The Complete Ethical Hacking Course

BY
Udemy

Deepen your understanding of ethical hacking and learn to develop security and coding tools with Python.

Lavel

Beginner

Mode

Online

Fees

₹ 499 3499

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course overview

The Complete Ethical Hacking Course is a short certification created jointly by Codestars by Rob Percival and Atil Samancioglu that intends to assist the students to have an in-depth knowledge of  Ethical Hacking and guide them on how to dodge hackers and cyberattacks. Through this course, the learners will explore VPN & DNS, Social Engineering, Python,  Dark Web, Kali Linux, Beef, Apache, Nmap, SQLMap, Socket, Scapy, Pynput, Keylogger, and a lot more. The Complete Ethical Hacking Course Online Programme is open for enrolment for any candidate who is passionate about ethical hacking and possesses a computer with a minimum of 4GB of RAM. 

The Complete Ethical Hacking Course Certification, the online course by Udemy, will coach the candidates on the tools the hackers use, the way of hackers’ attack on various computers, systems, websites, users, and wireless networks, creation of Ethical Hacking tool portfolio, developing security and hacking tool with Python on their own and many more. The interested folk can join the online programme by making the payment of a fee. 

The highlights

  • Online course
  • Downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  •  Certificate of completion
  • English videos
  • 30-Day Money-Back Guarantee

Program offerings

  • 36.5 hours on-demand video
  • 36 articles
  • 4 downloadable resources
  • Full lifetime access
  • Access on mobile and tv
  • Certificate of completion

Course and certificate fees

Fees information
₹ 499  ₹3,499
certificate availability

Yes

certificate providing authority

Udemy

Who it is for

What you will learn

Knowledge of python Ethical hacking

By the end of The Complete Ethical Hacking Course Online Certification, students can learn SQL Injection, Commands, Metasploit, Website penetration testing, System penetration testing, Wireless networks penetration testing, Wireless Attacks, Object-Oriented Programming, Backdoor, and whatnot. 

The syllabus

Introduction

  • Introduction
  • Course Manual

Hacking Lab Setup

  • Hacking Lab Setup Introduction
  • What is Virtual Machine
  • Installing Virtualbox (Windows)
  • Installing Virtualbox (MAC)
  • Installing Kali Linux
  • Solutions to Common Problems & Links
  • Kali Linux Problem Solving: ISO Installation
  • Installing Windows 10
  • Snapshots
  • Quick Reminder Before We Move On
  • Hacking Lab Setup Outro

Kali Linux 101

  • Kali Linux 101 Introduction
  • Kali Overview
  • Linux Terminal
  • Changing Kali Password
  • Kali Linux 101 Outro

Anonymity Online

  • Anonymity Online Introduction
  • How Networks Work
  • VPN & DNS Explained
  • VPN Usage
  • Changing DNS
  • VPN and DNS Together
  • Solutions for Problems
  • Anonymity Online Outro

Dark Web

  • Dark Web Introduction
  • What is Dark Web?
  • Installing Tor On Kali
  • Browsing Dark Web
  • Dark Web Outro

Network Pentesting

  • Network Pentesting Introduction
  • What is Network Pentesting?
  • Chipsets
  • Kali Linux WiFi Card List
  • Connecting WiFi USB
  • Solutions to Common Connection Problems
  • MAC Address
  • Monitor vs Managed
  • Network Pentesting Outro

Gathering Information From Networks

  • Gathering Information From Networks Introduction
  • Network Sniffing
  • Airodump Specific Target
  • Deauthentication Attacks
  • Gathering Information From Networks Outro

Wireless Attacks

  • Wireless Attacks Introduction
  • WEP Settings
  • WEP Encryption Logic
  • Cracking WEP
  • Fake Authentication
  • WPA & WPA2
  • Capturing Handshake
  • WPA Cracking
  • Wordlist Alternatives
  • More Secure Network
  • Wireless Attacks Outro

