- Introduction
- Course Manual
The Complete Ethical Hacking Course
Quick Facts
particular | details | |||
---|---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course overview
The Complete Ethical Hacking Course is a short certification created jointly by Codestars by Rob Percival and Atil Samancioglu that intends to assist the students to have an in-depth knowledge of Ethical Hacking and guide them on how to dodge hackers and cyberattacks. Through this course, the learners will explore VPN & DNS, Social Engineering, Python, Dark Web, Kali Linux, Beef, Apache, Nmap, SQLMap, Socket, Scapy, Pynput, Keylogger, and a lot more. The Complete Ethical Hacking Course Online Programme is open for enrolment for any candidate who is passionate about ethical hacking and possesses a computer with a minimum of 4GB of RAM.
The Complete Ethical Hacking Course Certification, the online course by Udemy, will coach the candidates on the tools the hackers use, the way of hackers’ attack on various computers, systems, websites, users, and wireless networks, creation of Ethical Hacking tool portfolio, developing security and hacking tool with Python on their own and many more. The interested folk can join the online programme by making the payment of a fee.
The highlights
- Online course
- Downloadable resources
- Full lifetime access
- Access on mobile and TV
- Certificate of completion
- English videos
- 30-Day Money-Back Guarantee
Program offerings
- 36.5 hours on-demand video
- 36 articles
- 4 downloadable resources
- Full lifetime access
- Access on mobile and tv
- Certificate of completion
Course and certificate fees
Fees information
certificate availability
Yes
certificate providing authority
Udemy
Who it is for
What you will learn
By the end of The Complete Ethical Hacking Course Online Certification, students can learn SQL Injection, Commands, Metasploit, Website penetration testing, System penetration testing, Wireless networks penetration testing, Wireless Attacks, Object-Oriented Programming, Backdoor, and whatnot.
The syllabus
Introduction
Hacking Lab Setup
- Hacking Lab Setup Introduction
- What is Virtual Machine
- Installing Virtualbox (Windows)
- Installing Virtualbox (MAC)
- Installing Kali Linux
- Solutions to Common Problems & Links
- Kali Linux Problem Solving: ISO Installation
- Installing Windows 10
- Snapshots
- Quick Reminder Before We Move On
- Hacking Lab Setup Outro
Kali Linux 101
- Kali Linux 101 Introduction
- Kali Overview
- Linux Terminal
- Changing Kali Password
- Kali Linux 101 Outro
Anonymity Online
- Anonymity Online Introduction
- How Networks Work
- VPN & DNS Explained
- VPN Usage
- Changing DNS
- VPN and DNS Together
- Solutions for Problems
- Anonymity Online Outro
Dark Web
- Dark Web Introduction
- What is Dark Web?
- Installing Tor On Kali
- Browsing Dark Web
- Dark Web Outro
Network Pentesting
- Network Pentesting Introduction
- What is Network Pentesting?
- Chipsets
- Kali Linux WiFi Card List
- Connecting WiFi USB
- Solutions to Common Connection Problems
- MAC Address
- Monitor vs Managed
- Network Pentesting Outro
Gathering Information From Networks
- Gathering Information From Networks Introduction
- Network Sniffing
- Airodump Specific Target
- Deauthentication Attacks
- Gathering Information From Networks Outro
Wireless Attacks
- Wireless Attacks Introduction
- WEP Settings
- WEP Encryption Logic
- Cracking WEP
- Fake Authentication
- WPA & WPA2
- Capturing Handshake
- WPA Cracking
- Wordlist Alternatives
- More Secure Network
- Wireless Attacks Outro
Post Connection Attacks
- Post Connection Attacks Introduction
- Post Connection Settings
- Netdiscover
- nMap
- Man In The Middle
- Manual ARP Poison
- Man In The Middle Framework
- How Hackers Steal Passwords
- Breaking HTTPS
- Creating Web Server
- DNS Attacks
- Bettercap Installation
- ARP Attack
- Capturing Information
- Caplet Usage
- About HSTS Settings
- HSTS Settings
- Breaking HTTPS
- HSTS Downgrade Attempt
- Javascript Injection
- Wireshark Intro
- Wireshark Analysis
- How to Protect Yourself
- Post Connection Attacks Outro
System Pentesting
- System Pentesting Introduction
- Gaining Access
