UDEMY
UDEMY Logo

Complete Ethical Hacking Bootcamp : Zero to Mastery 

  • Offered byUDEMY

Complete Ethical Hacking Bootcamp : Zero to Mastery
 at 
UDEMY 
Overview

Learn Ethical Hacking + Penetration Testing! Use real techniques by black hat hackers then learn to defend against them!

Duration

27 hours

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Beginner

Official Website

Go to Website External Link Icon

Credential

Certificate

Details Icon

Complete Ethical Hacking Bootcamp : Zero to Mastery
 at 
UDEMY 
Course details

Who should do this course?
  • Anybody interested in learning ethical hacking and penetration testing
  • Anybody interested in learning python and ethical hacking
  • Anybody looking to go beyond a normal "beginner" tutorial that doesn't give you a chance to practice
  • Anybody looking to learn how hackers hack computer systems
  • Any developer looking to secure their computer systems from hackers
What are the course deliverables?
  • Learn Ethical Hacking from scratch & All 5 phases of Penetration Testing
  • Learn Python from scratch so you are able to write your own tools for ethical hacking
  • Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with Windows/Mac/Linux)
  • Create additional virtual *vulnerable* machines that we can practice our attacks on
  • Create trojans, viruses, keyloggers for ethical hacking
  • Learn how to bypass Firewalls & Intrusion Detection System with Advanced Scanning
  • Learn how to crack Wireless Access Point passwords
  • Bug Bounty: Discover all types of Web Application Bugs that could cause a threat
  • Learn how to gain access to any type of machine: Windows/Linux/MacOS
  • Sniff passwords over the local area network with Man In The Middle Attacks
  • SQL Injection, XSS, Command Injection and other techniques
  • Learn how to trick people into opening your program (i.e Social Engineering)
  • Learn Advance Metasploit Framework usage
  • Learn Basics of Linux and Linux Terminal
  • Master Information Gathering and Footprinting
  • Learn how to perform Vulnerability Analysis
  • Perform advanced scanning of an entire network
  • Perform Deauthentication Attack to disconnect everyone from the Wireless Access Point
  • Learn Website Application Penetration Testing from scratch
  • Learn Advance Nmap Usage
  • Code your own Advanced Backdoor that you can use in your Penetration Tests
  • Create Persistence on target machines
  • Perform newest Windows 7 + 10 exploits & attacks
  • Learn how to gain access to a router in various ways
  • Learn Networking & different Networking Protocols
  • Combine programming knowledge and ethical hacking knowledge so you can mix techniques and adapt them to different situations
Read more
More about this course
  • Just launched with all modern ethical hacking tools and best practices for ! Join a live online community of over 400,000+ students and a course taught by industry experts. This course will take you from absolute beginning of setting up your own hacking lab (like Kali Linux) on your machine, all the way to becoming a security expert that is able to use all the hacking techniques used by hackers and defend against them!
  • Whether you are a complete beginner looking to become an ethical hacker, or you?re a student looking to learn about securing computer systems, or you are a programmer who is looking to improve their security online and prevent attacks from hackers on your website, this course will dive you into the world of hacking and penetration testing. We even teach you Python programming from scratch for those that want to learn to program their own tools for hacking and penetration testing.
  • This course is focused on learning by doing. We are going to teach you how hacking works by actually practicing the techniques and methods used by hackers today. We will start off by creating our hacking lab to make sure we keep your computers safe throughout the course, as well as doing things legally, and once we have our computers set up for ethical hacking, then we dive into topics like:
