Introduction To Ethical Hacking

This course is designed for those interested to learn the basics of ethical hacking, becoming an elite ethical hacker, exploiting computers, setting up a hacking lab, and making a career out of it. Read more.

No ratings yet
Course Skill Level
Beginner
Time Estimate
11h 40m

Hi I'm Juan. My background is in the tech space from Digital Marketing, E-commerce, Web Development to Programming.

Access all courses in our library for only $9/month with All Access Pass

Get Started with All Access PassBuy Only This Course

About This Course

Blending practical work with solid theoretical training, we take you from the basics of ethical hacking through to mastery, giving you the training you need not just to hack, but also to secure against a hack.

While the theory is important, we understand that it can also be dry and uninspiring. For this reason, this course is packed with examples that you can follow. This practical focus starts from the beginning, where we will teach you about penetration testing and show you how to install the software required (Windows, Linux, and Mac OSX) and jump right into hacking.

Throughout, you will analyze and exploit various systems from regular websites through to sprawling networks, along with hacking servers and clients. More than just hacking, you’ll also learn how to conduct efficient penetration testing techniques.

What you’ll learn:

  • Become an elite ethical hacker
  • Set up a hacking lab
  • Launch attacks/exploits against computers
  • How to start a cybersecurity/ethical hacking career

Who this course is for:

  • This course is for anyone who has an interest in Cybersecurity or Ethical Hacking/Penetration Testing
  • Anyone who wants to start a career as an Ethical Hacker or Penetration Tester but does not know where to start

Our Promise to You

By the end of this course, you will have learned ethical hacking.

10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.

Get started today and learn more about the basics of hacking.

Course Curriculum

Section 1 - Course Introduction
Course Overview 00:00:00
About Your Instructors 00:00:00
Section Overview 00:00:00
Current Cybersecurity Market 00:00:00
The Three Types of Hackers 00:00:00
The Four Elements of Security 00:00:00
Ethical Hacker Terminology 00:00:00
Common Methods Of Hacking 00:00:00
Cybersecurity And Ethical Hacking Overview 00:00:00
Ethical Hacking Vs Penetration Testing 00:00:00
Job Opportunities In Cybersecurity 00:00:00
Who is This Course is For 00:00:00
Section 2 - Networking Basics
Networking Section Overview 00:00:00
How Data Travels Across The Internet 00:00:00
Understanding Ports And Protocols 00:00:00
Understanding IP Addresses: Public And Private 00:00:00
What Are Subnets 00:00:00
The Average Network Vs Remote Based 00:00:00
Section 3 - Setting Up Your Hacking Lab
Hacking Lab Section Overview 00:00:00
Understanding Virtual Machines 00:00:00
Setup Your Kali Linux Machine 00:00:00
VN Setup And Testing Vulnerable Systems 00:00:00
Section 4 - Linux, Python, Bash And PowerShell Basics
Linux Plus Python Plus Bash Plus Powershell Section Overview 00:00:00
Linux Basics 00:00:00
Working With Directories And Moving Files 00:00:00
Installing And Updating Application Files 00:00:00
Linux Text Editors 00:00:00
Searching For Files 00:00:00
Bash Scripting Basics 00:00:00
