0
0 reviews
The Complete Ethical Hacking Course: Beginner to Advanced!
- Description
- Curriculum
- FAQ
- Reviews
Would you like to learn how to do ethical hacking and penetration testing? This will help you level up your cyber security and ethical hacking career.
This is an intense 6-week course. Where you will also have to do some homework.
In this course you will learn:
- Introduction to Ethical Hacking
- Build your hacking environment!
- Linux Terminal and CLI
- What is Tor? How can you use it to protect your anonymity online?
- Proxy Chains for using proxy servers, hiding your IP, and obtaining access.
- What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN?
- What is a mac changer? How can you use it to change your mac address?
- Footprinting with Nmap and external resources.
- Attacking wireless networks. Overview of the tools.
- Breaking WPA/WPA2 encryption. WiFi hacking and WiFi hacker training.
- Signal jamming and denial of service.
- SSL strips.
- and much more…

This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!
After completeness of the course, you will receive a certification of achievement.
*The provided material, tools, and software in the course are intended for educational use only! Don’t break the Law!
1. Introduction to Ethical Hacking
-
1Introduction to ethnical hacking. What is it in detail?Preview 08:18
We introduce ethnic hacking in detail and what it contains
-
2Prerequisites for getting the most out of the course07:29Sorry, this lesson is currently locked. You need to complete "Introduction to ethnical hacking. What is it in detail?" before accessing it.
-
3Basic terminology – white hat, grey hat, black hat hacking12:00Sorry, this lesson is currently locked. You need to complete "Introduction to ethnical hacking. What is it in detail?" before accessing it.
-
4Basic terminology – SQL injections, VPN , proxy, VPS and keyloggers18:19Sorry, this lesson is currently locked. You need to complete "Introduction to ethnical hacking. What is it in detail?" before accessing it.
2. Build your hacking environment!
-
5Installing VirtualBox with RPM and why use a virtual machine.09:13This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
6Installing VirtualBox using the default package manager from repositories.15:02Sorry, this lesson is currently locked. You need to complete "Installing VirtualBox with RPM and why use a virtual machine." before accessing it.
-
7Creating the virtual environment.13:35Sorry, this lesson is currently locked. You need to complete "Installing VirtualBox with RPM and why use a virtual machine." before accessing it.
-
8Installing VirtualBox on Windows.05:16Sorry, this lesson is currently locked. You need to complete "Installing VirtualBox with RPM and why use a virtual machine." before accessing it.
-
9Kali Linux installation within a virtual environment.16:04Sorry, this lesson is currently locked. You need to complete "Installing VirtualBox with RPM and why use a virtual machine." before accessing it.
-
10Booting up Kali Linux for the first time.12:20Sorry, this lesson is currently locked. You need to complete "Installing VirtualBox with RPM and why use a virtual machine." before accessing it.
-
11Installing VirtualBox Guest Additions.14:40Sorry, this lesson is currently locked. You need to complete "Installing VirtualBox with RPM and why use a virtual machine." before accessing it.
3. Linux Terminal and CLI
-
12Introduction to the Linux terminal.09:50This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
13Linux command line interface (CLI) basics.14:04Sorry, this lesson is currently locked. You need to complete "Introduction to the Linux terminal." before accessing it.
-
14Linux CLI explained in greater detail.15:26Sorry, this lesson is currently locked. You need to complete "Introduction to the Linux terminal." before accessing it.
4. What is Tor? How can you use it to protect your anonymity online?
-
15Using Tor to protect your anonymity online.11:13This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
16Tor continued.15:06Sorry, this lesson is currently locked. You need to complete "Using Tor to protect your anonymity online." before accessing it.
5. ProxyChains for using proxy servers
-
17Proxychains for using proxy servers, hiding your IP, and obtaining access.12:02This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
18Proxychains - part 2.14:16Sorry, this lesson is currently locked. You need to complete "Proxychains for using proxy servers, hiding your IP, and obtaining access." before accessing it.
-
19Proxychains - part 3.13:18This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
6. What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN?
-
20Staying anonymous with a virtual private network (VPN).06:23This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
21VPN continued.12:21Sorry, this lesson is currently locked. You need to complete "Staying anonymous with a virtual private network (VPN)." before accessing it.
7. What is a macchanger? How can you use it to change your mac address?
8. Footprinting with Nmap and external resources.
-
24Footprinting with nmap.17:38This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
25Nmap continued.19:23Sorry, this lesson is currently locked. You need to complete "Footprinting with nmap." before accessing it.
