HOME > IT & Software > Complete Ethical Hacking Bootcamp

Complete Ethical Hacking Bootcamp

SynopsisComplete Ethical Hacking Bootcamp, available at $109.99, has...
Complete Ethical Hacking Bootcamp  No.1

Complete Ethical Hacking Bootcamp, available at $109.99, has an average rating of 4.64, with 256 lectures, 2 quizzes, based on 16650 reviews, and has 98160 subscribers.

You will learn about Learn Ethical Hacking from scratch & All 5 phases of Penetration Testing Learn Python from scratch so you are able to write your own tools for ethical hacking Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with Windows/Mac/Linux) Create additional virtual *vulnerable* machines that we can practice our attacks on Create trojans, viruses, keyloggers for ethical hacking Learn how to bypass Firewalls & Intrusion Detection System with Advanced Scanning Learn how to crack Wireless Access Point passwords Bug Bounty: Discover all types of Web Application Bugs that could cause a threat Learn how to gain access to any type of machine: Windows/Linux/MacOS Sniff passwords over the local area network with Man In The Middle Attacks SQL Injection, XSS, Command Injection and other techniques Learn how to trick people into opening your program (i.e Social Engineering) Learn Advance Metasploit Framework usage Learn Basics of Linux and Linux Terminal Master Information Gathering and Footprinting Learn how to perform Vulnerability Analysis Perform advanced scanning of an entire network Perform Deauthentication Attack to disconnect everyone from the Wireless Access Point Learn Website Application Penetration Testing from scratch Learn Advance Nmap Usage Code your own Advanced Backdoor that you can use in your Penetration Tests Create Persistence on target machines Perform newest Windows 7 + 10 exploits & attacks Learn how to gain access to a router in various ways Learn Networking & different Networking Protocols Combine programming knowledge and ethical hacking knowledge so you can mix techniques and adapt them to different situations This course is ideal for individuals who are Anybody interested in learning ethical hacking and penetration testing or Anybody interested in learning python and ethical hacking or Anybody looking to go beyond a normal beginner tutorial that doesnt give you a chance to practice or Anybody looking to learn how hackers hack computer systems or Any developer looking to secure their computer systems from hackers It is particularly useful for Anybody interested in learning ethical hacking and penetration testing or Anybody interested in learning python and ethical hacking or Anybody looking to go beyond a normal beginner tutorial that doesnt give you a chance to practice or Anybody looking to learn how hackers hack computer systems or Any developer looking to secure their computer systems from hackers.

Enroll now: Complete Ethical Hacking Bootcamp

Summary

Title: Complete Ethical Hacking Bootcamp

Price: $109.99

Average Rating: 4.64

Number of Lectures: 256

Number of Quizzes: 2

Number of Published Lectures: 256

Number of Published Quizzes: 2

Number of Curriculum Items: 258

Number of Published Curriculum Objects: 258

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Learn Ethical Hacking from scratch & All 5 phases of Penetration Testing
  • Learn Python from scratch so you are able to write your own tools for ethical hacking
  • Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with Windows/Mac/Linux)
  • Create additional virtual *vulnerable* machines that we can practice our attacks on
  • Create trojans, viruses, keyloggers for ethical hacking
  • Learn how to bypass Firewalls & Intrusion Detection System with Advanced Scanning
  • Learn how to crack Wireless Access Point passwords
  • Bug Bounty: Discover all types of Web Application Bugs that could cause a threat
  • Learn how to gain access to any type of machine: Windows/Linux/MacOS
  • Sniff passwords over the local area network with Man In The Middle Attacks
  • SQL Injection, XSS, Command Injection and other techniques
  • Learn how to trick people into opening your program (i.e Social Engineering)
  • Learn Advance Metasploit Framework usage
  • Learn Basics of Linux and Linux Terminal
  • Master Information Gathering and Footprinting
  • Learn how to perform Vulnerability Analysis
  • Perform advanced scanning of an entire network
  • Perform Deauthentication Attack to disconnect everyone from the Wireless Access Point
  • Learn Website Application Penetration Testing from scratch
  • Learn Advance Nmap Usage
  • Code your own Advanced Backdoor that you can use in your Penetration Tests
  • Create Persistence on target machines
  • Perform newest Windows 7 + 10 exploits & attacks
  • Learn how to gain access to a router in various ways
  • Learn Networking & different Networking Protocols
  • Combine programming knowledge and ethical hacking knowledge so you can mix techniques and adapt them to different situations
  • Who Should Attend

