We may earn an affiliate commission when you visit our partners.
Seyed Farshid Miri and Seyed Farhad Miri

Welcome to the most complete Ethical Hacking and Threat Hunting course available online, where both topics in offensive security, as well as defensive security, are professionally covered. This course includes two crash courses about Linux and Python as well.

The following seven pillars constitute the foundation of this life-changing course:

Read more

Welcome to the most complete Ethical Hacking and Threat Hunting course available online, where both topics in offensive security, as well as defensive security, are professionally covered. This course includes two crash courses about Linux and Python as well.

The following seven pillars constitute the foundation of this life-changing course:

1- Ethical HackingLearn how to think and act like a hacker and work with various techniques and tools to achieve this goal. As an ethical hacker at the end of this course, you will be able to help your customers mitigate various attack vectors and their corresponding details practically based on various security standards and best practices. Also, you will learn how to execute various ethical hacking phases as Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks, and others.

2- Penetration TestingLearn how to hack easy to hard real-world simulated virtual machines on HackTheBox Live Hacking. using unique exploits, tactics, and techniques. Learn the art of intrusion with these CTFs (Capture the Flags) which will help you in the future on every real work project.Also work on pentest methods in web, network, vulnerability assessment workflows, and “Defense in Depth” best practices which will help you hack like black-hat hackers, defend or secure them like security experts and harden your corporate environment against malicious actors.

3- Red-Teaming techniques and tactics

Learn beginner to advanced pentesting techniques. Learn how to think and act like threat actors to stop them at various phases of the attack life cycle.MITRE ATT&CK Framework: reconnaissance, initial foothold, lateral movement, privilege escalation, command and control, active directory attacks, Linux, and mac os x malware and attack techniques.Learn scripting languages for the Cobalt Strike Framework and other red-team engagement frameworks to perform development and operations on them.Learn how to develop your C2 infrastructure to avoid detection by blue teams and SOCs during red team operations.

4- Elastic Stack Wazuh Manager (SIEM)Learn how to set up a complete SIEM (Security Information and Event Management) using Elastic Stack (formerly ELK Stack) using Wazuh Manager. Also, learn how to ingest various log formats from different log sources such as Linux and Windows servers, Fortigate firewall appliances, and so on. You will learn how to activate different functionalities (capabilities) of the Wazuh manager such as vulnerability monitoring, File Integrity Monitoring, CIS Hardening Benchmark Monitoring, and much more. Also, you will learn how the underlying decoders and rules are programmed to detect an unlimited amount of security events across an enterprise network.

5- Threat Hunting (Blue-Teaming)There is a complete section for threat hunting where you put what you've learned into work and run attacks such as Spawn Session and Process Injection, ShellShock During this section, you get familiar with how different IoC (Indication of Compromise) will appear in your SIEM tool.

6- Python Scripting for SecurityLearn how to create scripts and programs to do what you want whenever you are required to, from small scripts that are needed during pentest to more sophisticated ones during Red Team Ops. there is a crash course about Python basics included in this course to promote you in this must-know language field.

7- Linux (Kali Linux and Parrot OS)Linux runs the world, especially when it comes to the cybersecurity world. There is a crash course about Linux basics in this course. However, during this course and after many hours of exciting hands-on practices on the different offensive and defensive security methods you will become a Linux expert at the level of a cybersecurity expert. You will learn Kali Linux and Parrot OS as the main Linux distros used in this course.

Here is an overview of the main content of the course:

  • Sections 1 to 3 are for introduction and preparation. Here you set up your offensive lab and will learn the basics of Linux to get prepared for the ethical hacking sections. You will also install Kali Linux and Microsoft Visual Studio Code as your main IDE (Integrated development environment). Then you move on to create your vulnerable labs such as dvwa, bwapp, webgoat, and so on. Also, you will do your first capture-the-flag (CTF) and create your HTB (HackTheBox dot com) account if you haven't before.

  • You will start your professional white hat hacking training from sections 4 to 10. Here you will learn a broad range of hacking tools, attack vectors, technics, and procedures. They start from Reconnaissance, enumeration, vulnerability scanning to exploitation, post-exploitation, password cracking. You will continue with network attacks (wired and wireless), social engineering attacks, Web applications attacks (OWASP Top 10), and much more.

  • You'll take your second crash course in Python in section 11. Here you learn Python geared towards IT Security and Hacking purposes.

  • Now you have earned all the requirements, a professional hacker needs in the pentesting battlefield. In section 12, you get to know the interesting world of CTFs (Capture the Flags), especially on HackTheBox dot com and will hack 8 machines:3 Easy machines:

  • Everything is standardized in modern times. Giving a break to practical hacking, in section 13 you will learn the must-know security standards such as

  • We did everything up to here to be a great Red Teamer, here you learn how to use all that practical ethical hacking techniques along with In section 14 you will learn how to work based on various You will also learn how to customize your C2 to be like what you want and also learn how to do various operations with it.

