Course Overview

Welcome to The Comprehensive Ethical Hacking Course!

Across 30 hours of instructor-led content, you’ll learn:

1) How hackers launch attacks on different systems, computers, users, websites, and wireless networks

2) What tools do hackers use, why, and how they work

3) How to protect yourselves (or your clients!) against these attacks

4) How to build your own security and hacking tools with Python – taught from scratch and with no programming experience necessary!

5) How to create your own Ethical Hacking tool portfolio.

So that you can practice all the skills and techniques in real time, we start by setting up an ethical hacking lab on your computer. Here you can put the theory you learn to the test and have a safe space to practice using hacking tools and attacks. We'll experience real-time hacking examples and learn how to protect ourselves against these attacks at the same time!

The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/The-Comprehensive-Ethical-Hacking-Course

What You Will Learn

  • You'll learn about Kali Linux Tools
  • You'll learn about the Basic Linux Commands
  • You'll learn about the Fundamental ethical hacking attacks & protection methods
  • You'll learn about Metasploit
  • You'll learn about Python
  • You'll learn about writing ethical hacking tools with Python
  • You'll learn about website penetration testing
  • You'll learn about wireless networks penetration testing
  • You'll learn about system penetration testing
  • You'll learn about social engineering
  • You'll learn about SQL Injection
  • You'll learn about the fundamentals of SQL
  • You'll learn about the Man In The Middle Attacks and protection

Program Curriculum

  • Hacking Lab Setup Introduction
  • What is Virtual Machine?
  • Installing VirtualBox (Windows)
  • Installing VirtualBox (Mac)
  • Installing Kali Linux
  • Kali Linux Problem Solving: ISO Installation
  • Installing Windows 10
  • Snapshots
  • Quick Reminder Before We Move On
  • Hacking Lab Setup Outro
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Kali Linux 101 Introduction
  • Kali Overview
  • Linux Terminal
  • Changing Kali Password
  • Kali Linux 101 Outro
  • Chapter 2 Quiz

  • Anonymity Online Introduction
  • How Networks Work?
  • VPN and DNS Explained
  • VPN Usage
  • Changing DNS
  • VPN and DNS Together
  • Solutions for Problems
  • Chapter 3 Quiz

  • Dark Web Introduction
  • What is Dark Web?
  • Installing Tor on Kali
  • Browsing Dark Web
  • Dark Web Outro
  • Chapter 4 Quiz

  • Network Pentesting Introduction
  • What is Network Pentesting?
  • Chipsets
  • Connecting Wi-Fi USB
  • MAC Address
  • Monitor vs. Managed
  • Network Pentesting Outro
  • Chapter 5 Quiz

  • Gathering Information from Networks Introduction
  • Network Sniffing
  • Airodump Specific Target
  • Deauthentication Attacks
  • Real-time Deauth Attack
  • Gathering Information from Networks Outro
  • Chapter 6 Quiz

  • Wireless Attacks Introduction
  • Encryption Models
  • Cracking WEP
  • Fake Authentication
  • Packet Injection
  • How WPA Works?
  • Capturing Handshakes
  • Creating Wordlists
  • WPA Live Cracking
  • Safe Routers
  • Wireless Attacks Outro
  • Chapter 7 Quiz

  • Post Connection Attacks Introduction
  • Post Connection Settings
  • Netdiscover
  • Nmap
  • Man in the Middle
  • Manual ARP Poison
  • Man in the Middle Framework
  • How Hackers Steal Passwords?
  • Breaking HTTPS
  • Creating Web Server
  • DNS Attacks
  • Bettercap Installation
  • ARP Attack
  • Capturing Information
  • Caplet Usage
  • HSTS Settings
  • Breaking HTTPS
  • HSTS Downgrade Attempt
  • JavaScript Injection
  • Wireshark Intro
  • Wireshark Analysis
  • How to Protect Yourself?
  • Post Connection Attacks Outro
  • Chapter 8 Quiz

  • System Pentesting Introduction
  • Gaining Access
  • Installing Metasploitable
  • Zenmap Installation
  • Finding Vulnerabilities
  • Exploiting First Vulnerability
  • Exploiting Username Map Script
  • Exploiting PostgreSQL Vulnerability
  • System Pentesting Outro
  • Chapter 9 Quiz

