The Ethical Hacking Starter Kit: 12 Techniques
3.5 (159 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,498 students enrolled
Wishlisted Wishlist

Please confirm that you want to add The Ethical Hacking Starter Kit: 12 Techniques to your Wishlist.

Add to Wishlist

The Ethical Hacking Starter Kit: 12 Techniques

This course is focused on practice and will help you learn the basic techniques of Ethical Hacking & Penetration Testing
3.5 (159 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,498 students enrolled
Last updated 2/2017
English
Current price: $10 Original price: $195 Discount: 95% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Operate the Kali Linux & Windows OS for Ethical Hacking purposes
  • Work in a virtualised environment
  • Set up and use a VPN
  • Collect personal info using footprinting
  • Scan websites for vulnerabilities
  • Understand how DDoS attacks work
  • Sniff & Spoof
  • Understand how Wireless Hacking works
  • Use TOR and surf on the Dark Web
  • And many more tips & tricks..
View Curriculum
Requirements
  • You need a computer
  • You need an internet connection
  • You need a web browser
Description

*******************

SPECIAL NOTE: WE KEEP ADDING NEW LECTURES

Please note that we keep adding new lectures to this course on a regular basis! We want to make it the best Udemy course on Ethical Hacking and help you feel what's like to be a real Ethical Hacker & Pen Tester.

*******************

This course will help you master Hacking Tricks, as well as the theoretical and practical basis for Ethical Hacking & Penetration Testing.

You will get lifetime access to the course's content!

This course comes with a 30 day money back guarantee! If you are not satisfied in any way, you’ll get your money back!

I’ll personally be answering any questions you have and I’ll be happy to provide links, resources and any help I can to help you master Ethical Hacking & Penetration Testing. 

What are you waiting for?! Click "Take This Course" and let's get started!

Who is the target audience?
  • You want to become a professional Ethical Hacker
  • You want to learn practical Hacking Tricks
  • You want to learn more about Computer Security and how Hackers hack into systems
  • You want to learn more about Networking
Students Who Viewed This Course Also Viewed
Curriculum For This Course
60 Lectures
05:02:38
+
Introduction
3 Lectures 07:39

Introduction about this course & the instructor. 

Preview 03:18

Introduction to what kind of different lever are there in cyber security.

Preview 02:56

What is the future scope of cyber security.

Preview 01:25
+
Introduction to Linux.
4 Lectures 06:28

Introduction to Linux.

What is Linux?
01:30

Introduction to different type of Linux distributions available.

What are the different types of Linux distributions?
01:45

Introduction to Linux & hacking.

What you should know on Linux & Hacking
01:22

Information on Kali & WIFIslax.

Introduction to Security OS such as Kali & Wifislax
01:51
+
Lab Requirements
1 Lecture 02:33

Detailed information on tools/apps required for this course.

Preview 02:33
+
Virtualization.
2 Lectures 02:39

What is Virtualization & why do we need it.

Introduction to Virtualization
01:24

List of tools available for Virtualization.

Different tools available for Virtualization
01:15
+
Setting up Lab
14 Lectures 01:35:28

Installing Vmware on Windows 10, this steps can also be followed on Windows 7, 8 & 8.1

Installing Vmware on Windows 10
04:31

Installing proper network adapters after installation.

Configuring Vmware
02:11

Installing Windows 10 as a virtual machine on Vmware, the process for Windows on physical machine is the same.

Installing windows 10 as a VM
07:36

Configuring windows 10 to make it work with Vmware without issues.

Configuring Windows 10
05:37

Downloading & installing Vmware on Ubuntu.

Installing Vmware on Ubuntu
04:39

Installing Ubuntu as a virtual machine on Vmware, the process for Ubuntu on physical machine is the same.

Installing Ubuntu as a VM
05:58

Adding Vmware tools so it can work as a normal OS.

Configuring Ubuntu
06:49

Downloading & installing Kali through graphical user interface.

Installing Kali GUI as a VM
08:18

Installing Vmware tools in Kali NM.

Configuring Kali
08:22

In this video you will learn basic of command line interface and some basic universal Linux commands.

Getting started with basic commands.
21:10

In this tutorial I will demonstrate how you can download & install Virtualbox on your Windows host.

Installing Virtualbox on Windows
03:02

In this video I will demonstrate you how you can download & install Virtualbox on your Linux host.

Installing Virtualbox on Linux
03:36

In this video I will demonstrate you how you can configure Virtualbox after installing it on Windows/Linux.

Configuring Virtualbox on Windows/Linux
10:48

In this video I will demonstrate you how you can install guest additions on your virtual machine.

