers. That mindset will not take you far in your career. <3

Who this course is for:

  • Beginner students interested in ethical hacking and cybersecurity.

Featured review

Julius Caesar Crisostomo
Julius Caesar Crisostomo
23 courses
11 reviews
Rating: 5.0 out of 5a year ago
The best instructor that I've ever seen, he explained his craft in very detailed way and easy to understand. This is beyond my expectation hoping that heath will create more courses, because in no time he wil be huge here in Udemy platform.

Course content

26 sections • 193 lectures • 24h 43m total length

  • Course Resources
    00:12

  • Preview03:41
  • Frequently Asked Questions Guide
    01:00
  • A Day in the Life of an Ethical Hacker
    16:49

  • Preview06:39
  • Part 2: Important Tools
    05:20

  • Introduction
    01:11
  • IP Addresses
    13:06
  • MAC Addresses
    03:13
  • TCP, UDP, and the Three-Way Handshake
    05:12
  • Common Ports and Protocols
    06:10
  • The OSI Model
    05:30
  • Subnetting: Part 1 - Methodology
    26:59
  • Subnetting: Part 2 - Hands-On Challenge
    04:13

  • Installing VMWare / Virtualbox
    06:15
  • Installing Kali Linux
    06:29

  • Exploring Kali Linux
    03:28
  • Sudo Overview
    05:12
  • Navigating the File System
    11:59
  • Users and Privileges
    09:23
  • Common Network Commands
    05:52
  • Network Commands Update
    01:55
  • Installing and Updating Tools
    09:07
  • Installing gedit
    01:39
  • Viewing, Creating, and Editing Files
    05:59
  • Installing and Updating Tools
    07:04
  • Scripting with Bash
    22:34

  • Introduction
    02:19
  • Strings
    07:28
  • Math
    05:54
  • Variables & Methods
    11:12
  • Functions
    10:54
  • Boolean Expressions
    04:29
  • Relational and Boolean Operators
    06:54
  • Conditional Statements
    08:55
  • Lists
    10:23
  • Tuples
    02:30
  • Looping
    04:58
  • Importing Modules
    06:02
  • Advanced Strings
    13:19
  • Dictionaries
    07:31
  • Sockets
    05:28
  • Preview19:06

  • The Five Stages of Ethical Hacking
    05:16

  • Passive Reconnaissance Overview
    07:32
  • Identifying Our Target
    03:33
  • E-Mail Address Gathering with Hunter.io
    05:15
  • Gathering Breached Credentials with Breach-Parse
    07:17
  • Utilizing theharvester
    03:38
  • Hunting Subdomains - Part 1
    05:31
  • Hunting Subdomains - Part 2
    04:48
  • Identifying Website Technologies
    07:06
  • Information Gathering with Burp Suite
    08:48
  • Google Fu
    05:31
  • Utilizing Social Media
    05:37

  • Installing Kioptrix: Level 1
    06:37
  • Preview19:46
  • Enumerating HTTP/HTTPS - Part 1
    15:01
  • Enumerating HTTP/HTTPS - Part 2
    15:08
  • Enumerating SMB
    14:19
  • Enumerating SSH
    04:09
  • Researching Potential Vulnerabilities
    14:49
  • Our Notes, so Far
    03:06

Instructors

Heath Adams
Senior Penetration Tester
Heath Adams
  • 4.7 Instructor Rating
  • 21,304 Reviews
  • 169,261 Students
  • 4 Courses

Hi everyone! My name is Heath Adams, but I also go by "The Cyber Mentor" on social media.  I am the founder and CEO of TCM Security and while I am an ethical hacker by trade,  I love to teach!  I have taught courses on multiple platforms, including YouTube, Twitch, and INE.

In terms of certifications, I am currently OSCP, OSWP, eCPPTX, eWPT, CEH, Pentest+, CCNA, Linux+, Security+, Network+, and A+ certified. 

I'm also a husband, animal dad, tinkerer, and military vet.  I hope you enjoy my courses.

TCM Security, Inc.
Penetration Testing and Training Company
TCM Security, Inc.
  • 4.7 Instructor Rating
  • 21,304 Reviews
  • 169,261 Students
  • 4 Courses

Originally founded in Charlotte, NC, the TCM Security team has serviced clients around the globe, including Fortune 500, government, educational, and non-profits. We are a veteran-owned cybersecurity practice that brings together decades of cybersecurity experience and strong core values from our time in service. We have spent thousands of hours protecting people, data, and systems and look forward to the opportunity to do the same for your environments.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.