Ethical Hacking from Scratch to Advanced Technique

Ethical Hacking Skills
4.5 (687 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
5,525 students enrolled Bestselling in Hacking
84% off
Take This Course
  • Lectures 89
  • Length 17.5 hours
  • Skill Level All Levels
  • Languages English, captions
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2016 English Closed captions available

Course Description

All our information are not on digital media so everything now is on our Cell Phone, Laptop, Cloud and so on. so what will happen if someone was able to hack our devices, that's why we need to be aware about hacking techniques and how easy it is to hack any system and system could be Computer, Network, Wireless, Website, Web Application, Accounts like Email or Social Media.

A lot of Organization now are hiring Ethical Hacker to try to hack their system and evaluate their security, this is a the skill that you will learn during this course.

Every day there is new in Security that's why I will keep you updated, every month I will publish a new video about a new attack or a new technique so you will always be updated.

Support will always be there any time.

What are the requirements?

  • Basic Computer Knowledge.

What am I going to get from this course?

  • Learn How to hack to any System after getting the proper approval.
  • Will learn how to hack Network, Wireless, Application, Web Site and bypass different security layers of course after getting proper approval.
  • Will learn how to compromise computers, crack password, crash system and compromise application.
  • Will learn Buffer Overflow from Scratch, Social Engineering Tools and Technique
  • Evaluate the security in any organization.

Who is the target audience?

  • People who plan to misuse this type of skills should not take this courses, this course is for Network Administrator, System Administrator, Developer and programmer , individual how need to know about hacking skills to evaluate their security.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Start Here

Course introduction will go through the content of the course and what topics will be covered and most important what skills you will learn after the completion of the course.

Section 2: Setup your Lab

You are going to need a lab to practice all hacking skills , in this lecture I will explain how to prepare the lab needed for our course. I will guide you step by step on how to setup a virtualization environment.


In this lecture I will explain how to setup different Operating System on your Virtualization environment because as an Ethical Hacker you are going to learn how to hack different Operating System.

Section 3: Start to use Linux

Some student may not have Linux background and since Linux is important to Ethical Hacker and it will enhance their skill so in this lecture I will guide you step by step on how to use Linux.

Section 4: Reconnaissance

The first phase in Ethical Hacking is the Reconnaissance phase where student will learn how to gather information about their target to plan for a successful attack, student will never imagine how much information are exposed online.


in This lecture I will explained what information student should look for and why.


Some of the very effective tools and techniques for Reconnaissance is explained in this video.


In This lecture I explained some advanced technique for Reconnaissance manly using Google, and student will understand why Google is Hacker best friend.

Section 5: Maltego

In this lecture i explained how to download and install Maltego


Starting using Maltego 


How to related different entity in Maltego to get better search results 


Get to Learn More Maltego Features

Section 6: Scanning

Scanning is the second phase in Ethical Hacking, its a gathering information phase but active information, This lecture will explain the what is scanning and why its important to do it in a professional way.


NMAP is one of the best scanning tool that will provide you with unbelievable result, during the lecture I explained step by step how to use NMAP Command line and GUI.


In this lecture I explained some advanced technique for vulnerability scanning using a tool called NESSUS this will help student to identify how vulnerable is their target.


There is different types of scanning , in this lecture I explained their types and functionality.


Enumeration is an Excellent technique to dump some important information from target system, in this lecture I explained how to ise Enumeration.

Section 7: Start Hacking

System Hacking is the third phases where you start to hack system using the information that has been gathering in the 2 previous phases.


Cracking password is one of the important hacking technique, in this lecture I explained how to crack password.


Hydra and Xhydra is two powerful tools for hacking password, in this lecture I explained how to use them.


In this lecture I explained how to use Rainbow tables for cracking password.


Web account like Hotmail and Gmail are vulnerable for system cracking as I explained in this lecture.

Section 8: Network Hacking

We are always connected to a network (wired or wireless) using laptop or mobile devices , how network work and how vulnerable they are , this what I explained in this lecture


Network Sniffing is one of the basic network attack. In this lecture I explained how to sniffer the network.


