Course Overview

If you would like to learn ethical hacking, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux, and Python hacking with over 28 hours of HD video tutorials! We will cover the following topics:

1)  How to set up a Kali Linux system

2) Essential Linux system commands

3)  How to create a secure penetration testing environment

4)  Footprinting

5)  Scanning

6)  Website penetration testing

7)  WPA2 wireless network cracking

8)  Man in the middle attacks

9)  System hacking

10)  Python programming fundamentals

11) Writing our own pen-testing tools (reverse shell, keylogger, and bruteforcer)

12) Tips for building a career in cybersecurity

This course was designed for absolute beginners, so no previous ethical hacking or programming knowledge is necessary.

What You Will Learn

  • Learn how to setup a Kali Linux System and about essential Linux commands
  • Learn how to create a secure penetration testing environment
  • Learn about Footprinting
  • scanning
  • man-in-the-middle attacks
  • Learn about Python Programming Fundamentals

Program Curriculum

  • VirtualBox Installation
  • Kali Linux Installation
  • Enabling Fullscreen
  • $7 Million Cybersecurity Scholarship by EC-Council

  • Basic Linux Commands Part I
  • Basic Linux Commands Part II
  • Basic Linux Commands Part III
  • Chapter 2 quiz

  • Changing IP Address and Wireless Adapter Setup
  • Creating a Bootable Kali USB Drive
  • Essential Networking Terms
  • Essential Hacking Terms
  • Additional Kali Tools to Install
  • Changing Your MAC Address with macchanger
  • Chapter 3 Quiz

  • Google Hacking
  • Nikto Basics
  • Whois Tool
  • Email Harvesting
  • Shodan
  • Zero Transfer with Dig
  • Chapter 4 Quiz

  • Installing Metasploitable
  • Nmap Part I
  • Nmap Part II
  • Nmap Part III
  • Zenmap
  • TCP Scans
  • Nmap Bypassing Defenses
  • Nmap Scripts Part I
  • Nmap Scripts Part II
  • Chapter 5 Quiz

  • Installing OWASP
  • HTTP Request
  • HTTP Response
  • Burp Site Configuration
  • Editing Packets in Burp Site
  • WhatWeb and DIRB
  • Password Recovery Attack
  • Burp Site Login Brute-force
  • Hydra Login Brute-force
  • Session Fixation
  • Injection Attacks
  • Simple Command Injection
  • Exploiting Command Injection Vulnerability
  • Finding Blind Command Injection
  • SQL Basics
  • Manual SQL Injection Part I
  • Manual SQL Injection Part II
  • SQL Maps Basics
  • XML Injection
  • Installing XCAT and Preventing Injection Attacks
  • Reflected XSS
  • Stored XSS
  • Changing HTML Code with XSS
  • XSSer and XSSsniper
  • Chapter 6 Quiz

  • Wireless Attacking Theory
  • Enabling Monitor Mode
  • Capturing Handshake with Airodump
  • RockYou.txt
  • Cracking with Aircrack
  • Cracking with Hashcat
  • Creating Password Lists with Crunch
  • Creating Password Lists with Cupp
  • Rainbox Tables Part I
  • Rainbox Tables Part II
  • Installing Fluxion
  • Finding and Cracking Hidden Networks
  • Preventing Wireless Attacks
  • Chapter 7 Quiz

  • ARP Protocol Basics
  • Man-in-the-Middle Attack Theory
  • Installing MITMf
  • Manual ARP Spoofing
  • Problems While Installing MITMf
  • HTTP Traffic Sniffing
  • DNS Spoofing with HTTPS Password Sniffing
  • Hooking Browsers with BeEF
  • Screenshotting Targets Browser
  • Cloning Any Webpage
  • Ettercap Basics
  • Chapter 8 Quiz

  • MFSconsole Environment
  • Metasploit Modules Explained
  • Brute-forcing SSH with Metasploit
  • Attacking Tomcat with Metasploit
  • Getting Meterpreter with Command Injection
  • PHP Code Injection
  • 2 Metasploitable Exploits
  • Wine Installation
  • Creating Windows Payloads with MSFvenom
  • Encoders and Hex Editor
  • Windows 10 Meterpreter Shell
  • Meterpreter Environment
  • Windows 10 Privilege Escalation
  • Preventing Privilege Escalation
  • Post Exploitation Modules
  • Getting Meterpreter Over Internet with Port Forwarding
  • EternalBlue Exploit
  • Persistence Module
  • Hacking Over the Internet with Ngrok
  • Android Device Attack with Venom
  • The Real Hacking Begins Now
  • Chapter 9 Quiz

  • Variables
  • Raw Input
  • If-else Statements
  • For Loops
  • While Loops
  • Python Lists
  • Functions
  • Classes
  • Importing Libraries
  • Files in Python
  • Try and Except Rule
  • Chapter 10 Quiz

  • Theory Behind Reverse Shells
  • Simple Server Code
  • Connection with Reverse Shell
  • Sending and Receiving Messages
  • Sending Messages with While True Loop
  • Executing Commands on Target System
  • Fixing Backdoor Bugs and Adding Functions
  • First Test Using Our Backdoor
  • Trying to Connect Every 20 Seconds
  • Creating Persistence Part I
  • Creating Persistence Part II
  • Changing Directory
  • Uploading and Downloading Files
  • Downloading Files from the Internet
  • Starting Programs using Our Backdoor
  • Capturing Screenshot on the Target PC
  • Embedding Backdoor in an Image Part I
  • Embedding Backdoor in an Image Part II
  • Checking for Administrator Privileges
  • Adding Help Option
  • Chapter 11 Quiz

  • Importing Pynput
  • Simple Keylogger
  • Adding Report Function
  • Writing Keystrokes to a Files
  • Adding the Keylogger to Our Reverse Shell Part I
  • Adding the Keylogger to Our Reverse Shell Part II
  • Final Project Test
  • Chapter 12 Quiz

  • Printing Banner
  • Adding Available Options
  • Starting Threads for Brute-force
  • Writing Function to Run the Attack
  • Brute-forcing Router Login
  • Bypassing Antivirus with Your Future Programs
  • Sending Malware with Spoofed Email
  • Chapter 13 Quiz

  • What Will You Learn in This Section?
  • Why is Ethical Hacking a Valuable Skill?
  • What is the Best Ethical Hacking Certification?
  • Tip for Getting Your First Job as an Ethical Hacker
  • How I Started My Career as an Ethical Hacker?
  • How to Price Your Work?
Load more modules

Instructor

Joseph Delgadillo

Joseph Delgadillo is the founder of JTDigital Courses, an education technology company. He has been active in the online learning community since 2015 and has worked with multiple startups. As of 2020, over 600,000 students across the globe have enrolled in his courses covering ethical hacking, Python programming, web development and more. He graduated with honours from Central Washington University.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8