Mô tả

Welcome to The Complete Ethical Hacking Course!

This is one of the most comprehensive Ethical Hacking Courses ever created online!

Across 35+ hours of instructor-led content, you’ll learn:

  • How hackers launch attacks on different systems, computers, users, websites and wireless networks

  • What tools hackers use, why, and how they work

  • How to protect yourselves (or your clients!) against these attacks

  • How to build your own security and hacking tools with Python – taught from scratch and with no programming experience necessary!

  • How to create you own Ethical Hacking tool portfolio.

So that you can practice all the skills and techniques in real time, we start by setting up an ethical hacking lab on your computer. Here you can put the theory you learn to the test, and have a safe space to practice using hacking tools and attacks. We'll experience real time hacking examples, and learn how to protect ourselves against these attacks at the same time!

What else do I get?

Along with the course you’ll also receive for free the "The Complete Ethical Hacking Course Handbook", and $25 credit of at Digital Ocean (in order to build and practice within their online servers).

This course is brought to you by the most popular instructors in Udemy: Codestars by Rob Percival (>1.000.000 students) and Atil Samancioglu (>280.000 students). Atil Samancioglu teaches cyber security and programming courses on Udemy, and all across the world. His courses focus on taking you from beginner to master of your own security, and this course covers a huge range of vital topics, including but not limited to:

  • VPN & DNS

  • Dark Web

  • Kali Linux

  • Network Fundamentals

  • Wireless network attacks and protection

  • Man In The Middle attacks and protection

  • Capturing screenshots

  • Beef Usage

  • Fake Game Website Attacks

  • Ubuntu Apache Server Installation

  • Social Media & Instagram Hacking and protection

  • Wireshark Analysis

  • Metasploit

  • Maltego

  • Social Engineering

  • Trojans & Backdoors

  • Meterpreter

  • Website Pentesting

  • SQL 101

  • SQL Injection

  • XSS Vulnerabilities

  • Python

  • Socket

  • Keylogger

  • Scapy

  • Ethical Hacker Certifications

  • Tunneling Services

In related sections we are going to learn about subjects like Kali Linux, Wireshark, Maltego, netdiscover, MSFC, Trojan, Backdoor, Veil, Metasploitable, SQLi, MITMf, Crucnch, Meterpreter, Beef, Apache, nMap, SQLMap, Python, Socket, Scapy, Pynput, Keylogger etc. We are going to start with practical information without suffocating into details and make our way up with not neglecting theory at the end.

Is this course for you?

Yes! If you want to learn about Cyber Security and become an Ethical Hacker.

Yes! Because no prior experience of programming or Kali Linux is needed, we’ll teach you everything.

Important warning: This course only aims to teach for people who want to become Cyber Security Professionals, Ethical Hackers and Penetration Testers. All students should stay within legal boundaries in order to avoid any legal action against themselves.

See what students have to say about Ethical Hacking courses of Atil:

" Narration of Atil is really successful, fluent and deeply detailed. Furthermore all terms and phrases are explained clearly. You can get clear explanations for your questions as well. Do not hesitate to take the course as you will see the benefit more than you expect!" - Metin

" Great course! You can feel the instructors experience and knowledge, comprehensive and beautiful! I got answers to my every question and succeeded in completing the course. Thanks, if you have any hesitation getting the course, do not think further and get it :)" - Omer

" I haven't seen such a good course before. You do not have to spend money on any other! I know Atil from Java & Kotlin courses and I follow him. I cannot thank him enough for sharing this information with us. I only expect to see more courses from him. He is the man!" - Ertugrul

" This course puts confidence in you and removes any negative opinion about succeeding in this topic. I cannot wait to see more!" - Eren

" Narration is simple and clear. No unnecessary sentences. Ordered sections, experienced instructor, makes you focus on the subject. Thanks!" - Servet

" Undoubtedly the best instructor in Udemy, the best and the most efficient course on Udemy" - Abdurrahim

" I'm a new Mac user and before even figuring out how to use it, I've decided to take this course. Even though I thought this was going to be very hard for me, I did not experience any difficulties at all. On the contrary my motivation and my excitement increased along the way. Atil explains it so well that nothing stays on the thin air. If you listen carefully and practice what he is saying you will get great knowledge that little people have. I recommend this course." - Emre

