Fundamentals of Ethical Hacking (Choose your hat)

Learn the Fundamentals of ETHICAL HACKING, the tools used to SECURE and PENETRATE a network, Viruses, Malware, Trojans.
4.2 (26 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
695 students enrolled
$20
Take This Course
  • Lectures 38
  • Contents Video: 2 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 6/2015 English

Course Description

Ever wondered how people hack? Are you interested in learning the secrets? This course covers the FUNDAMENTALS OF ETHICAL HACKING. You will learn about the infamous SOCIAL ENGINEERING, FOOT PRINTING, and TOOLS used by common hackers to penetrate networks. You will learn what information and tools to PROTECT your network, protect YOURSELF, and learn techniques used to HACK. This course is perfect for beginning SECURITY SPECIALIST, PARENTS, and PEOPLE interested in the covert world of HACKING. For a small price and time you will learn the FUNDAMENTALS and open your mind to things you may have known or not known about this world. Begin COURSE today! What do you have to lose?

SKILLS and TOOLS you will learn:

  • Social engineering
    • Spoofing phone calls
    • Spoofing emails
  • Data mining for information used for social engineering
  • Foot printing a networking
    • Discovery of network settings
    • Security settings
  • Tools
    • Cracking Passwords
    • Sniffing Packets
    • Creating viruses
    • Creating worms
    • Creating Trojans
    • Wrapping viruses
    • Remote control of computers
    • Key loggers
    • Force Attacks
    • Data Recovery
    • Zeroing out drives
  • And SO MUCH MORE!

The information is this course is VALUABLE to a person who wants to get involved with SECURITY, HACKING, PEN-TESTING, and learning their options. This will give you a solid understanding and the tools necessary to protect your network and yourself….

What are the requirements?

  • Computer
  • Headphones
  • Internet Connection
  • Desire to Learn

What am I going to get from this course?

  • Learn about social engineering, ethical hacking, and the tools to do pen testing and secure your network.
  • At the end of this course the student will learn how to protect themselves and networks from possible intrusion
  • This course is designed to teach people the fundamentals of ethical hacking. This course will break down virus, trojans, malware, foot printing, and many other tools. No programming skills required. If your desire is to learn more about the black hat vs white hat world this course is for you.

What is the target audience?

  • Computer Beginners
  • Beginning Security Professionals
  • Those interested in Ethical Hacking

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Social Engineering
01:57

This is the course introduction video.

03:19

In this course we will begin foot printing.

  • Identify the target company.
  • Begin the process of social engineering.
02:47

In this course the student will learn the steps:

  • Identify viable targets and begin gathering info of that person.
  • Gather more info for possible targets.
03:13

In this course the student will learn the steps:

  • Data mine for contact information
  • Gather initial information for potential social engineering attack.
03:35

In this course the student will learn the steps:

  • In this lesson we will gather mine other outlets for potential personal information.
  • Dive further into potential information used to turn our target and design game plan.
03:48

In this lesson you will learn the importance of establishing a story and commonality when social engineering.

02:01

In this course the student will learn the steps:

  • We will recap on why you should be careful with your information.
Social Engineering
8 questions
Section 2: Foot Printing
01:56

Introduction video to foot printing a target company.

02:07

In this course the student will learn the steps:

  • Use Google maps to determine information about target.
01:35

In this course the student will learn the steps:

  • Difference between whaling and phishing
  • Begin data mining for network infrastructure
Foot Printing - Email discovery
Preview
03:06
02:29

In this lesson the student will lean more about foot printing the company and social engineering.

03:31

In this course the student will learn the steps:

  • Utilize their Job Board to determine potential network infrastructure.
  • Determine potential security measures.
03:14

In this course the student will learn the steps:

  • Using Job Board to determine end user configurations.
01:30

In this course the student will learn the steps:

  • Use the Job board to determine what kind of storage devices they use for databases.
Foot Printing Quiz
5 questions
Section 3: Tools
03:30

In this course the student will learn the steps:

  • Tools used to scrape website for information to use for targeting the company.
04:12

In this course the student will learn the steps:

  • Tools used to rip a website.
03:05

In this course the student will learn the steps:

  • Learn how to use those tools for possible man in the middle.
  • Recreate a website.
04:33

Students will learn how to proxy and do a proxy daisy chain.

03:05

In this course the student will learn the steps:

  • Students will learn about network discovery of devices.
02:15

In this course the student will learn the steps:

  • Students will learn more about network discovery.
03:30

In this course the student will learn the steps:

  • Stenography
03:37

In this course the student will learn the steps:

  • Will learn about spam
  • How to trace spam
01:46

In this course the student will learn the steps:

  • Trace public IP addresses
  • Be introduced to where spam comes from.
02:28

In this course the student will learn the steps:

  • To spoof an email.
03:50

In this course the student will learn the steps:

  • Crack passwords
01:35

In this course the student will learn the steps:

  • Learn more about password cracking.
03:22

In this course the student will learn the steps:

  • Spoof a phone call
03:12

In this course the student will learn the steps:

  • About key logging.
03:54

In this course the student will learn the steps:

  • Create a virus
03:01

Studnts will learn how to wrap a virus into a executable file.

03:25

In this course the student will learn the steps:

  • Create a worm
01:39

In this course the student will learn the steps:

  • For rogue access point.
03:10

In this course the student will learn the steps:

  • Create false link in email
03:48

In this course the student will learn the steps:

  • Scan a web server for volnerability
03:47

In this course the student will learn the steps:

  • Zero out a hard drive
  • Recover from a hard drive
02:46

In this course the student will learn the steps:

  • How to port scan
01:59

Students will learn the final pieces about social engineering.

Tools Quiz
12 questions

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Shaun Kolich, Help Desk/IT Professional

Currently I am a IT Help Desk professional with over 4 years of IT experience. I hold three active IT Certifications Comptia A+, Net+, and Security+. Education I have 10 credit hours left remaining to a Bachelors in Information Technology and Software Engineering degree. My experience includes but not limited to trouble shooting computers, networks, servers, routers, firewalls, security protocols, web development, and other IT processes.

Ready to start learning?
Take This Course