The Complete Ethical Hacking Bootcamp
4.4 (327 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,852 students enrolled

The Complete Ethical Hacking Bootcamp

Hands on ethical hacking & penetration testing training. Prepare for the CEH & OSCP.
4.4 (327 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,852 students enrolled
Last updated 6/2019
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 27.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • How to setup a penetration testing environment.
  • How to use the Linux terminal.
  • Networking fundamentals
  • How to use networking tools
  • Passive information gathering
  • Google Dorks
  • Information Gathering With Shodan
  • Email Harvesting
  • DNS Enumeration and zone transfers
  • Active information gathering
  • Port scanning with Nmap
  • Using Nmap scripts
  • Web application penetration testing
  • HTTP requests and responses
  • Burpsuite fundamentals
  • Brute force attacks
  • Command Injection
  • SQL Injection
  • Cross Site Scripting (XSS)
  • Wireless penetration testing
  • Capture handshakes with Airodump-ng
  • Cracking passwords with Aircrack-ng
  • Generating wordlists with crunch
  • Rainbowtables
  • Arpspoofing
  • DNS spoofing
  • Exploiting browsers with BEEF
  • MITM Attacks
  • Metasploit
  • Msfconsole
  • Msfvenom
  • Command Injection
  • Meterpreter sessions
  • Python basics
  • Developing a custom backdooor
  • Developing a keylogger
  • Developing an offensive bruteforce script
Requirements
  • Basic Linux Knowledge
  • Basic TCP/IP
Description

Welcome to The Complete Ethical Hacking Bootcamp. This course covers everything you need to know to unlock a career in Ethical Hacking & Penetration Testing.

This course has over 25 hours of ethical hacking content, we have exhaustively covered every topic in regards to Ethical Hacking and Penetration Testing.

If you are looking to get started in Ethical Hacking or Penetration Testing, this course is for you. It covers everything you need to know from Linux to web application penetration testing.

Learn ethical hacking and penetration testing with us today starting as a complete beginner working through to coding your own advanced backdoors! We start with how to set up a Linux system and use basic Unix system commands. Next, we see how to create a secure penetration testing environment and begin footprinting, scanning, and website penetration testing. Then, we cover WPA2 wireless network cracking, man in the middle attacks (MITM), system hacking, and python programming fundamentals. Finally, we conclude with writing our own pen-testing tools featuring a reverse shell, keylogger, and a bruteforcer!




Keywords:

ethical hacking course free

ethical hacking course pdf

ethical hacking course near me

ethical hacking course fees

ethical hacking course reddit

ethical hacking certification

ethical hacking course

ethical hacking jobs

ethical hacking salary

ethical hacking definition

ethical hacking tools

Who this course is for:
  • Beginner Ethical Hacking Students
  • Beginner Penetration Testing Studemts
  • CEH Students
Course content
Expand all 142 lectures 27:22:12
+ Setting Up Our Environment Pentesting Lab
4 lectures 52:51
Installing Kali Linux
13:57
Installing VirtualBox Guest Additions
18:17
How to create a bootable Kali USB flash drive
05:00
+ Networking Tools & Essential Terminology
4 lectures 41:48
Changing our IP & setting up our wireless adapter
04:53
Networking terminology
10:18
Hacking terminology
18:05
Important things to do after installing Kali Linux
08:32
+ Passive Information Gathering & Footprinting
5 lectures 43:33
Whois information gathering
06:40
Email harvesting
06:08
Information gathering with Shodan
10:25
DNS Zone transfers with Dig
07:09
+ Active Information Gathering & Port Scanning
9 lectures 01:51:23
Installing Metasploitable
07:00
Nmap - 1
15:34
Nmap - 2
11:43
Nmap - 3
12:25
Scanning with Zenmap
07:55
TCP scans
15:52
Bypassing firewalls with Nmap
17:24
Using Nmap scripts - 1
09:30
Using Nmap scripts - 2
14:00
+ Web Application Penetration Testing
25 lectures 04:50:17
Installing OWASP
08:27
HTTP requests
10:01
HTTP responses
10:30
Configuring Burpsuite
12:51
Modifying packets in Burpsuite
12:21
Whatweb & Dirb
10:12
Password recovery attacks
15:35
Bruteforce attacks with Burpsuite
11:06
Bruteforce attacks with Hydra
08:48
Session fixation
13:55
Injection attacks
05:35
Command injection
11:10
Exploiting command injection
07:44
Finding Blind command injection
13:46
SQL Basics
10:27
Manual SQL injection - 1
13:17
Manual SQL injection - 2
21:00
SQLmap basics
16:37
XML injection
16:00
Installing XCAT & preventing injection attacks
05:53
Reflected XSS
10:52
Stored XSS
12:01
Modifying HTML code with XSS
07:34
XSSer & XSSsniper
13:40
Nikto Basics
10:55
+ Wireless Penetration Testing
13 lectures 02:25:20
Wireless attacks fundamentals
10:52
Enabling Monitor mode
04:41
Capturing handshakes with Airodump-ng
14:40
Rockou.txt Wordlist
14:00
Cracking passwords with Aircrack-ng
15:35
Cracking passwords with Hashcat
15:00
Making password lists with Crunch
18:22
Making password lists with Cupp
07:12
Rainbowtables - 1
16:36
Rainbowtables - 2
05:40
Installing Fluxion
06:20
Finding & cracking hidden networks
08:22
Preventing Wireless attacks
08:00
+ System Hacking And Exploitation
21 lectures 04:14:10
The Metasploit Console
16:10
Metasploit Modules Explained
12:14
Bruteforcing SSH with Metasploit
15:20
Exploiting Apache Tomcat With Metasploit
08:53
Getting A Meterpreter Session With Command Injection
25:08
PHP Code Injection
05:46
Exploiting Metasploitable2
07:00
Wine installation
12:04
Crafting Windows Payloads With Msfvenom
10:04
Encoders & Hexeditor
18:45
Windows 10 Meterpreter session
12:01
Meterpreter Environment
11:30
Windows 10 Privilege Escalation
11:30
Preventing Privilege Escalation
06:23
Post Exploitation Modules
14:13
Getting A Meterpreter Session Over Internet With Port Forwarding
10:43
Eternalblue Exploit
20:20
Persistence Module
13:19
Hacking Over Internet With Ngrok
10:26
Creating Android Payloads With Msfvenom
09:55
The Real Hacking Begins Now!
02:26
+ MITM Attacks (Man In The Middle Attacks)
11 lectures 01:59:36
ARP Protocol basics
10:30
MITM Attacks Explained
07:22
Installing MITMf
06:38
Manual Arp Spofing
12:50
Problems While Installing MITMf
06:21
HTTP Traffic Sniffing
08:32
DNS Spoofing and HTTPS Password Sniffing
24:20
Hooking Browsers With BEEF
16:04
Taking a screenshot of the target's browser
11:03
Cloning Any Webpage
08:56
Man In The Middle Attack - Ettercap Basics
07:00