Learn Ethical Hacking From Scratch
Welcome this comprehensive Ethical Hacking course. This course assumes you have NO prior knowledge and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts.
This course is highly practical but it won't neglect the theory; we'll start with ethical hacking basics, breakdown the different penetration testing fields and install the needed software (on Windows, Linux and Mac OS X), then we'll dive and start hacking straight away. You'll learn everything by example, by analysing and exploiting different systems such as networks, servers, clients, websites .....etc. We'll never have any boring dry theoretical lectures.
The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses to hack this system.
By the end of the course you will have a strong foundation in most hacking or penetration testing fields and you'll also learn how to detect, prevent and secure systems and yourself from the discussed attacks.
The course is divided into four main sections:
1. Network Hacking - This section will teach you how to test the security of both wired & wireless networks. First, you will learn network basics, how they work, and how devices communicate with each other. Then it will branch into three sub sections:
Pre-connection attacks: in this subsection you'll learn a number of attacks that can be executed without connecting to the target network and without the need to know the network password; you'll learn how to gather information about the networks around you, discover connected devices, and control connections (deny/allow devices from connecting to networks).
Gaining Access: Now that you gathered information about the networks around you, in this subsection you will learn how to crack the key and get the password to your target network whether it uses
Post Connection attacks: Now that you have the key, you can connect to the target network, in this subsection you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and much more. All of these attacks work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.
2. Gaining Access - In this section you will learn two main approaches to gain full control or hack computer systems:
Server Side Attacks: In this subsection you will learn how to gain full access to computer systems without user interaction. You will learn how to gather useful information about a target computer system such as its operating system, open ports, installed services, then use this information to discover weaknesses and vulnerabilities and exploit them to gain full control over the target. Finally you will learn how to automatically scan servers for vulnerabilities and generate different types of reports with your discoveries.
Client Side Attacks - If the target system does not contain any weaknesses then the only way to hack it is by interacting with the users, in this subsection you'll learn how to get the target user to install a backdoor on their system without even realising, this is done by hijacking software updates or backdooring downloads on the fly. This subsection also teaches you how to use social engineering to hack secure systems, so you'll learn how to gather comprehensive information about system users such as their social accounts, friends, their mails.....etc, you'll learn how to create trojans by backdooring normal files (such as an image or a pdf) and use the gathered information to spoof emails so they appear as if they're sent from the target's friend, boss or any email account they're likely to interact with, to social engineer them into running your trojan.
3. Post Exploitation - In this section you will learn how to interact with the systems you compromised so far. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, spy on the target (capture key strikes, turn on the webcam, take screenshots....etc) and even use the target computer as a pivot to hack other systems.
4. Website / Web Application Hacking - In this section you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ....etc) and how to discover and exploit the following dangerous vulnerabilities to hack websites:
File Upload.
Code Execution.
Local File Inclusion.
Remote File Inclusion.
SQL Injection.
Cross Site Scripting (XSS).
At the end of each section you will learn how to detect, prevent and secure systems and yourself from the discussed attacks.
All the techniques in this course are practical and work against real systems, you'll understand the whole mechanism of each technique first, then you'll learn how to use it to hack the target system. By the end of the course you'll be able to modify these techniques to launch more powerful attacks, and adopt them to suit different situations and different scenarios.
With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.
Notes:
This course is created for educational purposes only, all the attacks are launched in my own lab or against systems that I have permission to test.
This course is totally a product of Zaid Sabih & zSecurity and no other organisation is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that
Get a Reminder
Rating | 4.5★ based on 10,000 ratings |
---|---|
Length | 16 total hours |
Starts | On Demand (Start anytime) |
Cost | $19 |
From | Udemy |
Instructors | Zaid Sabih, z Security |
Download Videos | Only via the Udemy mobile app |
Language | English |
Subjects | IT & Networking |
Tags | IT & Software Network & Security |
Get a Reminder
Similar Courses
What people are saying
so far
At the moment is the most complete EH course available so far i have found the course to be very informative and at a steady pace that a novice can follow and build on it is done in step by step guides with help from the q&a section This is my first course on ethical hacking.
