Ethical Hacking - Beginners To Expert Level Course
4.5 (76 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
3,742 students enrolled

Ethical Hacking - Beginners To Expert Level Course

Complete Ethical Hacking And Penetration Testing Course, Learn Ethical Hacking Using Kali Linux And Windows Based Tools
4.5 (76 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
3,742 students enrolled
Last updated 12/2018
English
Current price: $10.99 Original price: $199.99 Discount: 94% off
30-Day Money-Back Guarantee
This course includes
  • 10 hours on-demand video
  • 9 articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to Udemy's top 3,000+ courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • What is virtualization?
  • Install operating systems into virtualization (windows , linux )

  • Configuring networking in virtualization

  • Ethical Hacking terms and ethics
  • Phases of hacking
  • Attack categories and vectors
  • Concepts of footprinting
  • Search engine tools
  • Hacking using google tool
  • Website recon tools
  • Metagoofil tool
  • Email headers and footprinting
  • DNS tool
  • WHOIS
  • Network scanning overview and methodology
  • Port discovery
  • Network scanning tools
  • Stealth idle scanning
  • OS and application fingerprinting
  • Vulnerability scanning
  • Network mapping tools
  • Proxy servers
  • Enumeration concepts
  • Netbios enumeration
  • SNMP enumeration
  • LDAP enumeration
  • NTP enumeration
  • SMTP enumeration
  • System Hacking concepts
  • Password cracking
  • Sniffing ( Man in the middle attack)
  • Rainbow crack
  • Password reset
  • DHCP starvation
  • Remote Access method
  • Spyware
  • NTFS alternate data stream exploit
  • Steganography
  • Covering track
  • Malware overview , malware analysis,
  • Trojan concepts , creating trojan
  • Virus
  • Switching security concepts and attack
  • DHCP snooping
  • ARP inspection
  • Social engineering
  • Denial of service attack
  • Session Hijacking
  • Hacking Web Servers
  • Buffer overflow
  • OWASP
  • SQL injection
  • Web app vulnerabilities
  • Wireless hacking concepts
  • Mobile Hacking
  • Firewall
  • IDS and IPS
  • Honeypots
  • Encryption concepts
Requirements
  • Basic Computer IT Skills
  • Computer With 4GB Of Ram Atleast (8GB Recommended)
  • Operating Systems - Windows , Linux , Kali Linux (We will teach you how you can install it)
  • Computer Network Knowledge Will Be Advantage
Description

In this Ethical Hacking Course you will learn from zero. In this course you will start to learn from installations and lab setup so you can prepare ethical hacking lab at your home to practice and perform penetration testing. First , you will learn how to install windows , linux based operating systems into virtualization. In this course we are using vmware workstation.

In this course you will learn Ethical Hacking step by step. You will learn to setup hacking tools in computer and then usage of it to perform most powerful attacks. In this course you will learn about penetration testing so instructor will demonstrate how you can perform attack on your own devices in your computer network safely to find vulnerabilities of it and secure them.

This course will brief you about computer network also. If you are already working as IT professional in IT industry, this course will help you a lot to secure computer network, operate computer network, designed computer network , monitor computer network.

This course will give you more confidence to work as cyber security specialist in the production environment.

This course is designed in a way you will learn from basic to advance level.

In this course you will learn about most powerful hacking attacks like system hacking , password craking , web server hacking , scanning networks , sniffing , DDos , web server hacking , web app hacking , enumeration , virus , trojan , buffer overflow , sql injection , firewall , ids , ips , cryptography , wireless , session hijacking , mobile platform hacking , social engineering , steganography , etc....

In this course every attack perfomed in my own lab. This course mainley focusing on practicals. This course will teach you step by step that how you can penetrate your own computer networks and defend it from hacker's attack. This course will give you complete white hats skills.

This course is devided in phases like footprinting , scanning , gaining Access , maintaining and covering track.

We tried to make every practicals to be simple to understand however we are giving support to solve queries of students. Students can contact through Q.A to solve queries.

This course is designed for educational purpose only. We are not motivated to you to launch attacks on internet to damage other. We are giving you a tricks that how attackers attack on our network and how we can defend it by attacking on our own computer networks and devices. We are using our own computer network to perfrom Ethical hacking that we have full permission to launch attack.

Who this course is for:
  • Anyone who wants to learn ethical hacking
  • IT Professionals
  • Person who use internet for online money transaction
  • Anyone who wants to learn that how we can defend computer network from attackers attacks
  • Anyone who wants to be ethical hacker
  • IT Security Professionals
Course content
Expand all 99 lectures 10:14:06
+ Welcome To This Course
1 lecture 03:19

In this video you will learn important and features of this course and also you will get tips and tricks to get success with this course.

Preview 03:19
+ Introduction
1 lecture 04:48

In this video you will learn introduction of this course.

Preview 04:48
+ Preparing Ethical Hacking Lab
11 lectures 01:07:07

In this lecture you will learn about how to build your own lab in your company's network infrastructure or work network.

Building A Lab Concepts
06:16

In this lecture you will learn how to configure networking in lab environment or vmware workstation.

Building A Lab Concepts-Networking
07:37

In this lecture you will learn how to install windows 8 into vm

Preview 07:54

In this lecture you will learn how to install windows 10 into vm.

Preview 08:00

In this lecture you will learn how to deploy kali linux operating system into your lab environment.

Preview 06:57

In this lecture you will learn how to assign static ip address on kali linux.

Configure Static IP on Kali
03:50

In this lecture you will learn how to install windows server 2012 r2 into vm.

Installing Windows Server 2012 R2
04:15

In this lecture you will learn how to install windows server 2016 into your lab environment.

