Key features of The Complete Ethical Hacking Course

    • Recognised qualification upon successful completion of the course
    • Study from anywhere, anytime, whenever it is convenient for you.
    • Get 24/7 support from our Customer Success Team
    • Affordable and engaging e-learning study materials
    • Study at your own pace from a tablet, PC or smartphone
    • Online tutor support when you are in need.

Who is this course for?

There is no experience or previous qualifications required for enrolment on this course. It is available to all students, of all academic backgrounds.

Requirements

Our The Complete Ethical Hacking Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.

Career Path

After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

Course Curriculum

Introduction to Ethical Hacking
What is an Ethical Hacker 00:00:00
Terminology Crash Course pt. 2 00:09:00
Terminology Crash Course pt. 2 00:09:00
Terminology Crash Course pt. 3 00:08:00
Legal Considerations 00:11:00
Reconnaissance - Surveying the Attack Surface
Surveying the Attack Surface 00:10:00
Recon Types 00:08:00
Passive Recon Part 1 00:07:00
Passive Recon Part 2 00:10:00
Active Recon 00:15:00
Recon Walkthrough Tools Summary 00:14:00
Maltego Demo 00:07:00
FOCA Demo 00:05:00
DEMO – Harvester 00:02:00
Scanning and Enumeration - Getting Down to Business
Scanning & enumeration 00:08:00
Identifying Active Hosts pt. 1 00:10:00
Identifying Active Hosts pt. 2 00:13:00
Identifying Active Services 00:18:00
OS and Services Fingerprinting 00:15:00
Network Mapping 00:10:00
Final Thoughts 00:05:00
DEMO – Nmap Syntax pt. 1 00:14:00
DEMO – Nmap Syntax pt. 2 00:16:00
DEMO – Nmap Hosts Discovery 00:12:00
DEMO – Nmap Service Discovery 00:17:00
DEMO – Nmap Scripts 00:11:00
DEMO – Masscan 00:11:00
Network Presence
Network Insecurity 00:04:00
Sniffing and Spoofing 00:13:00
Sniffing Tools 00:09:00
Spoofing, Crypto and Wifi 00:15:00
DEMO – tcpdump 00:11:00
DEMO – Wireshark 00:11:00
DEMO – Ettercap 00:13:00
DEMO – Burp Suite 00:15:00
DEMO – Scapy 00:10:00
Attacking
Security Overview pt. 1: Windows Architecture 00:18:00
Security Overview pt. 2: Credentials Security 00:16:00
Security Overview pt. 3: Memory Corruption and Exploitation 00:16:00
Windows Hacking Basics 00:20:00
Local Access and Privilege Escalation 00:20:00
Dumping Hashes and Cracking Passwords 00:18:00
Linux Attacking Basics pt. 1 00:13:00
Linux Attacking Basics pt. 2 00:14:00
References 00:08:00
DEMO – Windows MSF Exploit pt. 1 00:13:00
DEMO – Windows MSF Exploit pt. 2 00:15:00
DEMO – Post Exploitation Activities 00:13:00
DEMO – Mimikatz 00:07:00
DEMO – Hashcat 00:08:00
DEMO – Konboot 00:13:00
DEMO – Post Exploitation Windows CMD 00:14:00
DEMO – Post Exploitation Windows Powershell 00:13:00
DEMO – Attacking Linux targets pt. 1 00:10:00
DEMO – Attacking Linux targets pt. 1 00:13:00
Web Hacking
Introduction to Web Hacking 00:03:00
Web Security Architecture Overview pt. 1 00:17:00
Web Security Architecture Overview pt. 2 00:12:00
Attacking the Web Server pt. 1 00:10:00
Attacking the Web Server pt. 2 00:11:00
Attacking the Platform pt. 1 00:19:00
Attacking the Platform pt. 2 00:08:00
Attacking the Technology pt. 1 00:21:00
Attacking the Technology pt. 2 00:17:00
OWASP Top 10 pt. 1 00:09:00
OWASP Top 10 pt. 2 00:21:00
Attacking the Business Logic pt. 1 00:11:00
Attacking the Business Logic pt. 2 00:15:00
Tools and Methodology 00:20:00
References 00:05:00
DEMO – OWASP Mutillidae 00:09:00
SQLI 00:07:00
SQL Map Intro 00:08:00
SQL Map 00:25:00
DEMO – Burpsuite 00:37:00
DEMO – Burpsuite XSS Hunter 00:16:00
DEMO – mitmproxy 00:10:00
DEMO – Skipfish pt.1 00:04:00
DEMO – Skipfish pt.2 00:04:00
Social Engineering - Hacking Humans
Social Engineering Basics 00:15:00
Social Engineering Methods 00:16:00
Tools and Techniques pt. 1 00:15:00
Tools and Techniques pt. 2 00:12:00
Tools and Techniques pt. 3 00:09:00
Physical Security Considerations 00:13:00
Final Thoughts 00:11:00
DEMO – Credential harvesting 00:02:00
DEMO – Website cloning 00:06:00
DEMO – Automating an attack 00:03:00
DEMO – Anti-virus evasion pt. 1 00:08:00
DEMO – Anti-virus evasion pt. 2 00:12:00
Certificate and Transcript
Order Your Certificates or Transcripts 00:00:00

Course Reviews

4.8

4.8
3 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

77 STUDENTS ENROLLED

    Excellent

    Kieran Graham
    Very professional courses. Great Administration assistance and high quality e-learning service.
    Sarah Jennings
    I did forex trading diploma. Very professional and detailed course.
    Jordan Cooke
    The course offered is excellent. I am glad to have taken it.
    top