The Complete Ethical Hacking Bootcamp-From Zero to Hero
4.3 (159 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
13,574 students enrolled

The Complete Ethical Hacking Bootcamp-From Zero to Hero

A Comprehensive Beginner's Guide To Learn And Master Ethical Hacking!
4.3 (159 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
13,574 students enrolled
Created by Ramsai Dupati
Last updated 9/2019
English
English [Auto-generated]
Current price: $48.99 Original price: $64.99 Discount: 25% off
23 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 18 hours on-demand video
  • 1 article
  • 5 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • 70+ ethical hacking & security videos.
  • Start from a beginner up to a high-intermediate level.
  • Learn what is ethical hacking, its fields and the different types of hackers.
  • Install hacking lab & needed software (works on Windows, MAC OS X and Linux).
  • The ability to secure and protect any network from hackers and loss of data.
  • Discover vulnerabilities & exploit them hack into servers.
  • More than 35+ hacking tools such as Metasploit,sAINT spyware,Beelogger,SQL Map.....and more
  • Tips for remaining anonymous in hacking and penetration testing activities.
  • Secure systems from all the attacks shown.
  • Install Kali Linux -the best penetration testing OS (Hackers Love this OS).
  • Learn linux basics.
  • Learn Linux commands and how to get really comfortable with it:)
  • Learn Network Penetration Testing.
  • Crack WEP/WPA/WPA2 encryptions using a number of methods.
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • Discover open ports, installed services and vulnerabilities on computer systems.
  • Take a look at SHODAN-Search Engine.
  • What SHODAN search engine is and how to use it effectively.
  • Install (s)AINT Spyware in kali linux and start spying any system(Webcamsnaps,Keylogger,Persistence)
  • Install and configure Beelogger in kali linux and start getting keylogs from the victim
  • Create undetectable backdoors(FUDs)
  • Use social engineering to gain full control over target systems.
  • Capture keystrokes on a compromised system.
  • Gather sensitive information about websites(SQL INJECTION).
  • Discover, fix, and exploit SQL injection vulnerabilities.
  • Bypass login forms and login as admin using SQL injections.
  • You'll learn what is WIRESHARK is.
  • Start sniffing data around using WIRESHARK and gather information.
  • A brief overview on what VPNs are how do they work.
  • Get added to telegram hacking groups and start valuable information from them.
  • How to Install TAILS OS and start using it right from now to protect against somr one spying you
  • What is TOR and how to install it on any OS(Windows,OS X,Linux) and how to use it to access the hidden sites on deep web.
  • Use TOR Anonymous Chat Rooms and Learn how do they work.
  • Explore the - Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more.
  • And Finally i will be updating the course frequently with the latest hacking methods and cool computer tips and tricks.....
Requirements
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory.
  • Operating System: Windows / MACOS X / Linux.
  • For WiFi hacking (around 10 lectures ONLY) - Wireless adapter that supports monitor mode and packet injection (more info provided in the course).
  • Basic Computer Knowledge or IT skills
  • Reliable and fast internet connection.
  • The curiosity to learn:)
Description

If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course!We will cover the following topics in this course:

  • Introduction to ethical hacking

  • Hacking terms you will want to know getting started.

  • Setting up our hacking LAB

  • How to install VMware and virtual box on any system(Windows,MAC OS X,Linux)

  • Linux Terminal including basic functionalities and CLI(Command Line Interface)

  • What is TOR BROWSER and how does it work and how to increase our level of anonymity online!

  • Using ProxyChains to hide our IP address...

  • What are VPNs and how do they work and how we can stay anonymous online!

  • SHODAN-Hackers search engine what is it and how to use it & install it on Kali Linux.

  • Using Tools Like Anonym8 and Anonsurf-To get Anonymous online.

  • Cracking wifi encryption WEP/WPA/WPA2/WPS Pins.

  • Take full control over systems either WINDOWS or OS X.

  • Hack into any ANDROID Mobile or Apple (IOS) through metasploit and finding Vulnerability.

  • A crash course on ENCRYPTION and much more.......

You get lifetime access to this course which already has 14+ hours of HD video tutorials sharing everything you need to be a penetration testing expert and ethical hacker!This is my 1st ever course created but don't,worry i have made it fantastic you'll love this course i will be there with you through out the course and will help you answer every single question possible don't worry if you have any doubts PLEASE ask in the Q&A section.

This course will receive monthly updates with new hacking methods and our goal is to make this the BEST-network security course online!

DISCLAIMER-The attacks demonstrated in this course can cause serious damage and are only shown for educational purpose. The intent of this course is to give you the tools to defend your own networks, share skills that are valuable to companies all over the world, and help you to better understand the challenges that information security professionals face on a daily basis.

NOTE: This course is totally a product of Ramsai Dupati and no other organisation is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANISATION IS INVOLVED.

What will you get-15+ hours on demand video,English subtitles available,Full Life time access,Access on mobile and TV,and the best part is Certificate of Completion:)

With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and I will respond to you within 15 hours.

Thank you for taking the time to read this, and we hope to see you in the course!