Post Connection Attacks

  • Post Connection Attacks Introduction
  • Post Connection Settings
  • Netdiscover
  • nMap
  • Man In The Middle
  • Manual ARP Poison
  • Man In The Middle Framework
  • How Hackers Steal Passwords
  • Breaking HTTPS
  • Creating Web Server
  • DNS Attacks
  • Bettercap Installation
  • ARP Attack
  • Capturing Information
  • Caplet Usage
  • About HSTS Settings
  • HSTS Settings
  • Breaking HTTPS
  • HSTS Downgrade Attempt
  • Javascript Injection
  • Wireshark Intro
  • Wireshark Analysis
  • How to Protect Yourself
  • Post Connection Attacks Outro

System Pentesting

  • System Pentesting Introduction
  • Gaining Access
  • Installing Metasploitable
  • Zenmap Installation
  • Finding Vulnerabilities
  • Exploiting First Vulnerability
  • Exploiting Username Map Script
  • Exploiting PostgreSQL Vulnerability
  • System Pentesting Outro

Attacks On Users

  • Attacks On Users Introduction
  • Attacking to Users
  • Installing Veil
  • Veil Overview
  • Creating First Backdoor
  • Bypassing Antivirus Solutions
  • Using Multi Handler
  • Testing Backdoor
  • What is Fud?
  • FatRat Features
  • Attacks On Users Outro

Social Engineering

  • Social Engineering Introduction
  • What is Maltego?
  • Maltego Overview
  • Strategy
  • Choosing Image
  • Combining Files
  • Hacking Windows
  • Changing the Extension
  • Fake Emails
  • Social Engineering Outro

Social Media Security

  • Social Media Security Introduction
  • Instagram Brute Force Attacks
  • Instagram Social Engineering
  • How to Protect Ourselves
  • Social Media Security Outro

Beef

  • Beef Introduction
  • What is Beef?
  • What If Beef is not Installed in Kali?
  • Hooking Target
  • Injection
  • Taking Screenshots
  • How Hackers Steal Facebook Passwords?
  • Backdoor Delivery
  • How to Protect Yourself?
  • Beef Outro

External Network Attacks

  • External Network Attacks Introduction
  • External Network Attack Options
  • What is a Tunneling Service?
  • Msfvenom
  • Hacking Windows
  • Running Veil with Ngrok
  • Optional: External Backdoor with Port Forwarding
  • Optional: External Backdoor Hacking with Port Listening
  • Setoolkit
  • Setoolkit Modules
  • Hacking Gmail
  • sendEmail
  • External Network Attacks Outro

Fake Game Website Attacks

  • Fake Game Website Attacks Introduction
  • External Beef Attack
  • Necessary Links
  • Ubuntu Server Creation
  • Creating Game Website
  • Installing Beef
  • Beef in Ubuntu
  • Embedding JavaScript
  • What is No IP?
  • Hooking iPhone
  • How to Stay Safe
  • Fake Game Website Attacks Outro

Post Hacking Sessions

  • Post Hacking Sessions Introduction
  • Meterpreter Sessions
  • Migration
  • Downloading Files
  • Capturing Keylogs
  • Sustaining The Session
  • Post Hacking Sessions Outro

Hacker Methodology

  • Hacker Methodology Introduction
  • Ethical Hacker's Steps
  • Detailed Explanation of Methodology
  • Hacker Methodology Outro

Website Reconnaissance

  • Website Reconnaissance Introduction
  • Website Pentesting Setup
  • Maltego One More Time
  • Netcraft
  • Reverse DNS Lookup
  • Whois Lookup
  • Robots
  • Subdomains
  • Website Reconnaissance Outro

Website Pentesting

  • Website Pentesting Introduction
  • Code Execution Vulnerability
  • Reverse TCP Commands
  • File Upload Vulnerability
  • File Inclusion
  • Website Pentesting Outro

Cross Site Scripting

  • Cross Site Scripting Introduction
  • What is XSS?
  • Reflected XSS
  • Stored XSS
  • Real Hacking with XSS
  • How to Protect Yourself?
  • Cross Site Scripting Outro

SQL 101

  • SQL 101 Introduction
  • Database and SQL
  • Database Structure
  • Adding a New Value
  • Updating and Deleting Values
  • Filtering
  • SQL Codes Used In This Section
  • SQL 101 Outro

SQL Injection

  • SQL Injection Introduction
  • Metasploitable Databases
  • Working with Mutillidae
  • Vulnerability Test
  • Post Method SQLi
  • Get Method SQLi
  • Every Password On Database
  • Learning Database Name
  • Finding Out More
  • Retrieving Everything
  • SQL Injection Outro

