4 out of 5
4
3 reviews on Udemy

The Complete Guide to Ethical Hacking: Beginner to Pro

Hack your way to a secure and threat-free environment using best-in-class tools and techniques
Instructor:
Packt Publishing
15 students enrolled
English [Auto]
Work with the Metasploit toolkit to test the effectiveness of defenses
Incorporate sniffing with the Man-in-the-Middle attack
Bypass modern security defenses to understand the ins and outs of security
Understand how networks are exploited by attackers
Prevent password attacks on your system
Use the NVIDIA Compute Unified Device Architectures

Security is the foremost concern for all organizations both big and small, and thus companies and people are ready to invest in enhanced security, pentesting, and ethical hacking. Security is a major issue that organizations are now facing. Cyber threats are on the increase with the rising growth of technology, thus giving rise to the need for ethical hacking and advanced security. 

In this comprehensive 2-in-1 course, you will learn step by step ethical hacking and identify threats and vulnerabilities to secure your IT environment. This learning path also takes your ethical hacking skills to the next level to help you address various security threats, whether in information, networks, and other security concerns. It is a seamless blend of text, videos, code examples, and assessments that will help you, master ethical hacking efficiently as you progress.

This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible.

The first course, Ethical Hacking for Beginners, begins with introducing you to the best tools for penetration testing. You will then learn basic ethical hacking technique such as reconnaissance. You will also gain hands-on experience of working with Metasploit and testing the effectiveness of different defenses. Next, you’ll learn about sniffing and how effective the Man-in-the-Middle attack can be. You will learn with the help of a coffee shop scenario to further enhance your understanding.

The second course, Mastering Ethical Hacking, starts off with explaining you how to install Kali Linux on your system and work with it. You will then learn how to gather information using different methods such as fingerprinting and open ports. You will also learn to check your system’s vulnerability using Nessus and OpenVAS. Next, you will learn to exploit your vulnerability with different parameters to reveal all the gaps in your system. You will then escalate privileges in your system to improve your design and program, and prevent password attacks using different methods. Finally, you will learn to prevent wireless attacks on your system.

By the end of this Learning Path, you’ll gain all the required ethical hacking skills to offer stronger security solutions for your organization to have a successful career in IT security.

Meet Your Expert(s):

We have the best work of the following esteemed author(s) to ensure that your learning journey is smooth:

  • Gary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome’s computer security and forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats.
  • Alexis Ahmed is an experienced Ethical Hacker and Cyber Security Expert with over 5 years of experience. He also develops Android apps and games in his free time. In addition to this, he is also a Web Developer with over 4 years of experience and he loves creating beautiful and functional websites for clients all over the world. He has a YouTube channel with over 19,000 subscribers and more than 1 million views where he makes videos on ethical hacking, Linux, and programming.

Ethical Hacking for Beginners

1
The Course Overview

This video provides an overview of the entire content.

2
Basic Terminologies

The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.

  • Get a grasp on the definitions of the hacking terms used in this course
  • Understand their significance
  • Know the phases of ethical hacking 
3
Operating Systems and Tools Used

In this video, we will take a look at the operating systems used in this course.

  • Check out the operating system used in the course
  • Glance through some of the tools we have used in the course 
4
What is Reconnaissance?

The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.

  • Understand the importance of the Reconnaissance phase in hacking
  • Know more about Passive and Active foot printing
  • Take a deeper look at Vulnerability Research 
5
Working with NMap

Our aim in this video is to understand what NMap is and how we will be working with it.

  • Understand the 3-way TCP handshake
  • Talk about ports, switches, and options
  • Use the commands we learnt in demo scenarios 
6
Shodan for scanning

In this video we will learn what Shodan is and how to use it.

  • Scour through the Shodan website
  • Explore the options available on the website
  • Create a demo report 
7
Other Types of Reconnaissance

In this video we’ll understand vulnerability scanning

  • Check out vulnerability scanning with Nikto
  • Check out vulnerability scanning with Sparta 
8
Metasploit Basics

Used by industry leaders in security, Metasploit is essential to a hacking course for beginners. Let’s talk about it in this video.

  • Know what Metasploit is
  • Understand the basic commands used in Metasploit 
9
Exploiting a Vulnerability

This video will help us understand how we can effectively exploit the weakness in a system

  • Know how to find vulnerabilities in a system
  • Launch exploits to penetrate a target 
10
Armitage

This video will help us understand armitage in detail.

