The Definitive Ethical Hacking Course - Learn From Scratch

Learn the Basics Of Penetration Testing, Wifi Hacking and Ethical Hacking With Kali Linux
4.1 (1,098 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
41,828 students enrolled Bestselling in Kali Linux
$19
$195
90% off
Take This Course
  • Lectures 73
  • Length 9 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 12/2015 English

Course Description

Thank you to the 41,387 students enrolled in this course! Shouldn't you find out why?

Course Updated 24 November 2016

What's New?

2 Hours on an Introduction to Perl and How To Use Perl for Writing Ethical Hacking Scripts.

You will also learn How To Create Malware and Use Python to Create Hacking Scripts and an Nmap scanner. Also you will learn Brute Force Cracking Passwords with Python

Added:

Nessus Port Scanner and Vulnerability Scanner

Footprinting and Enumeration module

Here are a few 5 star reviews:

"Finally a clear course on Kali!

OMG thank you so much, I finally have a working kali linux installation on my computer!

This course is simply amazingly clear! I`ve never used any other os apart from Windows and Kali always was a mistery to me let alone installing it on my virtual machine. BUT this course solved it, I just followed the instructions and less than 10 minutes later kali is installed and working! The whole course is presented super clear, great video quality and no steps missed!

Cannot recommend it enough!" - TWO 2

"Great Course

firstly i want to thank the lecturer for the great course. and i want to say that the course definitely worth the time." - Berzan Hasan

"Very Informative

Fantastic course, lots of content and covers almost everything i need to know as a beginner .Thanks #Nikhil Parekh." - Dr Raihan Kabir

Also, here's a 1 star review:

"Waste of my money

Did not learn anything usefull"

and a 2 star review by William C. Husk Jr who has failed to leave any actual review for me to look at so that I can improve this course.

When you take this course, you are covered by a 30 day full money back guarantee. So there is no waste of money ever if you ask for a refund if this product is not suitable to you. Please look at the number of 5 star reviews before you make a decision on taking my course.

You are about to be introduced to one of the most powerful penetration testing platforms in the world. Kali Linux

Kali Linux is one of the most versatile penetration testing platforms favored by ethical hackers.

This course will introduce you to Kali Linux and explain step by step how to install Kali Linux in a virtual environment on a Windows 10 machine.

You will learn how to install Kali Linux, set up the root username and password, install VirtualBox guest additions, Linux kernels and much more!

All videos are recorded in HD quality and you will be able to follow along as the lessons are spoken in clear English.

You will also be introduced to Nmap and how to use it for security scanning, port scanning and network exploration.

The videos will also guide you on how to install a wireless card within the virtual environment so you can scan wireless networks and devices and take advantage of many of the wireless security tools available in the Kali Linux environment.

You will also learn how hackers use Malware to infect a victim's computer. In addition, you will also be introduced to Python and how to use it for ethical hacking purposes.

Take this course today and start your Ethical Hacking journey now!

What are the requirements?

  • Fast and Reliable Internet Connection
  • Wireless Card

What am I going to get from this course?

  • Install Kali Linux in a Windows 10 Environment
  • Understand Step By Step Instructions of Enabling Wireless Hacking in Kali Linux
  • Understand the Use of NMAP for Security Scanning and Network Exploring

What is the target audience?

  • Anyone Wanting To Learn How To Set Up a Proper Ethical Hacking Environment
  • Anyone Wanting To Learn The Basics of Ethical Hacking