This is a good course, i am learning a long so far, the Instructor is knowledgeable about course content, the content is well prepared and arranged, video and audio quality is good, i am getting value for my money, i would recommend anyone interested in Ethical Hacking to take M Zaid's courses Zaid and his team were really good.
I have learned so much so far.
To be honest, I wasn't expecting anything real from this course but, so far - even at the very beginning of the course - everything looks pretty legit and real.
before this course i dont know about kali linux i think that its like a difference between android and windows mobile but it is so much different than the windows and it is very useful; tahnks zai Looks super good so far!
Now the negative things, firstly every tutorial the instructor shows on how to do various attacks on Wifi and local systems, everything works well on the tutorials with no errors, unfortunately this is not the case when I tried the same attack, almost everything so far and i'm nearly 50% through has not worked, I post questions on the Q&A but the response is exactly the same as what he has told everyone else to do.
This is very practical and I like what I've seen so far.
(not showing off how intelligent he is by speeding through the instructions) The best instructor i have had so far!
/Excellent course I have fun so far So far, the information is great.
So far, if things does not work as Zaid indicated, its because we made an error, or we missed a simple step.
But facing so many hurdles during installation of software which could be guided in prior to avoid delay.. the course has been informative so far and i am totally happy with the contents .it has been joyful to learn .
I appreciate that Zaid and looking forward to learning more of the courses you offer Its really nice and informative so far, and really good in keeping up the attention I am totally new to computing subject and of course hacking course.
This course makes me understand well of the contents taught so far.
So far best ethical hacking course I saw Best Course covering every minute detail.
Read more
virtual box
The only point of frustration I have had so far is I was unable to install the 64bit v. of Kali through Virtual Box so was advised to download the 32bit instead but a bit further in the course, you are required to install packages that need a 64bit system.
I am unable to load the virtual machine into virtual box without much additional information which I am completely unfamiliar with.
Best way to learn is to download Virtual box and follow along every lesson.
I have a small amount of Linux and Virtual Box experience but I feel that even a beginner would be able to follow along easily.
I had a problem at the start but Zaid consistently answered all my questions and I was able to get past the issue(it was only an issue setting up the virtual box).
perfect course and owesome lecturer i really enjoy it its better than lynda.com but i need more time to give my final review/ update 1/13/2019 i been having some issues with virtual box to set up kali and the lab in general but ill keep up at it but the whole lecture(s) have been really useful and i hope to become a certified pen tester This course is awesome.This was my first course on Udemy,The lectures are well explained and easy to follow.Zaid is a good instructor,he had very deep knowledge,He explains each concept with clear explanations and practical examples.This course is highly recommended to those who want to learn ethical hacking with passion and commitment.
I have purchased several other courses and they do not go into detail on how to get the progarms to work or how to set up virtual box, nat network..
However, it will now show you that you need to add it to the device in Virtual Box until tutorial 14.
The only thing I would add is I had issues with my wireless adapter so I recommend a side video on debugging USB devices using Virtual Box.
Using Virtualbox with Kali means you spend hours fixing bugs inside the VM box with OK support from the instructor but I have spent hours fixing Virtual Box NAT networking USB issues, DNS errors, rolling repository issues, access issues and general VM box bugs that I will have to get another PC install a real version of Kali otherwise I will waste huge amounts of time and I am sick of it.
Short and easy to understand when I got use to his accent Excelen, i had not finished yett and i am understanding a lot concceps The video quality is very good, but I have sent messages several times regarding how to download the Kali Linus Virtual Box images because I have been stuck on this over 24 hours now and it's really frustrating, but yet no reply from the seller.