Installing guest additions in virtual machine
02:51
+
VPN
4 Lectures 13:55

Introduction to VPN.

What is a VPN?
01:30

Installing PPTP and how does it work.

How to configure PPTP?
04:11

Configuring Socks5 on Firefox and how does it function.

How to configure Socks5?
03:39

Downloading & installing OpenVPN, & how to use it. 

How to configure OpenVPN?
04:35
+
Footprinting(Gathering Information)
5 Lectures 15:13

Theory about footprinting

What is Footprinting?
01:29

Demonstration of who.is to check website information & personal information.

How to collect WHOIS & personal information?
02:37

Gathering precise location using IP address.

How to collect location & website information?
05:42

Demonstration of how to extract internal link & ping an IP address.

Ping & internal link extractor
03:36

Harvesting Email addresses of our victim using The Harvester in Kali.

How to harvest emails?
01:49
+
Social Engineering
4 Lectures 14:24

Theory about social engineering.

What is Social Engineering?
01:19

Demonstrating Setoolkit to make a phishing attack on our victim.

Setoolkit
06:33

Demonstration on how to send and receive a fake E-mail.

Fake E-mail sender & receiver
02:19

Tracking E-mail originating details using E-mail headers.

E-mail tracker
04:13
+
Scanning
7 Lectures 01:11:54

Theory about scanning.

What is Scanning?
00:58

Demonstration of Nmap in kali to scan our target.

What's an Nmap?
07:56

In depth explanation of Nmap with live example.

Nmap Continued.
21:49

Demonstration of Zenmap in Kali, the same UI is available for windows.

What's a Zenmap?
02:58

Downloading & installing OpenVas to scan for vulnerability on our target. 

OpenVas
09:14

Scanning the whole internet for 1 or a list of open ports.

Masscan
03:48

Wordpress Scan(wpscan)
25:11
+
Denial of service (DoS &DDoS)
2 Lectures 06:47

Theory about DDOS.

What is DoS/DDoS?
01:57

Demonstrate LOIC on windows 10 to do a DOS attack.

Low Orbit Ion Cannon (LOIC)
04:50
4 More Sections
About the Instructor
Imran Mohammed
3.5 Average rating
158 Reviews
6,498 Students
1 Course
IT Consultant

I am a IT security enthusiast since a very young age. Always had a craze of how things work behind the monitor. 

Started my IT security journey at the age of 18, learned in & out of Networking, OS and cyber security. Started working as a IT consultant.

Earned my CEH certification in 2014 with 99.2% score.

Samy Mkacher
4.2 Average rating
1,191 Reviews
35,859 Students
11 Courses
Join my army of 35,000+ superlearners!

(Français plus bas)

Why more than 35,000 students chose me as their instructor?

♜ Enroll in one of my courses and you'll see! ♜ 

1. Each of my courses is organized in a clear and precise manner. I always make sure that you know the prerequisite to teach you a new concept. 

2. I have a background in both humanities and computer science. It gives me an holistic view of teaching and pedagogy. 

3. To me, anything can be learned if you put in enough effort and persistence.

What makes me an ideal instructor?

1. I graduated a Master of Research  in Logics & Epistemology from the Sorbonne, Paris.   2. I have a background in computer sciences and programming languages such as C, C++, Python and Java. 

3. Because I came to learn technical skills quite late in my life, I have a very pedagogical way of teaching things ! 

≫ What can I do for you? Enroll in one of my courses and you'll see! ≪


Pourquoi plus de 35 000 étudiants m'ont choisi comme instructeur ? 

♜ Suis l'un de mes cours et tu verras ! ♜ 

1. Chaque cours que j'instruis est organisé de manière claire et précise. Je m'assure toujours que tu aies les pré-requis pour aborder une notion.
2. J'ai un double background en sciences humaines et sciences informatiques. Cela me permet d'avoir une vision d'ensemble de la pédagogie.
3. À mes yeux, tout peut être appris avec assez de volonté et de persistance.

Qu'est-ce qui fait de moi ton instructeur idéal ?

1. J'ai suivi un cursus universitaire solide et j'ai un Master de recherche de la Sorbonne en Logique et Épistémologie.
2. J'ai un background en sciences informatiques et dans les langages de programmation C, C++, Python et Java.
3. Parce que j'ai appris des sujets techniques assez tard dans ma vie, j'ai une manière très pédagogique d'instruire mes étudiants. 

≫ Que puis-je faire pour toi ? Suis l'un de mes cours et tu verras !