Ethical Hacking from Scratch to Advanced Technique

Ethical Hacking Skills
4.4 (611 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
4,591 students enrolled Bestselling in Hacking
$19
$95
80% off
Take This Course
  • Lectures 83
  • Length 16.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2016 English

Course Description

All our information are not on digital media so everything now is on our Cell Phone, Laptop, Cloud and so on. so what will happen if someone was able to hack our devices, that's why we need to be aware about hacking techniques and how easy it is to hack any system and system could be Computer, Network, Wireless, Website, Web Application, Accounts like Email or Social Media.

A lot of Organization now are hiring Ethical Hacker to try to hack their system and evaluate their security, this is a the skill that you will learn during this course.

Every day there is new in Security that's why I will keep you updated, every month I will publish a new video about a new attack or a new technique so you will always be updated.

Support will always be there any time.

What are the requirements?

  • Basic Computer Knowledge.

What am I going to get from this course?

  • Learn How to hack to any System after getting the proper approval.
  • Will learn how to hack Network, Wireless, Application, Web Site and bypass different security layers of course after getting proper approval.
  • Will learn how to compromise computers, crack password, crash system and compromise application.
  • Will learn Buffer Overflow from Scratch, Social Engineering Tools and Technique
  • Evaluate the security in any organization.

What is the target audience?

  • People who plan to misuse this type of skills should not take this courses, this course is for Network Administrator, System Administrator, Developer and programmer , individual how need to know about hacking skills to evaluate their security.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Start Here
29:50

Course introduction will go through the content of the course and what topics will be covered and most important what skills you will learn after the completion of the course.

Section 2: Setup your Lab
09:33

You are going to need a lab to practice all hacking skills , in this lecture I will explain how to prepare the lab needed for our course. I will guide you step by step on how to setup a virtualization environment.

12:17

In this lecture I will explain how to setup different Operating System on your Virtualization environment because as an Ethical Hacker you are going to learn how to hack different Operating System.

Section 3: Start to use Linux
19:39

Some student may not have Linux background and since Linux is important to Ethical Hacker and it will enhance their skill so in this lecture I will guide you step by step on how to use Linux.

Section 4: Reconnaissance
24:41

The first phase in Ethical Hacking is the Reconnaissance phase where student will learn how to gather information about their target to plan for a successful attack, student will never imagine how much information are exposed online.

08:06

in This lecture I will explained what information student should look for and why.

04:36

Some of the very effective tools and techniques for Reconnaissance is explained in this video.

07:29

In This lecture I explained some advanced technique for Reconnaissance manly using Google, and student will understand why Google is Hacker best friend.

Maltego
02:23
Section 5: Scanning
02:17

Scanning is the second phase in Ethical Hacking, its a gathering information phase but active information, This lecture will explain the what is scanning and why its important to do it in a professional way.

24:13

NMAP is one of the best scanning tool that will provide you with unbelievable result, during the lecture I explained step by step how to use NMAP Command line and GUI.

13:45

In this lecture I explained some advanced technique for vulnerability scanning using a tool called NESSUS this will help student to identify how vulnerable is their target.

13:27

There is different types of scanning , in this lecture I explained their types and functionality.

15:06

Enumeration is an Excellent technique to dump some important information from target system, in this lecture I explained how to ise Enumeration.

Section 6: Start Hacking
03:15

System Hacking is the third phases where you start to hack system using the information that has been gathering in the 2 previous phases.

15:09

Cracking password is one of the important hacking technique, in this lecture I explained how to crack password.

12:10

Hydra and Xhydra is two powerful tools for hacking password, in this lecture I explained how to use them.

19:20

In this lecture I explained how to use Rainbow tables for cracking password.

10:49

Web account like Hotmail and Gmail are vulnerable for system cracking as I explained in this lecture.

Section 7: Network Hacking
05:40

We are always connected to a network (wired or wireless) using laptop or mobile devices , how network work and how vulnerable they are , this what I explained in this lecture

30:13

Network Sniffing is one of the basic network attack. In this lecture I explained how to sniffer the network.

11:59

Man in the Middle Attack(MITM) is a very easy attack and very effective attack as well as student will learn in this lecture.

06:33

Cain and Able is an Excellent network hacking tools with many functionality. In this lecture I explained different features in this tool.

05:44

Ettercap one of the powerful tools for network hacking and MITM attacks.

15:58

DNS Poising is a famous attack, In this lecture I explained how to implemented DNS Poising attack.