Who this course is for:
  • Anybody who wants to learn how hackers hack computer systems.
  • Anybody who wants to learn how to secure their systems from hackers.
  • Anybody who is interested in learning ethical hacking / penetration testing.
  • For those who want privacy and anonymity online from hackers, corporations and governments.
Course content
Expand all 84 lectures 17:55:53
+ Introduction
4 lectures 10:07

This is an intro video of the course and a quick overview

Preview 02:17

I wanted to Thank you all for taking up this COMPLETE ETHICAL HACKING BOOTCAMP.

Preview 02:11
+ Some Basic Definitions Such as Hacking......
3 lectures 33:53
What is ETHICAL HACKING?Indepth review!
08:43

Get to know important terms in this video like White Hacks,Black Hats,Grey hats .......etc,even google search them and get to know more about such interesting terms.

Preview 14:11

In in this this video u will learn and understand what computer viruses are and an in depth definition about them and their working....

Basic terminology Such as Malware,trojans,worms......
10:59
+ Ethical Hacker's Lab Setup
4 lectures 48:25

Install the virtualization software needed in windows or mac os x the process is one and the same or even u can download ORACLE VIRTUAL BOX to install kali linux or any other OS if u face any errors plz ask in the QnA section:)

Needed Virtulazation software
07:31

Install the needed iso or image files of different operating systems like tails os and kali linux iso file and in this video i will show u what a rasberrypi is.

.iso
10:29

Start setting up your ETHICAL HACKING Environment and configuring it to our will and wish:)

Installing Kali linux within virtual environment.
18:36

This is the part-2 video of kali linux installation and installing VMware tools to maxmize our screen to FULLSCREEN mode if u are facing any errors plz ask in the QnA section i will be there to help U.Download HTTP-Kali Linux 64-Bit.

Kali Linux installation after it is running and getting started using it
11:49
+ Linux Terminal Tutorial-Including basic functionalities and CLI
3 lectures 44:40

The Linux terminal is an extremely powerful tool that goes well beyond the GUI. Writing commands might seem scary for a beginner, but you will soon get the hang of it. In this guide, you will find the most important Linux commands, to use the terminal like a pro.

#1-Customizing The Terminal.
06:47

The terminal is the heart of LINUX so if u really learn and master it u can use LINUX like a PRO because most of the thing is done through the CLI (COMMAND LINE INTERFACE)

#2-Basic Commands-CLI (COMMAND LINE INTERFACE)
18:43

This is the last part of this section #3 you will be learning more advanced commands & important commands to get really comfortable with KALI LINUX because the terminal is the HEART of kali linux

#3-File ownerships and permissions-The CLI INTERFACE
19:10
+ Terminator - Kali Linux
1 lecture 04:40

Terminator is a Linux terminal emulator that provides several features that your default terminal app does not support. It provides the ability to create multiple terminals in one window and faster your work progress. Other than multiple windows, it allows you to change other properties such as, terminal fonts, fonts color, background color and so on. Let's see how we can install and use Terminator in different Linux distributions.

Terminator an ADVANCED TERMINAL
04:40
+ TOR-The Onion Router
4 lectures 45:25

Browse Privately.Explore Freely.BLOCK TRACKERS.DEFEND AGAINST SURVEILLANCE.DEFEND AGAINST SURVEILLANCE.MULTI-LAYERED ENCRYPTION.BROWSE FREELY.

#1 Install TOR on KALI LINUX
07:47

Defend yourself against tracking and surveillance. Circumvent censorship.

#2 Finish Installing and get ANONYMOUS ONLINE!
19:30

In this video u will learn how to install TOR BROWSER in your windows machine and start using it and prevent some one spying on us by hiding out ip address and using miltary grade encryption and more.....

Install TOR BROWSER on WINDOWS
08:56

In this video i will show U how to install,configure and setup TOR on android and start using it to PROTECT OUR ONLINE TRAFFIC.

Install TOR on ANDROID and stop anyone spying on U!
09:12
+ Accessing the HIDDEN SITES through TOR!
2 lectures 39:21
#1 Browsing the DEEP WEB!
19:19

Accessing the sites are up to u if u mess up something or get into any kind of illegal activity i am not responsible!Plz be careful on the DEEP WEB....

#2 Browsing the DEEP WEB...
20:02
+ TOR-Anonymous Chat Rooms
1 lecture 18:42

Disclaimer-Plz dont give out your personal information like name,phone numbers,address etc,I u give or if u fall into any kind of trouble i am not responsible for your LOSS.

Get into TOR CHAT ROOMS!
18:42
+ ProxyChains-For using proxy servers,hiding your ip & passing DNS LEAK TEST!
4 lectures 48:27
#1 ProxyChains-Setting it up
12:08
#2 ProxyChains-Setting them in your Kali Linux MACHINE
07:40
#3 ProxyChains-Hiding behind PROXY
14:39

proxychains - a tool that forces any TCP connection made by any given application. to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP. proxyresolv - DNS resolving. Used to resolve host names via proxy or TOR.

#4 ProxyChains-Series of PROXIES.
14:00
+ What are VPN's(VIRTUAL PRIVATE NETWORK) how to use to stay ANONYMOUS ONLINE!
2 lectures 32:58
#1 VPN-Setup in KALI LINUX
16:33
#2 VPN-Using it to add a layer of ONLINE SECURITY
16:25