Python Basics 00:00:00
Section 5 - How To Remain Anonymous On The Web
Remaining Anonymous Section Overview 00:00:00
TOR Browser Overview 00:00:00
Anonsurf Overview 00:00:00
Changing Mac Addresses 00:00:00
Using a Virtual Private Network Or Server (VPN, VPS) 00:00:00
Section 6 - How To Hack Into WIFI
WiFi Hacking Section Overview 00:00:00
WiFi Hacking System Setup 00:00:00
WEP Hacking Attack Number One 00:00:00
WEP Hacking Attack Two 00:00:00
WPA Or WPA2 Hacking 00:00:00
Section 7 - Passive And Active Reconnaissance (Information Gathering)
Reconnaissance Section Overview 00:00:00
Passive Recon Vs Active Recon 00:00:00
Recon-ng Overview 00:00:00
Whois Enumeration 00:00:00
DNS Enumeration Overview 00:00:00
Netcraft.com DNS Information 00:00:00
Google Hacking 00:00:00
Shodan.io Overview 00:00:00
Securityheaders.com (Analyze HTTPS Headers of website) 00:00:00
Ssllabs.com Or ssltest (Look for SSL issues on website) 00:00:00
Pastebin.com (Sensitive Information) 00:00:00
NMAP Port Scanning (Discover Open Ports, OS, Services, Vulnerabilities, etc.) 00:00:00
Netcat Overview Plus SMB/NFSEnumeration 00:00:00
Nikto And Sparta Web Application Scanner 00:00:00
SMPT Enumeration And Nessus Or Openvas Scanners 00:00:00
Section 8 - Launching Attacks
Launching Attacks Overview 00:00:00
Analyzing Information Gathered 00:00:00
Taking Advantage Of Telenet 00:00:00
Searching And Understanding Exploits 00:00:00
Copy Exploits From Searchsploit 00:00:00
Understanding Exploits 00:00:00
Launching Exploits 00:00:00
Brute Force Attacks 00:00:00
How To Crack Passwords 00:00:00
ARP Spoofing Overview 00:00:00
Introduction To Cryptography 00:00:00
Section 9 - Post Exploitation
Post Exploitation Section Overview 00:00:00
Privilege Escalation 00:00:00
Transferring Files in/out of Victim, Creating Custom Malware Plus Evading Antivirus 00:00:00
Installing a Keylogger 00:00:00
Installing a Backdoor 00:00:00
Section 10 - Website And Web Application Hacking
Website And Web Application Hacking Overview 00:00:00
Web Application Scanning 00:00:00
Directory Buster Hacking Tool 00:00:00
Nikto Web App Hacking Tool 00:00:00
SQLmap And SQL Ninja Overview 00:00:00
How To Execute Brute Force Attacks 00:00:00
Using Command Injection 00:00:00
Malicious File Upload 00:00:00
Local And Remote File Inclusion 00:00:00
SQL Injection Overview 00:00:00
Using Cross Site Request Forgery 00:00:00
Cross Site Scripting Overview 00:00:00
Section 11 - Mobile Phone Hacking And Security
Mobile Phone Hacking Section Overview 00:00:00
Mobile Attack Vectors 00:00:00
Mobile Hacking Using URLs 00:00:00
Jail Breaking And Rooting Considerations 00:00:00
Privacy Issues (Geo Location) 00:00:00
Mobile Phone Data Security 00:00:00
Section 12 - Getting Your Name Out There As An Ethical Hacker
Getting Your Name Out There Section Overview 00:00:00
Building A Brand 00:00:00
Personal Branding 00:00:00
Setup Your Website and Blog 00:00:00
Writing A Book 00:00:00
Starting A Podcast 00:00:00
Networking Overview 00:00:00
Section 13 - How To Make Money As An Ethical Hacker
Making Money Section Overview 00:00:00
Bug Bounty Programs 00:00:00
How To Start Freelancing 00:00:00
How To Start Client Consulting 00:00:00
Section 14 - How To Start A Career In Cybersecurity
Potential Salary And Cybersecurity Roadmap 00:00:00
Books Recommendations 00:00:00
Places To Practice Hacking For Free 00:00:00

