Ethical Hacking Essential Training
3.7 (22 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,114 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Ethical Hacking Essential Training to your Wishlist.

Add to Wishlist

Ethical Hacking Essential Training

cyber security awareness
3.7 (22 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,114 students enrolled
Created by Ankur Singh
Last updated 2/2017
English
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Perform Basic hacking
  • ready to learn advanced course
View Curriculum
Requirements
  • basic computer
  • working Internet
Description

course design for  beginner

If the idea of hacking as a career excites you, you’ll benefit greatly from completing this training . You’ll learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them.
 If you want to get in the cyber security field 
, then this is an ideal course for you. It teaches you, how to find vulnerabilities (bugs or loopholes, like coding mistakes, configuration mistakes or errors etc) in any applications and Network infrastructures including networking devices, mobiles and etc. Web Application Penetration is specific to digging the same specific to web applications.
Information gathering
Scanning enumeration & footprinting
Open source intelligence gathering
Utilizing opensource tools to find the information
System hacking
Proxy server and chaining
Keyloggers, Trojan and other viruses
Networking sniffing and session hijacking
SQL Injection and cross site scripting
And more…

Who is the target audience?
  • Security testers
  • Students
  • Anyone Who Interested In Securing Security
Students Who Viewed This Course Also Viewed
Curriculum For This Course
31 Lectures
02:04:21
+
Chapter 1 - Lab Setup
5 Lectures 19:23
+
Chapter 2 - Introduction
1 Lecture 05:00
Introduction to Ethics and Hacking, Types, and Five Phases of Hacking
05:00
+
Chapter 3 - Footprinting/Reconnaissance
5 Lectures 17:43
Footprinting and Reconnaissance Concepts
00:55

Hacking using Google
07:04

Using WHOIS
02:15

web data extractor
02:08

People search
05:21
+
Chapter 4 - Scanning
4 Lectures 17:04
Network Scanning Overview
01:16

Port Discovery and OS and Application Fingerprinting
05:48

Vulnerability Scanning
05:51

Using Public Proxy Services
04:09
+
Chapter 5- Enumeration Concepts
1 Lecture 03:16
SMTP and Service Enumeration
03:16
+
Chapter 6 - System Hacking Win7 and Linux
6 Lectures 19:30
Password Cracking
02:30

Trojan
02:59

Exploit windows 7
03:54

Exploit Linux
02:23

keylogger
03:31

Phishing
04:13
+
Chapter 7 - Malwares
1 Lecture 09:33
Malware Analysis
09:33
+
Chapter 8 - Sniffing
1 Lecture 03:01
Sniffing
03:01
+
Chapter 9 - Social Engineering
1 Lecture 03:43
Social Engineering
03:43
+
Chapter 10 - Denial of Service
1 Lecture 02:08
Denial of Service
02:08
3 More Sections
About the Instructor
Ankur Singh
3.2 Average rating
207 Reviews
7,555 Students
7 Courses
Engineer

Hello there, I am ankur singh , with over 4 Years experience in Ethical Hacking, Penetration Testing, Malware Reverse Engineering, Forensics, Securing Websites and Servers.

e Found and Reported Many Security Vulnerabilities in Facebook, Microsoft, Adobe, Apple, AT&T, RedHat, SoundCloud, GitHub, Etsy, Nokia .

Also having some global certification like Ceh, Ecsa, CCNA, GIMS.