Course Overview

Ethical hacking is a critical skill in today's cybersecurity landscape, enabling professionals to proactively identify and mitigate security vulnerabilities before malicious actors exploit them. This comprehensive course provides hands-on training in penetration testing, covering a wide range of attack vectors and defensive strategies. Whether you're an aspiring ethical hacker or an experienced security professional looking to refine your skills, this course will equip you with the practical knowledge needed to assess and secure modern systems effectively.

This course begins with an introduction to ethical hacking and guides you through setting up a penetration testing lab using Kali Linux and Windows as a victim machine. You will explore Kali's desktop environment and essential Linux commands before diving into penetration testing methodologies, including threat modeling and network attacks using tools like Wireshark, Nmap, and Metasploit. Wireless security, web application attacks, password cracking, and social engineering techniques are thoroughly covered, along with mobile device exploitation and post-exploitation strategies. The course also includes real-world scenarios, reporting techniques, and a bonus section on advanced hacking tools, ensuring you gain a well-rounded understanding of ethical hacking.

By the end of this course, you will be proficient in executing penetration tests, exploiting vulnerabilities, maintaining access, and documenting findings — skills that are invaluable for securing networks, applications, and devices.

What You Will Learn

  • Learn simplified ethical hacking techniques from scratch
  • Perform an actual Mobile attack
  • Master 2 smart techniques to crack into wireless networks
  • Learn more than 9 ways to perform LAN attacks
  • Learn more than 5 proven methods of Social Engineering attacks
  • Make better decisions on how to protect your applications and network
  • Learn how to write a professional penetration testing report

Program Curriculum

  • The Undeniable Power of Ethical Hacking
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Why KALI
  • Different Installation Methods
  • Install KALI
  • Color Coding for Root User
  • Install Windows (Victim's Machine)
  • Chapter 2 Quiz

  • Master KALI Desktop Environment
  • Color Coding
  • Chapter 3 Quiz

  • Get Started with Linux Commands
  • Explore Main Services and Programs
  • Chapter 4 Quiz

  • Threat Modeling
  • Chapter 5 Quiz

  • Wireshark Simplified
  • How Does Port Scanning Work
  • Introducing NMAP
  • Understand NETBIOS and SMB Attacks
  • NMAP and ZENMAP Simplified
  • Execute Man-in-the-Middle Attacks
  • Perform a DNS Spoofing Attack
  • Plan DOS and DDOS Attacks
  • All-in-one Metasploit Framework
  • Transfer the Payload to a Windows Machine
  • Create Your First Trojan and Infiltrate a Target
  • Explore The Powerful Armitage Tool
  • Chapter 6 Quiz

  • Introduction
  • WEP Cracking
  • WPA and WPA2 Cracking
  • WPS Cracking
  • Tips to Improve Your Wireless Network Security
  • Chapter 7 Quiz

  • Web Applications Security Overview
  • Web Applications Attack Surface
  • Metasploitable VM
  • Injection Vulnerabilities
  • Broken Authentication Vulnerabilities
  • Sensitive Data Exposure Vulnerabilities
  • XML External Entities (XXE) Vulnerabilities
  • Broken Access Control Vulnerabilities
  • Security Misconfiguration Vulnerabilities
  • Cross-Site Scripting (XSS) Vulnerabilities
  • Insecure Deserialization Vulnerabilities
  • Using Components with Known Vulnerabilities
  • Insufficient Logging & Monitoring Vulnerabilities
  • Additional Risks to Consider
  • Discover Vulnerabilities in Websites
  • Control Database Server with SQLMap
  • Easily Hack a WordPress Site
  • Intercept, Analyze, and Replay Web Traffic
  • Chapter 8 Quiz

  • Various Password Attacks
  • Hashing in a Nutshell
  • Execute an Offline Password Attack on Linux
  • Execute an Offline Password Attack on Windows
  • Run an Online Password Attack on Linux
  • Run an Online Password Attack on a Router
  • Crack Passwords with Rainbow Tables
  • Design Effective Wordlists
  • Password Management Tips
  • Chapter 9 Quiz

  • Attack Vectors
  • Open-source Intelligence (OSINT)
  • Google Dorks Live Examples
  • Track and Spoof Emails Easily
  • Collect and Visualize Data with Maltego
  • Execute a Phishing Attack
  • Hack Facebook, Twitter, and Gmail Accounts
  • Chapter 10 Quiz

  • Mobile Attack Surface
  • Decrypt SSL Session
  • Reverse Engineer an Android Application
  • Hack an Android Phone and Download its Contacts
  • Chapter 11 Quiz

  • Post-Exploitation Terminologies
  • Backdoor Tools Explained
  • Netcat Simplified
  • Install a Backdoor
  • Deface a Website in Few Seconds
  • Create a Simple Ransomware
  • Understand Hidden Tear Ransomware
  • Bypass Firewalls by Tunneling Data and Commands Over DNS
  • Chapter 12 Quiz

  • Publish Your Weapons Online
  • Stay Anonymous Online
  • Setup a Stealthy Command and Control Center Online
  • Chapter 13 Quiz

  • Report Writing Techniques
  • How Can Pentest.ws Help You?
  • Chapter 14 Quiz

  • Create a Wi-Fi Jammer
  • Create a $3 Rubber Ducky Key-logger
  • Chapter 15 Quiz
Load more modules

Instructor

Mohamad Mahjoub

Mohamad Mahjoub is a highly accomplished author, trainer, speaker, and esteemed expert in the field of cyber security. Holding a prestigious array of licenses and certifications, including CISSP, ISO 27005 Risk Manager, ISO 27001 Lead Implementer, CISA, PMP, ITIL, and Data Protection Officer (GDPR), he brings a wealth of knowledge and experience to the realm of information security. Mohamad earned his Master's Degree in Computer Science with magna cum laude distinction from the Lebanese American University, a testament to his dedication to academic excellence. He is notably recognized as the author of the influential book "Ethical Hacking with Kali and More" and has been a featured speaker at prominent cyber security events. With an unwavering commitment to professionalism, Mohamad leverages his extensive training and certifications to provide expert cyber security services to both individuals and organizations. Since 2012, he has conducted numerous cyber security courses and seminars, catering to a diverse audience, including recent graduates, IT professionals, senior executives, and business owners. Additionally, he has reached a global audience through his multilingual online cyber security courses, boasting an enrolment of over 100,000 students worldwide. Currently serving as the Chief Information Security Officer (CISO) for a multinational corporation, Mohamad oversees the security of IT and OT operations across the Middle East region. With a remarkable 17-year career in the field of cyber security, he has earned a reputation as a trusted authority, consistently achieving success in the domain. In an era dominated by pervasive technology, Mohamad's steadfast belief underscores the critical importance of cyber security in safeguarding our digital world.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering video-based learning with 840+ courses and diverse Learning Paths to enhance your skills.

$ 69.00
Billed monthly or $599.00 billed annually

What is included

  • 840+ Premium Short Courses
  • 70+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs and CTF Challenges for comprehensive skill-building.

$ 79.00
Billed monthly or $699.00 billed annually

Everything in Pro and

  • 1400+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month

Related Courses

1 of 49