• LOGIN
  • No products in the basket.

Login

Get Access to Entire Course Library of 2000+ Courses at £99 Get Now

Course Overview

Ethical hacking, (or penetration testing) involves exploiting computer networks and systems to detect vulnerabilities that could be exposed to dangerous hackers. Many organisations use ethical hackers to test the security of their website or web applications, which is where the role of the Penetration Tester comes in.

If you’re looking to become a certified Penetration Tester or Ethical Hacker, then this is the course for you. It covers everything you need to know about security testing, including how to use Linux operating systems and SQL programming language. 

Learn how to reduce the risk of a cyber attack with this step-by-step training course, designed to equip you with the skills to detect weaknesses in computer systems quickly and easily. It will familiarise you with a range of cyber attacks and techniques for securing systems, from how to create a fake WiFi network and even spy on your clients.

Learn ethical hacking from scratch and enrol in this introductory training course today!

What You Will Learn

In this Ethical Hacking training course, you will learn how to exploit IT systems to detect vulnerabilities that attackers could take advantage of. It will provide you with the fundamental skills to become a qualified Penetration Tester.

Why You Should Choose This Course From iStudy

Study at your own pace

Full Tutor support on weekdays (Monday – Friday)

Fully compatible with any device

Free Printable PDF Certificate immediately after completion

No prior qualifications are needed to take this course

No hidden fees or exam charges

CPD Qualification Standards and IAO accredited

Efficient exam system, assessment, and instant results

Our customer support team is always ready to help you

Gain professional skills and better earning potential

Certification

After completing the course you’ll receive a free printable CPD accredited PDF certificate. Hard Copy certificate is also available, and you can get one for just £9!

Accreditation

This course is accredited by Continuing Professional Development (CPD). It is a recognised independent accreditation service.

Enrol today and learn something new with iStudy.

You’ll find a full breakdown of the course curriculum down below, take a look and see just how much this course offers. We’re sure you’ll be satisfied with this course.