  • More than half of today's APTs (Advanced Persistent Threats) are experts on active directory attacks and you as an ethical hacker or Red Teamer should also know how to do that and report vulnerabilities to your customers. In section 15 you will learn how to configure AD, create a vulnerable AD lab and perform some of the most important attacks in this category. Having this category of attacks in a separated section is because of the importance and amount of common attacks by APTs on this module in the victim’s environment.

  • In section 16 we tried to cover every tactic, its corresponding technique, and also the procedures behind it standardized by We will study most of the operations done by threat actors and APTs. Their TTPs are covered line by line and in near future, with some updates, we are going to practice every technique after its explanations. Also, most of these TTPs are covered during the course without knowing what category of TTPs it is. It is really important to stick to

  • Up to section 17, you finished your pythonic offensive security with all possible aspects. Now you are a professional and ethical hacker. From this section on, you start your defensive security journey, where the focus is mainly on defense against offensive technics and tactics you've learned up until here. In this section, you learn terminologies and methodologies such as "Defense in Depth" on the defensive side, where the SIEM tool is in the center of attention.

  • In section 18 you start building up your fully customized Linux-based and 100% open source SIEM tool using Elastic-Stack and Wazuh Manager (The Open Source Security Platform). In this section, you set up Wazuh Manager Server, Open Distro for Elasticsearch, Filebeat, and Kibana.

  • Then in section 19, you move on to endpoints such as Windows and Linux Servers, Windows 10, and Fortigate firewall appliance, to integrate these different log sources into your ELK-Stack SIEM server. Also, you will learn how you can roll out authenticated Wazuh agents on a network of Windows machines using Domain GPOs in an automated form.

  • Section 20 covers index management in Elasticsearch where the life cycle of the indexes will be managed. In this lecture, you will learn how to manage your accumulated alerts in your Elastic Stack to improve your server disks and storage.

  • In section 21 you will extend your configured SIEM with its capabilities such as File Integrity Monitoring (FIM), Linux Syscalls monitoring, Enterprise continuous vulnerability monitoring, CIS Hardening Benchmarks (SCA), Windows Defender, and Sysinternals Sysmon Eventchannel.

  • How one can create new alerts out of ingested logs in Wazuh Manager is the topic of section 22. In this section, you will learn how decoders and rules are constructed behind the scenes and how you can create your own custom decoders and rules for your own requirements.

  • And finally, you will finish this course with hunting IoCs (threat hunting) in your fully customized SIEM. In section 23, you will run some of the attacks you have learned during the course such as Mimikatz, HTA, Brute Force, etc. from your Cobalt Strike on your Parrot OS against your endpoints (Wazuh agents) and you will examine generated alerts for these specific security events.

Disclaimer:

  • This course is created for educational purposes only, all the attacks are launched in our own lab or against online Lab systems that are legally permitted to run tests against them.

  • This course is totally a product of the two instructors of this course and no other organization is associated with it. Although, you will receive a Course Completion Certification from Udemy, apart from that

Enroll now

What's inside

Learning objectives

  • 40h video bootcamp, deep-diving into ethical hacking and threat hunting subjects
  • 4 courses in 1: #a) ethical hacking #b) threat hunting #c) python hacking scripting #d) linux security distros
  • +5h live hacking sessions for hack the box ctf (here you become a hacker)
  • +15 hours hands-on ethical hacking incl. reconnaissance, exploitation, ٫network attacks, social engineering, and 5h webapp pentesting
  • +5 hours red teaming, incl. cobalt strike ops and devs active directory attacks and mitreatt&ck
  • +5 hours threat hunting using elastic-stack and wazuh manager
  • Cobalt strike, metasploit, empire, python, kali linux +200 other industry-proven cybersecurity tools
  • Deploy a complete siem with elastic stack & wazuh manager for real production
  • Master pentest standards and tools, hacking methods with their standards e.g. mitre att&ck, owasp, ptes
  • 2 crash courses included: python3 scripting and kali linux
  • How to perform web app attacks such as sqli, xss, idor, webshell upload, code and command injection, and much more
  • Programming corporate-level siem use-cases & their common mistakes
  • How to develop scripting projects, geared towards it security
  • Breach secure systems using client-side & social engineering techniques and tools
  • How corporate-level it security solutions are planned & developed
  • Develop and conduct red team engagement using open source and commercial frameworks
  • Create malware with python as well as cobalt strike framework
  • Master owasp top 10 best practices and other security standards
  • Pentest on servers, web apps, appliances, corporate networks and active directory forests
  • How to customize your malware agent and make it like windows legitimate traffic and binary
  • Master log aggregation basic concepts with hands-on practices
  • Perform various attack technics using automated as well as manual tools
  • Securely send social engineered & phishing emails disguised as any legitimate email address without authentication
  • How to perform network attacks and sniff sensitive data such as passwords
  • Elastic stack: elasticsearch, kibana and filebeat in action
  • Master intelligence gathering and reconnaissance using the latest techniques
  • How to map your targets and create network topologies of your targets
  • Linux command line (kali linux and parrot os security)
  • How to do lateral movement on secure networks, do privilege escalation and become administrator of the environment
  • How to do attacks on active directory and get domain admin with different techniques
  • Advanced nmap techniques and nse scripts
  • Master metasploit framework as your arsenal of exploits
  • Show more
  • Show less