I didn't know how to make NAT Network in Virtual Box, so I find solution on Google.
Zaid is very comprehensive in his lessons clear and concise and i just wana point out there are times where i guess that sometimes problems are frequent (there is a time where u have trouble setting up a "nat network" in virtual box and he anticipates the issue and tells you how to fix it before you the learner even know its a problem which is great, all in all great course The course is great.
Amazing ++ Instructions about downloading virtual box and various machines were not as specific as I need GOOD TUTORIALS !!
Read more
ethical hacking from scratch
Zaid is one of the best lecturers in the field of ethical hacking, and this is for the honesty of the best courses in this field, so I would recommend anyone trying to learn the ethical hacking from scratch to start with this course.
If the course title says: "Learn ethical hacking from scratch", the course should be beginner friendly and I should be able to make the programs work with the instructions given by the professor.
so far so good I started with Zaid's “Learn Python and Ethical Hacking from scratch” course (which was excellent) and then moved to this one.
interesting and promises with a lot of things great introduction and course till now Great information Learning Ethical Hacking from Scratch with Zaid Sabih was easy; and I must say, paying for this course was never a waste of money.
Good ok Yes Yes so far I would like to compliment Mr Al-Quraishi on his course “Learn Ethical Hacking From Scratch”.
I enrolled Zaid course by Facebook advertising from Udemy "learn ethical hacking from scratch" since then I have not regretted the single purchase of my life by from guy, every new course which is released from Zaid goes straight to the shopping cart without any questions asked or hesitating.
Zaid cleared my mind with this outstanding course in "Learn Ethical Hacking From Scratch" there's much to learn from Zaid in this course and is part of other courses that fit into his Ethical Hacking course as you just may find out.
if you want to learn ethical hacking from scratch.
I recommend this formation to any person who wants to learn ethical hacking from scratch.
Nonetheless, it is still the best course out there to learn Ethical Hacking from Scratch.
But, the class is called "learn ethical hacking FROM SCRATCH".
Read more
hasta el momento
nice clear instructions and examples, customer support is excellent Hasta el momento, el instructor logra impartir la clase con ejemplos de manera clara y sencilla, lo cual hace ameno el aprendizaje.
Hasta el momento cumple con lo que describe el curso.
this is fire excellent so far very good course Till now good I hope I can be ethical hacker after completion of this course Hasta el momento lo es, explicaciones claras y amenas.
It’s because I don’t know if the programs will run good It is a really interesting topic Sí es una buena elección de curso, y sí ha sido lo que esperaba hasta el momento.
Hasta el momento todo está bien explicado y fácil de entender Explanation is already valuable.
very informative many things I didn't know that I needed to know because I run linux ubutu on my other pc, my only problem is with the sound the audio is so low I have to crank my speakers to max to hear the lectures, other than that it's great as Tony the Tiger says lol... Muy bien explicado por el instructor hasta el momento.
excellent course Even though it’s very simple and easy and nice on the eyes just as i love it, i still think the buffer time takes a lot of time great intro course I think because I didn’t find out if I need to learn all sections to hack websites Hasta el momento esta muy entendible a pesar de que inglés no es mi idioma nacional Great!!!
Definitivamente SI, las bases que hasta el momento se han explicado me han resultado muy interesantes y puedo deducir que ha sido una buena inversion.
Makes me want to keep going Excellent keeps the concept of hacking interesting and gives confidence that even beginners can be able to do the advanced stuff given enough time Very clearly explained So far I like the tease, excited for what imma learn next I am loving it Hmmm hasta el momento buena Introducción al Tema...
Good explanation hasta el momento el instructor es bastante claro en los terminos y metodos.
Excellent perfect yes, but I want to be sure that this is "ETHICAL" hacking easy and informative start is quiet interesting explained very nice excelente curso hasta el momento Great , and simple to understand Ethically the right thing to do.