  • 1. HACKING LAB - In this section we are building our own lab where we can perform our attacks (You will be able to use your Mac, Windows, Linux operating systems don't worry!). What this lab essentially is, is a virtual machine that we will use for hacking (Kali Linux) and throughout the course we also create additional virtual *vulnerable* machines that we can practice our attacks on. The reason we use virtual machines is because we are not allowed to test our attacks on real life websites and networks so we create our own environment to do that.
  • 2. OPTIONAL: PYTHON 101 - Learn python 3 programming from scratch. This section is not mandatory and is optional for those that want to learn to programming so you are able to build your own ethical hacking tools!
  • 3. RECONNAISSANCE - Here we learn what we call Footprinting, or in other words, Information Gathering. Once we choose our target, our first task is to gain as much information about the target as possible.
  • 4. SCANNING - This is where things get real. In this section, we also gather information but we try to gather only technical information (i.e. if they have open ports, if they have a firewall, what softwares they are running on those open ports, what operating system do they have, is it an outdated operating system, etc.).
  • 5. VULNERABILITY ANALYSIS - In this section we use the information that we gathered from scanning (such as softwares that the target has running on open ports) and with this information, we try to determine whether there is any known vulnerabilities.
  • 6. EXPLOITATION & GAINING ACCESS - This is the exciting part of the course. This is where we attack and gain access to the target machines. Throughout this section, we will be covering many different vulnerabilities and different targets. We perform these attacks on our virtual machines and cover another really important tool for an ethical hacker: Metasploit Framework. The goal of exploitation is to get on that target machine. This means we must drop a payload on that target machine so we can use it to navigate through their systems, look through their files, execute anything we want, and delete anything we want without the target knowing anything about it. We will also learn to create our own Viruses and Trojans that we can deliver to the target whether through an email or through an USB.
  • 7. POST EXPLOITATION - This is what comes after Exploitation. Post exploitation is what we do on the target machine after we have exploited it. Since we are on that machine we can do many things depending on what we want to get out from it. At the end, after we do all of the things we wanted, we want to make sure we cover our tracks by deleting any event logs or deleting any evidence that we were ever on that machine.
  • 8. WEBSITE PENETRATION TESTING - This is another big topic for an ethical hacker. In this section, we are mainly targeting websites and their bugs/vulnerabilities. These vulnerabilities can be anything from misconfigurations, SQL Injections (us interacting with the database), Information Disclosures (having access to some information by mistake which shouldn't be out there), Command Injection (directly interacting with the system through the webpage), XSS (Cross Site Scripting Attack and Injecting Javascript code on the page).
  • 9. MAN IN THE MIDDLE - This is an attack that is used inside a network. This allows us to sniff any unencrypted data and see it in plain text. This could also include seeing passwords in plain text for some websites. There are many tools out there that can perform this attack for us and we cover some of the main ones in the section.
  • 10. WIFI CRACKING - This is the section where we want to gain access to a network by cracking its wireless password.
  • 11. SOCIAL ENGINEERING - This is something we cover in almost every section. Social Engineering is an attack on humans since as we know people are always the weakest security!
  • + much much more!
  • We guarantee you this is the most comprehensive online course on hacking and security skills! Have a look at the course outline video to see all the topics we are going to cover, all the projects we?re going to build, and all the techniques you?re going to learn to become a top ethical hacker and penetration tester!
Read more

