The Definitive Ethical Hacking Course - Learn From Scratch
4.2 (1,460 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
61,450 students enrolled
Wishlisted Wishlist

Please confirm that you want to add The Definitive Ethical Hacking Course - Learn From Scratch to your Wishlist.

Add to Wishlist

The Definitive Ethical Hacking Course - Learn From Scratch

Learn the Basics Of Ethical Hacking, Penetration Testing, Wifi Hacking
4.2 (1,460 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
61,450 students enrolled
Created by Nikhil Parekh
Last updated 9/2016
English [Auto-generated]
Current price: $10 Original price: $195 Discount: 95% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 9 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Install Kali Linux in a Windows 10 Environment
  • Understand Step By Step Instructions of Enabling Wireless Hacking in Kali Linux
  • Understand the Use of NMAP for Security Scanning and Network Exploring
View Curriculum
  • Fast and Reliable Internet Connection
  • Wireless Card

Thank you to the 41,387 students enrolled in this course! Shouldn't you find out why?

Course Updated 24 November 2016

What's New?

2 Hours on an Introduction to Perl and How To Use Perl for Writing Ethical Hacking Scripts.

You will also learn How To Create Malware and Use Python to Create Hacking Scripts and an Nmap scanner. Also you will learn Brute Force Cracking Passwords with Python


Nessus Port Scanner and Vulnerability Scanner

Footprinting and Enumeration module

Here are a few 5 star reviews:

"Finally a clear course on Kali!

OMG thank you so much, I finally have a working kali linux installation on my computer!

This course is simply amazingly clear! I`ve never used any other os apart from Windows and Kali always was a mistery to me let alone installing it on my virtual machine. BUT this course solved it, I just followed the instructions and less than 10 minutes later kali is installed and working! The whole course is presented super clear, great video quality and no steps missed!

Cannot recommend it enough!" - TWO 2

"Great Course

firstly i want to thank the lecturer for the great course. and i want to say that the course definitely worth the time." - Berzan Hasan

"Very Informative

Fantastic course, lots of content and covers almost everything i need to know as a beginner .Thanks #Nikhil Parekh." - Dr Raihan Kabir

Also, here's a 1 star review:

"Waste of my money

Did not learn anything usefull"

and a 2 star review by William C. Husk Jr who has failed to leave any actual review for me to look at so that I can improve this course.

When you take this course, you are covered by a 30 day full money back guarantee. So there is no waste of money ever if you ask for a refund if this product is not suitable to you. Please look at the number of 5 star reviews before you make a decision on taking my course.

You are about to be introduced to one of the most powerful penetration testing platforms in the world. Kali Linux

Kali Linux is one of the most versatile penetration testing platforms favored by ethical hackers.

This course will introduce you to Kali Linux and explain step by step how to install Kali Linux in a virtual environment on a Windows 10 machine.

You will learn how to install Kali Linux, set up the root username and password, install VirtualBox guest additions, Linux kernels and much more!

All videos are recorded in HD quality and you will be able to follow along as the lessons are spoken in clear English.

You will also be introduced to Nmap and how to use it for security scanning, port scanning and network exploration.

The videos will also guide you on how to install a wireless card within the virtual environment so you can scan wireless networks and devices and take advantage of many of the wireless security tools available in the Kali Linux environment.

You will also learn how hackers use Malware to infect a victim's computer. In addition, you will also be introduced to Python and how to use it for ethical hacking purposes.

Take this course today and start your Ethical Hacking journey now!

Who is the target audience?
  • Anyone Wanting To Learn How To Set Up a Proper Ethical Hacking Environment
  • Anyone Wanting To Learn The Basics of Ethical Hacking
Students Who Viewed This Course Also Viewed
Curriculum For This Course
73 Lectures
Introduction and Welcome
1 Lecture 08:14
Kali Linux Installation
9 Lectures 44:55
Downloading Kali Linux