  • Understand what armitage is
  • Know how to effectively use armitage 
11
Aircrack-ng

In this video we will take a look at Aircrack-ng that will help us in wireless hacking.

  • Understand what aircrack-ng is
  • Use aircrack-ng to crack WEP encrypted WiFi 
12
MitM (Man-in-the-Middle) Attack

The goal in this video is get a grasp over MitM (Man-in-the-Middle) Attacks.

  • Understand what a MitM (Man-in-the-Middle) Attack is
  • Get to know how to run a MitM (Man-in-the-Middle) Attack 
13
Social Engineering Toolkit

Our aim in the video is to know how to use the Social Engineering Toolkit.

  • Understand what Social Engineering is
  • Know how to effectively use a Social Engineering Toolkit  
14
Working with Wireshark

This video will help us understand the working details of Wireshark.

  • Understand what Wireshark is
  • Know how to effectively use Wireshark  

Mastering Ethical Hacking

1
The Course Overview

This video will give you an overview about the course.

2
Downloading Kali Linux

In this video, learn how to download the appropriate version of Kali Linux depending on your system architecture and hardware specifications.

  • Visit the Kali website
  • Select the correct version
  • Download via torrent or direct download 
3
Downloading and Installing VMware

In this video, learn how to download and install the latest version of VMware.

  • Visit the VMware website
  • Select the free version of VMware
  • Install VMware 
4
Downloading and Installing VirtualBox

In this video, learn how to download and install the latest version of VirtualBox.

  • Visit VirtualBox website
  • Select the correct version according to your platform
  • Install VirtualBox 
5
Installing Kali Linux

In this video, learn how to install Kali Linux on VMware.

  • Create the virtual machine
  • Start the setup process
  • Install Kali Linux  
6
Installing VMware Tools

In this video, we will learn how to install VMware tools on Kali Linux.

  • Insert VMware additions
  • Copy and extract VMware tools to desktop
  • Install from terminal 
7
Updating Kali Linux

In this video, we will learn how to update Kali Linux with the aptitude package manager.

  • Update repository
  • Update packages
  • Update distribution 
8
Setting Up Proxychains

In this video, we will learn how to setup and configure Proxychains for anonymity.

  • Install the tor service
  • Edit the Proxychains configuration file
  • Start the tor service and launch Proxychains 
9
Starting Network Services

In this video, we will learn how to start and stop network services on Kali Linux.

  • Start apache service
  • Start SSH service
  • Connect to Kali Linux via SSH 
10
DNS Enumeration

In this video, we will learn how to gather DNS information on the target with dnsenum.

  • Select the target
  • Scan target with dnsenum
  • Analyze results 
11
Information Gathering – Whois Lookup and Subdomain Enumeration

In this video, we will learn how to perform a Whois lookup on a target and how to enumerate subdomains.

  • Perform Whois lookup
  • Configure Knockpy
  • Enumerate Subdomains 
12
Finding Open Ports with Nmap

In this video, we will learn how to scan a target for open ports with Nmap.

  • Learn Nmap syntax
  • Perform the Nmap scan
  • Explore port states – Open, closed, or filtered 
13
OS and Service Fingerprinting

In this video, we will learn how to perform OS and service fingerprinting with Nmap.

  • Learn Nmap syntax
  • Perform Nmap scan
  • Study OS and service detection and analysis 
14
Exploring Maltego

In this video, we will learn how to use Maltego for information gathering.

  • Configure Maltego
  • Study overview of the interface
  • Explore information gathering 
15
Installing and Configuring Nessus

Buttons appear all over a site (Go Premium, Learn More, Submit, and so on) and usually have the same general style but vary in things such as color, width, and position. Creating modular lightweight classes to handle this variation can be very efficient.

  • Registration and download
  • Install Nessus
  • Configure Nessus 
16
Finding Local Vulnerabilities Using Nessus

In this video, we will learn how to scan for local vulnerabilities with Nessus.

  • Overview of the interface
  • Create a policy and scanning
  • Analyze results 
17
Checking for Linux Specific Vulnerabilities with Nessus

In this video, we will learn how to scan for vulnerabilities on Linux.

