Ethical Hacking from Scratch to Advanced Technique
4.3 (1,022 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
7,649 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Ethical Hacking from Scratch to Advanced Technique to your Wishlist.

Add to Wishlist

Ethical Hacking from Scratch to Advanced Technique

Ethical Hacking Skills
4.3 (1,022 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
7,649 students enrolled
Created by Mohamed Atef
Last updated 3/2017
English
English
Current price: $10 Original price: $95 Discount: 89% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 16 hours on-demand video
  • 24 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn How to hack to any System after getting the proper approval.
  • Will learn how to hack Network, Wireless, Application, Web Site and bypass different security layers of course after getting proper approval.
  • Will learn how to compromise computers, crack password, crash system and compromise application.
  • Will learn Buffer Overflow from Scratch, Social Engineering Tools and Technique
  • Evaluate the security in any organization.
View Curriculum
Requirements
  • Basic Computer Knowledge.
Description

All our information are now on digital media so everything now is on our Cell Phone, Laptop, Cloud and so on. so what will happen if someone was able to hack our devices, that's why we need to be aware about hacking techniques and how easy it is to hack any system  which could be Computer, Network, Wireless, Website, Web Application, Accounts like Email or Social Media.

Many Organization now are hiring Ethical Hacker to try to hack their system and evaluate their security, this is a the skill that you will learn during this course.

Every day there is new security threats  that's why I will keep you updated, every month I will publish a new video about a new attack or a new technique so you will always be updated.

Support will always be there any time.

In short, you will finish the course with advanced hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification

Who is the target audience?
  • Anyone who want to learn Ethical Hacking
  • Ethical Hacker and Penetration Tester
  • Security Administrator
  • Network Administrator
  • Computer Science Students
  • You
Students Who Viewed This Course Also Viewed
Curriculum For This Course
89 Lectures
15:49:02
+
Start Here
1 Lecture 29:50

Course introduction will go through the content of the course and what topics will be covered and most important what skills you will learn after the completion of the course.

Preview 29:50
+
Setup your Lab
2 Lectures 21:50

You are going to need a lab to practice all hacking skills , in this lecture I will explain how to prepare the lab needed for our course. I will guide you step by step on how to setup a virtualization environment.

Install VMWARE Player
09:33

In this lecture I will explain how to setup different Operating System on your Virtualization environment because as an Ethical Hacker you are going to learn how to hack different Operating System.

Install and configure the lab
12:17
+
Start to use Linux
1 Lecture 19:39

Some student may not have Linux background and since Linux is important to Ethical Hacker and it will enhance their skill so in this lecture I will guide you step by step on how to use Linux.

Linux
19:39
+
Reconnaissance
5 Lectures 47:15

The first phase in Ethical Hacking is the Reconnaissance phase where student will learn how to gather information about their target to plan for a successful attack, student will never imagine how much information are exposed online.

What is Reconnaissance?
24:41

in This lecture I will explained what information student should look for and why.

What information you should look for?
08:06

Some of the very effective tools and techniques for Reconnaissance is explained in this video.

Tools and Technique
04:36

In This lecture I explained some advanced technique for Reconnaissance manly using Google, and student will understand why Google is Hacker best friend.

Advanced Resonance technique
07:29

Maltego
02:23
+
Maltego
4 Lectures 21:31

In this lecture i explained how to download and install Maltego

Introduction to Maltego
03:34

Starting using Maltego 

Using Maltego
08:09

How to related different entity in Maltego to get better search results 

Related Entities in Maltego
03:47

Get to Learn More Maltego Features

More Maltego
06:01
+
Scanning
5 Lectures 01:08:48

Scanning is the second phase in Ethical Hacking, its a gathering information phase but active information, This lecture will explain the what is scanning and why its important to do it in a professional way.

What is Scanning?
02:17

NMAP is one of the best scanning tool that will provide you with unbelievable result, during the lecture I explained step by step how to use NMAP Command line and GUI.