Website Pentesting Tools

  • Website Pentesting Tools Introduction
  • Sqlmap
  • Zap
  • Zap Analysis
  • Website Pentesting Tools Outro

Ethical Hacking Certifications

  • Ethical Hacking Certifications Introduction
  • Options for Certification
  • Certified Ethical Hacker
  • OSCP
  • Ethical Hacking Certifications Outro

Network Theory

  • What is OSI Model?
  • What is Binary?
  • IP Address Advanced
  • Host Calculations
  • TCP vs UDP

Python For Ethical Hacking Setup

  • Python For Ethical Hacking Setup Introduction
  • Anaconda Installation (Windows)
  • Anaconda Installation (MAC)
  • Python For Ethical Hacking Setup Outro

Python Data Types & Structures

  • Python Data Types & Structures Introduction
  • Numbers
  • Variables
  • Downloading Notebooks
  • Variables & General GitHub Link
  • String
  • String GitHub Link
  • String Advanced
  • String Advanced GitHub Link
  • Variable Attributes
  • Lists
  • Lists Advanced
  • Lists GitHub Link
  • Dictionary
  • Dictionary GitHub Link
  • Sets
  • Sets GitHub Link
  • Tuples
  • Tuples GitHub Link
  • Boolean
  • Boolean GitHub Link
  • Python Data Types & Structures Outro

Control Statements & Loops

  • Control Statements & Loops Introduction
  • Logical Comparisons
  • Comparisons GitHub Link
  • If Statements
  • If Statements Continued
  • If Statements Practical Usage
  • If Statements GitHub Link
  • For Loop
  • For Loop Practical Usage
  • For Loop GitHub Link
  • Break Continue Pass
  • Break Continue Pass GitHub Link
  • While Loop
  • While Loop GitHub Link
  • Control Statements & Loops Outro

Essentials

  • Essentials Introduction
  • Useful Methods
  • Zip and Random
  • Lists Advanced
  • Useful Methods GitHub Link
  • Sublime Text (Windows)
  • Command Prompt (Windows)
  • Sublime Text (MAC)
  • Terminal (MAC)
  • Essentials Outro

Functions

  • Functions Introduction
  • Functions Explained
  • Input and Output
  • Functions Advanced
  • Functions GitHub Link
  • Functions Practical Usage
  • Practical Functions GitHub Link
  • Scope
  • Scope GitHub Link
  • Functions Outro

Object Oriented Programming

  • Object Oriented Programming Introduction
  • Class
  • Methods
  • Class Practical Usage
  • Inheritance
  • OOP Classes GitHub Link
  • Special Methods
  • Special Methods GitHub Link
  • Error Handling
  • Error Handling GitHub Link
  • Object Oriented Programming Outro

Modules

  • Modules Introduction
  • Using Libraries
  • Modules GitHub Link
  • Writing Our Own Modules
  • Imported vs Direct
  • Imported vs Direct GitHub Link
  • Modules Outro

MAC Changer

  • MAC Changer Introduction
  • Installing PyCharm On Kali
  • MAC and IP Address
  • Changing MAC Manually
  • Using Subprocess
  • Introducing Variables
  • Processing Tuples
  • Beautifying the Code
  • Saving Subprocess
  • Regex 101
  • New MAC Control
  • Python3 Compatibility
  • MAC Changer GitHub Link
  • MAC Changer Outro

Network Scanner

  • Network Scanner Introduction
  • ARP Refreshed
  • How Network Scanners Work
  • ARP Request
  • Broadcast Request
  • Processing Response
  • Adding Features
  • Python3 Compatibility
  • Network Scanner GitHub Link
  • Network Scanner Outro

Man In The Middle

  • Man In The Middle Introduction
  • MITM Refreshed
  • ARP Response Creation
  • ARP Poison
  • Getting MAC Address
  • Looping Continuously
  • Displaying Better Logs
  • Handling Specific Error
  • Getting User Input
  • MITM GitHub Link
  • Man In The Middle Outro

