Ethical Hacking for Beginners

Become an ethical hacker and be a skilled penetration tester
2.7 (36 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
4,500 students enrolled
$19
$140
86% off
Take This Course
  • Lectures 26
  • Length 7 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 7/2014 English

Course Description

Learning hacking is very diffucult. Unlike programming or any other thing you have to work really hard to get to know something. Because there are closed communities, not especially friendly to people from "outside". A lot of people complained about it before they started the training. Almost everyone experienced rejection and almost everyone did not know how to make the first step. People just want to learn fast and good because of that we offer solid good information for beginners.

In this video series you will learn various way of hacking. Our aim is teaching basics about Penetration Testing and ethical hacking in this lessons. Because basics are very important. You can't continue to learn advanced techniques and things without knowing basics of ethical hacking. After this good basic knowledge you can easily improve yourself and continue to learn without a lot of effort.

We will teach how to do hacking in real life not just theory. We will do a lot of DEMO in this video series to understand topic much better. The topics that we are going to learn;

Kali Linux:

You will learn Kali Linux which is specially designed Linux distrubution for Penetration Tester.

  • Installation of Kali Linux OS
  • Basic usage of Linux

Metasploit:

You will learn exploiting security vulnerabilities with Metasploit Framework. It is a very popular program amongst Penetration Testers which have a very big exploit collection.

  • Metasploit framework
  • Exploiting a vulnerability with Metasploit framework
  • Client Side Attacks

Trojan:

You will learn how can make trojan, how to detect trojan in your systems and how can you hide trojan file from antivirus programs.

  • Making trojan file
  • Creating and managing a botnet
  • Hiding trojan file from antivirus programs
  • Detecting trojans in your systems

Sniffers:

In this section you will learn how can you capture network traffic packages, how can you analyze and find usefull information in this packages. You will learn arp poisoning, dns spoof attacks.

  • Capturing network traffics
  • Data mining from captured network traffics
  • Arp poisoning attack
  • Dns spoof attack

Just try our course. You will not regret. If you don't like it you can take your money back without answering any question.

** OUR COURSE HAS SUBTITLES. SO YOU DONT NEED TO AFRAID OF NOT UNDERSTAND THE COURSE ***

** YOU CAN CONTACT ME FOR DISCOUNT COUPONS **

What are the requirements?

  • Basic computer knowledge

What am I going to get from this course?

  • You will learn Kali Linux OS
  • You will learn Metasploit framework
  • You will learn exploiting a vulnerability with Metasploit framework
  • You will learn Client Side Attacks
  • You will learn making trojan file
  • You will learn creating and managing a botnet
  • You will learn hiding trojan file from antivirus programs
  • You will learn detecting trojans in your systems
  • You will learn capturing network traffics
  • You will learn data mining from captured network traffics
  • You will learn Arp poisoning attack
  • You will learn Dns spoof attack

What is the target audience?

  • People who interested in hacking
  • IT Security manager
  • System Admins
  • Penetration testers

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
02:32

What are we going to learn from Ethical Hacking for Beginners course?

00:38

Who should attend Ethical Hacking for Beginners course?

Section 2: Kali Linux and Basic Network Information
06:27

Introduction to Kali Linux OS

13:31

Installation of Kali Linux OS

05:12

Information about Linux Directury Structure

Basic Commands in Linux 1
09:39
Basic Commands in Linux 2
08:41
Basic Commands in Linux 3
16:18
Linux Complete Guide - PDF
189 pages
Basic Network Information
11:20
Section 3: Metasploit
03:47

What is Metasploit Framework?

Basic usage of Metasploit
13:11
Exploiting a remote machine
09:07
Post Exploitation 1
12:20
Post Exploitation 2
19:57
Client Side Attacks
Preview
07:50
Section 4: Trojan usage and detection techniques
What is a trojan ?
05:26
About Darkcomet RAT
04:48
Making a trojan file
18:07
Inspecting our trojan capabilities
11:58
Detecting trojan file
06:12
Hiding trojan file
11:12
Section 5: Sniffing network trafic and data mining
Sniffing network traffics
07:19
Analyzing captured packages
06:34
Arp poisoning
11:10
Dns spoof
10:38

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Gökhan OKUMUŞ, System Engineer

Hi. My name is Gökhan OKUMUŞ. I am a System Engineer currently working at Turkish National Police IT Department. We have running a Nation Wide information project with our team. I am responsible from maintenance of Datacenter of this project.

I start my career coding C++. In highschool I learn C Sharp programming language. After two years in university I began to learn Html, PHP, Javascript and Css. I wrote many projects for my university. After that I take several course about Computer Networking, Firewall Administration, Windows and Linux server managing. I take CEH course too. I am currently focus on Cyber Security.

Ready to start learning?
Take This Course