" This course is very good regarding to narration, information, experience. You can get it without any hesitation." - Ahmet

" Very good course. It combines everything you have been searching for on the internet. He explains everything sincerely and simply. I definitely recommend this. If you even have a little bit interest you should get this without thinking of it. You can find real examples in the content. Instructor does not hold back to share his knowledge at all. He explains it all. I hope the second version of this course comes out :) Thank you very much..." - Yunus

" All explanations are very understandable and clear, examples are live and useful. I congratulate Atil for telling this complex subject in a very simple matter." - Burak

" Instructor is unbelievably experienced, a real professional, knows every detail. He shares very precious information. You would not learn this stuff in years! Thanks." - Abdullah

Bạn sẽ học được gì

Kali Linux Tools

Basic Linux Commands

Fundamental ethical hacking attacks & protection methods

Network Fundamentals

Python

Writing ethical hacking tools with Python

Website penetration testing

Wireless networks penetration testing

System penetration testing

Social engineering

SQL Injection

SQL Fundamentals

Man In The Middle Attacks and protection

Tunneling Services

Metasploit

Yêu cầu

  • Min 4GB of RAM for your computer
  • Optional: USB wi-fi card (Only for wireless password cracking sections, will show how to get one in course)

Nội dung khoá học

41 sections

Introduction

2 lectures
Introduction
01:27
Course Manual
04:55

Hacking Lab Setup

14 lectures
Hacking Lab Setup Introduction
00:45
What is Virtual Machine
02:43
Installing Virtualbox (Windows)
15:11
Installing Virtualbox (MAC)
09:53
Downloading Kali Linux
14:28
Kali Linux Download Links
00:16
Kali Linux Installation
19:07
Solving Install Problems (Windows)
10:46
Manual .iSO Installation (Problem Solving)
12:50
Solving Install Problems (MAC)
19:42
Solutions to Common Problems & Links
01:30
Installing Virtual Windows
26:42
Snapshots
09:54
Quick Reminder Before We Move On
02:25

Kali Linux 101

10 lectures
Kali Linux 101 Introduction
00:58
Kali Overview
13:49
Navigation
11:23
Moving Stuff
08:24
Privilege and Permissions
14:40
Linux Folders
08:01
Linux Package Managers
07:56
Nano
05:14
Changing Password
06:29
Kali Linux 101 Outro
00:48

Anonymity Online

7 lectures
Anonymity Online Introduction
00:32
How Networks Work
07:58
VPN & DNS Explained
06:19
Running VPNBooks
20:52
Changing DNS
16:02
Solutions for Problems
06:17
Anonymity Online Outro
00:37

Dark Web

5 lectures
Dark Web Introduction
01:10
What is Dark Web?
04:33
Installing Tor On Kali
18:30
Browsing Dark Web
13:23
Dark Web Outro
00:41

Network Pentesting

9 lectures
Network Pentesting Introduction
01:17
What is Network Pentesting?
02:51
Chipsets
12:00
Kali Linux WiFi Card List
00:22
Connecting WiFi USB
10:50
Solutions to Common Connection Problems
00:59
MAC Address
08:55
Monitor vs Managed
09:48
Network Pentesting Outro
00:38

Gathering Information From Networks

5 lectures
Gathering Information From Networks Introduction
00:40
Network Sniffing
10:23
Airodump Specific Target
14:32
Deauthentication Attacks
08:53
Gathering Information From Networks Outro
00:24

Wireless Attacks

11 lectures
Wireless Attacks Introduction
00:36
WEP Settings
07:45
WEP Encryption Logic
05:44
Cracking WEP
09:23
Fake Authentication
14:36
WPA & WPA2
06:44
Capturing Handshake
05:25
WPA Cracking
08:46
Wordlist Alternatives
15:55
More Secure Network
05:01
Wireless Attacks Outro
00:42