Deploy Windows Server 2016
07:52

In this lecture you will learn how to install metasploit 2 into your lab environment.

Adding metasploitable 2 into vmware workstation
05:33

In this lecture you will learn about ethical hacking concepts.

what is Ethical Hacking?
02:27

In this lecture you will learn about how ethical hackers exactly works.

What do ethical hackers do?
06:26
+ Information Gathering
15 lectures 48:36

In this lecture you will learn about concept of footprinting.

Footprinting Overview
01:28

In this lecture you will learn how to gather information about target like ip information , packets information , hops information.

Footprinting a target using ping
05:38

In this lecture you will learn how to get information about dns recors using nslookup command.

Footprinting a target network using nslookup
Processing..

In this lecture you will learn how to gather target user's detailed information using online tool.

People search using online tool
01:32

In this lecture you will learn how to gather target user's detailed information using online tool.

People search using the online tool - part 2
01:27

In this lecture you will learn how to gather whois record information of target domain name or ip address.

Analyzing domain and ip address by using smartwhois and online tool
03:47

In this lecture you will learn how to gather whois record information of target domain name or ip address. 

Analyzing domain and ip address by using kali linux os
01:30

In this lecture you will learn how to trace path of the target using tools.

Network route tracing
02:10

In this lecture you will learn about tracing an email by using email headers.

Tracing an email
02:14

In this lecture you will learn collect information of target website.

Collect information of target website
06:04

In this lecture you will learn how to mirror website of target web server.

Mirroring websites
05:10

In this lecture you will learn to gathe targeted website's informations like phone numbers , email addresses , meta tag information , fax details etc..

Extracting company's website
01:19

In this lecture you will learn to gather information of open ports , subdomains , email addresses , subdomains details of targeted website by using kali linux operating system.

Information gathering - theharvester tool in kali linux
03:03

In this lecture you will learn how to gather information about target organization. informations like databases , live devices , web cam , usernames , passwords etc.. You will also learn to search in google using advance level google search operators.

Hacking Using Google
09:30

In this lecture you will learn how to download files from targeted websites using metagoofil , how to find username information using metagoofil , how to find path of documents on server using metagoofil.

Information gathering - metagoofil tool in kali linux
03:44
+ Network Scanning
5 lectures 45:39

In this lecture you will learn how to gather information about network devices , services , live ports using scanning tools. Here you will learn about tools like zenmap , nmap , etc... in kali linux and windows.

Performing Network Scanning
26:36

In this lecture you will learn how to scan system and network resources using windows based tool and find live hosts and devices information of local area network.

Scanning System And Network Resources
02:35

In this lecture you will learn how to gather target device's web server or operating system details using banner grabbing techniques.

Banner Grabbing
07:05

In this lecture you will learn how to gather information about ip addresses , domains , whois records etc.

Scanning A Network Using Netscan Tool Pro
04:23

In this lecture you will learn how you can map your network information in organization by simple way using windows based tool.

Network Topology Mapper
05:00
+ Network Vulnerabilities Scanner
1 lecture 08:03

In this lecture you will learn how we can find vulnerable machine in network and we can find solution to fix it.

Network Vulnerabilities Scanning
08:03
+ NMAP and HPING3 (Kings of scanner)
2 lectures 47:39

In this lecture you will learn in depth concepts of nmap command. It is most powerful network scanner command.

Nmap - King Of Scanner
28:53

In this lecture you will learn how to send packets to the target device using hping3 tool in kali linux to get device information.

Network Scanning Using HPING3
18:46
+ Proxy Server
3 lectures 18:04

In this lecture you will learn why organization use proxy server. This lecture does not cover practicals but it is very important to learn it so you can use proxy as expert user.

Proxy Server In Organization (Concepts)
10:02

In this lecture you will learn how you can hide your ip address behind proxy server and anonymize yourself.

Proxy Server - Proxy Switching
03:02

In this lecture you will learn how attacker hide identity using daisy chainning method.

Proxy Server - Daisy Chaining
05:00
+ Network Enumeration
8 lectures 01:16:02

In this lecture you will learn concepts of enumeration.

Enumeration Concepts
01:55

In this lecture you will learn how to gather complete details of target machine using netwbios.

Network Enumeration Using NetBIOS
09:37

In this lecture you will learn about SNMP enumeration concepts.

SNMP Enumeration
01:39

In this lecture you will learn complete practicals of snmp enumeration using windows and kali linux based tools.

SNMP Enumeration Demo
33:13

In this lecture you will learn about ldap/active directory concepts.

LDAP/Active Directory Enumeration Concepts
00:49

In this lecture you will learn demo of ldap/active directory enumeration.

LDAP/Active Directory Enumeration Demo
14:08

In this lecture you will learn NTP enumeration technique.

NTP Enumeration
09:30

In this lecture you will learn how to gather email id information by enumerating SMTP.

SMTP Enumeration
05:11
+ Exploiting Client Side Vulnerabilities ( System Hacking - Remote Access)
4 lectures 41:27

In this lecture you will learn how to hack windows machine using metasploit and perfrom post exploitation.

Hacking windows using metasploit and post exploitation using meterpreter
21:39

In this lecture you will learn how to exploit vulnerabilities of remote system.

Exploiting client side vulnerabilities and establishing a vnc session
05:21

In this lecture you will learn concept of Escalating Privileges By Exploiting Client Side Vulnerabilities Part.

Escalating Privileges By Exploiting Client Side Vulnerabilities Part 1
03:18

In this lecture you will learn complete demo of Escalating Privileges By Exploiting Client Side Vulnerabilities Part.

Escalating Privileges By Exploiting Client Side Vulnerabilities Part 2
11:09