Ethical Hacking for Beginners
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1 student enrolled
Wishlisted Wishlist

Please confirm that you want to add Ethical Hacking for Beginners to your Wishlist.

Add to Wishlist

Ethical Hacking for Beginners

Hack your way to a secure and threat-free environment using best-in-class tools and techniques.
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1 student enrolled
Created by Packt Publishing
Last updated 8/2017
Current price: $10 Original price: $125 Discount: 92% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Stage attacks to your own advantage
  • Work with the Metasploit toolkit to test the effectiveness of defenses
  • Incorporate sniffing with the Man-in-the-Middle attack
  • Bypass modern security defenses to understand the ins and outs of security
  • Understand how networks are exploited by attackers
View Curriculum
  • A basic C# programming knowledge is assumed. The course assumes some familiarity with networking-related concepts such as TCP/IP, but no IT security-related background is required.

This video course provides a good starting point from which to learn ethical hacking and identify threats and vulnerabilities to secure your IT environment.

We'll begin by introducing you to the best tools around; these are essential to get you started with penetration testing. Next, we'll introduce you to a basic hacking technique: reconnaissance. You'll get hands-on experience working with Metasploit and testing the effectiveness of different defenses. Next, you'll learn about sniffing and how effective the Man-in-the-Middle attack can be. We'll take you through a coffee shop scenario to further your understanding. You'll get the hang of bypassing different defenses, then learn how hackers use networks to gain access to different systems.

About the author

Gary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome's computer security and forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats.

Who is the target audience?
  • This video is for .NET developers who would like to learn about serverless architectures. It's best suited for pentesters, network security professionals, and site administrators who would like to gain information security skills.
Compare to Other Ethical Hacking Courses
Curriculum For This Course
14 Lectures
First Steps
3 Lectures 10:29

This video provides an overview of the entire content.

Preview 02:56

The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.

Basic Terminologies

In this video, we will take a look at the operating systems used in this course.

Operating Systems and Tools Used
Reconnaissance and Scanning
4 Lectures 42:40

The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.

Preview 06:34

Our aim in this video is to understand what NMap is and how we will be working with it.

Working with NMap

In this video we will learn what Shodan is and how to use it.

Shodan for scanning

In this video we’ll understand vulnerability scanning

Other Types of Reconnaissance
Exploit and Sniffing
7 Lectures 01:09:53

Used by industry leaders in security, Metasploit is essential to a hacking course for beginners. Let’s talk about it in this video.

Preview 11:39

This video will help us understand how we can effectively exploit the weakness in a system

Exploiting a Vulnerability

This video will help us understand armitage in detail.


In this video we will take a look at Aircrack-ng that will help us in wireless hacking.


The goal in this video is get a grasp over MitM (Man-in-the-Middle) Attacks.

MitM (Man-in-the-Middle) Attack

Our aim in the video is to know how to use the Social Engineering Toolkit.

Social Engineering Toolkit

This video will help us understand the working details of Wireshark.

Working with Wireshark
About the Instructor
Packt Publishing
3.9 Average rating
8,229 Reviews
59,023 Students
687 Courses
Tech Knowledge in Motion

Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.

With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.

From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.

Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.