Syllabus

Crash Course: Linux
Virtual Environment
Kali Linux Installation & Environment
Power Up Your Linux Shell: TERMINATOR-ZSH-TMUX
Read more
Linux Basics & Commands
Docker on Linux
Prepare yourself and your environment for the next sections
Important note
Disclaimer
VSCode IDE For Your Scripts!
Intro to Ethical Hacking Basic Concepts and Terminologies
Vulnerable Labs #1: dvwa, bwapp, webgoat, juiceshop, metasploitable2
Read Me!
Vulnerable Labs #2: metasploitable3
Capture The Flags(CTF): HTB and others
Quick talks about attack vectors, risk, vulnerability and others
Understanding Attack Vectors
Learn ethical hacking phases all together
Initial Reconnaissance with OSINT Framework
Scanning with ZENMAP
Scanning with NMAP in Command Line & in Python
Scanning with Metasploit AUX & CENSYS
Metasploitable Environment Preparation
Enum with NMAP Part 1
Enum with NMAP Part 2
Enum with Metasploit and other tools
Ethical Hacking 3: Vulnerability Scanning & Analysis
Introduction to Vulnerability Scanning and Analysis
Setting up OpenVAS-GVM
Vulnerability Assessment with OpenVAS-GVM
Vulnerability Analysis in Action
Second Opinion Vulnerability Scanning with NMAP NSE Scripts
Third Opinion Vulnerability Scanning with Metasploit
Burp Suite Basics - Part 1
Initial Presentation
Metasploitable2 - Part 1
Metasploitable2 - Part 2
Metasploitable2 - Part 3
Metasploitable2 - Part 4
Metasploitable3 Ubuntu - Part 1
Metasploitable3 Ubuntu - Part 2
Metasploitable3 Ubuntu - Part 3
Metasploitable3 Ubuntu - Part 4
Metasploitable3 Win2k8 - Part 1
Metasploitable3 Win2k8 - Part 2
Metasploitable3 Win2k8 - Part 3
Password Hash Crack - Part 1
Password Hash Crack - Part 2
Man in the Middle Attacks (Sniffing & Spoofing) - Part 1
Man in the Middle Attacks (Sniffing & Spoofing) - Part 2
Wireless Attacks - Part 1
Wireless Attacks - Part 2
Social Engineering Concepts - Part 1
Social Engineering Concepts - Part 2
Gophish Framework - Reaching the Target - Part 1
Gophish Framework - Reaching the Target - Part 2
Social Engineering Client Side Attacks - Part 1
Social Engineering Client Side Attacks - Part 2
Ethical Hacking 7: Web App Pentesting (OWASP-TOP 10)
Web App Pentesting Concepts - Part 1
Web App Pentesting Concepts - Part 2
Web App Pentesting Concepts - Part 3
Web App Pentesting Concepts - Part 4
Burp Suite Basics - Part 2
Damn Vulnerable Web Application Lab - Part 1
Damn Vulnerable Web Application Lab - Part 2
Damn Vulnerable Web Application Lab - Part 3
Damn Vulnerable Web Application Lab - Part 4
Damn Vulnerable Web Application Lab - Part 5
OWASP Webgoat Lab - Part 1
OWASP Webgoat Lab - Part 2
OWASP Mutillidae II Lab - Part 1
OWASP Mutillidae II Lab - Part 2
Metasploitable 3 Vulnerable Web App
bWAPP - Buggy Web Application Lab
PortSwigger - Online Vulnerable Web Apps - Part 1
PortSwigger - Online Vulnerable Web Apps - Part 2
Crash Course: Python Scripting (incl. 2x Mini Projects)
Basics 1: Installation & Config , Basic Operations, Binary Operations
Basics 2: Loop Statements, Flow Control and Modules
Basics 3: Data Types and Functions
Classes and Objects, Mini Project I: Writing a Port Scanner
Mini Project II: Writing a Malware Command & Control (C&C) Server/Client
Learn how to do pentesting on your real project by doing it on real-life simulated labs.
Intro to Hack the Box (HTB) CTF
Easy 1 - BLUE (Enumeration, Exploitation, Hash Dump and Impacket Framework)
Easy 2 - DEVEL (Indirect Web Shell Upload, Local Exploit Suggester, Priv. Esc.)
Easy 3 - NETMON (PRTG Exploit with Python, Creds Discovery & Guessing) - Part 1
Easy 3 - NETMON (PRTG Manual Exploit with Nishang Reverse Shells) - Part 2
Medium 1 - POPCORN (Dirbuster Enum, Upload Abuse, Nix PAM, DirtyCow Exploit)
Medium 2 - BLUNDER (Gobuster, Bludit CMS exploits) - Part 1
Medium 2 - BLUNDER (Hashcat, LinPEAS Priv Esc., sudo Exploit) - Part 2
Medium 2 - BLUNDER (CSRF/Anti-Bruteforce Bypass with Python Scripting) - Part 3
Medium 3 - SNIPER (SMB Enum, LFI RFI, Gain Rev Shell) - Part 1
Medium 3 - SNIPER (RFI RCE, Local Enum, Priv Esc, CHM Weaponization) - Part 2
Medium 3 - SNIPER (CrackMapExec, Impacket, Cookie Poisoning) - Part 3
Medium 4 - MANGO (Recon, NoSQL MongoDB Injection) - Part 1

