The Complete Ethical Hacking Course for 2016/2017!
4.4 (1,309 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
42,454 students enrolled
Wishlisted Wishlist

Please confirm that you want to add The Complete Ethical Hacking Course for 2016/2017! to your Wishlist.

Add to Wishlist

The Complete Ethical Hacking Course for 2016/2017!

Gain the knowledge hackers use to compromise systems and use it to protect your own!
4.4 (1,309 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
42,454 students enrolled
Created by Ermin Kreponic
Last updated 9/2016
English
English
Curiosity Sale
Current price: $10 Original price: $195 Discount: 95% off
30-Day Money-Back Guarantee
Includes:
  • 15 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Get started using Fedora (Linux)
  • Understand the basics of terminal
  • Troubleshoot networks using Wireshark
  • Stay anonymous online
  • Set up a VPN server
  • Hack wireless networks
  • Crack passwords and encryption using HashCat
  • Clone websites
  • Protect & defend your own network
  • Learn how to deploy a keylogger from a USB: Works out of the box for Windows 7 8 8.1 and 10
View Curriculum
Requirements
  • A computer to follow along with exercises in the course
  • USB drive to install Linux
  • Wireless card & router access
  • Various programs used to demo attacks (FREE)
  • An eager mind!
Description

If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world! Join us now and receive over 80 lectures & 15 hours of HD video, and 1 on 1 assistance from experienced network security professionals! We will cover the following topics in this course:

  • Introduction to ethical hacking
  • Linux installation, terminal basics, and Wireshark Setup
  • Staying anonymous online, proxy servers, and accessing the dark side of the internet using TOR
  • Aircrack-ng, HashCat, and wifi hacking
  • Defending your own networks from attacks
  • Cloning websites
  • Arduino USB keylogger that works out of the box for Windows 7, 8, 8.1, and 10
  • Windows power shell scripting

This course will receive monthly updates based on students requests, and our goal is to make this the #1 network security course online!

DISCLAIMER The attacks demonstrated in this course can cause serious damage and are only shown for educational purposes. The intent of this course is to give you the tools to defend your own networks, share skills that are valuable to companies all over the world, and help you to better understand the challenges that information security professionals face on a daily basis.

English & Spanish subtitles available.

Thank you for taking the time to read this, and we hope to see you in the course!

Who is the target audience?
  • This course was designed for students in the IT/Network Security field
  • No previous experience is required
Students Who Viewed This Course Also Viewed
Curriculum For This Course
85 Lectures
15:02:07
+
Introduction
1 Lecture 16:23

What you can expect to learn in this course and hardware & software requirements.

Preview 16:23
+
Setup
9 Lectures 01:30:25

Explains how to set up the environment.

Create a USB for Installation
10:10

Guides you through the process of Linux installation.

Installation Procedure Part 1
11:16

Guides you through the process of Linux installation.

Installation Procedure Part 2
06:22

General browser configuration.

Improve Safety and Anonymity of your Browser
07:08

Getting acquainted in Fedora KDE Desktop.

Fedora KDE Desktop Orientation (optional)
14:44

Showing basic Linux commands.

Terminal Basics Part 1
16:03

Showing basic Linux commands.

Terminal Basics Part 2
11:46

Setting up Wireshark and configuring it for later usage.

Wireshark Setup Part 1
05:02

Setting up Wireshark and configuring it for later usage.

Wireshark Setup Part 2
07:54
+
Anonymity Online
16 Lectures 03:05:47

Explains how to connect to the Internet via Proxy for the purposes of anonymization.

How to Connect to the Internet via Proxy Part 1
17:47

Explains how to connect to the Internet via Proxy for the purposes of anonymization.

How to Connect to the Internet via Proxy Part 2
02:50

Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.

How to set up a Proxy Server for Traffic Monitoring Part 1
19:52

Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.

How to set up a Proxy Server for Traffic Monitoring Part 2
09:55

Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.

How to set up a Proxy Server for Traffic Monitoring Part 3
14:39

Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.

How to set up a Proxy Server for Traffic Monitoring Part 4
19:04

Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.

How to set up a Proxy Server for Traffic Monitoring Part 5
09:23

Learn how to anonymize your traffic by using a VPN server as an anonymizer.

How to Connect to a VPN
07:48

Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.

How to set up your own VPN Server Part 1
10:14

Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.

How to set up your own VPN Server Part 2
09:23

Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.

How to set up your own VPN Server Part 3
13:32

Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic. 

How to set up your own VPN Server Part 4
05:58

Here I will show you how you can monitor the traffic of your VPN server.

Monitor VPN Server Traffic
09:45

Lets have a look at how we can access the dark side of the Internet by using the Tor network via Tor browser.

Tor Browser
11:21

Here we are going to take a look at how a Tor relay can be set up and configured.

How to set up a Tor Relay Part 1
18:32

Here we are going to take a look at how a Tor relay can be set up and configured.

How to set up a Tor Relay Part 2
05:44
+
Wireless
25 Lectures 04:32:17

Lets go ahead and install one of the necessary prerequisites for this chapter, namely aircrack-ng, which will be used in combination with our CPU to bruteforce the WPA2 key.