Course Curriculum

Introduction
Course Introduction & Overview FREE 00:03:00
Teaser – Hacking a Windows 10 Computer & Accessing Their Webcam FREE 00:07:00
What Is Hacking & Why Learn It 00:03:00
Setting up The Lab
Lab Overview & Needed Software 00:08:00
Installing Kali 2019 As a Virtual Machine 00:10:00
Creating & Using Snapshots 00:06:00
Linux Basics
Basic Overview of Kali Linux 00:05:00
The Terminal & Linux Commands 00:11:00
Network Hacking
Network Penetration Testing Introduction 00:02:00
Networks Basics 00:04:00
Connecting a Wireless Adapter To Kali 00:05:00
What is MAC Address & How To Change It 00:08:00
Wireless Modes (Managed & Monitor) 00:07:00
Network Hacking - Pre Connection Attacks
Packet Sniffing Basics Using Airodump-ng 00:07:00
WiFi Bands – 2.4Ghz & 5Ghz Frequencies 00:08:00
Targeted Packet Sniffing Using Airodump-ng 00:11:00
Deauthentication Attack (Disconnecting Any Device From The Network) 00:07:00
Network Hacking - Gaining Access (WEP/WPA/WPA2 Cracking)
Gaining Access Introduction 00:01:00
WEP Cracking – Theory Behind Cracking WEP Encryption 00:06:00
WEP Cracking – Basic Case 00:06:00
WEP Cracking – Fake Authentication 00:07:00
WEP Cracking – ARP Request Replay Attack 00:06:00
WPA/WPA2 Cracking – Introduction 00:04:00
WPA/WPA2 Cracking – Exploiting WPS Feature 00:10:00
WPA/WPA2 Cracking – How To Capture The Handshake 00:07:00
WPA/WPA2 Cracking – Creating a Wordlist 00:08:00
WPA/WPA2 Cracking – Using a Wordlist Attack 00:06:00
How to Configure Wireless Security Settings To Secure Your Network 00:06:00
Network Hacking - Post Connection Attacks
Introduction 00:02:00
Installing Windows As a Virtual Machine 00:04:00
Information Gathering – Discovering Connected Clients using netdiscover 00:09:00
Gathering More Information Using Zenmap 00:07:00
Gathering Even More Information Using Zenmap 00:08:00
MITM – ARP Poisoning Theory 00:09:00
MITM – ARP Spoofing using arpspoof 00:07:00
MITM – Bettercap Basics 00:09:00
MITM – ARP Spoofing Using Bettercap 00:08:00
MITM – Spying on Network Devices (Capturing Passwords, Visited Websites…etc) 00:05:00
MITM – Creating Custom Spoofing Script 00:10:00
MITM – Understanding HTTPS & How to Bypass it 00:06:00
MITM – Bypassing HTTPS 00:07:00
MITM – Bypassing HSTS 00:10:00
MITM – DNS Spoofing 00:11:00
MITM – Doing All of The Above Using a Graphical Interface 00:08:00
Wireshark – Basic Overview & How To Use It With MITM Attacks 00:08:00
Wireshark – Sniffing & Analysing Data 00:06:00
Wireshark – Using Filters, Tracing & Dissecting Packets 00:06:00
Wireshark – Capturing Passwords & Anything Sent By Any Device In The Network 00:08:00
Creating a Fake Access Point (Honeypot) – Theory 00:09:00
Creating a Fake Access Point (Honeypot) – Practical 00:11:00
Network Hacjing - Detection & Security
Detecting ARP Poisoning Attacks 00:05:00
Detecting suspicious Activities Using Wireshark 00:06:00
Gaining Access To Computer Devices
Gaining Access Introduction 00:04:00
Gaining Access - Server Side Attacks
Installing Metasploitable As a Virtual Machine 00:06:00
Introduction 00:04:00
Basic Information Gathering & Exploitation 00:10:00
Using a Basic Metasploit Exploit 00:08:00
Exploiting a Code Execution Vulnerability 00:10:00
MSFC – Installing MSFC (Metasploit Community) 00:06:00
MSFC – Scanning Target(s) For Vulnerabilities 00:03:00
MSFC – Analysing Scan results & Exploiting Target System 00:10:00
Nexpose – Installing Nexpose 00:10:00
Nexpose – How To Configure & Launch a Scan 00:09:00
Nexpose – Analysing Scan Results & Generating Reports 00:08:00
Gaining Access - Client Side Attacks
Introduction 00:02:00
Installing Veil 3.1 00:06:00
Veil Overview & Payloads Basics 00:07:00
Generating An Undetectable Backdoor Using Veil 3 00:10:00
Listening For Incoming Connections 00:07:00
Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00
Backdoor Delivery Method 1 – Using a Fake Update 00:12:00
Backdoor Delivery Method 2 – Backdooring Downloads on The Fly 00:12:00
How to Protect Yourself From The Discussed Delivery Methods 00:04:00
Gaining Access - Client Side Attacks - Social Engineering
Introduction 00:03:00
Maltego Basics 00:06:00
Discovering Websites, Links & Social Networking Accounts Associated With Target 00:08:00
Discovering Twitter Friends & Associated Accounts 00:05:00
Discovering Emails Of The Target’s Friends 00:04:00
Analysing The Gathered Info & Building An Attack Strategy 00:09:00
Backdooring Any File Type (images, pdf’s …etc) 00:05:00
Compiling & Changing Trojan’s Icon 00:06:00
Spoofing .exe Extension To Any Extension (jpg, pdf …etc) 00:08:00
Spoofing Emails – Setting Up am SMTP Server 00:08:00
