Learn The Basics of Ethical Hacking and Penetration Testing

You don’t have to be perfect to be a hacker. Or the smartest person in the room. Or a type-A personality.
  • Lectures 55
  • Video 18 Hours
  • Skill level all level
  • Languages English , captions
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

Course Description

Become a Master Computer Security Expert by Learning How to Use Ethical Hacking to Reveal Potential Vulnerabilities in Information Systems.

This course is a great place to start your journey towards becoming a computer security expert. Gain the valuable skills you need to identify important weaknesses and provide effective computer security techniques that are important for any sized system.

In this course, students interested in learning ethical hacking techniques and penetration testing and who have basic IT skills, knowledge of Linux and Windows, and a basic knowledge of networking, can learn to find vulnerabilities and exploit systems as an ethical hacker.

Get started with this course today to be on your way towards finding real-world computer security solutions.

  • Gather Information Intelligence
  • Find Security Vulnerabilities
  • Develop Exploits
  • Scan and Produce Vulnerability Assessments
  • Learn Network Attacking Techniques

Ethical Hacking for Computer Security
Ethical hackers are computer security experts who focus on penetration testing and weaknesses in an organization’s information systems.

Using the same destructive techniques of intruders, ethical hackers are able to produce security evaluations with information about vulnerabilities and recommend potential solutions.

Contents and Overview
With 55 lectures and over 17 hours of content this course is perfect for beginning to understand ethical hacking and penetration testing from scratch.

Students will be shown how to gather information intelligence, find web application and system security vulnerabilities, how to scan using Nmap and bypass IDS protected targets, how to hack clients using modern web browsers and how to collect important information once a system has been hacked into.

This course is ideal for web developers, IT security professionals, network engineers, Windows and Linux administrators, security engineers, database administrators and webmasters as well as anyone interested in learning basic ethical hacking techniques.

Upon completion, students will be able to apply ethical hacking practices to identify potential weaknesses, and understand the moves hackers would make to attempt to exploit a system. Students will also have the knowledge to recommend security measures that will make systems more impenetrable to hackers.

What are the requirements?

  • Basic IT skills
  • Basic knowledge of Linux and Windows
  • Basic knowledge of networking

What am I going to get from this course?

  • Over 55 lectures and 17 hours of content!
  • You will be able to gather information about your target
  • You will learn how to find open ports your target
  • You will learn how to find vulnerabilities in your target infrastructure
  • You will learn how to exploit Windows and Linux Systems
  • You will learn windows and linux Tactical Post Exploitation Techniques
  • You will learn how to find and exploit Web Application Vulnerabilities
  • You will learn how to Develop Windows Exploits

What is the target audience?

  • You
  • Anyone want to learn how to hack
  • Web developers
  • IT security professionals
  • Network engineers
  • Windows and Linux Administrators
  • Security engineers
  • Database administrators
  • Webmasters

What you get with this course?

Not for you? No problem.
30 day money back guarantee

Forever yours.
Lifetime access

Learn on the go.
Desktop, iOS and Android

Get rewarded.
Certificate of completion


Section 1: Solid Introduction to Ethical Hacking and Penetration Testing
About the course
Hacking vs Ethical Hacking
Who is a Hacker ?
Types of Hackers
Computer Crimes
Important Terms 1
Important Terms 2
Why Penetration Testing ?
Penetration Testing Types
Section 2: Real World Information Intelligence Techniques
Introduction to Information Intelligence Techniques
organizing information during a penetration test
how to locally copying company websites
newsgroups and list-servers
online job listing
the power of social media websites
harvesting a company emails
how to generate a targeted wordlist for password cracking
information intelligence with Maltego
Google Search Techniques for penetration testers
other search engines for penetration testers
Enumerating Internal Network From Outside
gather information using WhatWeb, HttpRecon and SSL SCAN
Whois Lookups, finding other Web Sites Hosted on a Web Server
IP Address Geolocation
finding subdomains, extracting exif data and finding hidden web dirs
ShodanHQ for fun and profit
Web Application Firewall Detection, HTTP and DNS load balancer detection
DNS Enumerating for penetration testers
Mail Server Enumeration for penetration testers

References and Sources:

  • http://www.debianhelp.co.uk/dnsrecords.htm
  • http://en.wikipedia.org/wiki/Domain_Name_System

  • Google Basic Guide to DNS: http://www.google.com/support/a/bin/answer.py?answer=48090#G
  • Zone Transfer Explanation: http://en.wikipedia.org/wiki/DNS_zone_transfer
  • SPF Explanation: http://en.wikipedia.org/wiki/Sender_Policy_Framework
  • DNS Record Type: http://en.wikipedia.org/wiki/List_of_DNS_record_types
  • Using nslookup, dig and host: http://docsrv.sco.com/NET_tcpip/dnsC.nslook.html
  • Using nslookup in Windows: http://support.microsoft.com/kb/200525
Section 3: Scanning and vulnerability Assessment
packet Crafting and Manipulating with Scapy
port scanning with scapy

References and Sources:

  • SuperScan: http://www.mcafee.com/us/downloads/free- tools/superscan3.aspx
  • Angry IP Scanner: http://www.angryip.org/w/Home
  • Scanrand: http://it.toolbox.com/wiki/index.php/Scanrand
  • Xprobe2: http://sourceforge.net/news/?group_id=30984

References and Sources:

  • Online Port Scanners

  • http://www.t1shopper.com/tools/port-scan/
  • http://nmap-online.com
  • http://www.hashemian.com/tools/port-scanner.php
  • Nmap: http://nmap.org/
  • Scanning Types: http://nmap.org/book/man-port-scanning- techniques.html
  • Scanning Performance: http://nmap.org/book/man- performance.html
  • Version Scanning: http://nmap.org/book/vscan-technique.html
  • OS Fingerprinting: http://nmap.org/book/osdetect.html#osdetect-intro

References and Sources:

  • NSE Script Repository: http://nmap.org/nsedoc/index.html
  • NSE Guide: http://nmap.org/book/nse.html
  • NSE Usage: http://nmap.org/book/nse-usage.html#nse-categories

  • Nexpose: http://www.rapid7.com/products/vulnerability-management.jsp

    Nessus: http://www.tenable.com/products/nessus

    Ncircle: http://www.ncircle.com/index.php?s=products_ip360


References and Sources:

  • Nmap Evasion Guide: http://nmap.org/book/man-bypass- firewalls-ids.html
  • Loose Source Routing Discussion: http://www.synacklabs.net/OOB/LSR.html
  • LSRTunnel: http://www.synacklabs.net/projects/lsrtunnel/
  • LSRScan: http://www.synacklabs.net/projects/lsrscan/
Section 4: Network Attacking Techniques

References and Sources:

  • Man in the Middle:
  • https://www.owasp.org/index.php/Man-in-the-middle_attack• http://it.toolbox.com/wiki/index.php/Man-in-the-Middle_Attack
  • http://www.schneier.com/blog/archives/2008/07/maninthemiddle_1.html

  • ARP Poisoning Attack:
  • http://www.watchguard.com/infocenter/editorial/135324.asp • http://www.osischool.com/protocol/arp/arp-spoofing•
  • http://news.hitb.org/content/guide-arp-spoofing
  • Tools:

Cain & Abel:

http://www.oxid.it/cain.htmlDsniff: http://www.monkey.org/~dugsong/dsniff/






Section 5: Windows and Linux Attacking Techniques

Refrences and Sources:

Inside Windows UAC: http://technet.microsoft.com/en- us/magazine/2007.06.uac.aspx

Windows Wikipedia Entry: http://en.wikipedia.org/wiki/Microsoft_Windows

Windows NT Wikipedia Entry: http://en.wikipedia.org/wiki/Windows_NT

Windows 2000 Wikipedia Entry: http://en.wikipedia.org/wiki/Windows_2000

Linux Security Overview for Penetration Testers
Attacking and Hacking Windows
Attacking and Hacking Linux
Section 6: Windows and Linux Post-Exploitation Techniques

References and Sources:

http://commandwindows.com http://www.computerhope.com/batch.htm http://www.robvanderwoude.com/

http://www.microsoft.com/resources/documentation/windo ws/xp/all/proddocs/en-us/batch.mspx?mfr=true

http://www.room362.com/blog/2011/9/6/post-exploitation- command-lists.html

Linux post exploitation techniques
Data mining techniques
Section 7: Web Exploitation Techniques

