Learning Ethical Hacking From Scratch Training Course - Udemy
Learning Ethical Hacking From Scratch Training Course - Udemy
Personal Teams
Add to cart
Buy now
or
Cancel anytime
Learn about the different hacking Install a hacking lab & needed
fields & hackers. software (on Windows, OS X and
Linux).
Discover vulnerabilities & exploit Hack secure systems using client-
them to hack into servers. side & social engineering.
Secure systems from all the attacks Install & use Kali Linux - a hacking
shown. operating system.
Linux basics. Linux commands
How to use the Linux terminal. Network basics & how devices
interact inside a network.
Run attacks on networks without Control Wi-Fi connections without
knowing its key. knowing the password.
Create a fake Wi-Fi network with Gather detailed information about
internet
Learn Ethical Hacking Fromconnection & spy on clients.
Scratch 2024 networks & connected clients like
$14.99
their OS, ports ...etc.
Bestseller 4.6 (131,236 ratings) 647,795 students $109.99
Crack WEP/WPA/WPA2 ARP Spoofing / ARP Poisoning.
encryptions.
Launch various Man In The Middle Access any account accessed by any
attacks. client on the network.
Sniff network traffic & analyse it to Intercept network traffic & modify it
extract important info such as: on the fly.
passwords, cookies, urls, videos,
images ..etc.
Discover devices connected to the Inject Javascript in pages loaded by
same network. clients connected to the same
network.
Show more
Course content
25 sections • 145 lectures • 15h 32m total length Expand all sections
15 more sections
Requirements
Basic IT Skills
For WiFi cracking (10 lectures ONLY) - Wireless adapter that supports monitor mode (more
info provided in the course).
Description
Last Update: June 2024
Learn EthicalWelcome
Hacking From
this Scratch 2024
comprehensive $14.99
Ethical Hacking course! This course assumes you have NO prior
Bestseller 4.6
knowledge!
(131,236It ratings)
starts with
647,795
you from
students
scratch and takes you step-by-step teaching you how
$109.99
to hack systems like black-hat hackers and secure them like security experts!
This course is highly practical but it won't neglect the theory; we'll start with ethical hacking
basics, breakdown the different penetration testing fields and install the needed software (on
Windows, Linux and Apple Mac OS), then we'll dive and start hacking straight away. You'll learn
everything by example, by analysing and exploiting different systems such as networks, cloud
servers, clients, websites, etc. No boring dry lectures.
The course is divided into a number of sections, each section covers a penetration testing /
hacking field, in each of these sections you'll first learn how the target system works, the
weaknesses of this system, and how to practically exploit theses weaknesses to hack this
system. As we do this I will also introduce you to different hacking and security concepts, tools
and techniques. Everything will be taught through examples and hands-on practicals, there
will be no useless or boring lectures!
All the techniques in this course are practical and work against real systems, you'll understand
the whole mechanism of each technique first, then you'll learn how to use it to hack the target
system . By the end of the course you'll be able to modify these techniques to launch more
powerful attacks, and adopt them to suit different situations and different scenarios .
By the end of the course you will have a strong foundation in most hacking or penetration
testing fields and you'll also learn how to detect, prevent and secure systems and yourself
from the discussed attacks.
1. Network Hacking - This section will teach you how to hack and secure both wired & wireless
networks. First, you will learn network basics, how they work, and how devices communicate
with each other. Then it will branch into three sub sections:
Pre-connection attacks: in this subsection you'll learn a number of attacks that can be
executed without connecting to the target network and without the need to know the
network password; you'll learn how to gather information about the networks around you,
discover connected devices, and control connections (deny/allow devices from
connecting to networks).
Gaining Access: Now that you gathered information about the networks around you, in this
subsection you will learn how to crack the key and get the password to your target network
whether it uses WEP, WPA or even WPA2 .
Post Connection attacks: Now that you have the key, you can connect to the target
network, in this subsection you will learn a number of powerful techniques that allow you
to gather comprehensive information about the connected devices, see anything they do
on the internet (such as login information, passwords, visited urls, images, videos, etc.),
redirect requests, inject evil code in loaded pages and much more! You will also learn how
to create a fake WiFi network or a honeypot, attract users to connect to it and use all of
the above techniques against the connected clients.
2. Gaining Access - In this section you will learn two main approaches to gain remote access
Learn EthicalorHacking From Scratch
hack computer systems: 2024 $14.99
Bestseller 4.6 (131,236 ratings) 647,795 students $109.99
Server Side Attacks: In this subsection you will learn how to gain full access to computer
systems without user interaction. You will learn how to gather useful information about a
target system such as the operating system, open ports, installed services, then use this
information to discover weaknesses / vulnerabilities and exploit them to gain full
control over the target. Finally you will learn how to automatically scan servers for
vulnerabilities and generate different types of reports with your discoveries.
Client Side Attacks - If the target system does not contain any weaknesses then the only
way to hack it is by interacting with the users, in this subsection you'll learn how to get the
target user to install a backdoor on their system without even realising, this is done
by hijacking software updates or backdooring downloads on the fly. This subsection
also teaches you how to use social engineering to hack secure systems, so you'll learn how
to gather comprehensive information about system users such as their social accounts,
friends, their mails, etc. You'll learn how to create trojans by backdooring normal files
(such as an image or a pdf) and use the gathered information to spoof emails so they
appear as if they're sent from the target's friend, boss or any email account they're likely to
interact with, to social engineer them into running your trojan.
