Network & Security


Learn Ethical Hacking From A-Z: Beginner To Expert Course

Learn how to become an elite ethical hacker and easily hack networks, computer systems, web apps and so much more...

4.44 (2494 reviews)


12 hours


Nov 2020

Last Update
Regular Price

What you will learn

How To Become An Elite Ethical Hacker

How To Setup A Hacking Lab

How To Launch Attacks/Exploits Against Computers

How To Start A Cybersecurity/Ethical Hacking Career

How To Hack Into Wireless Networks

How To Conduct Penetration Tests

How To Bypass Antivirus

The Fundamentals of Networking

How To Remain Anonymous On The Internet

The Fundamentals of Linux

The Fundamentals of Bash

How To Gather Website & App Data

The Fundamentals of Python

Maintaining Access To Exploited Computers

Website & Web Application Hacking

Mobile Phone Security Tips

Where You Can Practice Hacking For Free

Conducting Passive & Active Reconnaissance On A Network


Welcome to - Learn Ethical Hacking From A-Z: Beginner To Expert Course!

This practical, hands-on course was created for newbies – that's to say, people with no prior training or knowledge in hacking and cybersecurity. The aim of this course is to give you the education not just to understand what black-hat hatters do and how, but also to learn exactly how to hack systems like a pro and win the cat and mouse game by securing systems like a professional security expert.

Blending practical work with solid theoretical training, we take you from the basics of ethical hacking through to mastery, giving you the training you need not just to hack, but also to secure against a hack.

While the theory is important, we understand that it can also be dry and uninspiring. For this reason, this course is packed with examples that you can follow. This practical focus starts from the beginning, where we will teach you about penetration testing and show you how to install the software required (Windows, Linux, and Mac OSX) and jump right into hacking.

Throughout, you will analyze and exploit various systems from regular websites through to sprawling networks, along with hacking servers and clients. More than just hacking, you'll also learn how to conduct efficient penetration testing techniques.

This approach gives you the foundational education that you need not just to hack any given system, but also to secure it, with each module covering both sides of the coin. The course covers six main areas:


This foundational section gives you a full introduction to the basics of networking systems – how they communicate and work – and is designed to give you the knowledge you need to succeed in this course.

  • BASICS OF NETWORKING: Networking can be an intimidating topic, but don’t worry! We break down only the necessary things that you need to know in regards to networking and teach you important networking fundamentals

  • SETTING UP A HACKING LAB: You can’t hack without a lab! We walk you step-by-step through the process of setting up your own hacking lab on your laptop or desktop computer!

  • LINUX + SCRIPTING BASICS: Hackers use Linux, which is an OS that the average person may have no experience with. We will go over Linux fundamentals so that you can easily navigate your way through Linux during this course. We also touch on a couple of scripting languages that are a MUST for any ethical hacker and teach you the basics of each one with practical examples.

  • HIDING YOUR IDENTITY ON THE WEB: If you are hacking on the internet, you need to learn how to remain anonymous. We will show you the tools and techniques that you can use to always remain anonymous and unknown on the internet.


This section shows you how to test both wired and wireless systems. You will learn how to go from not having any access to a network to gaining access and being able to begin attacking systems on the network.

  • PRE-CONNECTION ATTACK: Not all attacks require you to be connected to the target or even know the password. Learn how to discover and manipulate devices connected to a network and gather information about your target

  • GAIN ACCESS TO NETWORKS: Learn how to use the information you have about your target to crack the key and get the access password. This section covers multiple protocols including WEP, WPA, and WPA2

  • POST-CONNECTION ATTACKS: With a key, you can now leverage powerful hacking techniques to get even more information. Learn how to see what users are doing on a network, inject code in pages, and more on wired and wireless networks


This section builds on the lessons learned in section one, showing you how you can get full control and hack into any computer system that you target.

  • SERVER-SIDE ATTACK: Discover how to harvest information about your targeted system – its OS, open ports, and installed services – without user interaction. Then use this information to exploit vulnerabilities and generate reports

  • CLIENT-SIDE ATTACK: Learn how to hack systems with no vulnerabilities by sneaking in with software updates or using backdoor trojan downloads. You’ll also learn the art of social engineering – or tricking people into giving you information


This section shifts the focus on interacting with compromised systems. Now that you have gained access, you'll learn how you can exploit these systems.