So far it was crisp and clear fine seems pretty good Looks interesting Hasta el momento esta bien el curso Very good, very informative so far.
Read more
white hat hacker
I hope it also helps me reach my goals and become a WHITE hat hacker!
it's great course and I'm getting more and detailed information of the course and I hope I will be one of the white hat hackers at the end of the course.
A lot of useful information for future white hat hackers.
yes it was i want to be a white hat hacker for my school and personal computers Enjoy the course, but encounter lots of problems in the early stages trying to set it all up.
So far, I would recommend this course for anyone who wants to learn how to be a "white hat hacker".
It appears I will be on the path to be a computer security professional after this course & will be able to work as a white hat hacker.
White hat hacker tho;P very cool!
So far am excited about this course My personal goal is to learn about ethical hacking and how to be a white hat hacker.
I feel like on the right track to becoming a white hat hacker Very knowledgable guy with interesting thoughts and insights.
è un corso molto interessante ed è esposto in modo molto chiaro e ordinato hes making me understand more about the benefits of being white hat hacker Informative, straight into the point and clear information.
Read more
tot nu toe
Tot nu toe informatief en weet ik wat ik kan gaan leren.
tot nu toe kan ik volgen en het blijft interessant Yes,it's a good match for me .Hoping to learn better from this course in order to achieve the skill of being an ethical hacker.
so far so good Tot nu toe lijkt het een prima cursus Good intro, you got my attentention.
good tot nu toe voldoet hij aan mijn verwachting.
Tot nu toe nog niet tegen grote problemen aangelopen, zo wel kan je altijd bij de Q&A terecht.
I learnt alot hij voldoet zeer zeker aan mn verwachtingen veel geleerd tot nu toe Yes Very interesting and easy.
praat wel erg snel om op somige punten niet helemaal duidelijk tot nu toe be npas bij college 4 This was a perfect match, my instructor is very informative very usefull Content is easy to follow and understand.
Informatie wordt goed gegeven, tot nu toe nog geen praktisch deel + bij de teaser wordt ook vermeld dat alles/veel zal aangeleerd worden.
Muy claro y practico Tot nu toe alles naar wens Very good course.
Easy to follow and communicated well he explains things very well Class is explained It is easy to view Good detail so far easy to understand tot nu toe is het een prima cursus It's very clear, educational and intriguing It's been good so far, sounds very interesting Learning a lot is interesting So far ... Muy buena great course so much to learn Very detailed Great course!
Read more
become an ethical hacker
my kitten woke up tho ;) ur tha best u have the power to teach in your voice Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts I am extremely excited to delve deeper into this course.
Still in the beginning of the course but Zaid explains what and why it is good to become an ethical hacker in a really good and understanding way Great teaching Just Awesome!
yes it is a good match for me i want to become an ethical hacker cause today there is a huge job opportunity and also i want to secure them the people from black hat hackers.
Please teach me or direct me to become An Ethical Hacker Mr. Zaid and I have much more issues while buying courses on udemy Great informative course, the instructor doesn't just tell you how to do it...
I would recommend this course for anyone who would like to learn how to become an ethical hacker!
Videos pause frequently very clear and hellpful I need more technicals from the very beggining of the course, I see too much bulk data that is not teaching me how to become an ethical hacker soon Até então está sendo bem promissor, interessante e envolvente.
passionate to become an ethical hacker.
Read more
worth every penny
You make it look easy... coz all the info and teachings are well understandable and quiet simple and all things are well explained in detail by Zaid(Instructor) in simple manner.. this course worth every penny i have spent for it Very in depth and easy to understand.
Worth every penny!!
Just amazing, worth every penny I want to learn how to blackhat hack and this is a good start i was amazed by the things i will learn So far so good.
Well worth every penny and then some.
Worth every penny.
Worth every penny!
I jvae not finished the course but this has the potential of getting a five star review Excelente , claro y muy practico its my first course purchase and it worth every penny,exactly as promised :) Still waiting for the details.
