Contact for queries :
020 3900 4072

Learn how to hack into, exploit and secure networks, servers, websites and more, with this Learn Ethical Hacking From Scratch course. This course is perfect for beginners who want to expand their knowledge of computer system hacking, social engineering and penetration testing. 

This Learn Ethical Hacking From Scratch is divided into a number of key topics, and will start by teaching students how to test the security of networks. Next, you’ll move onto accessing, hacking into and securing systems from different types of attacks. You’ll learn how to create fake WiFi networks, inject evil codes and more. You’ll also get step-by-step guidance on how to get started with Linux operating system.  

Enrol in this course today and get the practical skills and knowledge you need to be able to identify and exploit weaknesses in computer systems, create trojans by backdooring normal files, and control the networks around you, without having access to passwords!

What you’ll learn

  • Broaden your knowledge of hacking, its fields and the different types of hackers
  • Learn how to hack and secure WiFi, secured systems and wired networks 
  • Get step-by-step guidance on how to install and set up Kali Linux operating system
  • Understand the basics of network penetration testing
  • Explore techniques for securing systems from different types of attacks
  • Discover the differences between ARP spoofing and ARP poisoning
  • Learn how to create a fake WiFi network and spy on your clients
  • Understand the basics of social engineering and the techniques used in social engineering attacks

Requirements

  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For WiFi cracking (10 lectures ONLY) – Wireless adapter that supports monitor mode (more info provided in the course).

Who this course is for:

  • Anybody who is interested in learning ethical hacking / penetration testing
  • Anybody who wants to learn how hackers hack computer systems
  • Anybody who wants to learn how to secure their systems from hackers

