This course is designed for those interested to learn the basics of ethical hacking, becoming an elite ethical hacker, exploiting computers, setting up a hacking lab, and making a career out of it. Read more.
Hi I'm Juan. My background is in the tech space from Digital Marketing, E-commerce, Web Development to Programming.
Access all courses in our library for only $9/month with All Access Pass
Get Started with All Access PassBuy Only This CourseAbout This Course
Blending practical work with solid theoretical training, we take you from the basics of ethical hacking through to mastery, giving you the training you need not just to hack, but also to secure against a hack.
While the theory is important, we understand that it can also be dry and uninspiring. For this reason, this course is packed with examples that you can follow. This practical focus starts from the beginning, where we will teach you about penetration testing and show you how to install the software required (Windows, Linux, and Mac OSX) and jump right into hacking.
Throughout, you will analyze and exploit various systems from regular websites through to sprawling networks, along with hacking servers and clients. More than just hacking, you’ll also learn how to conduct efficient penetration testing techniques.
What you’ll learn:
- Become an elite ethical hacker
- Set up a hacking lab
- Launch attacks/exploits against computers
- How to start a cybersecurity/ethical hacking career
Who this course is for:
- This course is for anyone who has an interest in Cybersecurity or Ethical Hacking/Penetration Testing
- Anyone who wants to start a career as an Ethical Hacker or Penetration Tester but does not know where to start
Our Promise to You
By the end of this course, you will have learned ethical hacking.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the basics of hacking.
Course Curriculum
Section 1 - Course Introduction | |||
Course Overview | 00:00:00 | ||
About Your Instructors | 00:00:00 | ||
Section Overview | 00:00:00 | ||
Current Cybersecurity Market | 00:00:00 | ||
The Three Types of Hackers | 00:00:00 | ||
The Four Elements of Security | 00:00:00 | ||
Ethical Hacker Terminology | 00:00:00 | ||
Common Methods Of Hacking | 00:00:00 | ||
Cybersecurity And Ethical Hacking Overview | 00:00:00 | ||
Ethical Hacking Vs Penetration Testing | 00:00:00 | ||
Job Opportunities In Cybersecurity | 00:00:00 | ||
Who is This Course is For | 00:00:00 | ||
Section 2 - Networking Basics | |||
Networking Section Overview | 00:00:00 | ||
How Data Travels Across The Internet | 00:00:00 | ||
Understanding Ports And Protocols | 00:00:00 | ||
Understanding IP Addresses: Public And Private | 00:00:00 | ||
What Are Subnets | 00:00:00 | ||
The Average Network Vs Remote Based | 00:00:00 | ||
Section 3 - Setting Up Your Hacking Lab | |||
Hacking Lab Section Overview | 00:00:00 | ||
Understanding Virtual Machines | 00:00:00 | ||
Setup Your Kali Linux Machine | 00:00:00 | ||
VN Setup And Testing Vulnerable Systems | 00:00:00 | ||
Section 4 - Linux, Python, Bash And PowerShell Basics | |||
Linux Plus Python Plus Bash Plus Powershell Section Overview | 00:00:00 | ||
Linux Basics | 00:00:00 | ||
Working With Directories And Moving Files | 00:00:00 | ||
Installing And Updating Application Files | 00:00:00 | ||
Linux Text Editors | 00:00:00 | ||
Searching For Files | 00:00:00 | ||
Bash Scripting Basics | 00:00:00 | ||
Python Basics | 00:00:00 | ||
Section 5 - How To Remain Anonymous On The Web | |||
Remaining Anonymous Section Overview | 00:00:00 | ||
TOR Browser Overview | 00:00:00 | ||
Anonsurf Overview | 00:00:00 | ||
Changing Mac Addresses | 00:00:00 | ||
Using a Virtual Private Network Or Server (VPN, VPS) | 00:00:00 | ||
Section 6 - How To Hack Into WIFI | |||