References and Sources:

  • http://www.w3schools.com/
  • https://www.owasp.org/index.php/Category: OWASP_Top_Ten_Project
Web Application Scanning and Mapping
Exploiting SQL Injection to Full System Access (MYSQL)
Exploiting SQL Injection to Full System Access (MSSQL)
Exploiting Blind SQL Injection to Full System Access (MYSQL)
Exploiting Blind SQL Injection to Full System Access (MSSQL)
Exploiting RFI, Local File include, File Uploads and RCE
Exploiting XSS ( Reflected and Stored ) and CSRF to Full System Access
Section 8: Windows Exploit Development

Special Thanks to Dino Dai Zovi and Saumil Shah

References and Sources:

  • http://www.slideshare.net/saumilshah/operat ing-systems-a-primer
  • http://www.slideshare.net/saumilshah/how- functions-work-7776073
  • http://www.slideshare.net/saumilshah/introd uction-to-debuggers
  • http://cryptocity.squarespace.com/files/exploi tation/2011/memory_corruption_101.pdf
Section 9: The end but it is not the end :)
The end

Instructor Biography

Mohamed Ramadan , Hacker, Trainer and TV Guest. Thanked by Facebook and Google

Mohamed Ramadan is a Security Ninja with over 7 Years experience in Ethical Hacking, Penetration Testing, Malware Reverse Engineering, Forensics, Securing Websites and Servers.

He is a featured guest in many popular TV Shows and in many popular news websites.

He Found and Reported Many Security Vulnerabilities in Google, Facebook, Twitter, Microsoft, Nokia, Adobe, Apple, AT&T, RedHat, SoundCloud, GitHub, Etsy, Nokia Siemens, Zynga and Constant Contact.

Honors & Awards:

Listed in Facebook WhiteHats ( 2014 )

Listed in Facebook WhiteHats ( 2013 )

Listed in Facebook WhiteHats ( 2012 )

Listed in Twitter Top Hackers

Listed in Microsoft WhiteHats

Listed in Google Wall of Fame ( Reward Recipients )

Listed in Google Hall of Fame ( Honorable Mention )

Listed in Adobe Security Acknowledgments

Listed in Apple Responsible Disclosure

Listed in Etsy Responsible Disclosure

Listed in RedHat Vulnerability Acknowledgements

Listed in Nokia Siemens Networks Hall of fame as a Prime Reporter!

Listed in AT&T Hall of Fame

Listed in GitHub White Hat

Listed in Zynga WHITEHATS

Listed in SoundCloud Responsible Disclosure

Listed in Constant Contact Responsible Disclosure

Listed in Soldierx Hacker Database

Join the biggest student community


Hours of video content


Course Enrollments




Average Rating
  1. 5 Stars
  2. 4 Stars
  3. 3 Stars
  4. 2 Stars
  5. 1 Stars
    • Luca Spinelli

    Not bad course

    Good course but i've to informe u that i've followed it using a 100% discount coupon.

    • Paul Simmons

    Instructor Un-Comprehensible

    The instructor taking this course is almost impossible to understand. He has a very heavy indian accent. I also get the filling that there was not prep work done before he stated recording. Many works are repeated multiple times within a sentence and for the most part the first 11% (as far as I managed to get) of the course is just copied and pasted from Wikipedia. I got this course as part of a bundle of 7 course for which I paid around $40 for and after taking this course I fill that was extensive, so I feel incredibly sorry for people who have paid the hundreds of dollars this course normally sells for.

    • Deepansh Jagga



    • Carlos Azuax

    Worst teacher

    He doesn't explain anything...very bad english too.

    • Rye Robinson

    I Wish I could Understand Him

    I gave this two stars because I believe there is a lot of content to be learned and that it would be a REALLY great tool except for the one drawback. I can't really understand what this guy is saying. I'm not referring to the content either... His English is very slow and broken. I'm not trying to push any buttons because I'm sure that English is not his first language, but it is very hard for me to following along with. It was a little bit misleading because the "About the Course" video that we are shown on the home page before you buy the course seems to be much clearer than his actual videos.

Show more reviews
Ready to start learning?
Preview this course