Packet Listener

  • Packet Listener Introduction
  • Wireshark Refreshed
  • Wireshark Analysis
  • Gathering Packets
  • Working With Layers
  • Downgrading HTTPS
  • Protecting Ourselves
  • Packet Listener GitHub Link
  • Packet Listener Outro

Keylogger

  • Keylogger Introduction
  • Setting Up Windows
  • Working With Files
  • Logging Keyboard
  • Saving Logs
  • Handling Errors
  • Sending Email
  • Reason Behind Threading
  • Threading Library
  • Testing On Windows
  • Keylogger GitHub Link
  • Keylogger Outro

Backdoor

  • Backdoor Introduction
  • How To Write a Backdoor?
  • Opening a Connection
  • Running Commands
  • Writing Listener
  • Sending Commands With Listener
  • Class Structure
  • Finishing Classes
  • What is JSON?
  • Processing JSON
  • Sending Commands With List
  • Cd Command Implementation
  • Getting Contents
  • Saving Files
  • Encoding Downloads
  • Upload Functionality
  • Handling Errors
  • Python3 Compatibility
  • Backdoor GitHub Link
  • Backdoor Outro

Packaging & Malicious Files

  • Packaging & Malicious Files Introduction
  • Malicious Files
  • Creating Executables
  • What is Regedit?
  • Copying Files
  • Running Executables On Startup
  • Adding PDF to File
  • Changing Icons
  • Changing Extensions
  • MyPackage GitHub Link
  • Packaging & Malicious Files Outro

Closing & Ethical Hacker's Handbook

  • Closing
  • Ethical Hacker's Handbook

Instructors

Mr Rob Percival

Mr Rob Percival
Web Developer
Udemy

Other Bachelors

Mr Atil Samancioglu

Mr Atil Samancioglu
Instructor
Udemy

Other Bachelors

Similar Courses

Introduction to Ethical Hacking

Great Learning

Online
Beginner
Free

Hacking COVID 19 Course 3 Unraveling COVID 19s Ori...

UC San Diego via Coursera

4 Weeks Online
Beginner
Free

Hacking COVID-19 Course 1 Identifying a Deadly Pat...

UC San Diego via Coursera

4 Weeks Online
Beginner
Free

Learn Ethical Hacking Beginner to Advanced

Eduonix

Online
Beginner
₹199 ₹995

Courses of your Interest

An Introduction To Coding Theory

An Introduction To Coding Theory

IIT Kanpur via Swayam

8 Weeks Online
Beginner
Free

C++ Foundation

PW Skills

5 Months Online
Beginner
Free

Advanced CFD Meshing using ANSA

Skill Lync

4 Weeks Online
Beginner
₹ 40,000

Salesforce Platform App Builder Certification Trai...

Simplilearn

12 Hours Online
Beginner

Data Science Foundations to Core Bootcamp

Springboard

7 Months Online
Beginner
$9,900 $13,900
Full Stack Developer Course With Placement

Full Stack Developer Course With Placement

AttainU

7 Months Online
Beginner
₹ 68,000
User Experience Design And Research

User Experience Design And Research

UM–Ann Arbor via Futurelearn

35 Weeks Online
Beginner
Fundamentals of Agile Project Management

Fundamentals of Agile Project Management

UCI Irvine via Futurelearn

21 Weeks Online
Beginner
Artificial intelligence Design and Engineering wit...

Artificial intelligence Design and Engineering wit...

CloudSwyft Global Systems, Inc via Futurelearn

17 Weeks Online
Beginner

More Courses by Udemy

Microsoft Excel 2013 Course Beginners Intermediate...

Udemy

Online
Beginner
₹399 ₹2,699

Python for Beginners to Advance

Udemy

Online
Beginner
₹ 2,499

Learn Python Turtle Using Block Coding

Udemy

Online
Beginner
₹399 ₹799

Master Python Basics For Developer

Udemy

Online
Beginner
₹475 ₹3,499

Programming in Python for Beginners

Udemy

Online
Beginner
₹ 799

Learn Python 3 Programming from Scratch

Udemy

Online
Beginner
₹475 ₹1,299

Automate Your Life With Python

Udemy

Online
Beginner
₹ 2,899

Learn Python Python for Beginners

Udemy

Online
Beginner
₹ 1,799

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books