The Complete Ethical Hacking Course
4.6 (1,565 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
10,939 students enrolled

The Complete Ethical Hacking Course

Protect yourself from hackers & cyberattacks. Learn penetration testing + build security and coding tools with Python.
4.6 (1,568 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
10,939 students enrolled
Last updated 6/2020
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 34.5 hours on-demand video
  • 35 articles
  • 4 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Kali Linux Tools
  • Basic Linux Commands
  • Fundamental ethical hacking attacks & protection methods
  • Metasploit
  • Python
  • Writing ethical hacking tools with Python
  • Website penetration testing
  • Wireless networks penetration testing
  • System penetration testing
  • Social engineering
  • SQL Injection
  • SQL Fundamentals
  • Man In The Middle Attacks and protection
  • Tunneling Services
Requirements
  • Min 4GB of RAM for your computer
  • Optional: USB wi-fi card (Only for wireless password cracking sections, will show how to get one in course)
Description

Welcome to The Complete Ethical Hacking Course!

This is one of the most comprehensive Ethical Hacking Courses ever created online!

Across 30 hours of instructor-led content, you’ll learn:

  • How hackers launch attacks on different systems, computers, users, websites and wireless networks

  • What tools hackers use, why, and how they work

  • How to protect yourselves (or your clients!) against these attacks

  • How to build your own security and hacking tools with Python – taught from scratch and with no programming experience necessary!

  • How to create you own Ethical Hacking tool portfolio.

So that you can practice all the skills and techniques in real time, we start by setting up an ethical hacking lab on your computer. Here you can put the theory you learn to the test, and have a safe space to practice using hacking tools and attacks. We'll experience real time hacking examples, and learn how to protect ourselves against these attacks at the same time!

What else do I get?

Along with the course you’ll also receive for free the "The Complete Ethical Hacking Course Handbook", and $10 credit of at Digital Ocean (in order to build and practice within their online servers).

This course is brought to you by the most popular instructors in Udemy: Codestars by Rob Percival (>1.000.000 students) and Atil Samancioglu (>100.000 students). Atil Samancioglu teaches cyber security and programming courses on Udemy, and all across the world. His courses focus on taking you from beginner to master of your own security, and this course covers a huge range of vital topics, including but not limited to:

  • VPN & DNS

  • Dark Web

  • Kali Linux

  • Wireless network attacks and protection

  • Man In The Middle attacks and protection

  • Capturing screenshots

  • Beef Usage

  • Fake Game Website Attacks

  • Ubuntu Apache Server Installation

  • Social Media & Instagram Hacking and protection

  • Wireshark Analysis

  • Metasploit Usage

  • Maltego Usage

  • Social Engineering

  • Trojans & Backdoors

  • Meterpreter

  • Website Pentesting

  • SQL 101

  • SQL Injection

  • XSS Vulnerabilities

  • Python

  • Socket

  • Keylogger

  • Scapy

  • Ethical Hacker Certifications

  • Tunneling Services

In related sections we are going to learn about subjects like Kali Linux, Wireshark, Maltego, net discover, MSFC, Trojan, Backdoor, Veil, Metasploitable, SQLi, MITMf, Crucnch, Meterpreter, Beef, Apache, nMap, SQLMap, Python, Socket, Scapy, Pynput, Keylogger etc. We are going to start with practical information without suffocating into details and make our way up with not neglecting theory at the end.

Is this course for you?

Yes! If you want to learn about Cyber Security and become an Ethical Hacker.

Yes! Because no prior experience of programming or Kali Linux is needed, we’ll teach you everything.

Important warning: This course only aims to teach for people who want to become Cyber Security Professionals, Ethical Hackers and Pentesting Specialists. All students should stay within legal boundaries in order to avoid any legal action against themselves.

See what students have to say about Ethical Hacking courses of Atil:

" Narration of Atil is really successful, fluent and deeply detailed. Furthermore all terms and phrases are explained clearly. You can get clear explanations for your questions as well. Do not hesitate to take the course as you will see the benefit more than you expect!" - Metin

" Great course! You can feel the instructors experience and knowledge, comprehensive and beautiful! I got answers to my every question and succeeded in completing the course. Thanks, if you have any hesitation getting the course, do not think further and get it :)" - Omer

" I haven't seen such a good course before. You do not have to spend money on any other! I know Atil from Java & Kotlin courses and I follow him. I cannot thank him enough for sharing this information with us. I only expect to see more courses from him. He is the man!" - Ertugrul

" This course puts confidence in you and removes any negative opinion about succeeding in this topic. I cannot wait to see more!" - Eren

" Narration is simple and clear. No unnecessary sentences. Ordered sections, experienced instructor, makes you focus on the subject. Thanks!" - Servet

" Undoubtedly the best instructor in Udemy, the best and the most efficient course on Udemy" - Abdurrahim

