Save for later

Hands-on

Welcome to my "Hands-on: Complete Penetration Testing and Ethical Hacking.  " course.

My name is Muharrem Aydin (White-Hat Hacker), creator of the three best-selling Ethical Hacking and Penetration Testing courses on Udemy.

This time I’ve designed "Hands-on: Complete Penetration Testing and Ethical Hacking. , for YOU.

My "Hands-on: Complete Penetration Testing and Ethical Hacking.   is for everyone. If you don’t have any previous experience, not a problem.   This course is expertly designed to teach everyone from complete beginners, right through to pro hackers. You'll go from beginner to extremely high-level and I will take you through each step with hands-on examples.

And if you are a pro Ethical Hacker, then take this course to quickly absorb the latest skills, while refreshing existing ones.

Good news is:

 All applications and tools recommended are free. So you don’t need to buy any tool or application.

My course, just as my other courses on Udemy, is focused on the practical side of penetration testing and ethical hacking but I also will share with you the theory side of each attack. Before jumping into Penetration Testing or other practices with Ethical Hacking tools you will first learn how to set up a lab and install needed software on your machine.   In this course, you will have a chance keep yourself up-to-date and equip yourself with a range of Ethical Hacking skills.

When you finish this course you will learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that you can directly apply when you get back to work. I am coming from field and I will be sharing my 20 years experience with all of you. So you will also learn tips and tricks from me so that you can win the battle against the wide range of cyber adversaries that want to harm your environment.  

Here is the list of  what you’ll learn by the end of course,    

Setting Up The LaboratorySet Up Kali Linux from VMSet Up Kali Linux from ISO FileSet Up a Victim: Metasploitable LinuxSet Up a Victim: OWASP Broken Web ApplicationsSet Up a Victim: Windows SystemPenetration Test

Penetration Test TypesSecurity AuditVulnerability ScanPenetration Test Approaches: Black Box to White BoxPenetration Test Phases: Reconnaissance to ReportingLegal Issues Testing StandardsNetwork Scan

Network Scan TypesPassive Scan With WiresharkPassive Scan with ARP TablesActive Scan with HpingHping for Another Purpose: DDosNmap for Active Network Scan

Ping Scan to Enumerate Network HostsPort Scan with NmapSYN Scan, TCP Scan, UDP ScanVersion & Operating System DetectionInput & Output Management in NmapNmap Scripting EngineHow to Bypass Security Measures in Nmap ScansSome Other Types of Scans:Idle (Stealth) ScanVulnerability Scan

Introduction to Vulnerability ScanIntroduction to a Vulnerability Scanner: NessusNessus: Download, Install & SetupNessus: Creating a Custom PolicyNessus: First ScanAn Aggressive ScanNessus: Report FunctionExploitation

Exploitation TerminologiesExploit DatabasesManual ExploitationExploitation FrameworksMetasploit Framework (MSF)Introduction to MSF ConsoleMSF Console & How to Run an ExploitIntroduction to MeterpreterGaining a Meterpreter SessionMeterpreter BasicsPass the Hash: Hack Even There is No VulnerabilityPost-Exploitation

Persistence: What is it?Persistence Module of MeterpreterRemoving a Persistence BackdoorNext Generation PersistenceMeterpreter for Post-Exploitation with Extensions: Core, Stdapi, Mimikatz...Post Modules of Metasploit Framework (MSF)Collecting Sensitive Data in Post-Exploitation PhasePassword Cracking

Password Hashes of Windows SystemsPassword Hashes of Linux SystemsClassification of Password CrackingPassword Cracking Tools in Action: Hydra, Cain and Abel, John the Ripper...OSINT (Open Source Intelligent) & Information Gathering Over the Internet

Introduction to Information GatheringUsing Search Engines to Gather InformationSearch Engine Tools: SiteDigger and SearchDiggityShodanGathering Information About the PeopleWeb ArchivesFOCA - Fingerprinting Organisations with Collected ArchivesFingerprinting Tools: The Harvester and Recon-NGMaltego - Visual Link Analysis ToolHacking Web Applications

Terms and Standards Intercepting HTTP & HTTPS Traffics with Burp SuiteAn Automated Tool: Zed Attack Proxy (ZAP) in DetailsInformation Gathering and Configuration FlawsInput & Output ManipulationCross Site Scripting (XSS)Reflected XSS, Stored XSS and DOM-Based XSSBeEF - The Browser Exploitation FrameworkSQL InjectionAuthentication FlawsOnline Password CrackingAuthorisation FlawsPath Traversal AttackSession ManagementSession Fixation AttackCross-Site Request Forgery (CSRF)Social Engineering & Phishing Attacks