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction and Welcome
Introduction
Preview
08:14
Section 2: Kali Linux Installation
Downloading Kali Linux
01:26
Installing Kali Linux Part 1
05:14
Installing Kali Linux Part 2
10:02
Final Installation Steps Before Startup
04:00
First Look at Kali Linux
06:47
Wireless Card Installation Part 1
05:07
Linux Kernel Installation
01:40
How To Install VIrtualBox Guest Additions For Wireless Card Setup on Kali Linux
Preview
04:58
Wireless Card Installation Part 2
05:41
Section 3: NMAP Essentials
NMAP Introduction and Demo
Preview
09:19
NMAP Anonymous Mode First
01:43
TraceRoute Without ProxyChains
00:55
Proxychains
09:34
Nmap TCP Port Scanning
02:06
Port Scanning on Test Machine
07:09
TCP Port Scanning - Further Results
00:52
FIN and XMAS Scans
04:37
Nmap OS Detection
05:13
Section 4: Introduction To Footprinting
Whois Footprinting
Preview
04:22
Further Footprinting
12:55
Fun with List-Urls.py
01:40
More of The Harvester
01:06
Section 5: Installing and Working with Nessus
Introduction to Nessus and Nessus Installation
04:08
Section 6: Web SQL Injection
Introduction to Web SQL Injection
11:11
Impacts of Web SQL Injection
02:44
Section 7: Build Malware in Code Compiler
Introduction to Malware and Trojans
Preview
05:06
Installing C / C++ Compiler
05:35
Downloading Additional Applications
05:50
Creating a Malware Program with Codeblocks
10:26
Running Apache Server and Uploading Malware to Server
11:20
Using Reverse Shell on Victim's PC
09:47
Viewing Access Logs and Introduction to the Metasploit Framerwork
09:34
What to Do When Victim is on a Different Network
03:46
Using Metasploit to Create an Exploit
04:13
Viewing KeyScan Results
02:53
Section 8: Using Python to Create Hacking Scripts
Python Introduction and Installation on Windows
06:41
Python Installation on Kali Linux
Preview
08:22
Introduction to PyCharm - Create Your First Program
06:48
Importing the Nmap Module
07:47
Introduction to Indentation
06:46
Quick Recap
01:18
Basic Commands in Python
13:53
Conditional Statements
10:56
Lists, Arrays and Dictionaries
09:46
String Manipulation and File Handling
10:37
Introduction to Functions
Preview
07:48
Building an Nmap Network Scanner - Part 1
09:06
Building an Nmap Network Scanner - Part 2
10:30
Creating a Brute Force Password Cracker in Python
15:15
Brute Force Cracking Results
05:05
Section 9: How Hackers Create Undetectable Malware and Viruses
Introduction to Undetectable Malware
12:04
Installing Python and Pip
05:01
Installing Veil-Framework
04:09
Setting Up The Veil Framework
09:05
Installing Gnome Desktop
06:31
Wine Mono and Veil-Evasion Installation
02:56
Installing Metasploit
09:38
Metasploit Installation Complete
00:35
Testing MSF Console
01:02
Veil Evasion Final Installation
06:44
Adding the Metasploit Folder to Veil Installation
00:40
Introduction to Veil and The Importance in Ethical Hacking
06:48
Creating an Exploit
12:24
Testing Exploit on a Windows 10 Machine
14:45
Encrypting the Payload
02:00
Section 10: Introduction To Perl and Foundations for Ethical Hacking
Introduction to Perl
08:11
Basic Perl Programming
10:48
Introduction to Perl Functions
16:48
Working With Arrays
15:56
More Fun With Arrays
17:19
Conditions in Perl
15:43
Switch Statements and More Examples of If Statements
19:51

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Nikhil Parekh, Teaching 70,060 Students in 46 Courses, Celebrity Advisor

Teaching 46 courses with 70,060 students from 175 countries including United States, United Kingdom, Australia, Morocco, Canada, Poland, India, Egypt, Malaysia and Indonesia

I assist many of my clients, ranging from small/medium businesses to INC 500 corporations to multimillion dollar businesses (and even billion dollar businesses), by guiding them to achieve tremendous growth in revenue and profits utilizing my social media user engagement strategies, mobile applications and proprietary tools.

I am also a sought after best selling author and speaker and have been featured on stages all around the world, responsible for teaching thousands of successful entrepreneurs worldwide

Clients refer to me as a profit strategist - I am an expert at helping my clients with referral marketing using my proprietary Fast Referral System.

In addition, I advise a number of high profile celebrities who have been featured on Miss USA, The Apprentice, Miss Universe, BET, WWE, CNN, ESPN, USA Today, Wall Street Journal, NBC, CBS, Fox, ABC, Entrepreneur Magazine and numerous other television shows and radio stations around the world

Specializing in:- Pay Per Click Marketing (including Analytics)- Digital Startups- Social Media Asset Development and Deployment- Social CRM Technology- Strategic Social Media Marketing Campaign Development- Mobile Application Development- Online Reputation Management- Social Community Development, Management and Engagement- Social Brand Management- Social Media Strategy and Planning- Online Community Management and Engagement including in depth social conversation monitoring- Facebook, Twitter and LinkedIn Application Development

Ready to start learning?
Take This Course