  • Attacks on Users Introduction
  • Attacking to Users
  • Installing Veil
  • Veil Overview
  • Creating First Backdoor
  • Bypassing Antivirus Solutions
  • Using Multi Handler
  • Testing Backdoor
  • Attacks on Users Outro
  • Chapter 10 Quiz

  • Social Engineering Introduction
  • What is Maltego?
  • Maltego Overview
  • Strategy
  • Downloading Combiner
  • Combining Files
  • More Convincing File
  • Messing with Characters
  • Faking Mails
  • Social Engineering Outro
  • Chapter 11 Quiz

  • Social Media Security Introduction
  • Instagram Brute Force Attacks
  • Instagram Social Engineering
  • How to Protect Ourselves?
  • Social Media Security Outro
  • Chapter 12 Quiz

  • Beef Introduction
  • What is Beef?
  • What If Beef Is Not Installed in Kali?
  • Hooking Target
  • Injection
  • Taking Screenshots
  • How Hackers Steal Facebook Passwords?
  • Backdoor Delivery
  • How to Protect Yourself?
  • Beef Outro
  • Chapter 13 Quiz

  • External Network Attacks Introduction
  • How Outside Network Attacks Work?
  • External Backdoor
  • Port Forwarding
  • External Network Attacks Outro
  • Chapter 14 Quiz

  • Fake Game Website Attacks Introduction
  • External Beef Attack
  • Ubuntu Server Creation
  • Creating Game Website
  • Installing Beef
  • Beef in Ubuntu
  • Embedding JavaScript
  • What is No IP?
  • Hooking iPhone
  • How to Stay Safe?
  • Fake Game Website Attacks Outro
  • Chapter 15 Quiz

  • Post Hacking Sessions Introduction
  • Meterpreter Sessions
  • Migration
  • Downloading Files
  • Capturing Keylogs
  • Sustaining the Session
  • Post Hacking Sessions Outro
  • Chapter 16 Quiz

  • Hacker Methodology Introduction
  • Ethical Hacker's Steps
  • Detailed Explanation of Methodology
  • Hacker Methodology Outro
  • Chapter 17 Quiz

  • Website Reconnaissance Introduction
  • Website Pentesting Setup
  • Maltego One More Time
  • Netcraft
  • Reverse DNS Lookup
  • Who is Lookup?
  • Robots
  • Subdomains
  • Website Reconnaissance Outro
  • Chapter 18 Quiz

  • Website Pentesting Introduction
  • Code Execution Vulnerability
  • Reverse TCP Commands
  • File Upload Vulnerability
  • File Inclusion
  • Website Pentesting Outro
  • Chapter 19 Quiz

  • Cross Site Scripting Introduction
  • What is XSS?
  • Reflected XSS
  • Stored XSS
  • Real Hacking with XSS
  • How to Protect Yourself?
  • Cross Site Scripting Outro
  • Chapter 20 Quiz

  • SQL 101 Introduction
  • Database and SQL
  • Database Structure
  • Adding a New Value
  • Updating and Deleting Values
  • Filtering
  • SQL 101 Outro
  • Chapter 21 Quiz

  • SQL Injection Introduction
  • Metasploitable Databases
  • Working with Mutillidae
  • Vulnerability Test
  • Post Method SQLi
  • Get Method SQLi
  • Every Password on Database
  • Learning Database Name
  • Finding Out More
  • Retrieving Everything
  • SQL Injection Outro
  • Chapter 22 Quiz

  • Website Pentesting Tools
  • Sqlmap
  • Zap
  • Zap Analysis
  • Website Pentesting Tools Outro
  • Chapter 23 Quiz

  • What is OSI Model?
  • What is Binary?
  • IP Address Advanced
  • Host Calculations
  • TCP vs. UDP
  • Chapter 24 Quiz

  • Python for Ethical Hacking Setup Introduction
  • Anaconda Installation (Windows)
  • Anaconda Installation (MAC)
  • Python for Ethical Hacking Setup Outro
  • Chapter 25 Quiz

  • Python Data Types and Structures Introduction
  • Numbers
  • Variables
  • Downloading Notebooks
  • String
  • String Advanced
  • Variable Attributes
  • Lists
  • Lists Advanced
  • Dictionary
  • Sets
  • Tuples
  • Boolean
  • Python Data Types and Structures Outro
  • Chapter 26 Quiz

