Learn Ethical Hacking: Beginner to Advanced
All LevelsIT & SoftwareEthical Hacking

Learn Ethical Hacking: Beginner to Advanced

Learn ethical hacking, penetration testing and network security skills with our comprehensive course!

Created by Joseph Delgadillo
28.5 hours
Video Content
149
Lectures
237,776
Students
4.5
Rating
4.5
(237,776 students enrolled)

What you'll learn

Ethical Hacking
Linux Commands
Kali Linux
Creating a Secure Environment
Footprinting
Scanning
Website Penetration Testing
Wireless Cracking
Man in the Middle Attacks
System Hacking
Python Programming Fundamentals
Coding Custom Pentesting Tools
Tips for Building a Career in Cyber Security

Course Content

14 sections • 149 lectures • 28:46:04 total length

Introduction and Installation

5 lectures • 54:07

Introduction to the course04:40
Kali Linux in a virtual machine setup01:41
VirtualBox installation15:36
Kali Linux installation13:54
Enabling full-screen18:16
+1 more lectures

Basic Linux Commands

3 lectures • 43:30

Basic commands part 109:41
Basic commands part 221:04
Basic commands part 312:45

Creating a Secure Hacking Environment

6 lectures • 52:52

Changing IP address and wireless adapter setup04:51
Creating a bootable Kali USB drive04:54
Essential networking terms10:15
Essential hacking terms17:58
Additional Kali tools to install08:30
+1 more lectures

Footprinting

6 lectures • 54:21

Google hacking13:08
Nikto basics10:55
Whois tool06:39
Email harvesting06:07
Shodan10:24
+1 more lectures

Scanning

9 lectures • 01:51:09

Installing Metasploitable06:58
Nmap part 115:32
Nmap part 211:43
Nmap part 312:24
Zenmap07:52
+4 more lectures

Website Penetration Testing

24 lectures • 04:37:31

Installing OWASP08:26
HTTP request09:57
HTTP response10:27
Burpsuite configuration12:49
Editing packets in Burpsuite12:20
+19 more lectures

Wireless Cracking

13 lectures • 02:24:36

Wireless attacking theory10:49
Enabling monitor mode04:39
Capturing handshake with airodump14:35
RockYou.txt13:53
Cracking with Aircrack15:31
+8 more lectures

Man in the Middle Attacks

11 lectures • 01:59:05

ARP protocol basics10:28
Man in the middle attack theory07:18
Installing MITMf06:36
Manual ARP spoofing12:47
Problems while installing MITMf06:18
+6 more lectures

System Hacking with Metasploit

21 lectures • 04:13:02

MSFconsole environment16:05
Metasploit modules explained12:11
Bruteforcing SSH with Metasploit15:17
Attacking Tomcat with Metasploit08:49
Getting Meterpreter with command injection25:05
+16 more lectures

Python Crash Course

11 lectures • 01:46:24

Variables13:40
Raw input10:46
If-else statements10:17
For loops06:30
While loops08:23
+6 more lectures

Coding an Advanced Backdoor

20 lectures • 04:13:47

Theory behind reverse shells06:47
Simple server code12:40
Connection with reverse shell07:07
Sending and receiving messages10:46
Sending messages with while true loop07:52
+15 more lectures

Creating a Keylogger for the Backdoor

7 lectures • 01:29:47

Importing Pynput10:19
Simple keylogger09:55
Adding report function10:32
Writing keystrokes to a file13:59
Adding the keylogger to our reverse shell part 122:59
+2 more lectures

Basic Authentication Bruteforcer

7 lectures • 01:20:27

Printing banner11:19
Adding available options11:12
Starting threads for bruteforce08:23
Writing function to run the attack11:02
Bruteforcing router login09:37
+2 more lectures

BONUS - Building a Career in Cyber Security

6 lectures • 01:25:25

What will you learn in this section?02:33
Why is ethical hacking a valuable skill?23:00
What is the best ethical hacking certification?16:31
Tips for getting your first job as an ethical hacker18:23
How I started my career as an ethical hacker14:11
+1 more lectures

Description

If you would like to master ethical hacking and get a job in the field of cyber security, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux and Python hacking with over 28 hours of HD video tutorials! This course was designed to be extremely beginner friendly. We will begin by covering how to setup a secure and anonymous pentesting environment, cover essential hacking tools in Kali Linux, and finish up with writing our own tools in Python. This course even includes a complete Python crash course, so no previous programming experience is necessary!


Topics covered in the course:

• How to setup a Kali Linux system

• Essential Linux system commands

• How to create a secure penetration testing environment

• Footprinting

• Scanning

• Website penetration testing

• Wireless network security and how to hack Wi-Fi

• Man in the middle attacks

• System hacking using Metasploit

• Python programming fundamentals

• Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)

• Tips for building a career in cyber security


BONUS - 3 Coding Projects:

• Advanced Backdoor

• Keylogger

• Basic Authentication Bruteforcer


Expert Review for this course:

• “Joseph Delgadillo's courses are great for anyone wanting to start their career in the security industry. I enrolled into the Python and Ethical Hacking courses and found them very useful and accessible. They had a great balance between delivering the information without overwhelming the student but still being challenging enough. I definitely recommend them!”

- Abigail Garcia, OSINT Analyst, Center for Information Resilience


Still not sold? Check out a few of the awesome reviews this course has received from customers:

• "This course has helped me get started in my career in Networking/Cyber Security. Thanks!“

• "Amazing, detailed and superbly delivered. Highly recommended.“

• "Love it! I have to learn about networking for school, but learning it in the context of breaking it makes it so much more interesting!"


Who this course is for:

  • Students who are interested in ethical hacking and network security.

This course includes:

  • 28.5 hours on-demand video
  • 1 articles
  • 0
  • Access on mobile and TV
  • Full lifetime access
  • Certificate of completion

Instructor

Joseph Delgadillo

Students also download

Explore related courses to expand your learning journey.