Intensive Ethical Hacking Series

Course which is specially designed for Beginner's who look forward to make their career into field of Ethical Hacking.
4.1 (10 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
674 students enrolled
$30
Take This Course
  • Lectures 55
  • Length 7.5 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 9/2015 English

Course Description

This is one of the initial Ethical Hacking course which is designed and molded specifically for Beginners who wants to make their Career in the field of Ethical Hacking.

This course takes an in-depth look to get your started with setting up base to work with Linux, Networking to work with Firewalls and Analyze one of the most dangerous viruses in the world. Using readily available tools and custom developed practice scenarios, you will navigate your way through the techniques attacker use to hack websites and also ways to protect it.

In this course we teach everything from scratch and no pre-existing knowledge is needed. So as long as you have a working internet connection and a computer/laptop you are good to go.

With 50+ modules for this course and Challenge Assignments for topics, we make sure you understand the topic from the ground up to the deep packet level and build a strong base to move your career ahead in field of Ethical Hacking.

What are the requirements?

  • Viruses Samples, Software's etc will be provided linked for to Download.
  • Need a Computer with minimum 2GB RAM. 4GB RAM will be great.
  • Enthusiasm to Learn.

What am I going to get from this course?

  • Analyze one of the most dangerous Viruses i.e Ransomwares
  • Will be to themselves be able capture & analyze TCP, DNS packets on Wireshark
  • Gets Hands On working with Cryptography & Encryption
  • Learn some cool tricks to impress your Friends
  • Solid understanding of VEP Approach and how the Servers are Hacked.
  • Create perfect base for themselves to carry forward their Career in Ethical Hacking

What is the target audience?

  • This course is specially designed for Beginners who wants to make their career into the field of Ethical Hacking. If your'e one of them, this is the course for you.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Getting Started with the Course
Introduction to the Course
Preview
10:26
Section 2: Setting up the Hacking Lab
Introduction to Virtualization
05:18
Installing VMware
06:49
Installing Kali Linux 2.0
12:44
Getting the Windows 8.1 Official Evaluation
01:46
VMware Features : Adding Resources to Virtual Machines
11:55
VMware Features : Snapshots
10:53
Section 3: Our Favorite Networking
Introduction to Protocols
03:01
Introduction to Domain Name Systems
08:37
DNS - Packet Level View
07:30
DNS - Exercise
Article
Transmission Control Protocol ( TCP )
17:27
Notes : TCP
Article
Analyzing TCP in Packet Capture
Preview
07:13
Section 4: Cryptography & Network Security
Introduction to Cryptography
17:15
Plain Text vs Encrypted Text based algorithms
08:48
Exercise : Encryption
Article
Disk Level Encryption Schemas
08:47
Exercise : Full Disk Encryption
Article
Pretty Good Privacy ( PGP )
10:16
Asymmetric Key Encryption
09:47
Hashing
17:06
Exercise - Hashing
Article
SSH Key Based Authentication
13:03
Understanding working of HTTPS
06:55
Section 5: Intermidary Nodes for Hacking
The Proxy Servers
12:08
Virtual Private Networks
09:17
Section 6: The Metasploit Module
Getting started with Metasploit
14:50
Metasploit & Windows 8.1
14:20
Exercise : Hacking using Metasploit
Article
The Big Metasploitable 2
08:00
Notes : Metasploitable
Article
Section 7: Vulnerability, Exploit , Payload
Understanding the VEP approach during Hacking
07:09
VEP Practical
07:16
Vulnerability Scanning
12:45
Exercise - Vulnerability Scanning
Article
Section 8: Hail The Dangerous Viruses
Remote Access Trojans
14:07
Most Dangerous Ransomwares
12:56
Notes : Dangerous Viruses
Article
Section 9: Windows Hacking
Bypassing Windows Based Authentication Schemas
04:44
Alternate Data Streams
07:50
Group Policy Editor
08:09
Denial Of Service
12:30
Creating Backdoors
10:24
Changing Icons
03:36
The Harvester
07:48
Multi-Factor Authentication
06:40
Section 10: Password Attacks
The Stumbling Passwords
10:46
Getting started with Password Cracking
05:19
Password Attacks Practicals
16:40
Customizing our Wordlist
08:55
Section 11: Firewall
Getting started with Firewall's
08:52
Firewall Kung-FU
17:08
Rate Limiting with Firewalls
02:59
Section 12: Forensics
Stegnography
06:56

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Zeal Vora, Premium Instructor

I am Zeal Vora. I work as a Cloud Security Engineer. Working into the field of Security, we face tens of thousands of hacking attempts everyday and protecting the Servers from those is a challenging task but that is what makes the work Cool :)

My domain of expertise lies in Linux & Information Security. I hold many Certifications like : Certified Ethical Hacker, RedHat Certified Engineer, VMware Certified Associate for Cloud Computing, Data Center Virtualization, Workforce Mobility.

One of my passions is teaching and i have been teaching at personal tutor level to that of University level. One of my aim is to make Education free at some point of time. I'll look forward to that.

Ready to start learning?
Take This Course