" I'm a new Mac user and before even figuring out how to use it, I've decided to take this course. Even though I thought this was going to be very hard for me, I did not experience any difficulties at all. On the contrary my motivation and my excitement increased along the way. Atil explains it so well that nothing stays on the thin air. If you listen carefully and practice what he is saying you will get great knowledge that little people have. I recommend this course." - Emre

" This course is very good regarding to narration, information, experience. You can get it without any hesitation." - Ahmet

" Very good course. It combines everything you have been searching for on the internet. He explains everything sincerely and simply. I definitely recommend this. If you even have a little bit interest you should get this without thinking of it. You can find real examples in the content. Instructor does not hold back to share his knowledge at all. He explains it all. I hope the second version of this course comes out :) Thank you very much..." - Yunus

" All explanations are very understandable and clear, examples are live and useful. I congratulate Atil for telling this complex subject in a very simple matter." - Burak

" Instructor is unbelievably experienced, a real professional, knows every detail. He shares very precious information. You would not learn this stuff in years! Thanks." - Abdullah

Who this course is for:
  • Eager to learn ethical hacking once and for all
  • Looking forward to a career in cyber security
  • Want to learn Python programming for ethical hacking
  • Willing to write their own cyber security tools
  • Passionate for Kali Linux and general ethical hacking tools
  • Looking to enhance IT skills and be prepared for hacker attacks
Course content
Expand all 379 lectures 34:39:45
+ Hacking Lab Setup
11 lectures 01:20:26
Hacking Lab Setup Introduction
00:45
Installing Virtualbox (Windows)
09:32
Installing Virtualbox (MAC)
08:02
Installing Kali Linux
18:42
Solutions to Common Problems & Links
01:33
Kali Linux Problem Solving: ISO Installation
16:14
Installing Windows 10
10:19
Snapshots
09:54
Quick Reminder Before We Move On
02:25
Hacking Lab Setup Outro
00:17
+ Kali Linux 101
5 lectures 29:18
Kali Linux 101 Introduction
00:58
Kali Overview
09:34
Linux Terminal
12:25
Changing Kali Password
05:33
Kali Linux 101 Outro
00:48
+ Anonymity Online
8 lectures 58:35
Anonymity Online Introduction
00:32
How Networks Work
07:58
VPN & DNS Explained
06:19
VPN Usage
15:41
Changing DNS
17:16
VPN and DNS Together
06:11
Solutions for Problems
04:01
Anonymity Online Outro
00:37
+ Dark Web
5 lectures 38:17
Dark Web Introduction
01:10
What is Dark Web?
04:33
Installing Tor On Kali
18:30
Browsing Dark Web
13:23
Dark Web Outro
00:41
+ Network Pentesting
9 lectures 36:53
Network Pentesting Introduction
01:17
What is Network Pentesting?
04:32
Chipsets
06:49
Kali Linux WiFi Card List
00:22
Connecting WiFi USB
08:23
Solutions to Common Connection Problems
00:59
MAC Address
05:19
Monitor vs Managed
08:33
Network Pentesting Outro
00:38
+ Gathering Information From Networks
6 lectures 29:30
Gathering Information From Networks Introduction
00:40
Network Sniffing
08:08
Airodump Specific Target
08:24
Deauthentication Attacks
08:50
Realtime Deauth Attack
03:04
Gathering Information From Networks Outro
00:24
+ Wireless Attacks
11 lectures 55:12
Wireless Attacks Introduction
00:36
Encryption Models
05:10
Cracking WEP
12:33
Fake Authentication
08:16
Packet Injection
08:11
How WPA Works?
02:50
Capturing Handshakes
05:35
Creating Wordlists
04:14
WPA Live Cracking
02:29
Safe Routers
04:36
Wireless Attacks Outro
00:42
+ Post Connection Attacks
23 lectures 02:46:18
Post Connection Attacks Introduction
00:58
Post Connection Settings
03:05
Netdiscover
06:02
nMap
05:07
Man In The Middle
04:56
Manual ARP Poison
08:40
Man In The Middle Framework
15:19
How Hackers Steal Passwords
04:36
Breaking HTTPS
07:01
Creating Web Server
07:43
DNS Attacks
05:53
Bettercap Installation
08:48
ARP Attack
06:08
Capturing Information
07:43
Caplet Usage
14:47
HSTS Settings
06:44
Breaking HTTPS
11:36
HSTS Downgrade Attempt
08:00
Javascript Injection
09:21
Wireshark Intro
07:20
Wireshark Analysis
12:09
How to Protect Yourself
03:53
Post Connection Attacks Outro
00:29
+ System Pentesting
9 lectures 01:01:04
System Pentesting Introduction
01:18
Gaining Access
03:01
Installing Metasploitable
11:14
Zenmap Installation
07:59
Finding Vulnerabilities
07:48
Exploiting First Vulnerability
13:54
Exploiting Username Map Script
07:43
Exploiting PostgreSQL Vulnerability
07:21
System Pentesting Outro
00:46