Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add Fundamentals of Ethical Hacking (Choose your hat) to your Wishlist.

Add to Wishlist

Fundamentals of Ethical Hacking (Choose your hat)

Learn the Fundamentals of ETHICAL HACKING, the tools used to SECURE and PENETRATE a network, Viruses, Malware, Trojans.
4.3 (33 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
735 students enrolled
Created by Shaun Kolich
Last updated 6/2015
English
$10 $20 50% off
3 days left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
Description

Ever wondered how people hack? Are you interested in learning the secrets? This course covers the FUNDAMENTALS OF ETHICAL HACKING. You will learn about the infamous SOCIAL ENGINEERING, FOOT PRINTING, and TOOLS used by common hackers to penetrate networks. You will learn what information and tools to PROTECT your network, protect YOURSELF, and learn techniques used to HACK. This course is perfect for beginning SECURITY SPECIALIST, PARENTS, and PEOPLE interested in the covert world of HACKING. For a small price and time you will learn the FUNDAMENTALS and open your mind to things you may have known or not known about this world. Begin COURSE today! What do you have to lose?

SKILLS and TOOLS you will learn:

  • Social engineering
    • Spoofing phone calls
    • Spoofing emails
  • Data mining for information used for social engineering
  • Foot printing a networking
    • Discovery of network settings
    • Security settings
  • Tools
    • Cracking Passwords
    • Sniffing Packets
    • Creating viruses
    • Creating worms
    • Creating Trojans
    • Wrapping viruses
    • Remote control of computers
    • Key loggers
    • Force Attacks
    • Data Recovery
    • Zeroing out drives
  • And SO MUCH MORE!

The information is this course is VALUABLE to a person who wants to get involved with SECURITY, HACKING, PEN-TESTING, and learning their options. This will give you a solid understanding and the tools necessary to protect your network and yourself….

Who is the target audience?
  • Computer Beginners
  • Beginning Security Professionals
  • Those interested in Ethical Hacking
Students Who Viewed This Course Also Viewed
What Will I Learn?
Learn about social engineering, ethical hacking, and the tools to do pen testing and secure your network.
At the end of this course the student will learn how to protect themselves and networks from possible intrusion
This course is designed to teach people the fundamentals of ethical hacking. This course will break down virus, trojans, malware, foot printing, and many other tools. No programming skills required. If your desire is to learn more about the black hat vs white hat world this course is for you.
View Curriculum
Requirements
  • Computer
  • Headphones
  • Internet Connection
  • Desire to Learn
Curriculum For This Course
Expand All 38 Lectures Collapse All 38 Lectures 01:51:37
+
Social Engineering
7 Lectures 20:40

This is the course introduction video.

Preview 01:57

In this course we will begin foot printing.

  • Identify the target company.
  • Begin the process of social engineering.
Preview 03:19

In this course the student will learn the steps:

  • Identify viable targets and begin gathering info of that person.
  • Gather more info for possible targets.
Preview 02:47

In this course the student will learn the steps:

  • Data mine for contact information
  • Gather initial information for potential social engineering attack.
Preview 03:13

In this course the student will learn the steps:

  • In this lesson we will gather mine other outlets for potential personal information.
  • Dive further into potential information used to turn our target and design game plan.
Preview 03:35

In this lesson you will learn the importance of establishing a story and commonality when social engineering.

Preview 03:48

In this course the student will learn the steps:

  • We will recap on why you should be careful with your information.
Preview 02:01

Social Engineering
8 questions
+
Foot Printing
8 Lectures 19:28

Introduction video to foot printing a target company.

Preview 01:56

In this course the student will learn the steps:

  • Use Google maps to determine information about target.
Preview 02:07

In this course the student will learn the steps:

  • Difference between whaling and phishing
  • Begin data mining for network infrastructure
Preview 01:35


In this lesson the student will lean more about foot printing the company and social engineering.

Preview 02:29

In this course the student will learn the steps:

  • Utilize their Job Board to determine potential network infrastructure.
  • Determine potential security measures.
Preview 03:31

In this course the student will learn the steps:

  • Using Job Board to determine end user configurations.
Preview 03:14

In this course the student will learn the steps:

  • Use the Job board to determine what kind of storage devices they use for databases.
Preview 01:30

Foot Printing Quiz
5 questions
+
Tools
23 Lectures 01:11:29

In this course the student will learn the steps:

  • Tools used to scrape website for information to use for targeting the company.
Tools Video - Scrapping a Website for information
03:30

In this course the student will learn the steps:

  • Tools used to rip a website.
Tools Video - Copying a website
04:12

In this course the student will learn the steps:

  • Learn how to use those tools for possible man in the middle.
  • Recreate a website.
Tools Video - Continuation of website copying
03:05

Students will learn how to proxy and do a proxy daisy chain.

Tools Video - Proxy server and daisy chaining
04:33

In this course the student will learn the steps:

  • Students will learn about network discovery of devices.
Tools Video - Learn about network mapping
03:05

In this course the student will learn the steps:

  • Students will learn more about network discovery.
Tools Video - Continuing network discovery
02:15

In this course the student will learn the steps:

  • Stenography
Tools Video - Stenography
03:30

In this course the student will learn the steps:

  • Will learn about spam
  • How to trace spam
Tools Video - Analyze spam and gather information
03:37

In this course the student will learn the steps:

  • Trace public IP addresses
  • Be introduced to where spam comes from.
Tools Video - Locating public IP addresses
01:46

In this course the student will learn the steps:

  • To spoof an email.
Tools Video - Email Spoofing
02:28

In this course the student will learn the steps:

  • Crack passwords
Tools Video - Cracking Passwords
03:50

In this course the student will learn the steps:

  • Learn more about password cracking.
Tools Video - Different attacks for passwords
01:35

In this course the student will learn the steps:

  • Spoof a phone call
Tools Video - Spoof a phone call
03:22

In this course the student will learn the steps:

  • About key logging.
Tools Video - Key loggers
03:12

In this course the student will learn the steps:

  • Create a virus
Tools Video - Create virus
03:54

Studnts will learn how to wrap a virus into a executable file.

Tools Video - Wrapping viruses into programs
03:01

In this course the student will learn the steps:

  • Create a worm
Tools Video - Creating a worm
03:25

In this course the student will learn the steps:

  • For rogue access point.
Tools Video - Rogue access points
01:39

In this course the student will learn the steps:

  • Create false link in email
Tools Video - Create false link in email
03:10

In this course the student will learn the steps:

  • Scan a web server for volnerability
Tools Video - Web server vulnerability
03:48

In this course the student will learn the steps:

  • Zero out a hard drive
  • Recover from a hard drive
Tools Video 21 - Hard drive information
03:47

In this course the student will learn the steps:

  • How to port scan
Tools Video 22 - Port Scanning
02:46

Students will learn the final pieces about social engineering.

Tools Video - Finally over the course
01:59

Tools Quiz
12 questions
About the Instructor
4.1 Average rating
59 Reviews
2,192 Students
6 Courses
Help Desk/IT Professional

Currently I am a IT Help Desk professional with over 4 years of IT experience. I hold three active IT Certifications Comptia A+, Net+, and Security+. Education I have 10 credit hours left remaining to a Bachelors in Information Technology and Software Engineering degree. My experience includes but not limited to trouble shooting computers, networks, servers, routers, firewalls, security protocols, web development, and other IT processes.

Report Abuse