  • Anybody interested in learning ethical hacking and penetration testing
  • Anybody interested in learning python and ethical hacking
  • Anybody looking to go beyond a normal beginner tutorial that doesnt give you a chance to practice
  • Anybody looking to learn how hackers hack computer systems
  • Any developer looking to secure their computer systems from hackers
  • Target Audiences

  • Anybody interested in learning ethical hacking and penetration testing
  • Anybody interested in learning python and ethical hacking
  • Anybody looking to go beyond a normal beginner tutorial that doesnt give you a chance to practice
  • Anybody looking to learn how hackers hack computer systems
  • Any developer looking to secure their computer systems from hackers
  • Just updated with all modern ethical hacking tools and best practices! Join a live online community of over 900,000+ students and a course taught by industry experts. This course will take you from absolute beginning of setting up your own hacking lab (like Kali Linux) on your machine, all the way to becoming a security expert that is able to use all the hacking techniques used by hackers and defend against them!

    Whether you are a complete beginner looking to become an ethical hacker, or you’re a student looking to learn about securing computer systems, or you are a programmer who is looking to improve their security online and prevent attacks from hackers on your website, this course will dive you into the world of hacking and penetration testing. We even teach you Python programming from scratch for those that want to learn to program their own tools for hacking and penetration testing.

    This course is focused on learning by doing. We are going to teach you how hacking works by actually practicing the techniques and methods used by hackers today. We will start off by creating our hacking lab to make sure we keep your computers safe throughout the course, as well as doing things legally, and once we have our computers set up for ethical hacking, then we dive into topics like

    1. HACKING LAB – In this section we are building our own lab where we can perform our attacks. What this lab essentially is, is a virtual machine that we will use for hacking and throughout the course we also create additional virtual vulnerable machines that we can practice our attacks on. The reason we use virtual machines is because we are not allowed to test our attacks on real life websites and networks so we create our own environment to do that.

  • Downloading Virtual Box and Kali Linux

  • Creating Our First Virtual Machine

  • Installing Kali Linux Operating System

  • 5 Stages Of A Penetration Test

  • Navigating Through Kali Linux System

  • Creating Files and Managing Directories

  • Network Commands and Sudo Privileges In Kali

  • 2. OPTIONAL: PYTHON 101 – Learn python 3 programming from scratch. This section is not mandatory and is optional for those that want to learn to programming so you are able to build your own ethical hacking tools

  • Learn Python Basics

  • Learn Python Intermediate

  • Learn Python: Error Handling

  • Learn Python: File I/O

  • 3. RECONNAISSANCE  – Here we learn what we call Footprinting, or in other words, Information Gathering. Once we choose our target, our first task is to gain as much information about the target as possible.

  • What is Information Gathering

  • Obtaining IP Address, Physical Address Using Whois Tool

  • Whatweb Stealthy Scan

  • Aggressive Website Technology Discovering on IP Range

  • Gathering Emails Using theHarvester and Hunterio

  • How To Download Tools Online

  • Finding Usernames With Sherlock

  • Bonus Email Scraper Tool In Python 3

  • More About Information Gathering

  • 4. SCANNING – This is where things get real. In this section, we also gather information but we try to gather only technical information

  • Theory Behind Scanning

  • TCP & UDP

  • Installing Vulnerable Virtual Machine

  • Netdiscover

  • Performing First Nmap Scan

  • Different Nmap Scan Types

  • Discovering Target Operating System

  • Detecting Version Of Service Running On An Open Port

  • Filtering Port Range and Output Of Scan Results

  • What is a Firewall & IDS

  • Using Decoys and Packet Fragmentation

  • Security Evasion Nmap Options

  • Note: Time To Switch Things Up!

  • Python Coding Project: Port Scanner

  • 5. VULNERABILITY ANALYSIS – In this section we use the information that we gathered from scanning (such as softwares that the target has running on open ports) and with this information, we try to determine whether there is any known vulnerabilities.