Course Curriculum

Introduction
Course Introduction & Overview FREE 00:03:00
Teaser – Hacking a Windows 10 Computer & Accessing Their Webcam 00:07:00
What Is Hacking & Why Learn It 00:03:00
Setting up The Lab
Lab Overview & Needed Software 00:08:00
Installing Kali 2019 As a Virtual Machine 00:10:00
Creating & Using Snapshots 00:06:00
Linux Basics
Basic Overview of Kali Linux 00:05:00
The Terminal & Linux Commands 00:11:00
Network Hacking
Network Penetration Testing Introduction 00:02:00
Networks Basics 00:04:00
Connecting a Wireless Adapter To Kali 00:05:00
What is MAC Address & How To Change It 00:08:00
Wireless Modes (Managed & Monitor) 00:07:00
Network Hacking - Pre Connection Attacks
Packet Sniffing Basics Using Airodump-ng 00:07:00
WiFi Bands – 2.4Ghz & 5Ghz Frequencies 00:08:00
Targeted Packet Sniffing Using Airodump-ng 00:11:00
Deauthentication Attack (Disconnecting Any Device From The Network) 00:07:00
Network Hacking - Gaining Access (WEP/WPA/WPA2 Cracking)
Gaining Access Introduction 00:01:00
WEP Cracking – Theory Behind Cracking WEP Encryption 00:06:00
WEP Cracking – Basic Case 00:06:00
WEP Cracking – Fake Authentication 00:07:00
WEP Cracking – ARP Request Replay Attack 00:06:00
WPA/WPA2 Cracking – Introduction 00:04:00
WPA/WPA2 Cracking – Exploiting WPS Feature 00:10:00
WPA/WPA2 Cracking – How To Capture The Handshake 00:07:00
WPA/WPA2 Cracking – Creating a Wordlist 00:08:00
WPA/WPA2 Cracking – Using a Wordlist Attack 00:06:00
How to Configure Wireless Security Settings To Secure Your Network 00:06:00
Network Hacking - Post Connection Attacks
Introduction 00:02:00
Installing Windows As a Virtual Machine 00:04:00
Information Gathering – Discovering Connected Clients using netdiscover 00:09:00
Gathering More Information Using Zenmap 00:07:00
Gathering Even More Information Using Zenmap 00:08:00
MITM – ARP Poisoning Theory 00:09:00
MITM – ARP Spoofing using arpspoof 00:07:00
MITM – Bettercap Basics 00:09:00
MITM – ARP Spoofing Using Bettercap 00:08:00
MITM – Spying on Network Devices (Capturing Passwords, Visited Websites…etc) 00:05:00
MITM – Creating Custom Spoofing Script 00:10:00
MITM – Understanding HTTPS & How to Bypass it 00:06:00
MITM – Bypassing HTTPS 00:07:00
MITM – Bypassing HSTS 00:10:00
MITM – DNS Spoofing 00:11:00
MITM – Doing All of The Above Using a Graphical Interface 00:08:00
Wireshark – Basic Overview & How To Use It With MITM Attacks 00:08:00
Wireshark – Sniffing & Analysing Data 00:06:00
Wireshark – Using Filters, Tracing & Dissecting Packets 00:06:00
Wireshark – Capturing Passwords & Anything Sent By Any Device In The Network 00:08:00
Creating a Fake Access Point (Honeypot) – Theory 00:09:00
Creating a Fake Access Point (Honeypot) – Practical 00:11:00
Network Hacjing - Detection & Security
Detecting ARP Poisoning Attacks 00:05:00
Detecting suspicious Activities Using Wireshark 00:06:00
Gaining Access To Computer Devices
Gaining Access Introduction 00:04:00
Gaining Access - Server Side Attacks
Installing Metasploitable As a Virtual Machine 00:06:00
Introduction 00:04:00
Basic Information Gathering & Exploitation 00:10:00
Using a Basic Metasploit Exploit 00:08:00
Exploiting a Code Execution Vulnerability 00:10:00
MSFC – Installing MSFC (Metasploit Community) 00:06:00
MSFC – Scanning Target(s) For Vulnerabilities 00:03:00
MSFC – Analysing Scan results & Exploiting Target System 00:10:00
Nexpose – Installing Nexpose 00:10:00
Nexpose – How To Configure & Launch a Scan 00:09:00
Nexpose – Analysing Scan Results & Generating Reports 00:08:00
Gaining Access - Client Side Attacks
Introduction 00:02:00
Installing Veil 3.1 00:06:00
Veil Overview & Payloads Basics 00:07:00
Generating An Undetectable Backdoor Using Veil 3 00:10:00
Listening For Incoming Connections 00:07:00
Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00
Backdoor Delivery Method 1 – Using a Fake Update 00:12:00
Backdoor Delivery Method 2 – Backdooring Downloads on The Fly 00:12:00
How to Protect Yourself From The Discussed Delivery Methods 00:04:00
Gaining Access - Client Side Attacks - Social Engineering
Introduction 00:03:00
Maltego Basics 00:06:00
Discovering Websites, Links & Social Networking Accounts Associated With Target 00:08:00
Discovering Twitter Friends & Associated Accounts 00:05:00
Discovering Emails Of The Target’s Friends 00:04:00
Analysing The Gathered Info & Building An Attack Strategy 00:09:00
Backdooring Any File Type (images, pdf’s …etc) 00:05:00
Compiling & Changing Trojan’s Icon 00:06:00
Spoofing .exe Extension To Any Extension (jpg, pdf …etc) 00:08:00
Spoofing Emails – Setting Up am SMTP Server 00:08:00
Email Spoofing – Sending Emails as Any Email Account 00:14:00
BeEF Overview & Basic Hook Method 00:07:00
BeEF – Hooking Targets Using Bettercap 00:07:00
BeEF – Running Basic Commands On Target 00:04:00
BeEF – Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00
BeEF – Gaining Full Control Over Windows Target 00:04:00
Detecting Trojans Manually 00:06:00
Detecting Trojans Using a Sandbox 00:03:00
Gaining Access - Using The Above Attacks Outside The Local Network
Overview of the Setup 00:06:00
Ex1 – Generating a Backdoor That Works Outside The Network 00:05:00
Configuring The Router To Forward Connections To Kali 00:07:00
Ex2 – Using BeEF Outside The Network 00:06:00
Post Exploitation
Introduction 00:02:00
Meterpreter Basics 00:06:00
File System Commands 00:05:00
Maintaining Access – Basic Methods 00:05:00
Maintaining Access – Using a Reliable & Undetectable Method 00:07:00
Spying – Capturing Key Strikes & Taking Screen Shots 00:03:00
Pivoting – Theory (What is Pivoting?) 00:07:00
Pivoting – Exploiting Devices on The Same Network As The Target Computer 00:08:00
Website Hacking
Introduction – What Is A Website ? 00:04:00
How To Hack a Website? 00:04:00
Website Hacking - Information Gathering
Gathering Basic Information Using Whois Lookup 00:06:00
Discovering Technologies Used On The Website 00:06:00
Gathering Comprehensive DNS Information 00:10:00
Discovering Websites On The Same Server 00:04:00
Discovering Subdomains 00:05:00
Discovering Sensitive Files 00:07:00
Analysing Discovered Files 00:04:00
Website Hacking - File Upload, Code Execution & File Inclusion Vulns
Discovering & Exploiting File Upload Vulnerabilities 00:07:00
Discovering & Exploiting Code Execution Vulnerabilities 00:07:00
Discovering & Exploiting Local File Inclusion Vulnerabilities 00:05:00
Remote File Inclusion Vulnerabilities – Configuring PHP Settings 00:04:00
Remote File Inclusion Vulnerabilities – Discovery & Exploitation 00:06:00
Preventing The Above Vulnerabilities 00:07:00
Website Hacking - SQL Injection Vulnerabilities
What is SQL 00:06:00
Dangers of SQL Injection Vulnerabilities 00:03:00
Discovering SQL injections In POST 00:08:00
Bypassing Logins Using SQL injection Vulnerability 00:05:00
Discovering SQL injections in GET 00:07:00
Reading Database Information 00:05:00
Finding Database Tables 00:04:00
Extracting Sensitive Data Such As Passwords 00:04:00
Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00
Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00
The Right Way To Prevent SQL Injection 00:05:00
Website Hacking - Cross Site Scripting Vulnerabilities
Introduction – What is XSS or Cross Site Scripting? 00:03:00
Discovering Reflected XSS 00:04:00
Discovering Stored XSS 00:03:00
Exploiting XSS – Hooking Vulnerable Page Visitors To BeEF 00:06:00
Preventing XSS Vulnerabilities 00:05:00
Website Hacking - Discovering Vulnerabilities Automatically Using OWASP ZAP
Scanning Target Website For Vulnerabilities 00:04:00
Analysing Scan Results 00:04:00
Additional Materials
Resource Files: Learn Ethical Hacking From Scratch 00:00:00