  • Control Statements and Loops Introduction
  • Logical Comparisons
  • If Statements
  • If Statements Continued
  • If Statements Practical Usage
  • If Statements Practical Usage
  • For Loop Practical Usage
  • Break Continue Pass
  • While Loop
  • Control Statements and Loops Outro
  • Chapter 27 Quiz

  • Essentials Introduction
  • Useful Methods
  • Zip and Random
  • Lists Advanced
  • Sublime Text (Windows)
  • Command Prompt (Windows)
  • Sublime Text (Mac)
  • Terminal (Mac)
  • Essentials Outro
  • Chapter 28 Quiz

  • Functions Introduction
  • Functions Explained
  • Input and Output
  • Functions Advanced
  • Functions Practical Usage
  • Scope
  • Functions Outro
  • Chapter 29 Quiz

  • Object Oriented Programming Introduction
  • Class
  • Methods
  • Class Practical Usage
  • Inheritance
  • Special Methods
  • Error Handling
  • Object Oriented Programming Outro
  • Chapter 30 Quiz

  • Modules Introduction
  • Using Libraries
  • Writing Our Own Modules
  • Imported vs. Direct
  • Modules Outro
  • Chapter 31 Quiz

  • MAC Changer Introduction
  • Installing PyCharm On Kali
  • MAC and IP Address
  • Changing MAC Manually
  • Using Subprocess
  • Introducing Variables
  • Processing Tuples
  • Beautifying the Code
  • Saving Subprocess
  • Regex 101
  • New MAC Control
  • Python 3 Compatibility
  • MAC Changer Outro
  • Chapter 32 Quiz

  • Network Scanner Introduction
  • ARP Refreshed
  • How Network Scanners Work?
  • ARP Request
  • Broadcast Request
  • Processing Response
  • Adding Features
  • Python 3 Compatibility
  • Network Scanner Outro
  • Chapter 33 Quiz

  • Man in the Middle Introduction
  • MITM Refreshed
  • ARP Response Creation
  • ARP Poison
  • Getting MAC Address
  • Looping Continuously
  • Displaying Better Logs
  • Handling Specific Error
  • Getting User Input
  • Man in the Middle Outro
  • Chapter 34 Quiz

  • Packet Listener Introduction
  • Wireshark Refreshed
  • Wireshark Analysis
  • Gathering Packets
  • Working with Layers
  • Downgrading HTTPS
  • Protecting Ourselves
  • Packet Listener Outro
  • Chapter 35 Quiz

  • Keylogger Introduction
  • Setting Up Windows
  • Working with Files
  • Logging Keyboard
  • Saving Logs
  • Handling Errors
  • Sending Email
  • Reason Behind Threading
  • Threading Library
  • Testing on Windows
  • Keylogger Outro
  • Chapter 36 Quiz

  • Backdoor Introduction
  • How to Write a Backdoor?
  • Opening a Connection
  • Running Commands
  • Writing Listener
  • Sending Commands with Listener
  • Class Structure
  • Finishing Classes
  • What is JSON?
  • Processing JSON
  • Sending Commands with List
  • cd Command Implementation
  • Getting Contents
  • Saving Files
  • Encoding Downloads
  • Upload Functionality
  • Handling Errors
  • Python 3 Compatibility
  • Backdoor Outro
  • Chapter 37 Quiz

  • Packaging & Malicious Files Introduction
  • Malicious Files
  • Creating Executables
  • What is Regedit?
  • Copying Files
  • Running Executables on Startup
  • Adding PDF to File
  • Changing Icons
  • Changing Extensions
  • Packaging & Malicious Files Outro
  • Chapter 38 Quiz

Closing

Load more modules

Instructor

Codestars

Codestars is a digital publishing company specialising in fun, practical and comprehensive online courses in the most in-demand coding, technology and business skills topics. Started by globally best-selling instructor Rob Percival, Codestars has taught over 1.5 million people around the world! From web development and programming languages to digital marketing, app creation and much more, Codestars courses are aimed at beginners and give students the opportunity to transform their skillset and revolutionise their professional abilities. We work with the very best instructors to create innovative and learner-focused courses that are practical and challenging. Put your skills to the test with real-world projects and master the skill you need to succeed. Happy coding!

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8