Installing Kali Linux Part 1

Installing Kali Linux Part 2

Final Installation Steps Before Startup

First Look at Kali Linux

Wireless Card Installation Part 1

Linux Kernel Installation

Wireless Card Installation Part 2
NMAP Essentials
9 Lectures 41:28

NMAP Anonymous Mode First

TraceRoute Without ProxyChains


Nmap TCP Port Scanning

Port Scanning on Test Machine

TCP Port Scanning - Further Results

FIN and XMAS Scans

Nmap OS Detection
Introduction To Footprinting
4 Lectures 20:03

Further Footprinting

Fun with

More of The Harvester
Installing and Working with Nessus
1 Lecture 04:08
Introduction to Nessus and Nessus Installation
Web SQL Injection
2 Lectures 13:55
Introduction to Web SQL Injection

Impacts of Web SQL Injection
Build Malware in Code Compiler
10 Lectures 01:08:30

Installing C / C++ Compiler

Downloading Additional Applications

Creating a Malware Program with Codeblocks

Running Apache Server and Uploading Malware to Server

Using Reverse Shell on Victim's PC

Viewing Access Logs and Introduction to the Metasploit Framerwork

What to Do When Victim is on a Different Network

Using Metasploit to Create an Exploit

Viewing KeyScan Results
Using Python to Create Hacking Scripts
15 Lectures 02:10:38
Python Introduction and Installation on Windows

Introduction to PyCharm - Create Your First Program

Importing the Nmap Module

Introduction to Indentation

Quick Recap

Basic Commands in Python

Conditional Statements

Lists, Arrays and Dictionaries

String Manipulation and File Handling

Building an Nmap Network Scanner - Part 1

Building an Nmap Network Scanner - Part 2

Creating a Brute Force Password Cracker in Python

Brute Force Cracking Results
How Hackers Create Undetectable Malware and Viruses
15 Lectures 01:34:22
Introduction to Undetectable Malware

Installing Python and Pip

Installing Veil-Framework

Setting Up The Veil Framework

Installing Gnome Desktop

Wine Mono and Veil-Evasion Installation

Installing Metasploit

Metasploit Installation Complete

Testing MSF Console

Veil Evasion Final Installation

Adding the Metasploit Folder to Veil Installation

Introduction to Veil and The Importance in Ethical Hacking

Creating an Exploit

Testing Exploit on a Windows 10 Machine

Encrypting the Payload
Introduction To Perl and Foundations for Ethical Hacking
7 Lectures 01:44:36
Introduction to Perl

Basic Perl Programming

Introduction to Perl Functions

Working With Arrays

More Fun With Arrays

Conditions in Perl

Switch Statements and More Examples of If Statements
About the Instructor
Nikhil Parekh
3.9 Average rating
3,192 Reviews
126,450 Students
46 Courses
Teaching 124,751 Students in 46 Courses, Celebrity Advisor

Teaching 46 courses with 124,751 students from 187 countries including United States, United Kingdom, Australia, Morocco, Canada, Poland, India, Egypt, Malaysia and Indonesia

I assist many of my clients, ranging from small/medium businesses to INC 500 corporations to multimillion dollar businesses (and even billion dollar businesses), by guiding them to achieve tremendous growth in revenue and profits utilizing my social media user engagement strategies, mobile applications and proprietary tools.

I am also a sought after best selling author and speaker and have been featured on stages all around the world, responsible for teaching thousands of successful entrepreneurs worldwide

Clients refer to me as a profit strategist - I am an expert at helping my clients with referral marketing using my proprietary Fast Referral System.

In addition, I advise a number of high profile celebrities who have been featured on Miss USA, The Apprentice, Miss Universe, BET, WWE, CNN, ESPN, USA Today, Wall Street Journal, NBC, CBS, Fox, ABC, Entrepreneur Magazine and numerous other television shows and radio stations around the world

Specializing in:- Pay Per Click Marketing (including Analytics)- Digital Startups- Social Media Asset Development and Deployment- Social CRM Technology- Strategic Social Media Marketing Campaign Development- Mobile Application Development- Online Reputation Management- Social Community Development, Management and Engagement- Social Brand Management- Social Media Strategy and Planning- Online Community Management and Engagement including in depth social conversation monitoring- Facebook, Twitter and LinkedIn Application Development