Network & Security


Advanced Ethical Hacking: Network & Web PenTesting - Part I

Become a High-level PenTester in CyberSecurity. Network & Web application Penetration Testing (Hands-on Labs practice)

4.20 (27 reviews)


9.5 hours


May 2021

Last Update
Regular Price

Blue Host
Fast, easy, and secure WordPress hosting in minutes + 1 free domain name
65%OFF : $2.95/month

What you will learn

Labs Preparation (VirtualBox & Kali Linux installation & configuration), step-by-step guide & options to avoid provided ONLY by us & on Facebook/JRDacademy page.

Working with BURPSUITE PROFESSIONAL instead of the COMMUNITY version (ranking between the 3 first best tools for PenTesting)

METASPLOIT, ARMITAGE (High-level Penetration Testing Software, find security issues, verify vulnerability mitigations & much more)

Fix Armitage Error, and Enjoy the Metasploit User Interface

Enumeration, Remote and Exploitation

Structured Query Language (SQL Injection)

Cross-site Scripting (XSS attack)

Vulnerability Scanning

Network Scanning, Nmap Scanning, Nikto, Dirb, Ettercap

Reverse Shells

Buffer Overflows, DoS Attack

Man-In-The-Middle (MITM) Attack

Privilege Escalation

Network Hacking

Wireless Hacking

Take Control Of Any Wi-Fi Network ESSID whether it is well-passworded or not

WEP/WPA/WPA2 Hole/pitfall

Interrupt the Connection of a Client's ip-address whether using WEP/WPA/WPA2 Protocols

Get the Handshake of WPA/WPA2 Protocols of a Wi-Fi ESSID

Crack Wireless WEP/WPA/WPA2 ESSID

Eavesdrop the Communication & The Reason Behind The Scene

Stealth Idle Scan

Bypass Antivirus in Windows Machine

Bypass Any Windows Login Password & Get Access To The System Administrator

Bypass Ubuntu Login Password & Get Access To The System Administrator

Bypass MacOs Login Password & Get Access To The System Administrator

Strengthen The Login Account Security Of Your Computer thrice Before Getting Access To The Admin's Screen

Essentials of CEH v10 in real-life (CEH - Certified Ethical Hacker)

Information Security

ElGamal, RSA, Diffie-Hellman (Encryption and Decription steps)

Router Hacking

Mobile Phones Hacking


This course is all about Ethical Hacking and Security, which needs some Professional tools to proceed with, such as burpsuite_Pro for example.

  • This course covers syllabus of CEH v10 Certified Ethical Hacker version 10, mainly the Network activities, and some frequent web application vulnerabilities. Course has been designed in a way so that any novice, (from Zero level) to the advanced level of people in cyber security field can easily understand and can be well-benefited. As it is a step-by-step process, from zero to high level, we encourage you to try to understand exclusively the part one; then after, jump into the next parts to get what you need to know about cryptology, network establishment, firewall, hacking, eavesdrop, empower the security, etc...(as if you were sitting in a Master & PhD cryptology classroom).

    Therefore, after completing our courses (parts 1 - 4), you will meet with the most used encryption techniques, methods used to mitigate the probability of being hacked by Black-Hat hackers.

    -The most recent ways of hacking into a wireless network, no matter what protocols the Wifi was set with by its administrator. Furthermore, no matter how strong the Wifi password is, so that we dupe someone's network. We explain the reasons behind the scene of such attacks. Exploitation of the existed holes that the most used Operating Systems contain, such as (Linux based, Windows, Mac OS, Android)

  • We deeply explain why RSA is that so strong and why it is highly used in real-life cybersecurity, as well as AES encryption.

  • Most Well-known Encrypting Algorithms, such as ElGamal, RSA, Diffie-Hellman, and so on forth (Encryption and Decryption steps) are well described. It is crucial for cybersecurity engineers in Master and in PhD classes.

  • Note:
    In this course, we supply to you not only videos for the practice, but also we provide a light text file for each part of the tutorial which is exclusively self-explanatory (a step-by-step process) so that we make it easier to learn according to the obligations that you might face while you want to continue with your practice.

  • Example of a situation: you might need to continue with your tutorial where you are at a specific place, and don't want to disturb anybody while you forgot your earphone/headphone.


Advanced Ethical Hacking: Network & Web PenTesting - Part I
Advanced Ethical Hacking: Network & Web PenTesting - Part I
Advanced Ethical Hacking: Network & Web PenTesting - Part I
Advanced Ethical Hacking: Network & Web PenTesting - Part I


Introduction and Straight Hands-on Labs


Virtualbox (Installation & Configuration)

Kali Linux (Installation & Configuration)

The concept of Enumeration

NetBios Enumeration

Simple Mail Transfer Protocol - SMTP Enumeration

Simple Network Management Protocol - SNMP Enumeration

Lightweight Directory Access Protocol - LDAP Enumeration

Some Vulnerable Labs (VM) to Download for this Course

BrainPan VM Enumeration and Exploitation

Turnkey VM Enumeration and Exploitation

DerpnStink VM Enumeration and Exploitation

SkyTower VM Enumeration and Exploitation

PwnLab VM Enumeration and Exploitation

GoldenEye VM Enumeration and Exploitation

ShellShock Enumeration and Exploitation (Common Vulnerabilities & Exposures-CVE)

Lab_Practice - Using Metasploit on Kali Linux To Take Control Of A User's PC

Wordpress Enumeration and Exploitation

Stapler VM Enumeration and Exploitation

SickOS VM Enumeration and Exploitation

IMF (Impossible Mission Force) VM Enumeration and Exploitation

Exploitation of Apache Struts (CVE 2017)

Lampiao VM Enumeration and Exploitation

Remote File Inclusion Attack (RFI)



Shivang25 September 2020

It is one of the best penetration testing courses out there. I being a beginner in theoretical computer science find it extremely useful to understand the concepts from the very basics. I strongly recommend this course to all the students and computer engineers who are deeply interested in ethical hacking to enrol in this course and learn world-class knowledge. Thank you very much for providing us with such an education!

Vicky13 September 2020

This course is very reliable and well-explained. I finally find a step-by-step guide to start my ethical hacking. Thank you!

Marc13 September 2020

I deeply encourage all students who have interest on IT, ethical hacking & security to enroll in. I reached my expectations with this instructor. Thank you sir!

Nidhin12 September 2020

This course was what I was searching for learning pen testing myself. The course is presented with utmost clarity and proceeds linearly with step-by-step explanation of each and every tool needed for pen testing, using Kali linux. One could binge watch this course along with using the lab resources provided and be a good pen tester within one day. The light-hearted atmosphere and the instructor being witty at times makes the course even more engaging. I strongly recommend this course to anyone looking for an engaging pen testing course using Kali.

MJ22 March 2020

Insightful and easy online learning course! I have learned so much about different techniques such as ethical hacking tools to protect web security and Kali Linux installation. I look forward to more training courses soon!


5/31/202015% OFFExpired
1/29/20210% OFFExpired


Udemy ID


Course created date


Course Indexed date
Course Submitted by