NMAP
24:13

In this lecture I explained some advanced technique for vulnerability scanning using a tool called NESSUS this will help student to identify how vulnerable is their target.

Advanced technique of scanning
13:45

There is different types of scanning , in this lecture I explained their types and functionality.

Different types of scanning
13:27

Enumeration is an Excellent technique to dump some important information from target system, in this lecture I explained how to use Enumeration.

Enumeration
15:06
+
Start Hacking
5 Lectures 01:00:43

System Hacking is the third phases where you start to hack system using the information that has been gathering in the 2 previous phases.

Define your Objective
03:15

Cracking password is one of the important hacking technique, in this lecture I explained how to crack password.

Password guessing and cracking
15:09

Hydra and Xhydra is two powerful tools for hacking password, in this lecture I explained how to use them.

Hydra and Xhydra
12:10

In this lecture I explained how to use Rainbow tables for cracking password.

Rambow table technique
19:20

Web account like Hotmail and Gmail are vulnerable for system cracking as I explained in this lecture.

Advanced Password cracking technique
10:49
+
Network Hacking
7 Lectures 01:26:54

We are always connected to a network (wired or wireless) using laptop or mobile devices , how network work and how vulnerable they are , this what I explained in this lecture

How to Hack a network?
05:40

Network Sniffing is one of the basic network attack. In this lecture I explained how to sniffer the network.

Sniffing
30:13

Man in the Middle Attack(MITM) is a very easy attack and very effective attack as well as student will learn in this lecture.

Man in the Middle attack
11:59

Cain and Able is an Excellent network hacking tools with many functionality. In this lecture I explained different features in this tool.

Cain and Able
06:33

Ettercap one of the powerful tools for network hacking and MITM attacks.

Ettercap
05:44

DNS Poising is a famous attack, In this lecture I explained how to implemented DNS Poising attack.

DNS Poising
15:58

Many people think that secure website like HTTPS are safe but they can easily be compromised as I explained in this lecture

SSL Stip
10:47
+
Social Engineering
5 Lectures 48:27

Social Engineering is the attack that depend in people not machines, most of the major attacks in today world are done using Social Engineering.

What is Social Engineering?
05:24

Fake Email (Spoofing)
06:13

Social Engineering Toolkit (SET) is one of the best tools for SE, in this lecture I explained how to use SET.

Social Engineering Toolkit
04:41

Credential Harvest is a technique used to capture user credential easily as I explained in this lecture

Phising - Credential Harvest
13:11

Getting full access on the victim computer or system using Social Engineering as I explained in this lecture.

Advanced Social engineering technique
18:58
+
Vulnerability and Exploit
6 Lectures 46:24

Getting advantage of any system weakness or vulnerabilities is an advanced technique for hacking and the main topics of this section.

What is a Vulnerability and Exploit?
04:15

Search for Vulnerability and its Exploit
07:58

Exploit the Vulnerability
10:28

MetaSploit is an excellent exploitation tools , that allow you to hack any system that has weakness in this lecture i explained how to use MetaSploit.

Metasploit
05:33

Fast Track is an automated hacking tools that do everything on behalf on you and let you compromise a system with the less amount of effort.

Fast Track
09:41

Armitage is an Graphical Hacking tool for exploitation , in this lecture i explained how to use this amazing tools.

Armitage
08:29
10 More Sections
About the Instructor
Mohamed Atef
4.3 Average rating
2,186 Reviews
16,481 Students
12 Courses
Information Security Consultant, Certified Instructor

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.

CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+

Professional Experience:
IBM, Cliveland Clink Abu Dhabi (CCAD), Orascom Telecommunication, UAE Ministry of Interior, Egyptian Ministry of Interior, Saudi Ministry of Interior, Prince Naif University for forensic science - KSA, Khalifa University - UAE, Cairo University - Egypt