WiFi Hacking Section Overview | 00:00:00 | ||
WiFi Hacking System Setup | 00:00:00 | ||
WEP Hacking Attack Number One | 00:00:00 | ||
WEP Hacking Attack Two | 00:00:00 | ||
WPA Or WPA2 Hacking | 00:00:00 | ||
Section 7 - Passive And Active Reconnaissance (Information Gathering) | |||
Reconnaissance Section Overview | 00:00:00 | ||
Passive Recon Vs Active Recon | 00:00:00 | ||
Recon-ng Overview | 00:00:00 | ||
Whois Enumeration | 00:00:00 | ||
DNS Enumeration Overview | 00:00:00 | ||
Netcraft.com DNS Information | 00:00:00 | ||
Google Hacking | 00:00:00 | ||
Shodan.io Overview | 00:00:00 | ||
Securityheaders.com (Analyze HTTPS Headers of website) | 00:00:00 | ||
Ssllabs.com Or ssltest (Look for SSL issues on website) | 00:00:00 | ||
Pastebin.com (Sensitive Information) | 00:00:00 | ||
NMAP Port Scanning (Discover Open Ports, OS, Services, Vulnerabilities, etc.) | 00:00:00 | ||
Netcat Overview Plus SMB/NFSEnumeration | 00:00:00 | ||
Nikto And Sparta Web Application Scanner | 00:00:00 | ||
SMPT Enumeration And Nessus Or Openvas Scanners | 00:00:00 | ||
Section 8 - Launching Attacks | |||
Launching Attacks Overview | 00:00:00 | ||
Analyzing Information Gathered | 00:00:00 | ||
Taking Advantage Of Telenet | 00:00:00 | ||
Searching And Understanding Exploits | 00:00:00 | ||
Copy Exploits From Searchsploit | 00:00:00 | ||
Understanding Exploits | 00:00:00 | ||
Launching Exploits | 00:00:00 | ||
Brute Force Attacks | 00:00:00 | ||
How To Crack Passwords | 00:00:00 | ||
ARP Spoofing Overview | 00:00:00 | ||
Introduction To Cryptography | 00:00:00 | ||
Section 9 - Post Exploitation | |||
Post Exploitation Section Overview | 00:00:00 | ||
Privilege Escalation | 00:00:00 | ||
Transferring Files in/out of Victim, Creating Custom Malware Plus Evading Antivirus | 00:00:00 | ||
Installing a Keylogger | 00:00:00 | ||
Installing a Backdoor | 00:00:00 | ||
Section 10 - Website And Web Application Hacking | |||
Website And Web Application Hacking Overview | 00:00:00 | ||
Web Application Scanning | 00:00:00 | ||
Directory Buster Hacking Tool | 00:00:00 | ||
Nikto Web App Hacking Tool | 00:00:00 | ||
SQLmap And SQL Ninja Overview | 00:00:00 | ||
How To Execute Brute Force Attacks | 00:00:00 | ||
Using Command Injection | 00:00:00 | ||
Malicious File Upload | 00:00:00 | ||
Local And Remote File Inclusion | 00:00:00 | ||
SQL Injection Overview | 00:00:00 | ||
Using Cross Site Request Forgery | 00:00:00 | ||
Cross Site Scripting Overview | 00:00:00 | ||
Section 11 - Mobile Phone Hacking And Security | |||
Mobile Phone Hacking Section Overview | 00:00:00 | ||
Mobile Attack Vectors | 00:00:00 | ||
Mobile Hacking Using URLs | 00:00:00 | ||
Jail Breaking And Rooting Considerations | 00:00:00 | ||
Privacy Issues (Geo Location) | 00:00:00 | ||
Mobile Phone Data Security | 00:00:00 | ||
Section 12 - Getting Your Name Out There As An Ethical Hacker | |||
Getting Your Name Out There Section Overview | 00:00:00 | ||
Building A Brand | 00:00:00 | ||
Personal Branding | 00:00:00 | ||
Setup Your Website and Blog | 00:00:00 | ||
Writing A Book | 00:00:00 | ||
Starting A Podcast | 00:00:00 | ||
Networking Overview | 00:00:00 | ||
Section 13 - How To Make Money As An Ethical Hacker | |||
Making Money Section Overview | 00:00:00 | ||
Bug Bounty Programs | 00:00:00 | ||
How To Start Freelancing | 00:00:00 | ||
How To Start Client Consulting | 00:00:00 | ||
Section 14 - How To Start A Career In Cybersecurity | |||
Potential Salary And Cybersecurity Roadmap | 00:00:00 | ||
Books Recommendations | 00:00:00 | ||
Places To Practice Hacking For Free | 00:00:00 |
About This Course
Blending practical work with solid theoretical training, we take you from the basics of ethical hacking through to mastery, giving you the training you need not just to hack, but also to secure against a hack.