Course Reviews

4.5

4.5
3 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE

Instructors

2 STUDENTS ENROLLED

Our Students Say..

[{"code":""
[{"code":""
"label":"A Free Course"
"label":"A Free Course"
"win":false}
"win":false}
{"code":"10OFF"
{"code":"10OFF"
"label":"99% Off"
"label":"99% Off"
"win":false}
"win":false}
{"code":"FREESHIPPING"
{"code":"FREESHIPPING"
"label":"A Free Certificate"
"label":"A Free Certificate"
"win":false}
"win":false}
{"code":"ISTDME10"
{"code":"ISTDME10"
"label":"Course At £10"
"label":"Course At £10"
"win":true}
"win":true}
{"code":""
{"code":""
"label":"Free E-book"
"label":"Free E-book"
"win":false}
"win":false}
{"code":"10OFF"
{"code":"10OFF"
"label":"2 Courses At £14.99"
"label":"2 Courses At £14.99"
"win":false}
"win":false}
{"code":""
{"code":""
"label":"A Free Transcript"
"label":"A Free Transcript"
"win":false}
"win":false}
{"code":"10OFF"
{"code":"10OFF"
"label":"Buy 1 Get 1 Free"
"label":"Buy 1 Get 1 Free"
"win":false}
"win":false}
{"code":"25OFF"
{"code":"25OFF"
"label":"Course At £5"
"label":"Course At £5"
"win":false}
"win":false}
{"code":"FREESHIPPING"
{"code":"FREESHIPPING"
"label":"A Free Student ID"
"label":"A Free Student ID"
"win":false}
"win":false}
{"code":""
{"code":""
"label":"Almost"
"label":"Almost"
"win":false}
"win":false}
{"code":"25OFF"
{"code":"25OFF"
"label":"£400 Money Voucher"
"label":"£400 Money Voucher"
"win":false}]
"win":false}]