-
26External resources using public listings of known vulnerabilities.10:11Sorry, this lesson is currently locked. You need to complete "Footprinting with nmap." before accessing it.
9. Attacking wireless networks. Overview of the tools.
-
27Introduction to wifi cracking WPA/WPA2.15:29This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
28Aircrack and reaver installation.12:44Sorry, this lesson is currently locked. You need to complete "Introduction to wifi cracking WPA/WPA2." before accessing it.
-
29Installing aircrack-ng on Windows and crunch on Linux.12:32Sorry, this lesson is currently locked. You need to complete "Introduction to wifi cracking WPA/WPA2." before accessing it.
10. Breaking WPA/WPA2 encryption. WiFi hacking and WiFi hacker training.
-
30Aircrack-ng and crunch usage example - part 1.11:20This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
31Aircrack-ng and crunch usage example - part 2.10:26Sorry, this lesson is currently locked. You need to complete "Aircrack-ng and crunch usage example - part 1." before accessing it.
-
32Aircrack-ng and crunch usage example - part 3.20:40Sorry, this lesson is currently locked. You need to complete "Aircrack-ng and crunch usage example - part 1." before accessing it.
-
33Cracking WPS pins with reaver - part 1.11:19Sorry, this lesson is currently locked. You need to complete "Aircrack-ng and crunch usage example - part 1." before accessing it.
-
34Cracking WPS pins with reaver - part 2.10:42Sorry, this lesson is currently locked. You need to complete "Aircrack-ng and crunch usage example - part 1." before accessing it.
-
35Cracking WPS pins with reaver - part 3.16:25Sorry, this lesson is currently locked. You need to complete "Aircrack-ng and crunch usage example - part 1." before accessing it.
11. Signal jamming and denial of service.
-
36Signal jamming and denial of service.13:14This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
37Signal jamming and denial of service - continued.17:56Sorry, this lesson is currently locked. You need to complete "Signal jamming and denial of service." before accessing it.
12. SSL strips
-
38SSL strip - part 1.09:04This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
39SSL strip - part 2.10:38Sorry, this lesson is currently locked. You need to complete "SSL strip - part 1." before accessing it.
-
40SSL strip - part 3.18:13Sorry, this lesson is currently locked. You need to complete "SSL strip - part 1." before accessing it.
13. Let's have a bit of fun!
-
41Funny things - part 1.07:03This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
42Funny things - part 2.12:13Sorry, this lesson is currently locked. You need to complete "Funny things - part 1." before accessing it.
-
43Funny things - part 3.18:22Sorry, this lesson is currently locked. You need to complete "Funny things - part 1." before accessing it.
14. Evil twin method! Clone wireless access points to steal data.
-
44Evil twin - part 1.10:34This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
45Evil twin - part 2.07:28Sorry, this lesson is currently locked. You need to complete "Evil twin - part 1." before accessing it.
-
46Evil twin - part 3.11:19Sorry, this lesson is currently locked. You need to complete "Evil twin - part 1." before accessing it.
15. Attacking routers to give you free reign over the entire network!
-
47Using known vulnerabilities - part 1.09:40This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
48Using know vulnerabilities - part 2.09:20Sorry, this lesson is currently locked. You need to complete "Using known vulnerabilities - part 1." before accessing it.
-
49Using known vulnerabilities - part 3.18:55Sorry, this lesson is currently locked. You need to complete "Using known vulnerabilities - part 1." before accessing it.
16. DNS setting hacking to redirect users with post authentication exploitation.
-
50Post authentication exploitation (DNS) - part 1.09:38This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
51Post authentication exploitation (DNS) - part 2.12:22Sorry, this lesson is currently locked. You need to complete "Post authentication exploitation (DNS) - part 1." before accessing it.
-
52Post authentication exploitation (DNS) - part 3.12:41Sorry, this lesson is currently locked. You need to complete "Post authentication exploitation (DNS) - part 1." before accessing it.
17. Website attacks with SQL injections.
-
53SQL injection - part 1.12:47This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
54SQL injection - part 2.14:47Sorry, this lesson is currently locked. You need to complete "SQL injection - part 1." before accessing it.
-
55SQL injection - part 3.13:22Sorry, this lesson is currently locked. You need to complete "SQL injection - part 1." before accessing it.
-
56SQL injection - part 4.11:24Sorry, this lesson is currently locked. You need to complete "SQL injection - part 1." before accessing it.
