The Ultimate Ethical Hacking Course 2017-Real world example
4.2 (380 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
30,412 students enrolled
Wishlisted Wishlist

Please confirm that you want to add The Ultimate Ethical Hacking Course 2017-Real world example to your Wishlist.

Add to Wishlist

The Ultimate Ethical Hacking Course 2017-Real world example

Professional Level Ethical Hacking & Penetration testing from Beginner to Advanced - From Real World Experience!
4.2 (380 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
30,412 students enrolled
Created by Atul Tiwari
Last updated 6/2017
Curiosity Sale
Current price: $10 Original price: $195 Discount: 95% off
30-Day Money-Back Guarantee
  • 5 hours on-demand video
  • 3 Articles
  • 6 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Perform penetration testing computers, networks, wireless, web apps and secure computers and networks by exposing vulnerabilities and patching them.
  • Discover and exploit what a modern penetration tester does.
  • Penetrate and Exploit even highly secured environments
  • Effectively execute modern attack techniques
  • Use commercial / open-source penetration testing tools to efficiently assess traditional and non-traditional networks
  • Do not need to code, Hack from real world tools, scripts on your own.
  • Develop strategies for communicating risk that impacts an organization's security posture
View Curriculum
  • Basic computing knowledge with internet and networking.
  • keen interests to equipe themselves with latest hacking tools and tricks.

If you are wanting to learn Ethical Hacking and Penetration Testing to a Professional Standard, and work online to help companies secure their data, you will love this Udemy Course!

In this highly practical course, you will learn from a Certified Professional Hacker & Penetration tester. You will get practical details about what a modern pen-tester must have in order to be a professional level Penetration Tester.

This course covers, Computer Attacks, Networks Attacks, Web Applications Penetration Testing and Security, Exploits, VAPT, Automated Attacks, Firewall & AV Evasion, Veil-Evasion, DARKNET, Wireless attacks, Social-Engineering attacks, Best Commercial Tools and my tips at professional level from real world examples of  penetration testing. 

This course has been designed so students from non-technical background can learn with ease and use these skills to be a good Penetration Tester.

The course has been developed by myself after several research and development projects. This 100% practical course is for anyone wanting to be a competent Information Security Professional and Penetration Tester.

All the modules are independent, so you can start any module you want, but I recommend to learn the course in chronological order.

If for what ever reason, this course does not meet with your expectations, you will have Udemy's 30 days 'no questions asked' money back guarantee!

** Don't Delay, every second could be costing you money, and professional skills! ***

Who is the target audience?
  • People willing to acquire deep understanding of thoroughly Professional Penetration testing.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
53 Lectures
Introduction to penetration testing and ethical hacking
1 Lecture 04:02
Building your penetration testing Box (LAB)
4 Lectures 11:26
Setting-up OWASPbwa VM

Setting-up KALI LINUX vm

Setting-up metasploitable

Setting-up Windows VM
Penetration Testing methodologies
1 Lecture 02:25
Penetration Testing methodologies
Passive Discovery - Open Source Intelligence gathering
4 Lectures 38:03
Open source intelligence gathering - Basics

Open source intelligence gathering - Recon-ng

Open source intelligence gathering - DiscoverScript

Open-source intelligence gathering - Spiderfoot
Active Discovery - Reconnaissance
3 Lectures 21:20
Active Reconnaissance with Sparta

Scanning Entire network in 6 minutes

Taking massive snapshot of web
Vulnerability Assessments
7 Lectures 54:56
Vulnerability Assessment - Nessus

Vulnerability Assessment - OpenVAS

Vulnerability Assessment - Nikto

Quick findings of web apps vulnerabilities

ZAP scan analysis

Web application scanning - AppSpider_pro
Vulnerability to Exploitation - Exploiting the targets
5 Lectures 43:31
Metasploit Commanding

Metasploit - Exploiting MS08-067

Metasploit - Exploiting web apps

Binary Exploitation - Buffer overflow attack

Browser Exploitation with BeEF
Web application Penetration testing - Exploitation
4 Lectures 28:07
Exploiting SQL Injection

Cross Site Scripting attacks - XSS

Cross Site Request Forgery attack - CSRF

Fuzzing Input fields
Wireless Network Hacking
1 Lecture 06:48
WPA/WPA2 Cracking ( wireless security testing )
Post Exploitation attacks - Lateral Moving in Networks
5 Lectures 19:14
First post Responder

Adding user account to target machine

Creating persistent backdoor on target machine

Dumping cached credentials ( last 10 passwords )
6 More Sections
About the Instructor
Atul Tiwari
4.2 Average rating
379 Reviews
30,634 Students
2 Courses
Ethical hacker | Security Evangelist | Penetration Tester

Security Analyst | IT AUDITOR | Cyber laws expert | Author | Public speaker | CISSP

Having more than 10 years of working experience in information security field.

Have trained more than 35000 students on the topic of Information security & penetration testing in classroom mode and online across 162 countries. with expertise in web application penetration testing, i have performed several penetration tests and security audits, security analysis with private, governments and security agencies to help assist with to cope with cyber threats.