While the theory is important, we understand that it can also be dry and uninspiring. For this reason, this course is packed with examples that you can follow. This practical focus starts from the beginning, where we will teach you about penetration testing and show you how to install the software required (Windows, Linux, and Mac OSX) and jump right into hacking.
Throughout, you will analyze and exploit various systems from regular websites through to sprawling networks, along with hacking servers and clients. More than just hacking, you’ll also learn how to conduct efficient penetration testing techniques.
What you’ll learn:
- Become an elite ethical hacker
- Set up a hacking lab
- Launch attacks/exploits against computers
- How to start a cybersecurity/ethical hacking career
Who this course is for:
- This course is for anyone who has an interest in Cybersecurity or Ethical Hacking/Penetration Testing
- Anyone who wants to start a career as an Ethical Hacker or Penetration Tester but does not know where to start
Our Promise to You
By the end of this course, you will have learned ethical hacking.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the basics of hacking.
Course Curriculum
Section 1 - Course Introduction | |||
Course Overview | 00:00:00 | ||
About Your Instructors | 00:00:00 | ||
Section Overview | 00:00:00 | ||
Current Cybersecurity Market | 00:00:00 | ||
The Three Types of Hackers | 00:00:00 | ||
The Four Elements of Security | 00:00:00 | ||
Ethical Hacker Terminology | 00:00:00 | ||
Common Methods Of Hacking | 00:00:00 | ||
Cybersecurity And Ethical Hacking Overview | 00:00:00 | ||
Ethical Hacking Vs Penetration Testing | 00:00:00 | ||
Job Opportunities In Cybersecurity | 00:00:00 | ||
Who is This Course is For | 00:00:00 | ||
Section 2 - Networking Basics | |||
Networking Section Overview | 00:00:00 | ||
How Data Travels Across The Internet | 00:00:00 | ||
Understanding Ports And Protocols | 00:00:00 | ||
Understanding IP Addresses: Public And Private | 00:00:00 | ||
What Are Subnets | 00:00:00 | ||
The Average Network Vs Remote Based | 00:00:00 | ||
Section 3 - Setting Up Your Hacking Lab | |||
Hacking Lab Section Overview | 00:00:00 | ||
Understanding Virtual Machines | 00:00:00 | ||
Setup Your Kali Linux Machine | 00:00:00 | ||
VN Setup And Testing Vulnerable Systems | 00:00:00 | ||
Section 4 - Linux, Python, Bash And PowerShell Basics | |||
Linux Plus Python Plus Bash Plus Powershell Section Overview | 00:00:00 | ||
Linux Basics | 00:00:00 | ||
Working With Directories And Moving Files | 00:00:00 | ||
Installing And Updating Application Files | 00:00:00 | ||
Linux Text Editors | 00:00:00 | ||
Searching For Files | 00:00:00 | ||
Bash Scripting Basics | 00:00:00 | ||
Python Basics | 00:00:00 | ||
Section 5 - How To Remain Anonymous On The Web | |||
Remaining Anonymous Section Overview | 00:00:00 | ||
TOR Browser Overview | 00:00:00 | ||
Anonsurf Overview | 00:00:00 | ||
Changing Mac Addresses | 00:00:00 | ||
Using a Virtual Private Network Or Server (VPN, VPS) | 00:00:00 | ||
Section 6 - How To Hack Into WIFI | |||
WiFi Hacking Section Overview | 00:00:00 | ||
WiFi Hacking System Setup | 00:00:00 | ||
WEP Hacking Attack Number One | 00:00:00 | ||
WEP Hacking Attack Two | 00:00:00 | ||
WPA Or WPA2 Hacking | 00:00:00 | ||