  • Create Policies
  • Create scans
  • Perform scanning and analyzin results  
18
Checking for Windows Specific Vulnerabilities with Nessus

In this video, we will learn how to scan for vulnerabilities on Windows.

  • Create Policies
  • Create scans
  • Perform scanning and analyzing results  
19
Installing and Configuring OpenVAS

In this video, we will learn how to download, install and configure OpenVAS on Kali Linux.

  • Downloading OpenVAS
  • Install OpenVAS
  • Start the OpenVAS service 
20
Checking for Linux and Windows Vulnerabilities with OpenVAS

In this video, we will learn how to scan for vulnerabilities on Linux and Windows.

  • Study overview of the interface
  • Create scan configurations
  • Explore Information gathering 
21
Mastering Metasploit – Metasploit Console MSFconsole

In this video, we will learn how to use the Metasploit console for basic exploitation.

  • Start the Metasploit console
  • Use modules for exploitation
  • Exploit a vulnerability 
22
Exploring Armitage – The Metasploit Graphical User Interface

In this video, we will learn how to use Armitage for exploitation.

  • Start Armitage
  • Overview of the interface
  • Scan a target and exploitation 
23
MySQL Database Exploitation with Metasploit

In this video, we will learn how to exploit a MySQL database running on a server.

  • Select the module
  • Set the options
  • Learn about Exploitation and enumeration 
24
Client Side Attacks – BeEF Browser Exploitation

In this video, we will learn how to use the BeEF Web Interface for browser exploitation.

  • Start the BeEF Services
  • Go through an overview of the interface
  • Hook the client browser and exploitation with modules 
25
Client Side Attacks – Using the Social Engineering Toolkit (SET)

In this video, we will learn how to use the SET for credential harvesting attack on a target.

  • Understand the attack vector
  • Clone a site
  • Get the target to click on the link and stealing credentials 
26
Generating Wordlists with Crunch

In this video, we will learn how to generate custom wordlists with crunch.

  • Understand the crunch syntax
  • Understand the characters set combination
  • Generate a wordlist 
27
Password Cracking with John the Ripper

In this video, we will learn Cracking Linux and RAR/ZIP passwords with John the ripper.

  • Understand the syntax
  • Crack Linux passwords
  • Crack RAR/ZIP Passwords 
28
Password Cracking with Hydra

In this video, we will learn how to crack online log ins with Hydra.

  • Learn the syntax
  • Use default wordlists
  • Explore the SSH exploitation with Hydra 
29
Password Cracking with Medusa

In this video, we will learn how to crack online log ins with Medusa.

  • Learn the syntax
  • Use wordlist and usernames
  • Learn about Exploitation with Medusa 
30
Network Discovery with Netdiscover

In this video, we will learn how to discover devices on your network with netdiscover.

  • Understand the syntax
  • Scan your network
  • Analyze the results 
31
Network Sniffing with Tcpdump

In this video, we will learn how to sniff packets on your network with Tcpdump.

  • Understand the syntax
  • Sniff packets from a target
  • Sniff specific packets with filters  
32
Network Sniffing with Wireshark

In this video, we will learn how to sniff packets on your network with Wireshark.

  • Overview of the interface
  • Use protocol filters
  • Use IP filters 
33
ARP Spoofing with arpspoof

In this video, we will learn how to perform MITM attacks with arpspoof.

  • Understand Spoofing
  • Allow the flow of packets
  • Use arpspoof for MITM attack 
34
MITM with Ettercap

In this video, we will learn how to use Ettercap for MITM attack.

  • Start Ettercap
  • Select the interface and starting the sniffing
  • Select your target IP and traffic sniffing with Wireshark 
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4
4 out of 5
3 Ratings

Detailed Rating

Stars 5
1
Stars 4
1
Stars 3
1
Stars 2
0
Stars 1
0
30-Day Money-Back Guarantee

Includes

8 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion

Custom Sidebar

This theme offers completely unlimited custom sidebars down to the individual post and page level. For this specific sidebar:

  1. Go into Theme Options >> Custom Sidebars and create a new sidebar
  2. Go into Appearance >> Widgets and find the new sidebar you created and add widgets (for instance this is a standard text widget)
  3. Go to any page or post and choose the custom sidebar in the layout options