Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add Ethical Hacking from Scratch to Advanced Technique to your Wishlist.

Add to Wishlist

Ethical Hacking from Scratch to Advanced Technique

Ethical Hacking Skills
4.5 (744 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
5,851 students enrolled
Created by Mohamed Atef
Last updated 1/2017
English English
$10 $95 89% off
3 days left at this price!
30-Day Money-Back Guarantee
  • 16 hours on-demand video
  • 21 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
Learn How to hack to any System after getting the proper approval.
Will learn how to hack Network, Wireless, Application, Web Site and bypass different security layers of course after getting proper approval.
Will learn how to compromise computers, crack password, crash system and compromise application.
Will learn Buffer Overflow from Scratch, Social Engineering Tools and Technique
Evaluate the security in any organization.
View Curriculum
  • Basic Computer Knowledge.

All our information are not on digital media so everything now is on our Cell Phone, Laptop, Cloud and so on. so what will happen if someone was able to hack our devices, that's why we need to be aware about hacking techniques and how easy it is to hack any system and system could be Computer, Network, Wireless, Website, Web Application, Accounts like Email or Social Media.

A lot of Organization now are hiring Ethical Hacker to try to hack their system and evaluate their security, this is a the skill that you will learn during this course.

Every day there is new in Security threat  that's why I will keep you updated, every month I will publish a new video about a new attack or a new technique so you will always be updated.

Support will always be there any time.

In short, you Finish the course with advanced hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification

Who is the target audience?
  • People who plan to misuse this type of skills should not take this courses, this course is for Network Administrator, System Administrator, Developer and programmer , individual how need to know about hacking skills to evaluate their security.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 89 Lectures Collapse All 89 Lectures 15:49:02
Start Here
1 Lecture 29:50

Course introduction will go through the content of the course and what topics will be covered and most important what skills you will learn after the completion of the course.

Preview 29:50
Setup your Lab
2 Lectures 21:50

You are going to need a lab to practice all hacking skills , in this lecture I will explain how to prepare the lab needed for our course. I will guide you step by step on how to setup a virtualization environment.

Install VMWARE Player

In this lecture I will explain how to setup different Operating System on your Virtualization environment because as an Ethical Hacker you are going to learn how to hack different Operating System.

Install and configure the lab
Start to use Linux
1 Lecture 19:39

Some student may not have Linux background and since Linux is important to Ethical Hacker and it will enhance their skill so in this lecture I will guide you step by step on how to use Linux.

5 Lectures 47:15

The first phase in Ethical Hacking is the Reconnaissance phase where student will learn how to gather information about their target to plan for a successful attack, student will never imagine how much information are exposed online.

What is Reconnaissance?

in This lecture I will explained what information student should look for and why.

What information you should look for?

Some of the very effective tools and techniques for Reconnaissance is explained in this video.

Tools and Technique

In This lecture I explained some advanced technique for Reconnaissance manly using Google, and student will understand why Google is Hacker best friend.

Advanced Resonance technique

4 Lectures 21:31

In this lecture i explained how to download and install Maltego

Introduction to Maltego

Starting using Maltego 

Using Maltego

How to related different entity in Maltego to get better search results 

Related Entities in Maltego

Get to Learn More Maltego Features

More Maltego
5 Lectures 01:08:48

Scanning is the second phase in Ethical Hacking, its a gathering information phase but active information, This lecture will explain the what is scanning and why its important to do it in a professional way.

What is Scanning?

NMAP is one of the best scanning tool that will provide you with unbelievable result, during the lecture I explained step by step how to use NMAP Command line and GUI.


In this lecture I explained some advanced technique for vulnerability scanning using a tool called NESSUS this will help student to identify how vulnerable is their target.

Advanced technique of scanning

There is different types of scanning , in this lecture I explained their types and functionality.

Different types of scanning

Enumeration is an Excellent technique to dump some important information from target system, in this lecture I explained how to use Enumeration.

Start Hacking
5 Lectures 01:00:43

System Hacking is the third phases where you start to hack system using the information that has been gathering in the 2 previous phases.

Define your Objective

Cracking password is one of the important hacking technique, in this lecture I explained how to crack password.

Password guessing and cracking

Hydra and Xhydra is two powerful tools for hacking password, in this lecture I explained how to use them.

Hydra and Xhydra

In this lecture I explained how to use Rainbow tables for cracking password.

Rambow table technique

Web account like Hotmail and Gmail are vulnerable for system cracking as I explained in this lecture.

Advanced Password cracking technique
Network Hacking
7 Lectures 01:26:54

We are always connected to a network (wired or wireless) using laptop or mobile devices , how network work and how vulnerable they are , this what I explained in this lecture

How to Hack a network?

Network Sniffing is one of the basic network attack. In this lecture I explained how to sniffer the network.


Man in the Middle Attack(MITM) is a very easy attack and very effective attack as well as student will learn in this lecture.

Man in the Middle attack

Cain and Able is an Excellent network hacking tools with many functionality. In this lecture I explained different features in this tool.

Cain and Able

Ettercap one of the powerful tools for network hacking and MITM attacks.


DNS Poising is a famous attack, In this lecture I explained how to implemented DNS Poising attack.

DNS Poising

Many people think that secure website like HTTPS are safe but they can easily be compromised as I explained in this lecture

SSL Stip
Social Engineering
5 Lectures 48:27

Social Engineering is the attack that depend in people not machines, most of the major attacks in today world are done using Social Engineering.

What is Social Engineering?

Fake Email (Spoofing)

Social Engineering Toolkit (SET) is one of the best tools for SE, in this lecture I explained how to use SET.

Social Engineering Toolkit

Credential Harvest is a technique used to capture user credential easily as I explained in this lecture

Phising - Credential Harvest

Getting full access on the victim computer or system using Social Engineering as I explained in this lecture.

Advanced Social engineering technique
Vulnerability and Exploit
6 Lectures 46:24

Getting advantage of any system weakness or vulnerabilities is an advanced technique for hacking and the main topics of this section.

What is a Vulnerability and Exploit?

Search for Vulnerability and its Exploit

Exploit the Vulnerability

MetaSploit is an excellent exploitation tools , that allow you to hack any system that has weakness in this lecture i explained how to use MetaSploit.


Fast Track is an automated hacking tools that do everything on behalf on you and let you compromise a system with the less amount of effort.

Fast Track

Armitage is an Graphical Hacking tool for exploitation , in this lecture i explained how to use this amazing tools.

10 More Sections
About the Instructor
4.4 Average rating
1,563 Reviews
9,754 Students
10 Courses
Certified Instructor with more than 15 years of experience.

ICT Consultant and certified instructor with more than 20 years of experience deliver professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)

Project Management Professional (PMP) )ID #1772374

Report Abuse