Section 7 - Passive And Active Reconnaissance (Information Gathering) | |||
Reconnaissance Section Overview | 00:00:00 | ||
Passive Recon Vs Active Recon | 00:00:00 | ||
Recon-ng Overview | 00:00:00 | ||
Whois Enumeration | 00:00:00 | ||
DNS Enumeration Overview | 00:00:00 | ||
Netcraft.com DNS Information | 00:00:00 | ||
Google Hacking | 00:00:00 | ||
Shodan.io Overview | 00:00:00 | ||
Securityheaders.com (Analyze HTTPS Headers of website) | 00:00:00 | ||
Ssllabs.com Or ssltest (Look for SSL issues on website) | 00:00:00 | ||
Pastebin.com (Sensitive Information) | 00:00:00 | ||
NMAP Port Scanning (Discover Open Ports, OS, Services, Vulnerabilities, etc.) | 00:00:00 | ||
Netcat Overview Plus SMB/NFSEnumeration | 00:00:00 | ||
Nikto And Sparta Web Application Scanner | 00:00:00 | ||
SMPT Enumeration And Nessus Or Openvas Scanners | 00:00:00 | ||
Section 8 - Launching Attacks | |||
Launching Attacks Overview | 00:00:00 | ||
Analyzing Information Gathered | 00:00:00 | ||
Taking Advantage Of Telenet | 00:00:00 | ||
Searching And Understanding Exploits | 00:00:00 | ||
Copy Exploits From Searchsploit | 00:00:00 | ||
Understanding Exploits | 00:00:00 | ||
Launching Exploits | 00:00:00 | ||
Brute Force Attacks | 00:00:00 | ||
How To Crack Passwords | 00:00:00 | ||
ARP Spoofing Overview | 00:00:00 | ||
Introduction To Cryptography | 00:00:00 | ||
Section 9 - Post Exploitation | |||
Post Exploitation Section Overview | 00:00:00 | ||
Privilege Escalation | 00:00:00 | ||
Transferring Files in/out of Victim, Creating Custom Malware Plus Evading Antivirus | 00:00:00 | ||
Installing a Keylogger | 00:00:00 | ||
Installing a Backdoor | 00:00:00 | ||
Section 10 - Website And Web Application Hacking | |||
Website And Web Application Hacking Overview | 00:00:00 | ||
Web Application Scanning | 00:00:00 | ||
Directory Buster Hacking Tool | 00:00:00 | ||
Nikto Web App Hacking Tool | 00:00:00 | ||
SQLmap And SQL Ninja Overview | 00:00:00 | ||
How To Execute Brute Force Attacks | 00:00:00 | ||
Using Command Injection | 00:00:00 | ||
Malicious File Upload | 00:00:00 | ||
Local And Remote File Inclusion | 00:00:00 | ||
SQL Injection Overview | 00:00:00 | ||
Using Cross Site Request Forgery | 00:00:00 | ||
Cross Site Scripting Overview | 00:00:00 | ||
Section 11 - Mobile Phone Hacking And Security | |||
Mobile Phone Hacking Section Overview | 00:00:00 | ||
Mobile Attack Vectors | 00:00:00 | ||
Mobile Hacking Using URLs | 00:00:00 | ||
Jail Breaking And Rooting Considerations | 00:00:00 | ||
Privacy Issues (Geo Location) | 00:00:00 | ||
Mobile Phone Data Security | 00:00:00 | ||
Section 12 - Getting Your Name Out There As An Ethical Hacker | |||
Getting Your Name Out There Section Overview | 00:00:00 | ||
Building A Brand | 00:00:00 | ||
Personal Branding | 00:00:00 | ||
Setup Your Website and Blog | 00:00:00 | ||
Writing A Book | 00:00:00 | ||
Starting A Podcast | 00:00:00 | ||
Networking Overview | 00:00:00 | ||
Section 13 - How To Make Money As An Ethical Hacker | |||
Making Money Section Overview | 00:00:00 | ||
Bug Bounty Programs | 00:00:00 | ||
How To Start Freelancing | 00:00:00 | ||
How To Start Client Consulting | 00:00:00 | ||
Section 14 - How To Start A Career In Cybersecurity | |||
Potential Salary And Cybersecurity Roadmap | 00:00:00 | ||
Books Recommendations | 00:00:00 | ||
Places To Practice Hacking For Free | 00:00:00 |