Demonstrations of the most popular hack-tools of LINUX

Learn how to use various security tools of Linux
3.8 (19 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,445 students enrolled
57% off
Take This Course
  • Lectures 40
  • Length 4 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 8/2015 English

Course Description

  • Most students who wish to learn hacking, probably haven't used Linux before. Some students know only the theory, but they do not know how it's actually done. Right now, you may be a newbie, you may not know what a teminal is. If this is the case, then this course is perfect for you. Its best suited for students who enjoy learning by doing things in a practical way. The following security tools are featured in this course:
  • Wireshark
  • Nmap
  • Hydra & Hydra-gtk
  • macchanger
  • tor browser
  • Aircrack-ng
  • Reaver
  • Fern wi-fi cracker
I have tried to keep this course short and to-the-point. So almost all the lectures are video demonstrations of various techniques. The first four sections deal with the basics of the Linux operating system. In section 5, you will learn how to install the security tools of kali linux on ubuntu. From section 6 to section 10, you will learn how to use the above mentioned tools in Linux. Throughout the course, you will find out about more and more commands and techniques, and you will realise how flexible Linux is. After completing this course, you will have the skills of a hacker.

What are the requirements?

  • A Desktop/Laptop, and a phone(only for one demonstration) is definitely required.
  • A version of linux(preferably Ubuntu) is needed. Installation guidelines are provided in this course. But if you want, you can install it before beginning with this course(try to install a LTS version).

What am I going to get from this course?

  • Understand how the Linux system works.
  • Learn how to install the security tools of Kali-Linux on Ubuntu.
  • Learn the networking skills required for every hacker.
  • Learn how to use security tools like nmap, wireshark, hydra, fern etc.

Who is the target audience?

  • This course is meant for beginners who are interested to learn hacking but are not so familiar with the Linux operating system.
  • IT professionals who want to learn how to use the featured security tools of Linux.
  • This course is strictly a practical course. So, if you are looking for theoretical knowledge, this course probably isn't for you.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Introducing LINUX
Getting started
Section 2: Installing Ubuntu
Installing Ubuntu
1 page
Section 3: Terminal commands
What is a terminal?
5 pages

How to open a terminal


Learn the basic terminal commands that you'll need everyday!

List of terminal commands
1 page
Section 4: A few important things
About root shell
8 pages
Important directories
6 pages
Repositories in UBUNTU
6 pages
About Synaptic Package Manager
6 pages
Section 5: Gathering the tools

Learn how to install the security tools of kali linux on Ubuntu.

17 pages

List of important kali-linux hack tools.

1 page
Section 6: Basic networking skills
What are ports?
9 pages

Learn how to create a virtual wi-fi hotspot manually on Ubuntu


Learn how to hide your Mac address


Learn how to change your IP address


Learn how to stay anonymous on the internet.

Section 7: Network monitoring
About Wireshark
6 pages

Learn how to install wireshark using a terminal


Learn how to capture data packets with wireshark


Learn how to get sensitive information like login credentials on a wi-fi network

Section 8: Network scanning
Introduction to nmap
5 pages

Learn how to install the nmap tool.

Various scanning techniques
Version detection
OS detection
Second generation advanced detection system
Advanced scans
Section 9: Brute force attack
About hydra
6 pages

Installing hydra and hydra-gtk using a terminal


A demo of how email accounts are hacked with bruteforce tools like hydra

Section 10: Cracking WI-FI router passwords
About aircrack, reaver and fern wi-fi cracker
8 pages
Installing reaver
Installing aircrack
Hacking WPA/WPA2 passwords
Fern wi-fi cracker
Section 11: Reference manual
Reference manual
1 page
Section 12: Conclusion
What now?
Section 13: Extras
Mastering Kali-Linux ebook

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Sourav Das, Software developer

Currently, I am a grad student studying computer science. By profession, I am a software developer. I have been working with various security tools for the last few years, and developed quite a few tools for the cyber-security community. Some of these tools include network scanners and bruteforcing tools.

I made this course to help people learn how the hacking is actually done in the field and I hope that you find this course useful!

Ready to start learning?
Take This Course