Intensive Ethical Hacking Series
4.0 (11 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
679 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Intensive Ethical Hacking Series to your Wishlist.

Add to Wishlist

Intensive Ethical Hacking Series

Course which is specially designed for Beginner's who look forward to make their career into field of Ethical Hacking.
4.0 (11 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
679 students enrolled
Created by Zeal Vora
Last updated 9/2015
English
Price: $30
30-Day Money-Back Guarantee
Includes:
  • 7.5 hours on-demand video
  • 9 Articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Analyze one of the most dangerous Viruses i.e Ransomwares
  • Will be to themselves be able capture & analyze TCP, DNS packets on Wireshark
  • Gets Hands On working with Cryptography & Encryption
  • Learn some cool tricks to impress your Friends
  • Solid understanding of VEP Approach and how the Servers are Hacked.
  • Create perfect base for themselves to carry forward their Career in Ethical Hacking
View Curriculum
Requirements
  • Viruses Samples, Software's etc will be provided linked for to Download.
  • Need a Computer with minimum 2GB RAM. 4GB RAM will be great.
  • Enthusiasm to Learn.
Description

This is one of the initial Ethical Hacking course which is designed and molded specifically for Beginners who wants to make their Career in the field of Ethical Hacking.

This course takes an in-depth look to get your started with setting up base to work with Linux, Networking to work with Firewalls and Analyze one of the most dangerous viruses in the world. Using readily available tools and custom developed practice scenarios, you will navigate your way through the techniques attacker use to hack websites and also ways to protect it.

In this course we teach everything from scratch and no pre-existing knowledge is needed. So as long as you have a working internet connection and a computer/laptop you are good to go.

With 50+ modules for this course and Challenge Assignments for topics, we make sure you understand the topic from the ground up to the deep packet level and build a strong base to move your career ahead in field of Ethical Hacking.

Who is the target audience?
  • This course is specially designed for Beginners who wants to make their career into the field of Ethical Hacking. If your'e one of them, this is the course for you.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
55 Lectures
07:28:47
+
Getting Started with the Course
1 Lecture 10:26
+
Setting up the Hacking Lab
6 Lectures 49:25
Introduction to Virtualization
05:18

Installing VMware
06:49

Installing Kali Linux 2.0
12:44

Getting the Windows 8.1 Official Evaluation
01:46

VMware Features : Adding Resources to Virtual Machines
11:55

VMware Features : Snapshots
10:53
+
Our Favorite Networking
7 Lectures 44:18
Introduction to Protocols
03:01

Introduction to Domain Name Systems
08:37

DNS - Packet Level View
07:30

DNS - Exercise
00:25

Transmission Control Protocol ( TCP )
17:27

Notes : TCP
00:05

+
Cryptography & Network Security
11 Lectures 01:32:21
Introduction to Cryptography
17:15

Plain Text vs Encrypted Text based algorithms
08:48

Exercise : Encryption
00:07

Disk Level Encryption Schemas
08:47

Exercise : Full Disk Encryption
00:09

Pretty Good Privacy ( PGP )
10:16

Asymmetric Key Encryption
09:47

Hashing
17:06

Exercise - Hashing
00:07

SSH Key Based Authentication
13:03

Understanding working of HTTPS
06:55
+
Intermidary Nodes for Hacking
2 Lectures 21:25
The Proxy Servers
12:08

Virtual Private Networks
09:17
+
The Metasploit Module
5 Lectures 37:18
Getting started with Metasploit
14:50

Metasploit & Windows 8.1
14:20

Exercise : Hacking using Metasploit
00:06

The Big Metasploitable 2
08:00

Notes : Metasploitable
00:01
+
Vulnerability, Exploit , Payload
4 Lectures 27:16
Understanding the VEP approach during Hacking
07:09

VEP Practical
07:16

Vulnerability Scanning
12:45

Exercise - Vulnerability Scanning
00:06
+
Hail The Dangerous Viruses
3 Lectures 27:04
Remote Access Trojans
14:07

Most Dangerous Ransomwares
12:56

Notes : Dangerous Viruses
00:01
+
Windows Hacking
8 Lectures 01:01:41
Bypassing Windows Based Authentication Schemas
04:44

Alternate Data Streams
07:50

Group Policy Editor
08:09

Denial Of Service
12:30

Creating Backdoors
10:24

Changing Icons
03:36

The Harvester
07:48

Multi-Factor Authentication
06:40
+
Password Attacks
4 Lectures 41:40
The Stumbling Passwords
10:46

Getting started with Password Cracking
05:19

Password Attacks Practicals
16:40

Customizing our Wordlist
08:55
2 More Sections
About the Instructor
Zeal Vora
4.2 Average rating
210 Reviews
3,378 Students
4 Courses
Premium Instructor

I am Zeal Vora. I work as a Cloud Security Engineer at one of largest M-Commerce websites. Working into the field of Security, we face tens of thousands of hacking attempts everyday and protecting the Servers from those is a challenging task but that is what makes the work Cool :)

One of my passion is teaching and I intend to make video courses on topics that are unique and challenging to understand directly from documentations. If you have any such course requirement, do let know and I'd be happy to look into it.

If you want to connect, that would be cool, please feel free to connect me on Twitter from the links below the photo on the left :)

Happy Learning !