Complete Ethical Hacking Bootcamp : Zero to Mastery
 at 
UDEMY 
Curriculum

Introduction

Course Outline

Join Our Online Classroom!

Exercise Meet The Community

What Is Ethical Hacking?

Course Resources + Guide

Setting Up Our Hacking Lab

What is A Virtual Machine?

Why Linux?

Monthly Coding Challenges, Free Resources and Guides

Downloading Virtual Box & Kali Linux

Important - New Kali Linux Categories

Note Kali Linux Updates All The Time!

Creating Our First Virtual Machine

Installing Kali Linux Operating System

Update - New & Old Versions of Kali Linux

Networking Basics

Full Screen Mode & Network Settings

Note Getting Familiar With Kali Linux!

Stages Of A Penetration Test

Linux Operating System

Navigating Through Linux System

Creating Files & Managing Directories

Network Commands & Sudo Privileges In Kali

Note Linux File System & Additional Commands

Reconnaissance & Information Gathering

What is Information Gathering?

Obtaining IP Address, Physical Address Using Whois Tool

Whatweb Stealthy Scan

Aggressive Website Technology Discovering on IP Range

Note Same Tools Different Results!

Gathering Emails Using theHarvester & Hunter.io

How To Download Tools Online

Finding Usernames With Sherlock

Bonus - Email Scraper Tool In Python

Note More About Information Gathering

Scanning

Theory Behind Scanning

TCP & UDP

Installing Vulnerable Virtual Machine

Netdiscover

Perforg First Nmap Scan

Different Nmap Scan Types

ZTM Nmap Cheat Sheet

Discovering Target Operating System

Detecting Version Of Service Running On An Open Port

Filtering Port Range & Output Of Scan Results

What is a Firewall/IDS?

Using Decoys and Packet Fragmentation

Security Evasion Nmap Options

Note Time To Switch Things Up!

Python Coding Project # - Portscanner

The Paths

Note Do We Need To Learn Programg To Be An Ethical Hacker?

Coding a Portscanner in Python

Vulnerability Analysis

Finding First Vulnerability With Nmap Scripts

Manual Vulnerability Analysis & Searchsploit

Nessus Installation

Discovering Vulnerabilities With Nessus

Scanning Windows Machine With Nessus

Lets cool down for a bit!

Exploitation & Gaining Access

What is Exploitation?

What is a Vulnerability?

Reverse Shells, Bind Shells

Metasploit Framework Structure

Msfconsole Basic Commands

Our First Exploit ? vsftp 2.3.4 Exploitation

Misconfigurations Happen - Bindshell Exploitation

Information Disclosure - Telnet Exploit

Software Vulnerability - Samba Exploitation

Attacking SSH - Bruteforce Attack

Exploitation Challenge - Different Exploits

Explaining Windows Setup

Eternal Blue Attack - Windows Exploitation

DoublePulsar Attack - Windows Exploit

BlueKeep Vulnerability - Windows Exploit

Note We Can Also Target Routers!

Update - Routersploit

Update - Router Default Credentials

SMBGhost CVE - - Windows Manual Exploitation

Note Not Everything Will Work Smooth!

Setting Up Vulnerable Windows

Crashing Windows Machine Remotely

Exploiting Windows Machine Remotely

Gaining Access (Viruses, Trojans, Payloads ...)

Generating Basic Payload With Msfvenom

Advance Msfvenom Usage Part

Advance Msfvenom Usage Part

Generating Powershell Payload Using Veil

TheFatRat Payload Creation

Note My Payloads Are Getting Detected By An Antivirus!

Hexeditor & Antiviruses

Making Our Payload Open An Image

Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers

Post Exploitation Theory

Meterpreter Basic Commands Part

Meterpreter Basic Commands Part

Elevating Privileges With Different Modules

Creating Persistence On The Target System

Post Exploitation Modules

Exploitation Recap

Python Coding Project # 2- Backdoor

What Are We Creating?

Connecting Server And Backdoor

Processing Instructional Commands

Sending and Receiving Data

Executing Commands And Compiling The Program

Changing Directory Inside Of Our Backdoor

Uploading & Downloading Files

Testing All The Commands

Note You Can Continue Building Onto This Project!

Website Application Penetration Testing

Website Penetration Testing Theory

HTTP Request & Response

Information Gathering & Dirb Tool

Burpsuite Configuration

ShellShock Exploitation

Command Injection Exploitation

Getting Meterpreter Shell With Command Execution

Reflected XSS & Cookie Stealing

Stored XSS

HTML Injection

SQL Injection

CSRF Vulnerability

Hydra Bruteforce Attack Example

Hydra Bruteforce Attack Example

Burpsuite Intruder

Python Coding Project # 3- Login Bruteforce, Directory Discovery

Creating Programs

Bruteforcer In Python

Hidden Directory Discovery

Man In The Middle - MITM

Theory - Man In The Middle Attack

Bettercap ARP Spoofing

Ettercap Password Sniffing

Manually Poisoning Targets ARP Cache With Scapy

Bonus Wireless Access Point Cracking

Wireless Cracking Theory

Putting Wireless Card In Monitor Mode

Deauthenticating Devices & Grabbing Password

Aircrack Password Cracking

Hashcat Password Cracking

Bonus Gaining Access To An Android Device

Android Hacking Theory

Android VM Install

Gaining Access With Android Meterpreter

Evil Droid

Is it Flappy Bird or Malware

Hack Any Device On Any Network With Ngrok

Where To Go From Here?

Become An Alumni

Endorsements On LinkedIN

What is Next?

Learning Guideline

Practice

Bug Bounty

Coding For Hackers

Exploit Development

Python Monthly

Course Review

The Final Challenge

Learn Python Basics

What Is A Programming Language

Python Interpreter

How To Run Python Code

Our First Python Program

Latest Version Of Python

Python vs Python

Exercise How Does Python Work?

Learn Python Intermediate

Learning Python

Python Data Types

How To Succeed

Numbers

Math Functions

DEVELOPER FUNDAMENTALS I

Operator Precedence

Exercise Operator Precedence

Optional bin() and complex

Variables

Expressions vs Statements

Augmented Assignment Operator

Strings

String Concatenation

Type Conversion

Escape Sequences

Formatted Strings

String Indexes

Immutability

Built-In Functions + Methods

Booleans

Exercise Type Conversion

DEVELOPER FUNDAMENTALS II

Exercise Password Checker

Lists

List Slicing

Matrix

List Methods

List Methods

List Methods

Common List Patterns

List Unpacking

None

Dictionaries

DEVELOPER FUNDAMENTALS III

Dictionary Keys

Dictionary Methods

Dictionary Methods

Tuples

Tuples

Sets

Sets

Breaking The Flow

Conditional Logic

Indentation In Python

Truthy vs Falsey

Ternary Operator

Short Circuiting

Logical Operators

Exercise Logical Operators

Iterables

Exercise Tricky Counter

range()

enumerate()

While Loops

While Loops

break, continue, pass

Our First GUI

DEVELOPER FUNDAMENTALS IV

Exercise Find Duplicates

Functions

Parameters and Arguments

Default Parameters and Keyword Arguments return

Methods vs Functions

Docstrings

Clean Code

*args and **kwargs

Exercise Functions

Scope

Scope Rules

global Keyword

nonlocal Keyword

Why Do We Need Scope?

Modules in Python

Quick Note Upcog Videos

Optional PyCharm

Packages in Python

Different Ways To Import

Learn Python 3 Error Handling

Errors in Python

Error Handling

Error Handling

Exercises Error Handling

Error Handling

Learn Python 4: File I/O

Working With Files In Python

Read, Write, Append

File Paths

File IO Errors

Exercise Translator

Next Steps

BONUS SECTION

Bonus

Other courses offered by UDEMY

549
50 hours
– / –
3 K
10 hours
– / –
549
4 hours
– / –
599
10 hours
– / –
View Other 2344 CoursesRight Arrow Icon

Complete Ethical Hacking Bootcamp : Zero to Mastery
 at 
UDEMY 
Students Ratings & Reviews

4/5
Verified Icon1 Rating
A
Anup Maurya
Complete Ethical Hacking Bootcamp : Zero to Mastery
Offered by UDEMY
4
Learning Experience: great content in this course
Faculty: Faculty was very knowledgeable Yes it was updated
Course Support: Yes seeking for jon
Reviewed on 15 May 2022Read More
Thumbs Up IconThumbs Down Icon
View 1 ReviewRight Arrow Icon
qna

Complete Ethical Hacking Bootcamp : Zero to Mastery
 at 
UDEMY 

Student Forum

chatAnything you would want to ask experts?
Write here...