  • ACCESS FILE SYSTEMS: All systems have a wealth of files that you can now manipulate with your access. Learn how to access these systems and how to read, write, upload, and even execute files

  • MAINTAIN ACCESS: Gaining access to a system and its files is only half of the battle. Learn how to maintain your access and frustrate efforts to secure it again so you can continue to exploit a system

  • SPY ON YOUR TARGET: Learn how to capture any keystrokes on a keyboard, turn on a computer webcam, take screenshots, and even take control of the system to attack, hack, and access third-party networks and systems


In this section, you will learn more about how you can hack into websites and web applications using Kali Linux. You’ll also learn how web applications work – and how to find vulnerabilities within these applications for you to exploit.

  • How to scan websites/web applications for vulnerabilities to exploit

  • How to Brute Force into web applications

  • How to conduct SQL injection in web applications

  • How to conduct Cross Site Request Forgery (CSRF)

  • How to exploit File Inclusion Vulnerabilities

  • How to exploit File Upload Vulnerabilities

  • How to automate attacking web applications using various tools

  • How to prevent and secure websites & apps yourself


In this section, you will learn how you can make money as an ethical hacker using a variety of methods. You’ll also learn how to build your personal brand and get your name out there as an Ethical Hacker so you can have employers and clients knocking at your door ready to hire you for your services. Then finally, you’ll learn how you can start a career in cybersecurity with some insider tips on what certifications to get and the best way to land a job.

This includes:

  • How to build an ethical hacker personal brand from scratch

  • How to get instant credibility and authority as a hacker

  • How to properly network and get others talking about you

  • How to make money using a variety of websites

  • How to get started freelancing as a hacker

  • How to get started consulting as a hacker

  • How to land a job as a cybersecurity professional

This course is comprehensive, showing you both sides of hacking. You will learn to think and operate like a hacker – and how to apply that knowledge as a cybersecurity expert to protect you and your clients' networks and systems. In taking this 'cat and mouse' approach, your rounded understanding will give your approach new depths and angles, revealing the paths you can take to effectively neutralize any threat.

Together with the emphasis on practical examples that you can follow in real life with live systems, you will also benefit from the excitement of hands-on learning. By experiencing precisely what it takes to hack into any given target system, you'll also learn that no one system is the same and that all approaches can be modified.

This real-life learning is an invaluable part of your education, enabling you to better see what hackers are doing and how to block even the most potent attacks. No matter what the scenario or how complicated a hacking situation, this course gives you the foundational training you need to secure a network – and start pursuing a career in a field that is increasingly in demand as the global reliance on technology grows.


Learn Ethical Hacking From A-Z: Beginner To Expert Course
Learn Ethical Hacking From A-Z: Beginner To Expert Course
Learn Ethical Hacking From A-Z: Beginner To Expert Course
Learn Ethical Hacking From A-Z: Beginner To Expert Course


Course Introduction

Course Overview

About Your Instructors

Section Overview

Current Cybersecurity Market

The 3 Types of Hackers

The 4 Elements of Security

Ethical Hacker Terminology

Common Methods of Hacking

Cybersecurity & Ethical Hacking Overview

Ethical Hacking vs Penetration Testing

Job Opportunities in Cybersecurity

Who is This Course is For?

Section 1 Quiz

Networking Basics

Networking Section Overview

How Data Travels Across The Internet

Understanding Ports and Protocols

Understanding IP Addresses: Public & Private

What Are Subnets?

The Average Network vs Remote Based

Section 2 Quiz

Setting Up Your Hacking Lab

Hacking Lab Section Overview

Understanding Virtual Machines

Setup Your Kali Linux Machine

VN Setup & Testing Vulnerable Systems

Section 3 Quiz

Linux/Python/Bash & PowerShell Basics

Linux+Python+Bash+Powershell Section Overview

Linux Basics

Working With Directories & Moving Files

Installing & Updating Application Files

Linux Text Editors

Searching For Files

Bash Scripting Basics

Python Basics

Section 4 Quiz

How To Remain Anonymous On The Web

Remaining Anonymous Section Overview

TOR Browser Overview

Anonsurf Overview

Changing Mac Addresses

Using a Virtual Private Network/Server (VPN, VPS)

Section 5 Quiz

How To Hack Into WIFI

WiFi Hacking Section Overview

WiFi Hacking System Setup

WEP Hacking Attack #1

WEP Hacking Attack #2

WPA/WPA2 Hacking

Section 6 Quiz

Passive & Active Reconnaissance (Information Gathering)

Reconnaissance Section Overview

Passive Recon vs Active Recon

Recon-ng Overview

Whois Enumeration

DNS Enumeration Overview

Netcraft.com DNS Information

Google Hacking

Shodan.io Overview

Securityheaders.com (Analyze HTTPS Headers of website)

Ssllabs.com/ssltest (Look for SSL issues on website)

Pastebin.com (Sensitive Information)

NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.)