Post Connection Attacks

14 lectures
Post Connection Attacks Introduction
00:58
Netdiscover
11:39
nMap
03:41
ARP Protocol
12:12
Manual ARP Poison
10:33
What is Wireshark?
12:39
Wireshark Analysis
06:53
Bettercap Installation
09:54
ARP Attack
10:18
Sniffing Passwords
07:11
HSTS
14:21
Changing Caplet
06:52
How to Protect Yourself
02:53
Post Connection Attacks Outro
00:29

System Pentesting

11 lectures
System Pentesting Introduction
01:18
Intro to Pentesting
16:02
Installing Metasploitable
09:04
What is nMap?
11:25
First Scan
11:17
nMap Results
10:32
First Hack
20:06
Telnet vs SSH
07:14
Samba
09:38
Meterpreter
16:07
System Pentesting Outro
00:46

Attacks On Users

11 lectures
Attacks On Users Introduction
01:07
Attacking to Users
02:56
Installing Veil
07:11
Veil Overview
05:45
Creating First Backdoor
06:42
Bypassing Antivirus Solutions
09:29
Using Multi Handler
04:34
Testing Backdoor
06:31
What is Fud?
16:41
FatRat Features
18:53
Attacks On Users Outro
00:32

Social Engineering

14 lectures
Social Engineering Introduction
00:50
Social Engineering
18:26
Ngrok Settings
09:01
Accessing Location, Camera, Microphone
09:51
Malware Types
06:31
What is Maltego?
06:13
Maltego Overview
08:00
Strategy
07:56
Choosing Image
05:08
Combining Files
11:35
Hacking Windows
03:55
Changing the Extension
06:26
Fake Emails
07:08
Social Engineering Outro
00:43

Social Media Security

5 lectures
Social Media Security Introduction
00:49
Instagram Social Engineering
16:57
Connecting With Discord
14:36
More Believable Attacks
06:00
Social Media Security Outro
00:23

Beef

10 lectures
Beef Introduction
00:49
What is Beef?
05:40
What If Beef is not Installed in Kali?
12:33
Hooking Target
05:48
Injection
11:11
Taking Screenshots
03:36
How Hackers Steal Facebook Passwords?
03:57
Backdoor Delivery
09:16
How to Protect Yourself?
02:34
Beef Outro
00:28

External Network Attacks

13 lectures
External Network Attacks Introduction
00:35
External Network Attack Options
05:23
What is a Tunneling Service?
10:33
Msfvenom
07:21
Hacking Windows
05:56
Running Veil with Ngrok
17:31
Optional: External Backdoor with Port Forwarding
07:15
Optional: External Backdoor Hacking with Port Listening
04:46
Setoolkit
10:46
Setoolkit Modules
07:58
Hacking Gmail
12:01
sendEmail
13:42
External Network Attacks Outro
00:45

Fake Game Website Attacks

12 lectures
Fake Game Website Attacks Introduction
01:02
External Beef Attack
07:22
Necessary Links
00:05
Ubuntu Server Creation
07:00
Creating Game Website
16:02
Installing Beef
15:21
Beef in Ubuntu
10:26
Embedding JavaScript
05:39
What is No IP?
06:59
Hooking iPhone
03:14
How to Stay Safe
03:10
Fake Game Website Attacks Outro
00:29

Post Hacking Sessions

7 lectures
Post Hacking Sessions Introduction
00:32
Meterpreter Sessions
07:16
Migration
04:55
Downloading Files
04:54
Capturing Keylogs
02:38
Sustaining The Session
09:02
Post Hacking Sessions Outro
00:18

Hacker Methodology

4 lectures
Hacker Methodology Introduction
01:00
Ethical Hacker's Steps
03:49
Detailed Explanation of Methodology
05:57
Hacker Methodology Outro
00:38

Website Reconnaissance

9 lectures
Website Reconnaissance Introduction
00:25
Website Pentesting Setup
05:00
Maltego One More Time
08:38
Netcraft
05:28
Reverse DNS Lookup
04:22
Whois Lookup
04:01
Robots
06:25
Subdomains
05:52
Website Reconnaissance Outro
00:30