About This Course

Blending practical work with solid theoretical training, we take you from the basics of ethical hacking through to mastery, giving you the training you need not just to hack, but also to secure against a hack.

While the theory is important, we understand that it can also be dry and uninspiring. For this reason, this course is packed with examples that you can follow. This practical focus starts from the beginning, where we will teach you about penetration testing and show you how to install the software required (Windows, Linux, and Mac OSX) and jump right into hacking.

Throughout, you will analyze and exploit various systems from regular websites through to sprawling networks, along with hacking servers and clients. More than just hacking, you’ll also learn how to conduct efficient penetration testing techniques.

What you’ll learn:

  • Become an elite ethical hacker
  • Set up a hacking lab
  • Launch attacks/exploits against computers
  • How to start a cybersecurity/ethical hacking career

Who this course is for:

  • This course is for anyone who has an interest in Cybersecurity or Ethical Hacking/Penetration Testing
  • Anyone who wants to start a career as an Ethical Hacker or Penetration Tester but does not know where to start

Our Promise to You

By the end of this course, you will have learned ethical hacking.

10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.

Get started today and learn more about the basics of hacking.

Course Curriculum

Section 1 - Course Introduction
Course Overview 00:00:00
About Your Instructors 00:00:00
Section Overview 00:00:00
Current Cybersecurity Market 00:00:00
The Three Types of Hackers 00:00:00
The Four Elements of Security 00:00:00
Ethical Hacker Terminology 00:00:00
Common Methods Of Hacking 00:00:00
Cybersecurity And Ethical Hacking Overview 00:00:00
Ethical Hacking Vs Penetration Testing 00:00:00
Job Opportunities In Cybersecurity 00:00:00
Who is This Course is For 00:00:00
Section 2 - Networking Basics
Networking Section Overview 00:00:00
How Data Travels Across The Internet 00:00:00
Understanding Ports And Protocols 00:00:00
Understanding IP Addresses: Public And Private 00:00:00
What Are Subnets 00:00:00
The Average Network Vs Remote Based 00:00:00
Section 3 - Setting Up Your Hacking Lab
Hacking Lab Section Overview 00:00:00
Understanding Virtual Machines 00:00:00
Setup Your Kali Linux Machine 00:00:00
VN Setup And Testing Vulnerable Systems 00:00:00
Section 4 - Linux, Python, Bash And PowerShell Basics
Linux Plus Python Plus Bash Plus Powershell Section Overview 00:00:00
Linux Basics 00:00:00
Working With Directories And Moving Files 00:00:00
Installing And Updating Application Files 00:00:00
Linux Text Editors 00:00:00
Searching For Files 00:00:00
Bash Scripting Basics 00:00:00
Python Basics 00:00:00
Section 5 - How To Remain Anonymous On The Web
Remaining Anonymous Section Overview 00:00:00
TOR Browser Overview 00:00:00
Anonsurf Overview 00:00:00
Changing Mac Addresses 00:00:00
Using a Virtual Private Network Or Server (VPN, VPS) 00:00:00
Section 6 - How To Hack Into WIFI
WiFi Hacking Section Overview 00:00:00
WiFi Hacking System Setup 00:00:00
WEP Hacking Attack Number One 00:00:00
WEP Hacking Attack Two 00:00:00
WPA Or WPA2 Hacking 00:00:00
Section 7 - Passive And Active Reconnaissance (Information Gathering)
Reconnaissance Section Overview 00:00:00
Passive Recon Vs Active Recon 00:00:00
Recon-ng Overview 00:00:00
Whois Enumeration 00:00:00
DNS Enumeration Overview 00:00:00
Netcraft.com DNS Information 00:00:00
Google Hacking 00:00:00
Shodan.io Overview 00:00:00
Securityheaders.com (Analyze HTTPS Headers of website) 00:00:00
Ssllabs.com Or ssltest (Look for SSL issues on website) 00:00:00
Pastebin.com (Sensitive Information) 00:00:00
NMAP Port Scanning (Discover Open Ports, OS, Services, Vulnerabilities, etc.) 00:00:00
Netcat Overview Plus SMB/NFSEnumeration 00:00:00
Nikto And Sparta Web Application Scanner 00:00:00
SMPT Enumeration And Nessus Or Openvas Scanners 00:00:00
Section 8 - Launching Attacks
Launching Attacks Overview 00:00:00
Analyzing Information Gathered 00:00:00
Taking Advantage Of Telenet 00:00:00
Searching And Understanding Exploits 00:00:00
Copy Exploits From Searchsploit 00:00:00
Understanding Exploits 00:00:00
Launching Exploits 00:00:00
Brute Force Attacks 00:00:00
How To Crack Passwords 00:00:00
ARP Spoofing Overview 00:00:00
Introduction To Cryptography 00:00:00
Section 9 - Post Exploitation
Post Exploitation Section Overview 00:00:00
Privilege Escalation 00:00:00
Transferring Files in/out of Victim, Creating Custom Malware Plus Evading Antivirus 00:00:00
Installing a Keylogger 00:00:00
Installing a Backdoor 00:00:00
Section 10 - Website And Web Application Hacking
Website And Web Application Hacking Overview 00:00:00
Web Application Scanning 00:00:00
Directory Buster Hacking Tool 00:00:00
Nikto Web App Hacking Tool 00:00:00
SQLmap And SQL Ninja Overview 00:00:00
How To Execute Brute Force Attacks 00:00:00
Using Command Injection 00:00:00
Malicious File Upload 00:00:00
Local And Remote File Inclusion 00:00:00
SQL Injection Overview 00:00:00
Using Cross Site Request Forgery 00:00:00
Cross Site Scripting Overview 00:00:00
Section 11 - Mobile Phone Hacking And Security
Mobile Phone Hacking Section Overview 00:00:00
Mobile Attack Vectors 00:00:00
Mobile Hacking Using URLs 00:00:00
Jail Breaking And Rooting Considerations 00:00:00
Privacy Issues (Geo Location) 00:00:00
Mobile Phone Data Security 00:00:00
Section 12 - Getting Your Name Out There As An Ethical Hacker
Getting Your Name Out There Section Overview 00:00:00
Building A Brand 00:00:00
Personal Branding 00:00:00
Setup Your Website and Blog 00:00:00
Writing A Book 00:00:00
Starting A Podcast 00:00:00
Networking Overview 00:00:00
Section 13 - How To Make Money As An Ethical Hacker
Making Money Section Overview 00:00:00
Bug Bounty Programs 00:00:00
How To Start Freelancing 00:00:00
How To Start Client Consulting 00:00:00
Section 14 - How To Start A Career In Cybersecurity
Potential Salary And Cybersecurity Roadmap 00:00:00
Books Recommendations 00:00:00
Places To Practice Hacking For Free 00:00:00

Are you interested in higher education?