Social Engineering Terminologies Creating Malware - TerminologiesMSF VenomVeil to Create Custom PayloadsTheFatRat - Installation and Creating a Custom MalwareEmbedding Malware in PDF FilesEmbedding Malware in Word DocumentsEmbedding Malware in Firefox Add-onsEmpire Project in ActionExploiting Java VulnerabilitiesSocial Engineering Toolkit (SET) for PhishingSending Fake Emails for PhishingVoice Phishing: Vishing

Network Fundamentals

Reference Models: OSI vs. TCP/IP Demonstration of OSI Layers Using WiresharkData Link Layer (Layer 2) Standards & ProtocolsLayer 2: Ethernet - Principles, Frames & HeadersLayer 2: ARP - Address Resolution ProtocolLayer 2: VLANs (Virtual Local Area Networks)Layer 2: WLANs (Wireless Local Area Networks)Introduction to Network Layer (Layer 3)Layer 3: IP (Internet Protocol)Layer 3: IPv4 Addressing SystemLayer 3: IPv4 SubnettingLayer 3: Private NetworksLayer 3: NAT (Network Address Translation)Layer 3: IPv6Layer 3: DHCP - How the Mechanism WorksLayer 3: ICMP (Internet Control Message Protocol)Layer 3: TracerouteIntroduction to Transport Layer (Layer 4)Layer 4: TCP (Transmission Control Protocol)Layer 4: UDP (User Datagram Protocol)Introduction to Application Layer (Layer 5 to 7)Layer 7: DNS (Domain Name System)Layer 7: HTTP (Hyper Text Transfer Protocol)Layer 7: HTTPSNetwork Layer & Layer-2 Attacks

Creating Network with GNS3Network Sniffing: The “Man in the Middle” (MitM)Network Sniffing: TCPDumpNetwork Sniffing: WiresharkActive Network Devices: Router, Switch, HubMAC Flood Using MacofARP SpoofARP Cache Poisoning using EttercapDHCP Starvation & DHCP SpoofingVLAN Hopping: Switch Spoofing, Double TaggingReconnaissance on Network DevicesCracking the Passwords of the Services of Network DevicesCompromising SNMP: Finding Community Names Using NMAP ScriptsCompromising SNMP: Write Access Check Using SNMP-Check ToolCompromising SNMP: Grabbing SNMP Configuration Using MetasploitWeaknesses of the Network DevicesPassword Creation Methods of Cisco RoutersIdentity Management in the Network DevicesACLs (Access Control Lists) in Cisco Switches & RoutersSNMP (Simple Network Management Protocol) SecurityYou'll also get:

  • Lifetime Access to The Course

  • Fast & Friendly Support in the Q&A section

  • Udemy Certificate of Completion Ready for Download

Enroll now to become professional Ethical Hacker. IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorised.   

Get Details and Enroll Now

OpenCourser is an affiliate partner of Udemy.

Get a Reminder

Send to:
Rating 4.5 based on 63 ratings
Length 19.5 total hours
Starts On Demand (Start anytime)
Cost $18
From Udemy
Instructor Muharrem AYDIN
Download Videos Only via the Udemy mobile app
Language English
Subjects IT & Networking
Tags IT & Software Network & Security

Get a Reminder

Send to:

Similar Courses

What people are saying

easy to understand

The instructor is very well spoken and easy to understand.

So far so good, Voice of instructor is not putting me to sleep, easy to understand, and clearly explains what he is doing.

Very clear content and voice and that makes the training easy to understand.

Read more

so much

Very knowledgeable and all materials well explained congratulations.this is the best i have ever gone on ceh and penetration and i recommend you go for it.if it had six stars i would given six stars.thank you sir for putting in so much into this course for it to be what it it.thank you Instructor is not responsive to queries in spite of multiple re-pings.

There's so much information and I'm still at the start of the class which is great.

Thank you so much... High recommended.

Read more

for beginners

However, fundamentals could make do with more explanation for beginners.

This course has beneficial content and simple language for beginners, and also offers a indicative abstract of great knowledge.

Read more

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile.

CA API Developer (Layer 7) $60k

Ethical cost accountant $64k

Ethical cost accountant $64k

Ethical Hacker or Pen Tester $67k

Ethical Hacker or Pen Tester $67k

Access Layer Engineer $75k

Network Compliance Specialist $87k

IT/Network Security Specialist $92k

Network Engr. $99k

Program Manager- Multi-Layer Insulation/Project Engineer- Aerospace Products $116k

CAD / Network Administrator $131k

NETWORK SYSTEMS ARCHITECT $136k

Write a review

Your opinion matters. Tell us what you think.

Rating 4.5 based on 63 ratings
Length 19.5 total hours
Starts On Demand (Start anytime)
Cost $18
From Udemy
Instructor Muharrem AYDIN
Download Videos Only via the Udemy mobile app
Language English
Subjects IT & Networking
Tags IT & Software Network & Security

Similar Courses

Sorted by relevance

Like this course?

Here's what to do next:

  • Save this course for later
  • Get more details from the course provider
  • Enroll in this course
Enroll Now