-
57SQL injection - part 5.16:56Sorry, this lesson is currently locked. You need to complete "SQL injection - part 1." before accessing it.
18. Brute-forcing methods for cracking passwords
-
58Cracking hashes.12:04This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
59Cracking linux passwords with john the ripper - part 1.12:45Sorry, this lesson is currently locked. You need to complete "Cracking hashes." before accessing it.
-
60Cracking linux passwords with john the ripper - part 2.08:50Sorry, this lesson is currently locked. You need to complete "Cracking hashes." before accessing it.
-
61Cracking Windows passwords with john the ripper.19:25Sorry, this lesson is currently locked. You need to complete "Cracking hashes." before accessing it.
-
62Hydra usage - part 1.17:14Sorry, this lesson is currently locked. You need to complete "Cracking hashes." before accessing it.
-
63Hydra usage - part 2.18:21Sorry, this lesson is currently locked. You need to complete "Cracking hashes." before accessing it.
19. Denial of Service (DoS) attacks demonstrated and explained.
-
64DoS attack demo part 1 - introduction to denial of service attacks.18:37This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
65DoS attack demo part 2 - combine slowloris.pl with nmap.08:20Sorry, this lesson is currently locked. You need to complete "DoS attack demo part 1 - introduction to denial of service attacks." before accessing it.
-
66DoS attack demo part 3 - featuring ha.ckers.org.09:46Sorry, this lesson is currently locked. You need to complete "DoS attack demo part 1 - introduction to denial of service attacks." before accessing it.
20. Reverse shells. Gain remote control of any device!
-
67Intro to metasploit and reverse shells.18:43This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
68Metasploit continued.18:25Sorry, this lesson is currently locked. You need to complete "Intro to metasploit and reverse shells." before accessing it.
-
69Making reverse shells persistent on another system and escalating privileges.16:35Sorry, this lesson is currently locked. You need to complete "Intro to metasploit and reverse shells." before accessing it.
-
70Creating a persistent reverse shell with Metasploit.10:57Sorry, this lesson is currently locked. You need to complete "Intro to metasploit and reverse shells." before accessing it.
-
71Netcat.20:01Sorry, this lesson is currently locked. You need to complete "Intro to metasploit and reverse shells." before accessing it.
-
72How to upload a reverse shell onto a web server.16:33Sorry, this lesson is currently locked. You need to complete "Intro to metasploit and reverse shells." before accessing it.
-
73Final TestAssignmentThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Why is. Is cybersecurity important for a company or a private person?
Cybersecurity is important for both a company and a private person because it helps protect their online data, accounts, and networks from unauthorized access, malicious attacks, and data breaches. Cybersecurity can help protect valuable information such as financial data, customer data, and intellectual property, as well as personal information, such as emails, photos, and social media accounts. Having strong cybersecurity measures in place helps to ensure the security of data and networks and helps protect people from identity theft, financial loss, and other cybercrimes.
What is ethnical Hacking?
Ethical hacking is the practice of testing a computer system, network, or web application to find security vulnerabilities that an attacker could exploit. Ethical hackers use the same tools and techniques as malicious hackers, but instead of taking advantage of the vulnerabilities for personal gain or to cause damage, they report the vulnerabilities to the organization that owns the system so they can be fixed.
Should I use a VPN when connecting to the internet to protect my data?
Yes, using a VPN when connecting to the internet is a great way to protect your data. A VPN encrypts your data, making it much harder for hackers, cybercriminals, and other malicious actors to access your information. It also hides your IP address, making it difficult for companies and government agencies to track your online activities.
What is OSINT?
OSINT stands for Open Source Intelligence and is a form of intelligence gathering that focuses on publicly available information. It is used for a variety of purposes such as gathering background information about a person or company, discovering new leads, and gathering data for threat intelligence. OSINT involves collecting data from open-source materials like the internet, news, and social media.
Please, login to leave a review
Related courses
Get course
EUR300
One time purchase
Available with Memberships
Cyber Security
€300
Certificate included
Share
Course details
Duration
6 weeks
Lectures
72
Assignments
1
Full lifetime access
Access on mobile and TV
Popular courses
Popular Courses
Archive
Working hours
| Monday | 9:30 am - 6.00 pm |
| Tuesday | 9:30 am - 6.00 pm |
| Wednesday | 9:30 am - 6.00 pm |
| Thursday | 9:30 am - 6.00 pm |
| Friday | 9:30 am - 5.00 pm |
| Saturday | Closed |
| Sunday | Closed |