- Installing Metasploitable
- Zenmap Installation
- Finding Vulnerabilities
- Exploiting First Vulnerability
- Exploiting Username Map Script
- Exploiting PostgreSQL Vulnerability
- System Pentesting Outro
Attacks On Users
- Attacks On Users Introduction
- Attacking to Users
- Installing Veil
- Veil Overview
- Creating First Backdoor
- Bypassing Antivirus Solutions
- Using Multi Handler
- Testing Backdoor
- What is Fud?
- FatRat Features
- Attacks On Users Outro
Social Engineering
- Social Engineering Introduction
- What is Maltego?
- Maltego Overview
- Strategy
- Choosing Image
- Combining Files
- Hacking Windows
- Changing the Extension
- Fake Emails
- Social Engineering Outro
Social Media Security
- Social Media Security Introduction
- Instagram Brute Force Attacks
- Instagram Social Engineering
- How to Protect Ourselves
- Social Media Security Outro
Beef
- Beef Introduction
- What is Beef?
- What If Beef is not Installed in Kali?
- Hooking Target
- Injection
- Taking Screenshots
- How Hackers Steal Facebook Passwords?
- Backdoor Delivery
- How to Protect Yourself?
- Beef Outro
External Network Attacks
- External Network Attacks Introduction
- External Network Attack Options
- What is a Tunneling Service?
- Msfvenom
- Hacking Windows
- Running Veil with Ngrok
- Optional: External Backdoor with Port Forwarding
- Optional: External Backdoor Hacking with Port Listening
- Setoolkit
- Setoolkit Modules
- Hacking Gmail
- sendEmail
- External Network Attacks Outro
Fake Game Website Attacks
- Fake Game Website Attacks Introduction
- External Beef Attack
- Necessary Links
- Ubuntu Server Creation
- Creating Game Website
- Installing Beef
- Beef in Ubuntu
- Embedding JavaScript
- What is No IP?
- Hooking iPhone
- How to Stay Safe
- Fake Game Website Attacks Outro
Post Hacking Sessions
- Post Hacking Sessions Introduction
- Meterpreter Sessions
- Migration
- Downloading Files
- Capturing Keylogs
- Sustaining The Session
- Post Hacking Sessions Outro
Hacker Methodology
- Hacker Methodology Introduction
- Ethical Hacker's Steps
- Detailed Explanation of Methodology
- Hacker Methodology Outro
Website Reconnaissance
- Website Reconnaissance Introduction
- Website Pentesting Setup
- Maltego One More Time
- Netcraft
- Reverse DNS Lookup
- Whois Lookup
- Robots
- Subdomains
- Website Reconnaissance Outro
Website Pentesting
- Website Pentesting Introduction
- Code Execution Vulnerability
- Reverse TCP Commands
- File Upload Vulnerability
- File Inclusion
- Website Pentesting Outro
Cross Site Scripting
- Cross Site Scripting Introduction
- What is XSS?
- Reflected XSS
- Stored XSS
- Real Hacking with XSS
- How to Protect Yourself?
- Cross Site Scripting Outro
SQL 101
- SQL 101 Introduction
- Database and SQL
- Database Structure
- Adding a New Value
- Updating and Deleting Values
- Filtering
- SQL Codes Used In This Section
- SQL 101 Outro
SQL Injection
- SQL Injection Introduction
- Metasploitable Databases
- Working with Mutillidae
- Vulnerability Test
- Post Method SQLi
- Get Method SQLi
- Every Password On Database
- Learning Database Name
- Finding Out More
- Retrieving Everything
- SQL Injection Outro
Website Pentesting Tools
- Website Pentesting Tools Introduction
- Sqlmap
- Zap
- Zap Analysis
- Website Pentesting Tools Outro
Ethical Hacking Certifications
- Ethical Hacking Certifications Introduction
- Options for Certification
- Certified Ethical Hacker
- OSCP
- Ethical Hacking Certifications Outro
Network Theory
- What is OSI Model?
- What is Binary?
- IP Address Advanced
- Host Calculations
- TCP vs UDP
Python For Ethical Hacking Setup
- Python For Ethical Hacking Setup Introduction
- Anaconda Installation (Windows)
- Anaconda Installation (MAC)
- Python For Ethical Hacking Setup Outro
Python Data Types & Structures
- Python Data Types & Structures Introduction
- Numbers
- Variables
- Downloading Notebooks
- Variables & General GitHub Link
- String
- String GitHub Link
- String Advanced
- String Advanced GitHub Link
- Variable Attributes
- Lists
- Lists Advanced
- Lists GitHub Link
- Dictionary
- Dictionary GitHub Link
- Sets
- Sets GitHub Link
- Tuples
- Tuples GitHub Link
- Boolean