Website Pentesting

6 lectures
Website Pentesting Introduction
00:20
Code Execution Vulnerability
06:07
Reverse TCP Commands
08:49
File Upload Vulnerability
07:36
File Inclusion
06:37
Website Pentesting Outro
00:20

Cross Site Scripting

7 lectures
Cross Site Scripting Introduction
00:45
What is XSS?
03:32
Reflected XSS
04:03
Stored XSS
03:25
Real Hacking with XSS
05:54
How to Protect Yourself?
03:38
Cross Site Scripting Outro
00:19

SQL 101

8 lectures
SQL 101 Introduction
00:52
Database and SQL
01:46
Database Structure
04:36
Adding a New Value
05:50
Updating and Deleting Values
04:55
Filtering
04:36
SQL Codes Used In This Section
00:09
SQL 101 Outro
00:21

SQL Injection

11 lectures
SQL Injection Introduction
00:48
Metasploitable Databases
05:30
Working with Mutillidae
07:47
Vulnerability Test
05:21
Post Method SQLi
04:01
Get Method SQLi
04:08
Every Password On Database
03:26
Learning Database Name
05:38
Finding Out More
05:16
Retrieving Everything
04:20
SQL Injection Outro
00:26

Website Pentesting Tools

5 lectures
Website Pentesting Tools Introduction
00:35
Sqlmap
10:11
Zap
05:10
Zap Analysis
05:00
Website Pentesting Tools Outro
00:25

Ethical Hacking Certifications

5 lectures
Ethical Hacking Certifications Introduction
00:40
Options for Certification
02:28
Certified Ethical Hacker
06:37
OSCP
06:13
Ethical Hacking Certifications Outro
01:08

Network Theory

5 lectures
What is OSI Model?
07:04
What is Binary?
10:45
IP Address Advanced
08:19
Host Calculations
08:27
TCP vs UDP
06:39

Python For Ethical Hacking Setup

4 lectures
Python For Ethical Hacking Setup Introduction
00:43
Anaconda Installation (Windows)
13:00
Anaconda Installation (MAC)
11:45
Python For Ethical Hacking Setup Outro
00:23

Python Data Types & Structures

22 lectures
Python Data Types & Structures Introduction
00:42
Numbers
08:35
Variables
11:31
Downloading Notebooks
04:08
Variables & General GitHub Link
00:20
String
07:53
String GitHub Link
00:01
String Advanced
13:57
String Advanced GitHub Link
00:01
Variable Attributes
14:07
Lists
10:54
Lists Advanced
05:07
Lists GitHub Link
00:01
Dictionary
11:41
Dictionary GitHub Link
00:01
Sets
09:11
Sets GitHub Link
00:01
Tuples
05:50
Tuples GitHub Link
00:01
Boolean
04:08
Boolean GitHub Link
00:01
Python Data Types & Structures Outro
00:56

Control Statements & Loops

15 lectures
Control Statements & Loops Introduction
00:34
Logical Comparisons
06:30
Comparisons GitHub Link
00:01
If Statements
08:34
If Statements Continued
09:52
If Statements Practical Usage
05:06
If Statements GitHub Link
00:01
For Loop
09:06
For Loop Practical Usage
05:51
For Loop GitHub Link
00:01
Break Continue Pass
07:43
Break Continue Pass GitHub Link
00:01
While Loop
11:33
While Loop GitHub Link
00:01
Control Statements & Loops Outro
00:27

Essentials

10 lectures
Essentials Introduction
00:28
Useful Methods
10:39
Zip and Random
08:01
Lists Advanced
05:20
Useful Methods GitHub Link
00:01
Sublime Text (Windows)
07:08
Command Prompt (Windows)
03:40
Sublime Text (MAC)
06:19
Terminal (MAC)
03:47
Essentials Outro
00:31

Functions

10 lectures
Functions Introduction
00:39
Functions Explained
09:09
Input and Output
11:38
Functions Advanced
09:57
Functions GitHub Link
00:01
Functions Practical Usage
10:53
Practical Functions GitHub Link
00:01
Scope
13:49
Scope GitHub Link
00:01
Functions Outro
00:25

