Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS AWS Certified Developer - Associate CompTIA Security+
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
2021-01-16 18:40:04
30-Day Money-Back Guarantee

This course includes:

  • 6 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Ethical Hacking

Learn Ethical Hacking / Pen testing & Bug Bounty Hunting A:Z

Learn ethical hacking:Become a Pro ethical hacker that can hack computer systems like black hat hackers.
Rating: 4.2 out of 54.2 (64 ratings)
13,781 students
Created by Ciech Defence
Last updated 11/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • 95+ ethical hacking &security video lectures.
  • Start from 0 to become pro hacker.
  • Learn ethical hacking & the different types of hackers.
  • Learn to install a hacking lab & needed softwares.
  • Learn kali linux commands and basics of using terminal.
  • Basic to adnvance Ethical hacking.
  • Hack and secure server and client operating system.
  • Create undetecable backdoors.
  • Learn to secure and protect any network from hackers and loss of data.
  • step by step instructions for instalation of virtual boc and creating your virtual environment.
  • Learn basics of website and its technology.
  • what is websitre and its components.
  • Gathering information about website like black hat hackers do.
  • learn to crack wifi password of any security level WEP,WPA,WPA2.
  • World class tools for gatting best results.
  • All the attacks are performed live.

Requirements

  • Internet Connection & Computer (minimum 4gb RAM or more).
  • Basic computer skill.
  • Wireless networking card.

Description

Welcome to Learn Ethical Hacking / Pen testing & Bug Bounty Hunting A:Z


This Ethical Hacking tutorial provides basic and advanced concepts of Ethical Hacking. Our Ethical Hacking tutorial is developed for beginners and professionals.

Ethical hacking tutorial covers all the aspects associated with hacking. Firstly, we will learn how to install the needed software. After this, we will learn the 4 type of penetration testing section which is network hacking, gaining access, post exploitation, website hacking.

In network hacking section, we will learn how networks work, how to crack Wi-Fi keys and gain access the Wi-Fi networks. In Gaining access section, we will learn how to gain access to the servers and personal computers. In the post-exploitation section, we will learn what can we do with the access that we gained in the previous section. So we learn how to interact with the file system, how to execute a system command, how to open the webcam. In the website hacking section, we will learn how the website works, how to gather comprehensive information about website. In the end, we will learn how to secure our system from the discussed attacks.


The course is divided into four main sections so let's see what we are going to learn:

Network Penetration Testing

Network penetration testing is the first penetration testing that we are going to cover in this section. Most of the systems and computers are connected to a network. If a device is connected to the internet, that means the device is connected to the network because the internet is a really big network. Therefore, we need to know that how devices interact with each other in a network, as well as how networks works.

Gaining access

Gaining access attack is the second part of the network penetration testing. In this section, we will connect to the network. This will allow us to launch more powerful attacks and get more accurate information. If a network doesn't use encryption, we can just connect to it and sniff out unencrypted data. If a network is wired, we can use a cable and connect to it, perhaps through changing our MAC address. The only problem is when the target use encryption like WEP, WPA, WPA2. If we do encounter encrypted data, we need to know the key to decrypt it, that's the main purpose of this section.

Post-Connection Attacks

All the attacks that we performed in the pre-connection and gaining access section, we weren't connected to a network. In this section, we are going to be talking about post-connection attack that means the attacks that we can do after connecting to the network. Now, it doesn't matter that the network is a wireless or a wired network and it doesn't matter that the target was using the WEP or WPA key, we can launch all of the attacks that we're going to talk about in this section.


Website / Web Application Hacking

In this section you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ....etc) and how to discover and exploit the  dangerous vulnerabilities to hack into websites.

Who this course is for:

  • Anyone interested in learning ethical hacking

  • Anyone interested in  how hackers hack computer systems

  • Anyone interested in  how to secure systems from hackers


Notes:

  • This course is created for educational purposes only, all the attacks are launched in my own lab or against systems that I have permission to test.


Who this course is for:

  • ethical hacker
  • cyber security
  • penetration testing
  • network penetration testing
  • python developer
  • programmer
  • coder
  • data science
  • web developer
  • port programmer
  • computer network
  • hacker
  • computer fundamentals
  • it skill
  • computer skill
  • network hacking

Course content

16 sections • 95 lectures • 5h 46m total length

  • Preview01:33
  • Preview01:16
  • Hackers World
    02:16

  • Virtual Box- Virtual environment
    03:10
  • Hacker's OS- Kali Linux
    02:02
  • Vulnerable Machine- Metasploitable 2
    01:33
  • Broken WEB: OWASP BWA
    01:38
  • Getting Kali linux
    03:05
  • Getting Metasploitable 2
    03:22
  • Getting OWASP BWA
    02:27

  • Introduction
    00:42
  • Overview
    05:09
  • Linux Terminal
    01:56
  • Linux Basics 1
    03:18
  • Linux Basics 2
    02:57
  • Linux Basics 3
    02:14
  • Linux Basics 4
    04:11

  • Introduction
    01:41
  • Network Basics
    01:48
  • Wireless Communication
    04:40
  • Wireless standards
    02:57
  • Frequency spectrum
    01:43
  • Adapter modes
    00:59
  • Mapping adpater
    02:27

  • Overview
    01:28
  • Monitor Mode
    04:00
  • Airodump-ng
    03:12
  • Sniffing Network
    03:33
  • Deauthentication attack
    04:13

  • Overview
    01:39
  • WEP- Wired Equivalent Privacy
    02:40
  • WEP Cracking
    04:29
  • Fake authentication attack
    07:01
  • ARP request replay attack
    07:23
  • Wifi Protected Access-WPA
    01:37
  • Handshake
    01:19
  • Capturing Handshake
    06:35
  • Creating wordlist
    03:57
  • Cracking key
    01:40

  • Post-connection attack
    01:39
  • Netdiscovery
    03:17
  • Zenmap
    03:44

  • Computer hacking
    03:27

  • Server-side attack basics
    06:25
  • Server side vulnerability
    11:25
  • Attacking Metasploitable 2
    08:49
  • Advance server hacking
    10:45

  • Introduction
    02:54
  • Veil Evasion
    02:20
  • Installation
    03:47
  • Overview
    04:20
  • Generating backdoor
    08:14
  • Listening to connection
    06:44
  • Sending Backdoor
    04:52

Instructor

Ciech Defence
Cyber Secuity Enthusiast , Pen Tester and Full Time Learner
Ciech Defence
  • 4.2 Instructor Rating
  • 73 Reviews
  • 14,198 Students
  • 5 Courses

Hi everyone ! My name is Diwakar Parihar. I am an Engineer, ethical hacker and you might also call me a programmer.

I am having experience of 9+ years in cyber security and ethical hacking, I have been trained & Guide thousands of student to make there career in cyber security.

I love to read and study.I have always leaned towards cyber security and hacking.

Current I m Full Time Bug bounty Hunter and that what i want to share with you all my friends.I want you to learn how you can perform real world hacking and how the you can run step by step with real world hackers.

So Lets Start With This Famous Quote of 'Emmanuel Goldstein'

"Most hackers are young because young people tend to be adaptable. As long as you remain adaptable, you can always be a good hacker."

Emmanuel Goldstein

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.