- Boolean GitHub Link
- Python Data Types & Structures Outro
Control Statements & Loops
- Control Statements & Loops Introduction
- Logical Comparisons
- Comparisons GitHub Link
- If Statements
- If Statements Continued
- If Statements Practical Usage
- If Statements GitHub Link
- For Loop
- For Loop Practical Usage
- For Loop GitHub Link
- Break Continue Pass
- Break Continue Pass GitHub Link
- While Loop
- While Loop GitHub Link
- Control Statements & Loops Outro
Essentials
- Essentials Introduction
- Useful Methods
- Zip and Random
- Lists Advanced
- Useful Methods GitHub Link
- Sublime Text (Windows)
- Command Prompt (Windows)
- Sublime Text (MAC)
- Terminal (MAC)
- Essentials Outro
Functions
- Functions Introduction
- Functions Explained
- Input and Output
- Functions Advanced
- Functions GitHub Link
- Functions Practical Usage
- Practical Functions GitHub Link
- Scope
- Scope GitHub Link
- Functions Outro
Object Oriented Programming
- Object Oriented Programming Introduction
- Class
- Methods
- Class Practical Usage
- Inheritance
- OOP Classes GitHub Link
- Special Methods
- Special Methods GitHub Link
- Error Handling
- Error Handling GitHub Link
- Object Oriented Programming Outro
Modules
- Modules Introduction
- Using Libraries
- Modules GitHub Link
- Writing Our Own Modules
- Imported vs Direct
- Imported vs Direct GitHub Link
- Modules Outro
MAC Changer
- MAC Changer Introduction
- Installing PyCharm On Kali
- MAC and IP Address
- Changing MAC Manually
- Using Subprocess
- Introducing Variables
- Processing Tuples
- Beautifying the Code
- Saving Subprocess
- Regex 101
- New MAC Control
- Python3 Compatibility
- MAC Changer GitHub Link
- MAC Changer Outro
Network Scanner
- Network Scanner Introduction
- ARP Refreshed
- How Network Scanners Work
- ARP Request
- Broadcast Request
- Processing Response
- Adding Features
- Python3 Compatibility
- Network Scanner GitHub Link
- Network Scanner Outro
Man In The Middle
- Man In The Middle Introduction
- MITM Refreshed
- ARP Response Creation
- ARP Poison
- Getting MAC Address
- Looping Continuously
- Displaying Better Logs
- Handling Specific Error
- Getting User Input
- MITM GitHub Link
- Man In The Middle Outro
Packet Listener
- Packet Listener Introduction
- Wireshark Refreshed
- Wireshark Analysis
- Gathering Packets
- Working With Layers
- Downgrading HTTPS
- Protecting Ourselves
- Packet Listener GitHub Link
- Packet Listener Outro
Keylogger
- Keylogger Introduction
- Setting Up Windows
- Working With Files
- Logging Keyboard
- Saving Logs
- Handling Errors
- Sending Email
- Reason Behind Threading
- Threading Library
- Testing On Windows
- Keylogger GitHub Link
- Keylogger Outro
Backdoor
- Backdoor Introduction
- How To Write a Backdoor?
- Opening a Connection
- Running Commands
- Writing Listener
- Sending Commands With Listener
- Class Structure
- Finishing Classes
- What is JSON?
- Processing JSON
- Sending Commands With List
- Cd Command Implementation
- Getting Contents
- Saving Files
- Encoding Downloads
- Upload Functionality
- Handling Errors
- Python3 Compatibility
- Backdoor GitHub Link
- Backdoor Outro
Packaging & Malicious Files
- Packaging & Malicious Files Introduction
- Malicious Files
- Creating Executables
- What is Regedit?
- Copying Files
- Running Executables On Startup
- Adding PDF to File
- Changing Icons
- Changing Extensions
- MyPackage GitHub Link
- Packaging & Malicious Files Outro
Closing & Ethical Hacker's Handbook
- Closing
- Ethical Hacker's Handbook
Instructors
Articles
Popular Articles
Latest Articles
Similar Courses

Introduction to Ethical Hacking
Great Learning


Hacking COVID 19 Course 3 Unraveling COVID 19s Ori...
UC San Diego via Coursera


Hacking COVID-19 Course 1 Identifying a Deadly Pat...
UC San Diego via Coursera
Courses of your Interest
C++ Foundation
PW Skills
Advanced CFD Meshing using ANSA
Skill Lync
Data Science Foundations to Core Bootcamp
Springboard

User Experience Design And Research
UM–Ann Arbor via Futurelearn

Fundamentals of Agile Project Management
UCI Irvine via Futurelearn

Artificial intelligence Design and Engineering wit...
CloudSwyft Global Systems, Inc via Futurelearn