3. Post Exploitation - In this section you will learn how to interact with the systems you
compromised so far. You’ll learn how to access the file system
(read/write/upload/execute), maintain your access, spy on the target (capture key strikes, turn
on the webcam, take screenshots, etc.) and even use the target computer as a pivot to hack
other systems.
4. Website / Web Application Hacking - In this section you will learn how websites work,
how to gather information about a target website (such as website owner, server location, used
technologies, etc.) and how to discover and exploit the following dangerous vulnerabilities to
hack websites:
Information Disclosure.
File Upload.
Code Execution.
Local File Inclusion.
Remote File Inclusion.
SQL Injection.
Cross Site Scripting (XSS).
Throughout the course you'll learn how to use use the following tools to achieve the above:
VMware.
Kali Linux
Nmap.
Bettercap.
Wireshark.
OWASP Zap.
Metasploit.
Nexpose.
SQLmap.
Maltego.
Learn Ethical Hacking From Scratch 2024
Veil Framework. $14.99
Bestseller 4.6 (131,236 ratings) 647,795 students
Crunch. $109.99
Netdiscover.
Zenmap.
arpspoof.
Evilgrade.
The Backdoor Factory.
BeEF.
Dirb.
Knockpy.
Netcat.
Aircrack-ng suite .
Airmon-ng .
Airodump-ng .
Aireplay-ng .
Aircrack-ng .
At the end of each section you will learn how to detect, prevent and secure systems and
yourself from the discussed attacks.
Checkout the curriculum and the course teaser for more info!
With this course you'll get 24/7 support, so if you have any questions you can post them in the
Q&A section and we'll respond to you within 15 hours.
Notes:
This course is created for educational purposes only, all the attacks are launched in my own
lab or against systems that I have permission to test.
This course is totally a product of Zaid Sabih & zSecurity and no other organisation is
associated with it or a certification exam. Although, you will receive a Course Completion
Certification from Udemy, apart from that NO OTHER ORGANISATION IS INVOLVED.
Show more
Featured review
Patrick M.
Learn Ethical Hacking From Scratch 2024
32 courses $14.99
Bestseller 4.6 (131,236 ratings) 647,795 students
11 reviews $109.99
5 years ago
Zaid is an incredible teacher! He makes the material easy to follow, and his teaching
assistants or himself will answer any questions you have within a really short period of
time (always less than a day!). I learned tons and I had a lot of fun going through it. I
recommend this course to anyone interested in ethical hacking!
Report
Show more
Bestseller
Bestseller
Instructors
Zaid Sabih
Ethical Hacker, Computer Scientist & CEO of zSecurity
4.6 Instructor Rating
205,851 Reviews
Learn Ethical Hacking From Scratch 2024Students
895,362 $14.99
Bestseller 4.6 (131,236 ratings) 647,795 students
13 Courses $109.99
My name is Zaid Al-Quraishi, I am a professional ethical hacker, computer scientist, and the
founder and CEO of zSecurity & Bug-Bounty. I am passionate about utilising my skills to improve
the security of organisations and individuals by identifying and resolving vulnerabilities in their
systems.
I have in-depth knowledge and experience in the fields of ethical hacking & cyber security, and I
have helped over 1 million students worldwide on multiple teaching platforms to gain a better
understanding of the subject.
My companies,
Show more zSecurity & Bug-Bounty, specialise in providing ethical hacking services and
managed bug-bounty programs to help organisations identify and remediate vulnerabilities in
their systems.
z Security
Leading provider of ethical hacking and cyber security training,
4.6 Instructor Rating
205,851 Reviews
890,293 Students
13 Courses
zSecurity is a leading provider of ethical hacking and cyber security training, we teach hacking
and security to help people become ethical hackers so they can test and secure systems from
black-hat hackers.
Becoming an ethical hacker is simple but not easy, there are many resources online but lots of
them are wrong and outdated, not only that but it is hard to stay up to date even if you already
have a background in cyber security.
Our
Showgoal is to educate people and increase awareness by exposing methods used by real black-
more
hat hackers and show how to secure systems from these hackers.
Brihan S. Desmet A.
BS DA
a week ago 2 weeks ago
Please don't waste your money in this I had a great time learning, I had some
course. This course is totally outdated . issues but I always got a lot of help and
Your will face several problems after very fast reaction with any problems.
going through this course and even the
developers are not responding to our… Helpful?
Helpful?
Amazing and exiting course which help Overall a great starter course for those
you to explore more in cyber security who have some experience in IT but
field.thanks,regards. want to taste some ethical hacking
situations. This was a good intro and
Helpful? some things I would suggest is…
Helpful?
Learn Python & Ethical Website Hacking / The Ultimate Dark Web,
Hacking From Scratch Penetration Testing Anonymity, Privacy &…
Zaid Sabih, z Security Zaid Sabih, z Security Zaid Sabih, z Security
4.6 (20,561) 4.5 (21,507) 4.7 (8,763)
25 total hours ● 184 lectures 10.5 total hours ● 100 lectures 10.5 total hours ● 85 lectures
● All Levels ● All Levels ● All Levels
Learn Python & Ethical Website Hacking / The Ultimate Dark Web,
Hacking From Scratch Penetration Testing Anonymity, Privacy &…
Zaid Sabih, z Security Zaid Sabih, z Security Zaid Sabih, z Security
4.6 (20,561) 4.5 (21,507) 4.7 (8,763)
25 total hours ● 184 lectures 10.5 total hours ● 100 lectures 10.5 total hours ● 85 lectures
● All Levels ● All Levels ● All Levels