Installing aircrack-ng
16:20

In order for us to begin the cracking procedure, we need to go ahead and capture a handshake between the authenticated client and the wireless access point.

Capturing WPA2 Handshake
12:55

Since we are going to need something to generate lists of possible passwords, I decided to use Crunch for this purpose as it is very convenient due to its numerous options.

Crunch Password Generator Installation
09:18

Lets learn how to create custom rule sets for the password generation process so that our passwords would fit within a certain range of predefined rules.

Crunch Password Generator Rule Sets
18:50

In this final stage, we will feed aircrack with the passwords generated by Crunch and aircrack, in turn, will attempt to guess the passphrase by utilizing the CPU.

Crunch Password Generator in Combination with aircrack-ng
13:51

Installing drivers for our dedicated GPU.

Installing NVIDIA Drivers
15:11

Step by step guide on how to install HashCat.

Installing HashCat
08:39

Here we will learn how to prepare the capture file for HashCat.

Preparing the Capture File for HashCat
02:09

Getting started with Hashcat, one of the world's fastest CPU/GPU based password recovery tools.

HashCat Part 1
13:15

Advanced Hashcat tutorial for attacks & automation.

HashCat Part 2
14:13

Here I will show you how to utilize the tool to change the mac address of your network devices so that you may reach a higher degree of anonymity.

Changing your mac address
13:32

Install a virtual machine to isolate the incoming traffic.

Set up a Sandboxed Environment for our Hotspot Part 1
18:16

Install a virtual machine to isolate the incoming traffic.

Set up a Sandboxed Environment for our Hotspot Part 2
11:52

Configuring our network card to function as a wireless hotspot.

Setting up an Open Wireless Hotspot Part 1
08:39

Configuring our network card to function as a wireless hotspot.

Setting up an Open Wireless Hotspot Part 2
03:40

How to bring up and configure your own DNS server.

Setting up the Fake DNS Resolutions Part 1
05:51

How to bring up and configure your own DNS server.

Setting up the Fake DNS Resolutions Part 2
03:08

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.

Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 1
07:48

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 2
08:51

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 3
05:04

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.

Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 4
13:07

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 5
10:48

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 6
19:47

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.

Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 7
03:36

Here we will learn how to DOS the wireless connection by deauthenticating the authenticated clients.

Disconnect Clients from a Wireless Access Point
13:37
+
Site Cloning
1 Lecture 06:45

Here we will use the tool wget in order to clone websites.

How to Clone Websites
06:45
+
Bitsquatting
5 Lectures 01:22:35
Bitsquatting Part 1
14:26

Bitsquatting Part 2
20:05

Bitsquatting Part 3
18:11

Bitsquatting Part 4
19:38

Bitsquatting Part 5
10:15
+
Bad USB (USB Keylogger Deployment)
2 Lectures 09:13
Overview
03:58

Requirements
05:15
+
Setting up Windows Virtual Machine
4 Lectures 30:21
Installing Windows VM Part 1
10:01

Installing Windows VM Part 2
07:03

Install CodeBlocks with a Compiler
04:17

Download and Compile the Keylogger
09:00
+
Server Setup
2 Lectures 29:53
Set up a Server for Keylogger
15:51

Upload the Keylogger to the Server
14:02
+
Arduino USB Programming
9 Lectures 01:07:57
Download Arduino
02:36

Set up Arduino and Teensyduino
05:44

Confirm that everything works
08:43

Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 1
09:33

Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 2
05:39

Generate Files in System32
09:58

Sets of Commands to be Executed Part 1
11:54

Sets of Commands to be Executed Part 2
09:21

Call Functions and Run Commands
04:29
4 More Sections
About the Instructor
Ermin Kreponic
4.3 Average rating
24,597 Reviews
319,868 Students
14 Courses
IT Expert

Strongly motivated young IT expert, Linux enthusiast with a passion for troubleshooting network related problems. With an exceptional eye for details and a sense of urgency when it comes down to problem solving.

Skills
- Advanced knowledge of Linux command line
- Installation, configuration and maintenance of servers that run under Unix/Linux type
operating systems
To name a few: DNS, TFTP, FTP, SSH, APACHE, SMTP, VSFTP and some others
- Troubleshooting a wide range of network related problems. Meaning, digging deep for
packets on any given network.
Using one of my favourite tools for capturing and filtering packets on the network, Wireshark,
and resolving end-user issues
- Good understanding of Cisco routers and IOS operating system
- Configuration and implementation of Linux firewall namely Iptables
- Supervision and filtration of network traffic
- Tightening down security and pen testing networks for possible vulnerabilities
- Good knowledge of network gear brands and their strengths or weaknesses
- Preforming system back up
- Fair knowledge of Bash scripting
- equipment installation, upgrades, patches, and configuration.


Personal note:

I do not sleep much, but that is not only because I work hard, rather instead it is
because I enjoy this line of work,
it is extremely rewarding in every way that matters