  • Finding First Vulnerability & Nmap Scripts

  • Manual Vulnerability Analysis and Searchsploit

  • Nessus Installation

  • Discovering Vulnerabilities & Nessus

  • Scanning Windows 7 Machine With Nessus

  • 6. EXPLOITATION and GAINING ACCESS This is the exciting part of the course. This is where we attack and gain access to the target machines. Throughout this section, we will be covering many different vulnerabilities and different targets. We perform these attacks on our virtual machines and cover another really important tool for an ethical hacker: Metasploit Framework. The goal of exploitation is to get on that target machine. This means we must drop a payload on that target machine so we can use it to navigate through their systems, look through their files, execute anything we want, and delete anything we want without the target knowing anything about it. We will also learn to create our own Viruses and Trojans that we can deliver to the target whether through an email or through an USB.

  • What is Exploitation

  • What is a Vulnerability

  • Reverse Shells and Bind Shells

  • Metasploit Framework Structure

  • Msfconsole Basic Commands

  • Our First Exploit with vsftp 2.3.4 Exploitation

  • Misconfigurations Happen with Bindshell Exploitation

  • Information Disclosure with Telnet Exploit

  • Software Vulnerability with Samba Exploitation

  • Attacking SSH with Bruteforce Attack

  • Exploitation Challenge with 5 Different Exploits

  • Explaining Windows 7 Setup

  • Eternal Blue Attack Windows 7 Exploitation

  • DoublePulsar Attack Windows Exploit

  • BlueKeep Vulnerability  Windows Exploit

  • Routersploit

  • Router Default Credentials

  • Setting Up Vulnerable Windows 10

  • Crashing Windows 10 Machine Remotely

  • Exploiting Windows 10 Machine Remotely

  • Generating Basic Payload With Msfvenom

  • Advance Msfvenom Usage

  • Generating Powershell Payload Using Veil

  • TheFatRat Payload Creation

  • Hexeditor and Antiviruses

  • Making Our Payload Open An Image

  • 7. POST EXPLOITATION – This is what comes after Exploitation. Post exploitation is what we do on the target machine after we have exploited it. Since we are on that machine we can do many things depending on what we want to get out from it. At the end, after we do all of the things we wanted, we want to make sure we cover our tracks by deleting any event logs or deleting any evidence that we were ever on that machine.

  • Post Exploitation Theory

  • Meterpreter Basic Commands

  • Elevating Privileges With Different Modules

  • Creating Persistence On The Target System

  • Post Exploitation Modules

  • Python Coding Project Backdoor

  • 8. WEBSITE PENETRATION TESTING – This is another big topic for an ethical hacker. In this section, we are mainly targeting websites and their bugs or vulnerabilities. These vulnerabilities can be anything from misconfigurations, SQL Injections (us interacting with the database), Information Disclosures (having access to some information by mistake which shouldn’t be out there), Command Injection  (directly interacting with the system through the webpage),  XSS (Cross Site Scripting Attack and Injecting Javascript code on the page).

  • Website Penetration Testing Theory

  • HTTP Request and Response

  • Information Gathering and Dirb Tool

  • Burpsuite Configuration

  • ShellShock Exploitation

  • Command Injection Exploitation

  • Getting Meterpreter Shell With Command Execution

  • Reflected XSS and Cookie Stealing

  • Stored XSS

  • HTML Injection

  • SQL Injection

  • CSRF Vulnerability

  • Hydra Bruteforce Attack 

  • Burpsuite Intruder

  • Python Coding Project with Login Brute-force and Directory Discovery

  • 9. MAN IN THE MIDDLE – This is an attack that is used inside a network. This allows us to sniff any unencrypted data and see it in plain text. This could also include seeing passwords in plain text for some websites. There are many tools out there that can perform this attack for us and we cover some of the main ones in the section.

  • Theory of Man In The Middle Attack

  • Bettercap ARP Spoofing

  • Ettercap Password Sniffing

  • Manually Poisoning Targets ARP Cache With Scapy

  • 10. WIFI CRACKING – This is the section where we want to gain access to a network by cracking its wireless password.

  • Wireless Cracking Theory

  • Putting Wireless Card In Monitor Mode

  • Deauthenticating Devices & Grabbing Password

  • Aircrack Password Cracking

  • Hashcat Password Cracking

  • 11. SOCIAL ENGINEERING – This is something we cover in almost every section. Social Engineering is an attack on humans since as we know people are always the weakest security!

    & much much more!

    We guarantee you this is the most comprehensive online course on hacking and security skills! Have a look at the course outline video to see all the topics we are going to cover, all the projects we’re going to build, and all the techniques you’re going to learn to become a top ethical hacker and penetration tester!