Extremely beneficial course worth every penny you pay its really good instructor he makes a lot of things looks really easy and really encouraged me to be a white hat hacker and help people who really needs help and have the job of the future as well The instructor starts at the very beginning and explains really well, teaching in a way that anyone can learn.
Read more
step by step process
yes,its truely amazing and facinating course .Really enjoying it The step by step process is amazing .
And as you broke the course in the section and parts It really helps me clearly understand step by step process of hacking.
Speaks clear English (#1 right off the bat for that), clear precise instructions Knowledgeable instructor with step by step process and great explanations Best course Ever on udemy and very helpfull.
I love the step by step process.
Showed an example of what you'll be able to do by the end of the course so far its more in-depth then the class i am taking at my local college Because its easy to understand with good examples in a digestable step by step process Got lots of notes its a nice course It's a little early to say how it is.
Read more
within 24 hours
LOVE THIS COURSE you are fast at replying within 24 hours you give easy explanations so if somthing ain't working you can tell me the problem in a simple way i would understand thanks for this course i relly love it was every penny wort payed 10$ for it and for me i would even pay 100$ for getting this course if i relly had to!!
very well presented amazing usefull information and also very interesting Explained quite well, goes into the details about why and how certains attacks affect the victim machine, the Q&A community is very helpful and your questions will usually be answered within 24 hours.Overall lessons are in-depth, well explained, and the lectures give you the feeling that you learned something new without the information overload.
He has always replied back to me within 24 hours.
The course support is good and I generally receive a response within 24 hours.
Perfect explained course, the instructor helps you within 24 hours if you have a question.
If you're in need of help, the instructor replies within 24 hours, and is very helpful.
Read more
fue una buena
Pienso que fue una buena decisión.
fue una buena leccion, me atrapo el curso y me interesa bastante seguir adelante en el Yeah, since I am quite young and trying to learn as much as I can, and Zaid takes it slow and explains quite well.
Creo que definitivamente si fue una buena eleccion esta muy bien Very good course I like this.
Si, por el momento fue una buena eleccion Good short introduction of what is coming Nice, can't wait to see the rest of it :) So far, so good.
Read more
lo que se
Excelente, curso tiene todas las partes tanto practicas como teoricas para que termines de comprender lo que se esta haciendo.
Por ahora estoy asombrado de lo que se ha dicho en este curso, ha superado mis expectativas.
Thanks to the instructor for creating such a wonderful course and its worth of money and time:) Debido a que me explican bastante bien lo que se realizara en el curso y lo que puedo llegar a hacer con lo que este curso me enseñará.
Good presentation of multiple screens esta muy bien explicado y muestra bien lo que se puede llegar a lograr con el curso Got teased and excited to learn!
Read more
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile.
Accessibility Testing $58k
IT Security Vulnerability and Penetration Testing Red Team Member $62k
Product testing $66k
Penetration Tester with Security Clearance $68k
Penetration Tester for Mobile Devices $73k
Security Penetration Tester $77k
Vulnerability Assessment and Penetration Tester $94k
Penetration Tester on Mobile Devices $95k
Manufacturing TestIng $103k
Vulnerability Analyst and Penetration Tester $113k
Web Application Penetration Tester $117k
Testing Development $131k
Write a review
Your opinion matters. Tell us what you think.
Please login to leave a review
Rating | 4.5★ based on 10,000 ratings |
---|---|
Length | 16 total hours |
Starts | On Demand (Start anytime) |
Cost | $19 |
From | Udemy |
Instructors | Zaid Sabih, z Security |
Download Videos | Only via the Udemy mobile app |
Language | English |
Subjects | IT & Networking |
Tags | IT & Software Network & Security |
Similar Courses
Sorted by relevance
Like this course?
Here's what to do next:
- Save this course for later
- Get more details from the course provider
- Enroll in this course