10:47

Many people think that secure website like HTTPS are safe but they can easily be compromised as I explained in this lecture

Section 8: Social Engineering
05:24

Social Engineering is the attack that depend in people not machines, most of the major attacks in today world are done using Social Engineering.

Fake Email (Spoofing)
06:13
04:41

Social Engineering Toolkit (SET) is one of the best tools for SE, in this lecture I explained how to use SET.

13:11

Credential Harvest is a technique used to capture user credential easily as I explained in this lecture

18:58

Getting full access on the victim computer or system using Social Engineering as I explained in this lecture.

Section 9: Vulnerability and Exploit
04:15

Getting advantage of any system weakness or vulnerabilities is an advanced technique for hacking and the main topics of this section.

Search for Vulnerability and its Exploit
07:58
Exploit the Vulnerability
10:28
05:33

MetaSploit is an excellent exploitation tools , that allow you to hack any system that has weakness in this lecture i explained how to use MetaSploit.

09:41

Fast Track is an automated hacking tools that do everything on behalf on you and let you compromise a system with the less amount of effort.

08:29

Armitage is an Graphical Hacking tool for exploitation , in this lecture i explained how to use this amazing tools.

Section 10: Wireless Hacking
04:23

Wireless is every where at home , work and even public places , we are going to learn in this section how easy to hack wireless network and get they different types of key.

Wireless network infrastructure
17:26
Wireless attacks
02:33
WEP cracking
20:48
27:51

Many People think that WPA2 is a secure key that prevent unauthorized user to gain access to wireless network , but its easy to hack WPA2 key and connect to the WLAN.

Advanced WPA2 Cracking technique using Reaver
06:41
Section 11: Buffer Overflow
05:28

Buffer Over flow is one of the most advanced attack that allow you to hack into any system through application weakness, in this section i will guide you step be step how to understand and utilize Buffer Over blow to hack any systems.

How to search for Buffer Overflow?
14:04
Buffer Overflow 1
48:26
Buffer Overflow 2
16:33
Buffer Overflow 3
26:05
Another Demonstration
06:28
01:47
This is an Assignment for the Student

A vulnerable application is given to the student and i requested them to get full access on the system using this weakness, i will check their result and evaluate their progress and give them my feedback

Section 12: Web Application Hacking
04:16

Hacking Websites and Web Application is not hard as many people think , is easy to do that if you know the major attacks. In this section i will guide you step by step how to hack Website and Web Application.


09:09

Student need to have a testing website for hacking and they should not test their skills on real website , Dam Vulnerable Website (DVWA) is a testing web application, in this lecture i explained how to setup DVWA to be able to test different attacks,

Hackthissite.org
03:07
What is SQL Injection Attack?
14:05
SQL Injection Attack 1
07:53
SQL Injection Attack 2
14:01
XSS Introduction
02:58
Reflected XSS
12:38
Stored XSS
05:14
Affected website for testing
03:27
Advanced web application Attack
10:50
Major Web Application vulnerabilities
03:01
01:42

This is an Assignment for the Student , a testing website is available and i requested the student to hack it and get some confidential Information, i will check their result and evaluate their progress and give them my feedback

Section 13: Cryptography
Cryptography (Part1)
12:16
Cryptography (Part2)
14:40
Steganography
10:00
Hash
07:57
Section 14: Malicious Code
11:10

Malicious code is a big changeling that we are facing in today world, in this section i explained different types of malicious code.

Types of Malicious Code
14:51
Discovering Malicious Code
08:32
Hiding your Malicious code
06:51
05:08

Hashing is a technique used to verify the integrity of a file or an application, in this lecture i explained how to use the hash protocol.

Section 15: Denial of Service
03:38
A Denial of Service attack (DOS) is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. In this section i explained how to implement a succefull DOS attack.
Denial Service Attacks
07:57
DOS Attack 1
09:09
DOS Attacks 2
06:44
Ping of Death
06:39
DDOS
03:11
Section 16: Bypassing Security
10:43

In This lecture i explained different types of protection that you may found on the target machines and how to bypass them.

Section 17: Real Life Scenario
18:19

In This section of the course i assembled everything together to have an intgrated real life attacks.

Real Life Scenario 2
14:00
Real Life Scenario 3
07:27
Section 18: Penetration testing projecct

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Mohamed Atef, Certified Instructor with more than 15 years of experience.

ICT Consultant and certified instructor with more than 20 years of experience deliver professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)

Project Management Professional (PMP) )ID #1772374

Ready to start learning?
Take This Course