Save this course

Save Applied Ethical Hacking and Rules of Engagement to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Applied Ethical Hacking and Rules of Engagement with these activities:
Review Networking Fundamentals
Solidify your understanding of networking concepts. This will provide a strong foundation for understanding network-based attacks and defenses covered in the course.
Browse courses on TCP/IP
Show steps
  • Review the OSI model and TCP/IP stack.
  • Practice subnetting calculations.
  • Research common networking protocols.
Create a Personal Cybersecurity Toolkit
Familiarize yourself with essential cybersecurity tools. This will help you be more efficient and effective in your ethical hacking and threat hunting activities.
Show steps
  • Research and identify essential cybersecurity tools for different tasks.
  • Download and install the tools on your system.
  • Organize the tools into categories based on their functionality.
  • Document the purpose and usage of each tool.
Review 'Hacking: The Art of Exploitation'
Deepen your understanding of exploitation techniques. This book provides a solid foundation for understanding the more advanced hacking concepts covered in the course.
Show steps
  • Read the chapters on buffer overflows and shellcode.
  • Experiment with the code examples provided in the book.
  • Relate the concepts to the attacks covered in the course.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Review 'Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases'
Enhance your understanding of defensive security practices. This book will provide insights into building and operating a SOC, which is crucial for threat hunting and incident response.
View Melania on Amazon
Show steps
  • Read the chapters on SIEM deployment and threat hunting.
  • Study the use cases provided in the book and apply them to your own environment.
  • Research the tools and techniques used by blue teams to defend against attacks.
Practice Vulnerable Machine Exploitation
Reinforce your ethical hacking skills. This will allow you to apply the knowledge gained in the course to real-world scenarios.
Show steps
  • Set up a virtual machine with a vulnerable operating system.
  • Use tools like Metasploit and Nmap to identify and exploit vulnerabilities.
  • Document your findings and the steps you took to exploit the machine.
Write a Blog Post on a Recent Vulnerability
Solidify your understanding of vulnerabilities and exploits. This will help you stay up-to-date with the latest security threats and trends.
Show steps
  • Research a recent vulnerability disclosed in the news.
  • Write a blog post explaining the vulnerability, its impact, and how to mitigate it.
  • Publish your blog post on a platform like Medium or your own website.
Build a Simple Intrusion Detection System
Apply your knowledge of network security and threat hunting. This will give you hands-on experience in building a security tool.
Show steps
  • Choose a programming language and framework for your IDS.
  • Implement features like packet capture, signature-based detection, and anomaly detection.
  • Test your IDS against simulated attacks and refine its detection capabilities.

Career center

Learners who complete Applied Ethical Hacking and Rules of Engagement will develop knowledge and skills that may be useful to these careers:

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Applied Ethical Hacking and Rules of Engagement.
Provides a deep dive into the technical aspects of exploitation. It covers topics like buffer overflows, shellcode, and network programming. It valuable resource for understanding the underlying mechanisms of many attacks discussed in the course. While not required, it offers a more thorough understanding of the concepts.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser