Ethical Hacking and penetration testing - ultimate guide
4.7 (7 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
44 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Ethical Hacking and penetration testing - ultimate guide to your Wishlist.

Add to Wishlist

Ethical Hacking and penetration testing - ultimate guide

A complete guide to become a professional ethical hacker.
4.7 (7 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
44 students enrolled
Created by Darshil Modi
Last updated 8/2017
English
Curiosity Sale
Current price: $10 Original price: $65 Discount: 85% off
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • 6 Articles
  • 5 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Setting up a virtual hacking environment
  • Find vulnerabilities in a network/system
  • Fixing loopholes in a system
  • Different phases of penetration testing
  • performing footprinting
  • Performing DOS/DDOS attacks on a website
  • Scanning a network or web server (coming soon)
  • Hacking Windows passwords
  • Hacking a Wifi network
  • Protecting against various cyber attacks
  • Working with linux tools like nmap, hydra, SET etc (coming soon)
  • Working with browser exploitation framework
  • Hacking webserver, website, personal computers, social networking accounts. (coming soon)
  • Phishing and it's couner measures (coming soon)
  • Learning to secure WiFi networks
  • Cracking WPA2 encrypted passwords
  • Hacking a computer LAN network
  • CEH examination and carrier guidance
View Curriculum
Requirements
  • Basic computing skills
Description

Learn Ethical hacking from the author of famous book "Hack yourself before someone else does"

Our most popular information security and hacking training covers the techniques used by malicious, black hat hackers with high energy lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization or individual's system. You’ll leave with the ability to quantitatively assess and measure threats to information assets; and discover where your system is most vulnerable to hacking in this network security training course.

The goal of this course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation. This ethical hacking training course has a significant return on investment, since you gain hacking skills that are highly in demand, as well as certificate of excellence on passing the final Quiz by DARSHIL MODI, author of "hack yourself before someone else does".

Black Hat hackers are always changing their tactics to get one step ahead of the good guys. We update our course materials regularly to ensure that you learn about the current threats to your organization’s networks and systems.

 More tutorials will be added soon ! The course is still in progress.


Who is the target audience?
  • Anyone interested in ethical hacking and cyber security
  • CEH, CCNA aspirants
  • Network Administrators
  • Computer and IT engineers
  • Students pursuing bachelors in computer science and IT
Students Who Viewed This Course Also Viewed
Curriculum For This Course
19 Lectures
01:25:50
+
Introduction
4 Lectures 12:36

Please use headphones ! Sound recording quality is low.. (only for this video)

Nowadays when we are completely dependent on technology, it is essential to know about how our privacy can be invaded. Here's a short illustration that will show you how your privacy can be invaded if someone can get access to your google account.

Important links :

http://maps.google.com - login with the same email id registered in your android device .

http://myactivity,google.com - login with the same email id registered in your android device .

Why cyber security is important ?
03:20



Congratulations on completing 1st section of the training course. Test what you leanrnt by answer this quiz.

Test your knowledge
6 questions
+
Foot printing
2 Lectures 08:43

Services For Domain registration privacy ie to make your data hidden in Whois database : Namecheap.org

Preview 03:33

Foot printing techniques
05:10
+
Configuring Hacking environment
1 Lecture 07:59
configuring kali linux using Virtual box
07:59
+
Browser Exploitation Framework
1 Lecture 04:41
Browser exploitation framework - BeEf
04:41
+
Encryption and Windows Hacking
4 Lectures 14:10
hooking a browser in beEf
01:46

Harvesting facebook credentials using BeEf - demo
04:22

Password and encryption
03:07

Windows Hacking.
04:55

Evaluate your knowledge about what you learnt till now !

Scope of this Quiz :

Passwords and Encryption, Windows Hacking, Setting up Hacking environment.

Test your Knowledge 2
6 questions
+
Dos/Ddos attack
2 Lectures 09:24
Dos/Ddos attack
04:42

12 Types of Ddos attacks
04:42
+
wifi Hacking
3 Lectures 09:48
Wifi Hacking using kali linux
04:36

Wifi hacking using Wifi phisher
01:44

Securing Wifi Network
03:28
+
Accesing Dark Web
2 Lectures 05:53
Dark Web and Tor browser - overview
04:03

Setting up Tor browser
01:50
About the Instructor
Darshil Modi
4.7 Average rating
7 Reviews
44 Students
1 Course
Author. CEO of Eagle eye network solutions

I am Darshil modi, founder of eagle eye network solutions and author of a book "hack yourself before someone else does".I live in Ahmedabad,India and pursuing bachelors in computer science. I am on my way to make internet and technology a better thing to dwell with. I am here to share with you my hacking skills that are extremely high on demand in this information technology dependent world.