The Ethical Hacking Starter Kit: 12 Techniques
3.8 (161 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,621 students enrolled
Wishlisted Wishlist

Please confirm that you want to add The Ethical Hacking Starter Kit: 12 Techniques to your Wishlist.

Add to Wishlist

The Ethical Hacking Starter Kit: 12 Techniques

This course is focused on practice and will help you learn the basic techniques of Ethical Hacking & Penetration Testing
3.8 (161 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,621 students enrolled
Last updated 2/2017
English [Auto-generated]
Current price: $12 Original price: $195 Discount: 94% off
3 days left at this price!
30-Day Money-Back Guarantee
  • 5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion

Training 5 or more people?

Get your team access to Udemy's top 2,000 courses anytime, anywhere.

Try Udemy for Business
What Will I Learn?
  • Operate the Kali Linux & Windows OS for Ethical Hacking purposes
  • Work in a virtualised environment
  • Set up and use a VPN
  • Collect personal info using footprinting
  • Scan websites for vulnerabilities
  • Understand how DDoS attacks work
  • Sniff & Spoof
  • Understand how Wireless Hacking works
  • Use TOR and surf on the Dark Web
  • And many more tips & tricks..
View Curriculum
  • You need a computer
  • You need an internet connection
  • You need a web browser



Please note that we keep adding new lectures to this course on a regular basis! We want to make it the best Udemy course on Ethical Hacking and help you feel what's like to be a real Ethical Hacker & Pen Tester.


This course will help you master Hacking Tricks, as well as the theoretical and practical basis for Ethical Hacking & Penetration Testing.

You will get lifetime access to the course's content!

This course comes with a 30 day money back guarantee! If you are not satisfied in any way, you’ll get your money back!

I’ll personally be answering any questions you have and I’ll be happy to provide links, resources and any help I can to help you master Ethical Hacking & Penetration Testing. 

What are you waiting for?! Click "Take This Course" and let's get started!

Who is the target audience?
  • You want to become a professional Ethical Hacker
  • You want to learn practical Hacking Tricks
  • You want to learn more about Computer Security and how Hackers hack into systems
  • You want to learn more about Networking
Compare to Other Ethical Hacking Courses
Curriculum For This Course
60 Lectures
3 Lectures 07:39

Introduction about this course & the instructor. 

Preview 03:18

Introduction to what kind of different lever are there in cyber security.

Preview 02:56

What is the future scope of cyber security.

Preview 01:25
Introduction to Linux.
4 Lectures 06:28

Introduction to Linux.

What is Linux?

Introduction to different type of Linux distributions available.

What are the different types of Linux distributions?

Introduction to Linux & hacking.

What you should know on Linux & Hacking

Information on Kali & WIFIslax.

Introduction to Security OS such as Kali & Wifislax
Lab Requirements
1 Lecture 02:33

Detailed information on tools/apps required for this course.

Preview 02:33
2 Lectures 02:39

What is Virtualization & why do we need it.

Introduction to Virtualization

List of tools available for Virtualization.

Different tools available for Virtualization
Setting up Lab
14 Lectures 01:35:28

Installing Vmware on Windows 10, this steps can also be followed on Windows 7, 8 & 8.1

Installing Vmware on Windows 10

Installing proper network adapters after installation.

Configuring Vmware

Installing Windows 10 as a virtual machine on Vmware, the process for Windows on physical machine is the same.

Installing windows 10 as a VM

Configuring windows 10 to make it work with Vmware without issues.

Configuring Windows 10

Downloading & installing Vmware on Ubuntu.

Installing Vmware on Ubuntu

Installing Ubuntu as a virtual machine on Vmware, the process for Ubuntu on physical machine is the same.

Installing Ubuntu as a VM

Adding Vmware tools so it can work as a normal OS.

Configuring Ubuntu

Downloading & installing Kali through graphical user interface.

Installing Kali GUI as a VM

Installing Vmware tools in Kali NM.

Configuring Kali

In this video you will learn basic of command line interface and some basic universal Linux commands.

Getting started with basic commands.

In this tutorial I will demonstrate how you can download & install Virtualbox on your Windows host.

Installing Virtualbox on Windows

In this video I will demonstrate you how you can download & install Virtualbox on your Linux host.

Installing Virtualbox on Linux

In this video I will demonstrate you how you can configure Virtualbox after installing it on Windows/Linux.

Configuring Virtualbox on Windows/Linux

In this video I will demonstrate you how you can install guest additions on your virtual machine.

Installing guest additions in virtual machine
4 Lectures 13:55

Introduction to VPN.

What is a VPN?

Installing PPTP and how does it work.

How to configure PPTP?

Configuring Socks5 on Firefox and how does it function.

How to configure Socks5?

Downloading & installing OpenVPN, & how to use it. 

How to configure OpenVPN?
Footprinting(Gathering Information)
5 Lectures 15:13

Theory about footprinting

What is Footprinting?

Demonstration of to check website information & personal information.

How to collect WHOIS & personal information?

Gathering precise location using IP address.

How to collect location & website information?

Demonstration of how to extract internal link & ping an IP address.

Ping & internal link extractor

Harvesting Email addresses of our victim using The Harvester in Kali.

How to harvest emails?
Social Engineering
4 Lectures 14:24

Theory about social engineering.

What is Social Engineering?

Demonstrating Setoolkit to make a phishing attack on our victim.


Demonstration on how to send and receive a fake E-mail.

Fake E-mail sender & receiver

Tracking E-mail originating details using E-mail headers.

E-mail tracker
7 Lectures 01:11:54

Theory about scanning.

What is Scanning?

Demonstration of Nmap in kali to scan our target.

What's an Nmap?

In depth explanation of Nmap with live example.

Nmap Continued.

Demonstration of Zenmap in Kali, the same UI is available for windows.

What's a Zenmap?

Downloading & installing OpenVas to scan for vulnerability on our target. 


Scanning the whole internet for 1 or a list of open ports.


Wordpress Scan(wpscan)
Denial of service (DoS &DDoS)
2 Lectures 06:47

Theory about DDOS.

What is DoS/DDoS?

Demonstrate LOIC on windows 10 to do a DOS attack.

Low Orbit Ion Cannon (LOIC)
4 More Sections
About the Instructor
Imran Mohammed
3.8 Average rating
161 Reviews
6,621 Students
1 Course
IT Consultant

I am a IT security enthusiast since a very young age. Always had a craze of how things work behind the monitor. 

Started my IT security journey at the age of 18, learned in & out of Networking, OS and cyber security. Started working as a IT consultant.

Earned my CEH certification in 2014 with 99.2% score.

Samy Mkacher
4.3 Average rating
1,315 Reviews
37,690 Students
10 Courses
Join my army of 35,000+ superlearners!

(Français plus bas)

Why more than 35,000 students chose me as their instructor?

♜ Enroll in one of my courses and you'll see! ♜ 

1. Each of my courses is organized in a clear and precise manner. I always make sure that you know the prerequisite to teach you a new concept. 

2. I have a background in both humanities and computer science. It gives me an holistic view of teaching and pedagogy. 

3. To me, anything can be learned if you put in enough effort and persistence.

What makes me an ideal instructor?

1. I graduated a Master of Research  in Logics & Epistemology from the Sorbonne, Paris.   2. I have a background in computer sciences and programming languages such as C, C++, Python and Java. 

3. Because I came to learn technical skills quite late in my life, I have a very pedagogical way of teaching things ! 

≫ What can I do for you? Enroll in one of my courses and you'll see! ≪

Pourquoi plus de 35 000 étudiants m'ont choisi comme instructeur ? 

♜ Suis l'un de mes cours et tu verras ! ♜ 

1. Chaque cours que j'instruis est organisé de manière claire et précise. Je m'assure toujours que tu aies les pré-requis pour aborder une notion.
2. J'ai un double background en sciences humaines et sciences informatiques. Cela me permet d'avoir une vision d'ensemble de la pédagogie.
3. À mes yeux, tout peut être appris avec assez de volonté et de persistance.

Qu'est-ce qui fait de moi ton instructeur idéal ?

1. J'ai suivi un cursus universitaire solide et j'ai un Master de recherche de la Sorbonne en Logique et Épistémologie.
2. J'ai un background en sciences informatiques et dans les langages de programmation C, C++, Python et Java.
3. Parce que j'ai appris des sujets techniques assez tard dans ma vie, j'ai une manière très pédagogique d'instruire mes étudiants. 

≫ Que puis-je faire pour toi ? Suis l'un de mes cours et tu verras !