Object Oriented Programming

11 lectures
Object Oriented Programming Introduction
00:27
Class
13:33
Methods
05:57
Class Practical Usage
07:06
Inheritance
07:37
OOP Classes GitHub Link
00:01
Special Methods
08:25
Special Methods GitHub Link
00:01
Error Handling
11:05
Error Handling GitHub Link
00:01
Object Oriented Programming Outro
00:29

Modules

7 lectures
Modules Introduction
00:24
Using Libraries
12:38
Modules GitHub Link
00:01
Writing Our Own Modules
05:53
Imported vs Direct
06:54
Imported vs Direct GitHub Link
00:01
Modules Outro
00:22

MAC Changer

14 lectures
MAC Changer Introduction
00:48
Installing PyCharm On Kali
16:16
MAC and IP Address
06:44
Changing MAC Manually
07:48
Using Subprocess
07:13
Introducing Variables
09:42
Processing Tuples
12:02
Beautifying the Code
08:01
Saving Subprocess
04:59
Regex 101
06:46
New MAC Control
06:34
Python3 Compatibility
04:02
MAC Changer GitHub Link
00:01
MAC Changer Outro
00:24

Network Scanner

10 lectures
Network Scanner Introduction
00:28
ARP Refreshed
04:44
How Network Scanners Work
05:58
ARP Request
09:47
Broadcast Request
08:56
Processing Response
05:32
Adding Features
08:21
Python3 Compatibility
00:51
Network Scanner GitHub Link
00:01
Network Scanner Outro
00:32

Man In The Middle

11 lectures
Man In The Middle Introduction
00:36
MITM Refreshed
04:30
ARP Response Creation
07:43
ARP Poison
07:14
Getting MAC Address
13:46
Looping Continuously
09:37
Displaying Better Logs
04:02
Handling Specific Error
10:01
Getting User Input
08:05
MITM GitHub Link
00:01
Man In The Middle Outro
00:21

Packet Listener

9 lectures
Packet Listener Introduction
00:25
Wireshark Refreshed
07:28
Wireshark Analysis
07:32
Gathering Packets
08:41
Working With Layers
06:41
Downgrading HTTPS
15:15
Protecting Ourselves
02:51
Packet Listener GitHub Link
00:01
Packet Listener Outro
00:35

Keylogger

11 lectures
Keylogger Introduction
00:27
Setting Up Windows
14:45
Working With Files
13:54
Logging Keyboard
19:41
Saving Logs
06:47
Handling Errors
10:35
Sending Email
08:31
Threading Library
15:27
Testing On Windows
07:19
Keylogger GitHub Link
00:01
Keylogger Outro
00:27

Backdoor

20 lectures
Backdoor Introduction
00:23
How To Write a Backdoor?
06:42
Opening a Connection
07:38
Running Commands
08:35
Writing Listener
09:10
Sending Commands With Listener
06:10
Class Structure
09:19
Finishing Classes
05:37
What is JSON?
10:25
Processing JSON
08:28
Sending Commands With List
12:35
Cd Command Implementation
08:42
Getting Contents
06:59
Saving Files
06:18
Encoding Downloads
07:09
Upload Functionality
08:53
Handling Errors
07:10
Python3 Compatibility
12:13
Backdoor GitHub Link
00:01
Backdoor Outro
00:36

Packaging & Malicious Files

11 lectures
Packaging & Malicious Files Introduction
00:27
Malicious Files
06:00
Creating Executables
05:27
What is Regedit?
06:34
Copying Files
07:52
Running Executables On Startup
05:31
Adding PDF to File
08:37
Changing Icons
07:24
Changing Extensions
06:35
MyPackage GitHub Link
00:01
Packaging & Malicious Files Outro
00:36

Closing & Ethical Hacker's Handbook

2 lectures
Closing
02:38
Ethical Hacker's Handbook
00:03

Đánh giá của học viên

Chưa có đánh giá
Course Rating
5
0%
4
0%
3
0%
2
0%
1
0%

Bình luận khách hàng

Viết Bình Luận

Bạn đánh giá khoá học này thế nào?

image

Đăng ký get khoá học Udemy - Unica - Gitiho giá chỉ 50k!

Get khoá học giá rẻ ngay trước khi bị fix.