Learn Ethical Hacking: Beginner to Advanced!

BY
Udemy

Obtain a thorough understanding of the fundamentals of ethical hacking, as well as the functions involved in penetration testing and network security.

Mode

Online

Fees

₹ 2899

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course overview

Joseph Delgadillo, Certified Ethical Hacker & Instructor, developed the Learn Ethical Hacking: Beginner to Advanced certification course, which is accessible on Udemy and is aimed at candidates who want to master ethical hacking and secure a career in the cyber security industry. Learn Ethical Hacking: Beginner to Advanced online course by Udemy focuses on teaching candidates how to use Python to practice ethical hacking and penetration testing.

Learn Ethical Hacking: Beginner to Advanced online classes incorporates more than 28 hours of digital learning resources, which teach how to build up a safe and private pen-testing environment, teach basic hacking tools in Kali Linux, and conclude with programming the tools in Python. Candidates will learn about wireless cracking, system hacking, footprinting, scanning, and Linux commands as part of this course, which also includes an interactive element in which candidates will be taken through employment options in the ethical hacking and cyber security domain.

The highlights

  • Certificate of completion
  • Self-paced course
  • 28.5 hours of pre-recorded video content
  • Learning resources

Program offerings

  • Online course
  • Learning resources. 30-day money-back guarantee
  • Unlimited access
  • Accessible on mobile devices and tv

Course and certificate fees

Fees information
₹ 2,899
certificate availability

Yes

certificate providing authority

Udemy

What you will learn

Ethical hacking

After completing the Learn Ethical Hacking: Beginner to Advanced online certification, candidates will gain a solid understanding of the principles of ethical hacking and cyber security using python programming. Candidates will learn the basics of Kali Linux as well as the capabilities of Linux commands. Candidates will learn the mythologies associated with penetration testing, scanning, network security, wireless cracking, and system hacking. Candidates will also learn how to construct a secure environment, how to use custom coding penetration tools, and how to work with keyloggers and authentication brute-forcers.

The syllabus

Introduction and Installation

  • Introduction to the course
  • VirtualBox installation
  • Kali Linux installation
  • Enabling full-screen

Basic Linux Commands

  • Basic commands part 1
  • Basic commands part 2
  • Basic commands part 3

Creating a Secure Hacking Environment

  • Changing IP address and wireless adapter setup
  • Creating a bootable Kali USB drive
  • Essential networking terms
  • Essential hacking terms
  • Additional Kali tools to install
  • Changing our MAC address with macchanger

Footprinting

  • Google hacking
  • Nikto basics
  • Whois tool
  • Email harvesting
  • Shodan
  • Zone transfer with Dig

Scanning

  • Installing Metasploitable
  • Nmap part 1
  • Nmap part 2
  • Nmap part 3
  • Zenmap
  • TCP scans
  • Nmap bypassing defenses
  • Nmap scripts part 1
  • Nmap scripts part 2

Website Penetration Testing

  • Installing OWASP
  • HTTP request
  • HTTP response
  • Burpsuite configuration
  • Editing packets in Burpsuite
  • Whatweb and Dirb
  • Password recovery attack
  • Burpsuite login bruteforce
  • Hydra login bruteforce
  • Session fixation
  • Injection attacks
  • Simple command injection
  • Exploiting command injection vulnerability
  • Finding blind command injection
  • SQL basics
  • Manual SQL injection part 1
  • Manual SQL injection part 2
  • SQLmap basics
  • XML injection
  • Installing XCAT and preventing injection attacks
  • Reflected XSS
  • Stored XSS
  • Changing HTML code with XSS
  • XSSer and XSSsniper

Wireless Cracking

  • Wireless attacking theory
  • Enabling monitor mode
  • Capturing handshake with airodump
  • RockYou.txt
  • Cracking with Aircrack
  • Cracking with Hashcat
  • Creating password lists with Crunch
  • Creating password lists with Cupp
  • Rainbow tables part 1
  • Rainbow tables part 2
  • Installing Fluxion
  • Finding and cracking hidden networks
  • Preventing wireless attacks

Man in the Middle Attacks

  • ARP protocol basics
  • Man in the middle attack theory
  • Installing MITMf
  • Manual ARP spoofing
  • Problems while installing MITMf
  • HTTP traffic sniffing
  • DNS spoofing and HTTPS password sniffing
  • Hooking browsers with BEEF
  • Screenshotting targets browser
  • Cloning any webpage
  • Ettercap basics

System Hacking with Metasploit

  • MSFconsole environment
  • Metasploit modules explained
  • Bruteforcing SSH with Metasploit
  • Attacking Tomcat with Metasploit
  • Getting Meterpreter with command injection
  • PHP code injection
  • 2 Metasploitable exploits
  • Wine installation
  • Creating Windows payloads with Msfvenom
  • Encoders and Hex editor
  • Windows 10 Meterpreter shell
  • Meterpreter environment
  • Windows 10 privilege escalation
  • Preventing privilege escalation
  • Post exploitation modules
  • Getting Meterpreter over Internet with port forwarding
  • Eternalblue exploit
  • Persistence module
  • Hacking over the internet with Ngrok
  • Android device attack with Venom
  • The real hacking begins now!

Python Crash Course

  • Variables
  • Raw input
  • If-else statements
  • For loops
  • While loops
  • Python lists
  • Functions
  • Classes
  • Importing libraries
  • Files in Python
  • Try and except rule

Coding an Advanced Backdoor

  • Theory behind reverse shells
  • Simple server code
  • Connection with reverse shell
  • Sending and receiving messages
  • Sending messages with while true loop
  • Executing commands on target system
  • Fixing backdoor bugs and adding functions
  • First test using our backdoor
  • Trying to connect every 20 seconds
  • Creating persistence part 1
  • Creating persistence part 2
  • Changing directory
  • Uploading and downloading files
  • Downloading files from the internet
  • Starting programs using our backdoor
  • Capturing screenshot on the target PC
  • Embedding backdoor in an image part 1
  • Embedding backdoor in an image part 2
  • Checking for administrator privileges
  • Adding help option

Creating a Keylogger for the Backdoor

  • Importing Pynput
  • Simple keylogger
  • Adding report function
  • Writing keystrokes to a file
  • Adding the keylogger to our reverse shell part 1
  • Adding the keylogger to our reverse shell part 2
  • Final project test

Basic Authentication Bruteforcer

  • Printing banner
  • Adding available options
  • Starting threads for bruteforce
  • Writing function to run the attack
  • Bruteforcing router login
  • Bypassing antivirus with your future programs
  • Sending malware with spoofed email

BONUS - Building a Career in Cyber Security

  • What will you learn in this section?
  • Why is ethical hacking a valuable skill?
  • What is the best ethical hacking certification?
  • Tips for getting your first job as an ethical hacker
  • How I started my career as an ethical hacker
  • How to price your work

Instructors

Mr Joseph Delgadillo

Mr Joseph Delgadillo
Instructor
Eduonix

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books