Netcat Overview + SMB/NFSEnumeration

Nikto & Sparta Web Application Scanner

SMPT Enumeration + Nessus/Openvas Scanners

Section 7 Quiz

Launching Attacks

Launching Attacks Overview

Analyzing Information Gathered

Taking Advantage of Telenet

Searching & Understanding Exploits

Copy Exploits From Searchsploit

Understanding Exploits

Launching Exploits

Brute Force Attacks

How To Crack Passwords

ARP Spoofing Overview

Introduction To Cryptography

Section 8 Quiz

Post Exploitation

Post Exploitation Section Overview

Privilege Escalation

Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus

Installing a Keylogger

Installing a Backdoor

Section 9 Quiz

Website & Web Application Hacking

Website & Web Application Hacking Overview

Web Application Scanning

Directory Buster Hacking Tool

Nikto Web App Hacking Tool

SQLmap and SQL Ninja Overview

How To Execute Brute Force Attacks

Using Command Injection

Malicious File Upload

Local & Remote File Inclusion

SQL Injection Overview

Using Cross Site Request Forgery

Cross Site Scripting Overview

Section 10 Quiz

Mobile Phone Hacking & Security

Mobile Phone Hacking Section Overview

Mobile Attack Vectors

Mobile Hacking Using URLs

Jail Breaking and Rooting Considerations

Privacy Issues (Geo Location)

Mobile Phone Data Security

Section 11 Quiz

Getting Your Name Out There As An Ethical Hacker

Getting Your Name Out There Section Overview

Building A Brand

Personal Branding

Setup Your Website and Blog

Writing a Book

Starting a Podcast

Networking Overview

Section 12 Quiz

How To Make Money As An Ethical Hacker

Making Money Section Overview

Bug Bounty Programs

How To Start Freelancing

How To Start Client Consulting

Section 13 Quiz

How To Start A Career In Cybersecurity

Potential Salary & Cybersecurity Roadmap

Books Recommendations

Places to Practice Hacking for Free

Section 14 Quiz


Jawad9 November 2020

Through this course, anyone can learn hacking easily and he/she can used this experience in the professional life.

Syed4 November 2020

best ethical hacking course I ever bought other courses are like they don't teach by demos , some of them have bad English accent.

Talwinder3 November 2020

I have gained great experience with the introductory part of this course, I hope all other chapters are good and as expected

Ayoub1 November 2020

These introduction videos seem very promising, I can't wait until I proceed deeper into this course, thank you

Megan5 October 2020

I appreciate the hands on examples in this course. I like that instructor gives overview then walks you through how to do it.

Mia4 October 2020

I like the good mix between theory and practice. Some courses go too heavy on theory. Easy to follow methods.

Vinay3 October 2020

I'm too excited diving in the hacking world and this course is awesome and teacher is also superb... Thank you ??

John28 September 2020

Hacking has always been something I was interested in. After taking this course I feel ready to take my CEH exam.

SirRaygun24 September 2020

Solid course for beginners and good explanations with some cool techniques for hacking. I enjoyed learning this course

Ming22 September 2020

I had no prior knowledge or experience with Hacking. The course gave me a good solid foundation. Recommend this to all beginners.

Vishwak20 September 2020

Good course but could have shown bit more hands on hacking exercises compared to a lot of theory. But overall good intro to hacking.

Pamela18 September 2020

Enjoying the course so far. I really like the overviews before each section. They help get a better understanding of the material.

Robert17 September 2020

Good course. The quizzes after each section are what really sets this course apart from others Ive taken. I like to have a refresher of what I learned and the questions really help out.

Jayroyce17 September 2020

Instructors do a great job with explanations and practical examples. Highly recommend to anyone who is interested in learning how to conduct pentesting.

Leanney15 September 2020

Great course for the price. I like how I'm able to learn how to think like a black hat so I can secure devices against them. Looking to take my CEH as well. Eagerly waiting for the next course.


9/8/2020100% OFFExpired
11/1/2020100% OFFExpired
5/9/2021100% OFFExpired
6/7/2021100% OFFExpired
6/28/2021100% OFFExpired
8/3/2021100% OFFExpired
9/8/2021100% OFFExpired
9/10/2021100% OFFExpired
9/14/2021100% OFFExpired


Udemy ID


Course created date


Course Indexed date
Course Submitted by