Man in the Middle Attack(MITM) is a very easy attack and very effective attack as well as student will learn in this lecture.


Cain and Able is an Excellent network hacking tools with many functionality. In this lecture I explained different features in this tool.


Ettercap one of the powerful tools for network hacking and MITM attacks.


DNS Poising is a famous attack, In this lecture I explained how to implemented DNS Poising attack.


Many people think that secure website like HTTPS are safe but they can easily be compromised as I explained in this lecture

Section 9: Social Engineering

Social Engineering is the attack that depend in people not machines, most of the major attacks in today world are done using Social Engineering.

Fake Email (Spoofing)

Social Engineering Toolkit (SET) is one of the best tools for SE, in this lecture I explained how to use SET.


Credential Harvest is a technique used to capture user credential easily as I explained in this lecture


Getting full access on the victim computer or system using Social Engineering as I explained in this lecture.

Section 10: Vulnerability and Exploit

Getting advantage of any system weakness or vulnerabilities is an advanced technique for hacking and the main topics of this section.

Search for Vulnerability and its Exploit
Exploit the Vulnerability

MetaSploit is an excellent exploitation tools , that allow you to hack any system that has weakness in this lecture i explained how to use MetaSploit.


Fast Track is an automated hacking tools that do everything on behalf on you and let you compromise a system with the less amount of effort.


Armitage is an Graphical Hacking tool for exploitation , in this lecture i explained how to use this amazing tools.

Section 11: Wireless Hacking

Wireless is every where at home , work and even public places , we are going to learn in this section how easy to hack wireless network and get they different types of key.

Wireless network infrastructure
Wireless attacks
WEP cracking

Many People think that WPA2 is a secure key that prevent unauthorized user to gain access to wireless network , but its easy to hack WPA2 key and connect to the WLAN.

Advanced WPA2 Cracking technique using Reaver
Section 12: Buffer Overflow

Buffer Over flow is one of the most advanced attack that allow you to hack into any system through application weakness, in this section i will guide you step be step how to understand and utilize Buffer Over blow to hack any systems.

How to search for Buffer Overflow?
Buffer Overflow 1
Buffer Overflow 2
Buffer Overflow 3
Another Demonstration
This is an Assignment for the Student

A vulnerable application is given to the student and i requested them to get full access on the system using this weakness, i will check their result and evaluate their progress and give them my feedback

Section 13: Web Application Hacking

Hacking Websites and Web Application is not hard as many people think , is easy to do that if you know the major attacks. In this section i will guide you step by step how to hack Website and Web Application.


Student need to have a testing website for hacking and they should not test their skills on real website , Dam Vulnerable Website (DVWA) is a testing web application, in this lecture i explained how to setup DVWA to be able to test different attacks,
What is SQL Injection Attack?
SQL Injection Attack 1
SQL Injection Attack 2
XSS Introduction
Reflected XSS
Stored XSS
Affected website for testing
Advanced web application Attack
Major Web Application vulnerabilities

This is an Assignment for the Student , a testing website is available and i requested the student to hack it and get some confidential Information, i will check their result and evaluate their progress and give them my feedback

Section 14: Cryptography
Cryptography (Part1)
Cryptography (Part2)
Section 15: Malicious Code

Malicious code is a big changeling that we are facing in today world, in this section i explained different types of malicious code.

Types of Malicious Code
Discovering Malicious Code
Hiding your Malicious code

Hashing is a technique used to verify the integrity of a file or an application, in this lecture i explained how to use the hash protocol.

Section 16: Denial of Service
A Denial of Service attack (DOS) is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. In this section i explained how to implement a succefull DOS attack.
Denial Service Attacks
DOS Attack 1
DOS Attacks 2
Ping of Death
Section 17: Bypassing Security

In This lecture i explained different types of protection that you may found on the target machines and how to bypass them.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Mohamed Atef, Certified Instructor with more than 15 years of experience.

ICT Consultant and certified instructor with more than 20 years of experience deliver professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)

Project Management Professional (PMP) )ID #1772374

Ready to start learning?
Take This Course