Email Spoofing – Sending Emails as Any Email Account 00:14:00
BeEF Overview & Basic Hook Method 00:07:00
BeEF – Hooking Targets Using Bettercap 00:07:00
BeEF – Running Basic Commands On Target 00:04:00
BeEF – Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00
BeEF – Gaining Full Control Over Windows Target 00:04:00
Detecting Trojans Manually 00:06:00
Detecting Trojans Using a Sandbox 00:03:00
Gaining Access - Using The Above Attacks Outside The Local Network
Overview of the Setup 00:06:00
Ex1 – Generating a Backdoor That Works Outside The Network 00:05:00
Configuring The Router To Forward Connections To Kali 00:07:00
Ex2 – Using BeEF Outside The Network 00:06:00
Post Exploitation
Introduction 00:02:00
Meterpreter Basics 00:06:00
File System Commands 00:05:00
Maintaining Access – Basic Methods 00:05:00
Maintaining Access – Using a Reliable & Undetectable Method 00:07:00
Spying – Capturing Key Strikes & Taking Screen Shots 00:03:00
Pivoting – Theory (What is Pivoting?) 00:07:00
Pivoting – Exploiting Devices on The Same Network As The Target Computer 00:08:00
Website Hacking
Introduction – What Is A Website ? 00:04:00
How To Hack a Website? 00:04:00
Website Hacking - Information Gathering
Gathering Basic Information Using Whois Lookup 00:06:00
Discovering Technologies Used On The Website 00:06:00
Gathering Comprehensive DNS Information 00:10:00
Discovering Websites On The Same Server 00:04:00
Discovering Subdomains 00:05:00
Discovering Sensitive Files 00:07:00
Analysing Discovered Files 00:04:00
Website Hacking - File Upload, Code Execution & File Inclusion Vulns
Discovering & Exploiting File Upload Vulnerabilities 00:07:00
Discovering & Exploiting Code Execution Vulnerabilities 00:07:00
Discovering & Exploiting Local File Inclusion Vulnerabilities 00:05:00
Remote File Inclusion Vulnerabilities – Configuring PHP Settings 00:04:00
Remote File Inclusion Vulnerabilities – Discovery & Exploitation 00:06:00
Preventing The Above Vulnerabilities 00:07:00
Website Hacking - SQL Injection Vulnerabilities
What is SQL 00:06:00
Dangers of SQL Injection Vulnerabilities 00:03:00
Discovering SQL injections In POST 00:08:00
Bypassing Logins Using SQL injection Vulnerability 00:05:00
Discovering SQL injections in GET 00:07:00
Reading Database Information 00:05:00
Finding Database Tables 00:04:00
Extracting Sensitive Data Such As Passwords 00:04:00
Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00
Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00
The Right Way To Prevent SQL Injection 00:05:00
Website Hacking - Cross Site Scripting Vulnerabilities
Introduction – What is XSS or Cross Site Scripting? 00:03:00
Discovering Reflected XSS 00:04:00
Discovering Stored XSS 00:03:00
Exploiting XSS – Hooking Vulnerable Page Visitors To BeEF 00:06:00
Preventing XSS Vulnerabilities 00:05:00
Website Hacking - Discovering Vulnerabilities Automatically Using OWASP ZAP
Scanning Target Website For Vulnerabilities 00:04:00
Analysing Scan Results 00:04:00
Additional Materials
Resource Files: Learn Ethical Hacking From Scratch 00:00:00

FAQs

This course is for anyone who's interested in this topic and wants to learn more about it. This course will also help you gain potential professional skills.

No prior qualifications are needed to take this course.

You can study this course from wherever and whenever you want. You can study at your own pace and from any device. Just log in to your account from any device and start learning!

Yes, there is a test at the end of the course. Once you’ve completed all the modules of the course, you will have to give a multiple-choice test. The questions will be based on the topics of the modules you studied. And of course, you can take the test at any time, from any device and from anywhere you want.

Don’t worry if you fail the test, you can retake it as many times as you want.

You don’t have to wait a minute after your payment has been received, you can begin immediately. You will create your login details during the checkout process and we will also send you an email confirming your login details.

We make the payment process easy for you. You can either use your Visa, MasterCard, American Express, Solo cards or PayPal account to pay for the online course. We use the latest SSL encryption for all transactions, so your order is safe and secure.

After you complete the course, you’ll immediately receive a free printable PDF certificate. Hard Copy certificate is also available, and you can get one for just £9! You may have to wait for 3 to 9 days to get the hard copy certificate.

Validate your certificate

top
Select your currency
AUD Australian dollar