    Taught By:

    Andrei is the instructor of the highest rated technical courses on Udemy as well as one of the fastest growing.His graduates have moved on to work for some of the biggest tech companies around the world like Apple, Google, Tesla, Amazon, JP Morgan, IBM, UNIQLO etc He has been working as a senior software developer in Silicon Valley and Toronto for many years, and is now taking all that he has learned, to teach programming skills and to help you discover the amazing career opportunities that being a developer allows in life.

    Having been a self taught programmer, he understands that there is an overwhelming number of online courses, tutorials and books that are overly verbose and inadequate at teaching proper skills. Most people feel paralyzed and don’t know where to start when learning a complex subject matter, or even worse, most people don’t have $20,000 to spend on a coding bootcamp. Programming skills should be affordable and open to all. An education material should teach real life skills that are current and they should not waste a student’s valuable time. Having learned important lessons from working for Fortune 500 companies, tech startups, to even founding his own business, he is now dedicating 100% of his time to teaching others valuable software development skills in order to take control of their life and work in an exciting industry with infinite possibilities.

    Andrei promises you that there are no other courses out there as comprehensive and as well explained. He believes that in order to learn anything of value, you need to start with the foundation and develop the roots of the tree. Only from there will you be able to learn concepts and specific skills(leaves) that connect to the foundation. Learning becomes exponential when structured in this way.

    Taking his experience in educational psychology and coding, Andrei’s courses will take you on an understanding of complex subjects that you never thought would be possible.


    Aleksa is a Penetration Tester with over 5 years of experience in Ethical Hacking and Cyber Security. As a self made hacker that started from a young age he has learned it all from Ethical Hacking and Cyber Security to Online Privacy and How To Become Anonymous Online.

    He has worked and discovered vulnerabilities for multiple companies and governments. He also worked as a freelancer that tested private web applications. He believes that Online Security and Privacy is something valuable but also that it doesn’t get enough attention as many cyber attacks are being executed every single day! No System is Safe and that is why we are here to discover vulnerabilities and secure them before the bad guys attempt anything malicious

    His main goal as an instructor is to teach the foundations of Ethical Hacking and Cyber Security to anyone who wants to pursue this as a career or wants to learn it to protect themselves online. Cyber attacks and online security is something that changes really fast so we as hackers must always be ready to learn new things in order to better protect Networks, Websites, Machines .. and also people

    See you inside the courses!

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Course Outline

    Lecture 2: Join Our Online Classroom!

    Lecture 3: Exercise: Meet Your Classmates & Instructor

    Lecture 4: What Is Ethical Hacking ?

    Lecture 5: Course Resources + Guide

    Lecture 6: ZTM Resources

    Chapter 2: Setting Up Our Hacking Lab

    Lecture 1: What is A Virtual Machine ?

    Lecture 2: Why Linux ?

    Lecture 3: Monthly Coding Challenges, Free Resources and Guides

    Lecture 4: Downloading Virtual Box & Kali Linux

    Lecture 5: Note: Kali Linux Updates All The Time!

    Lecture 6: Creating Our First Virtual Machine

    Lecture 7: Note: Common Errors With Your First VM

    Lecture 8: Installing Kali Linux Operating System

    Lecture 9: Update 1 – New & Old Versions of Kali Linux

    Lecture 10: Networking Basics

    Lecture 11: Full Screen Mode & Network Settings

    Lecture 12: Troubleshooting Network Connection in Kali Linux

    Lecture 13: Note: Getting Familiar With Kali Linux!

    Lecture 14: 5 Stages Of A Penetration Test

    Chapter 3: Linux Operating System

    Lecture 1: Navigating Through Linux System

    Lecture 2: Creating Files & Managing Directories

    Lecture 3: Network Commands & Sudo Privileges In Kali

    Lecture 4: Note: Linux File System & Additional Commands

    Lecture 5: Endorsements On LinkedIN

    Chapter 4: Reconnaissance & Information Gathering

    Lecture 1: What is Information Gathering ?

    Lecture 2: Obtaining IP Address, Physical Address Using Whois Tool

    Lecture 3: Whatweb Stealthy Scan

    Lecture 4: Aggressive Website Technology Discovering on IP Range

    Lecture 5: Note: Same Tools Different Results!

