Course Overview

Ethical hacking is a critical skill for cybersecurity professionals, enabling them to identify vulnerabilities before malicious attackers can exploit them. This course provides a comprehensive journey from beginner to advanced levels, equipping learners with hands-on knowledge of penetration testing, system exploitation, and security best practices. By understanding ethical hacking techniques, learners can contribute to strengthening cybersecurity defenses in various environments.

This course begins with setting up a secure hacking environment, covering VirtualBox and Kali Linux installation. It then explores essential Linux commands, networking concepts, and hacking terminology. Learners progress through reconnaissance techniques, vulnerability scanning, website penetration testing, WPA2 cracking, and man-in-the-middle attacks. Advanced topics include system hacking with Metasploit, coding a backdoor, keylogging, and brute-force authentication attacks. A dedicated Python crash course ensures learners gain scripting proficiency, culminating in practical cybersecurity applications. The final section provides career guidance in ethical hacking and cybersecurity.

By completing this course, learners will acquire hands-on experience with ethical hacking tools, security testing methodologies, and penetration testing techniques, empowering them to identify and mitigate cybersecurity threats effectively.

What You Will Learn

  • Learn how to setup a Kali Linux System and about essential Linux commands
  • Learn how to create a secure penetration testing environment
  • Learn about Footprinting, scanning, man-in-the-middle attacks
  • Learn about Python Programming Fundamentals

Program Curriculum

  • VirtualBox Installation
  • Kali Linux Installation
  • Enabling Fullscreen
  • $7 Million Cybersecurity Scholarship by EC-Council

  • Basic Linux Commands Part I
  • Basic Linux Commands Part II
  • Basic Linux Commands Part III
  • Chapter 2 quiz

  • Changing IP Address and Wireless Adapter Setup
  • Creating a Bootable Kali USB Drive
  • Essential Networking Terms
  • Essential Hacking Terms
  • Additional Kali Tools to Install
  • Changing Your MAC Address with macchanger
  • Chapter 3 Quiz

  • Google Hacking
  • Nikto Basics
  • Whois Tool
  • Email Harvesting
  • Shodan
  • Zero Transfer with Dig
  • Chapter 4 Quiz

  • Installing Metasploitable
  • Nmap Part I
  • Nmap Part II
  • Nmap Part III
  • Zenmap
  • TCP Scans
  • Nmap Bypassing Defenses
  • Nmap Scripts Part I
  • Nmap Scripts Part II
  • Chapter 5 Quiz

  • Installing OWASP
  • HTTP Request
  • HTTP Response
  • Burp Site Configuration
  • Editing Packets in Burp Site
  • WhatWeb and DIRB
  • Password Recovery Attack
  • Burp Site Login Brute-force
  • Hydra Login Brute-force
  • Session Fixation
  • Injection Attacks
  • Simple Command Injection
  • Exploiting Command Injection Vulnerability
  • Finding Blind Command Injection
  • SQL Basics
  • Manual SQL Injection Part I
  • Manual SQL Injection Part II
  • SQL Maps Basics
  • XML Injection
  • Installing XCAT and Preventing Injection Attacks
  • Reflected XSS
  • Stored XSS
  • Changing HTML Code with XSS
  • XSSer and XSSsniper
  • Chapter 6 Quiz

  • Wireless Attacking Theory
  • Enabling Monitor Mode
  • Capturing Handshake with Airodump
  • RockYou.txt
  • Cracking with Aircrack
  • Cracking with Hashcat
  • Creating Password Lists with Crunch
  • Creating Password Lists with Cupp
  • Rainbox Tables Part I
  • Rainbox Tables Part II
  • Installing Fluxion
  • Finding and Cracking Hidden Networks
  • Preventing Wireless Attacks
  • Chapter 7 Quiz

  • ARP Protocol Basics
  • Man-in-the-Middle Attack Theory
  • Installing MITMf
  • Manual ARP Spoofing
  • Problems While Installing MITMf
  • HTTP Traffic Sniffing
  • DNS Spoofing with HTTPS Password Sniffing
  • Hooking Browsers with BeEF
  • Screenshotting Targets Browser
  • Cloning Any Webpage
  • Ettercap Basics
  • Chapter 8 Quiz

  • MFSconsole Environment
  • Metasploit Modules Explained
  • Brute-forcing SSH with Metasploit
  • Attacking Tomcat with Metasploit
  • Getting Meterpreter with Command Injection
  • PHP Code Injection
  • 2 Metasploitable Exploits
  • Wine Installation
  • Creating Windows Payloads with MSFvenom
  • Encoders and Hex Editor
  • Windows 10 Meterpreter Shell
  • Meterpreter Environment
  • Windows 10 Privilege Escalation
  • Preventing Privilege Escalation
  • Post Exploitation Modules
  • Getting Meterpreter Over Internet with Port Forwarding
  • EternalBlue Exploit
  • Persistence Module
  • Hacking Over the Internet with Ngrok
  • Android Device Attack with Venom
  • The Real Hacking Begins Now
  • Chapter 9 Quiz

  • Variables
  • Raw Input
  • If-else Statements
  • For Loops
  • While Loops
  • Python Lists
  • Functions
  • Classes
  • Importing Libraries
  • Files in Python
  • Try and Except Rule
  • Chapter 10 Quiz

  • Theory Behind Reverse Shells
  • Simple Server Code
  • Connection with Reverse Shell
  • Sending and Receiving Messages
  • Sending Messages with While True Loop
  • Executing Commands on Target System
  • Fixing Backdoor Bugs and Adding Functions
  • First Test Using Our Backdoor
  • Trying to Connect Every 20 Seconds
  • Creating Persistence Part I
  • Creating Persistence Part II
  • Changing Directory
  • Uploading and Downloading Files
  • Downloading Files from the Internet
  • Starting Programs using Our Backdoor
  • Capturing Screenshot on the Target PC
  • Embedding Backdoor in an Image Part I
  • Embedding Backdoor in an Image Part II
  • Checking for Administrator Privileges
  • Adding Help Option
  • Chapter 11 Quiz

  • Importing Pynput
  • Simple Keylogger
  • Adding Report Function
  • Writing Keystrokes to a Files
  • Adding the Keylogger to Our Reverse Shell Part I
  • Adding the Keylogger to Our Reverse Shell Part II
  • Final Project Test
  • Chapter 12 Quiz

  • Printing Banner
  • Adding Available Options
  • Starting Threads for Brute-force
  • Writing Function to Run the Attack
  • Brute-forcing Router Login
  • Bypassing Antivirus with Your Future Programs
  • Sending Malware with Spoofed Email
  • Chapter 13 Quiz

  • What Will You Learn in This Section?
  • Why is Ethical Hacking a Valuable Skill?
  • What is the Best Ethical Hacking Certification?
  • Tip for Getting Your First Job as an Ethical Hacker
  • How I Started My Career as an Ethical Hacker?
  • How to Price Your Work?
Load more modules

Instructor

Joseph Delgadillo

Joseph Delgadillo is the founder of JTDigital Courses, an education technology company. He has been active in the online learning community since 2015 and has worked with multiple startups. As of 2020, over 600,000 students across the globe have enrolled in his courses covering ethical hacking, Python programming, web development and more. He graduated with honours from Central Washington University.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering video-based learning with 840+ courses and diverse Learning Paths to enhance your skills.

$ 69.00
Billed monthly or $599.00 billed annually

What is included

  • 840+ Premium Short Courses
  • 70+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs and CTF Challenges for comprehensive skill-building.

$ 79.00
Billed monthly or $699.00 billed annually

Everything in Pro and

  • 1400+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month

Related Courses

1 of 50