    Lecture 6: Gathering Emails Using theHarvester & Hunter.io

    Lecture 7: How To Download Tools Online

    Lecture 8: Finding Usernames With Sherlock

    Lecture 9: Bonus – Email Scraper Tool In Python 3

    Lecture 10: Note: More About Information Gathering

    Chapter 5: Scanning

    Lecture 1: Theory Behind Scanning

    Lecture 2: TCP & UDP

    Lecture 3: Note: Installing Vulnerable Machine

    Lecture 4: Installing Vulnerable Virtual Machine

    Lecture 5: Netdiscover

    Lecture 6: Performing First Nmap Scan

    Lecture 7: Different Nmap Scan Types

    Lecture 8: ZTM Nmap Cheat Sheet

    Lecture 9: Discovering Target Operating System

    Lecture 10: Detecting Version Of Service Running On An Open Port

    Lecture 11: Filtering Port Range & Output Of Scan Results

    Lecture 12: What is a Firewall/IDS ?

    Lecture 13: Using Decoys and Packet Fragmentation

    Lecture 14: Security Evasion Nmap Options

    Lecture 15: Note: Time To Switch Things Up!

    Chapter 6: Python Coding Project #1 – Portscanner

    Lecture 1: The 2 Paths

    Lecture 2: Note: Do We Need To Learn Programming To Be An Ethical Hacker ?

    Lecture 3: Coding a Portscanner in Python 3

    Chapter 7: Vulnerability Analysis

    Lecture 1: Finding First Vulnerability With Nmap Scripts

    Lecture 2: Manual Vulnerability Analysis & Searchsploit

    Lecture 3: Nessus Installation

    Lecture 4: Discovering Vulnerabilities With Nessus

    Lecture 5: Scanning Windows 7 Machine With Nessus

    Lecture 6: Lets cool down for a bit!

    Chapter 8: Exploitation & Gaining Access

    Lecture 1: What is Exploitation ?

    Lecture 2: What is a Vulnerability ?

    Lecture 3: Reverse Shells, Bind Shells

    Lecture 4: Metasploit Framework Structure

    Lecture 5: Msfconsole Basic Commands

    Lecture 6: Our First Exploit – vsftp 2.3.4 Exploitation

    Lecture 7: Misconfigurations Happen – Bindshell Exploitation

    Lecture 8: Information Disclosure – Telnet Exploit

    Lecture 9: Software Vulnerability – Samba Exploitation

    Lecture 10: Attacking SSH – Bruteforce Attack

    Lecture 11: Exploitation Challenge – 5 Different Exploits

    Lecture 12: Explaining Windows 7 Setup

    Lecture 13: Eternal Blue Attack – Windows 7 Exploitation

    Lecture 14: DoublePulsar Attack – Windows Exploit

    Lecture 15: BlueKeep Vulnerability – Windows Exploit

    Lecture 16: Note: We Can Also Target Routers!

    Lecture 17: Update 2 – Routersploit

    Lecture 18: Update 3 – Router Default Credentials

    Lecture 19: Exercise: Imposter Syndrome

    Chapter 9: SMBGhost CVE 2020-0796 – Windows 10 Manual Exploitation

    Lecture 1: Note: Not Everything Will Work Smooth!

    Lecture 2: Setting Up Vulnerable Windows 10

    Lecture 3: Crashing Windows 10 Machine Remotely

    Lecture 4: Exploiting Windows 10 Machine Remotely

    Chapter 10: Gaining Access (Viruses, Trojans, Payloads )

    Lecture 1: Generating Basic Payload With Msfvenom

    Lecture 2: Advance Msfvenom Usage Part 1

    Lecture 3: Advance Msfvenom Usage Part 2

    Lecture 4: Generating Powershell Payload Using Veil

    Lecture 5: TheFatRat Payload Creation

    Lecture 6: Note: My Payloads Are Getting Detected By An Antivirus!

    Lecture 7: Hexeditor & Antiviruses

    Lecture 8: Making Our Payload Open An Image

    Instructors

  • Complete Ethical Hacking Bootcamp  No.2
    Andrei Neagoie
    Founder of zerotomastery.io
  • Complete Ethical Hacking Bootcamp  No.3
    Aleksa Tamburkovski
    Ethical Hacker
  • Rating Distribution

  • 1 stars: 104 votes
  • 2 stars: 144 votes
  • 3 stars: 1005 votes
  • 4 stars: 4699 votes
  • 5 stars: 10698 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!