Ethical Hacking for Beginners

Learn practical skills for ethical hacking & penetration testing with this comprehensive course, no experience necessary

4.60 (4372 reviews)
Network & Security
11.5 hours
Oct 2021
last update
regular price

What you will learn

Learn how to hack WiFi networks

Learn fundamental networking topics such as IP and MAC Addressing, binary numbering, subnetting, and common ports and protocols

Learn how to create a virtual lab for following along with the course using free virtualization platforms and tools

Learn some of the main tools inside of Kali Linux commonly leveraged by ethical hackers

Learn the basics of Linux, including common commands, file permissions, file system navigation, installing updates, and bash scripting

Learn the basics of the Python programming language, including strings, variables, functions, conditions, loops, and modules

Learn about the legal considerations for ethical hackers and take a look at a sample penetration testing findings report

Learn the important steps of hacking methodology used for penetration testing

Practice reconnaissance techniques for gathering open-source intelligence (OSINT)

Perform scanning and enumeration techniques against web servers in order to gather intelligence and discover vulnerabilities

Learn how to gain access by exploiting vulnerabilities and weaknesses

Understand techniques for maintaining access and covering your tracks

Learn about the top 10 threats to web servers, testing out those vulnerabilities in a lab environment with Kali Linux tools

Learn the fundamentals of WiFi technologies


This course is for anyone interested in becoming an ethical hacker, no matter your current skill level. The curriculum is designed for absolute beginners interested in a career as a security professional, beginning with the absolute basics of penetration testing, and progressing to advanced topics and techniques. Get started today in your Ethical Hacking career.

The goal of ethical hacking is to find security vulnerabilities in an organization’s digital systems and networks. The best way to test the security of this infrastructure is to attempt to break in through penetration testing techniques. The increasing amount of high-profile cyber incidents continues to emphasize the need for individuals with these skills, with job demand projected to continue at an exponential rate.

The techniques shown here leverage free tools which are explained throughout the course, including instructions for creating your own home lab for practice and study. One of the primary tools you will become familiar with is Kali Linux, which is a Debian-based Linux distribution aimed at penetration testing and security auditing.

This course explores the following topics and more:

-  Networking Basics

-  Creating a Virtual Lab

-  Kali Linux Tools for Penetration Testing

-  Linux Basics

-  Python Basics

-  Penetration Testing Methodology

-  Legal Considerations

-  Report Writing

-  Passive and Active Reconnaissance

-  Scanning and Enumeration

-  Reverse and Bind Shell

-  Automated Payloads and Exploitation

-  Brute Force Attacks

-  Credential Stuffing

-  Password Spraying

-  Tips for Maintaining Access and Covering Tracks

-  Web Server Vulnerabilities

- Wifi Hacking


Ethical Hacking for Beginners - Screenshot_01Ethical Hacking for Beginners - Screenshot_02Ethical Hacking for Beginners - Screenshot_03Ethical Hacking for Beginners - Screenshot_04


Course Introduction

1.0 Course Introduction
1.1 Introduction and Overview
1.2 Course Tools

Getting help

Answering your questions

Networking Basics

2.0 Networking Basics
2.1 IP Addressing
2.2 MAC Addressing
2.3 The OSI Model
2.4 Binary Numbering
2.5 Subnetting
2.6 Subnetting: Hands-On Practice
2.7 TCP and UDP
2.8 Well-Known Ports

Creating Virtual lab

3.0 Creating a Virtual Lab
3.1 VMware Player
3.2 Virtual Box
3.3 VMware Fusion
3.4 Kali Linux
3.5 VM Snapshots

Kali Linux Tools

4.0 Kali LInux Tools
4.1 Kali Linux Overview
4.2 Keeping Notes

Linux Basics

5.0 Linux Basics
5.1 Sudo Command
5.2 File System Navigation
5.3 File Permissions
5.4 Working with Files
5.5 Linux Users
5.6 Common Commands
5.7 Installing Updates
5.8 Installing Python
5.9 Using GitHub
5.10 Bash Scripting

Python Basics

6.0 Python Basics
6.1 Strings
6.2 Variables
Boolean Expressions

Penetration Testing

7.0 Penetration Testing
7.1 Five Phases of Ethical Hacking
7.2 Legal Documents
7.3 Pentest Report Writing


8.0 Reconnaissance
8.1 Passive Reconnaissance
8.2 Email Address Gathering
8.3 Discovering Breached Credentials
8.4 Passive Kali Tools
8.5 Leveraging the Internet
8.6 Subdomains


9.0 Scanning
9.1 Nmap Scanning
9.2 Web Server Scanning
9.3 File Share Enumeration
9.4 SSH Enumeration
9.5 Vulnerability Scanning

Gaining Access

10.0 Gaining Access
10.1 Reverse Shell
10.2 Bind Shell
10.3 Sending Payloads
10.4 Automated Exploitation
10.5 Brute Force Attacks
10.6 Credential Stuffing
10.7 Password Spraying

Maintaining Access

11.0 Maintaining Access
11.1 Tactics for Maintaining Access

Covering Tracks

12.0 Covering Tracks
12.1 Pentest Cleanup

Exploring OWASP

13.0 Exploring OWASP
13.1 OWASP Top 10
13.2 Using Burp Suite
13.3 SQL Injection
13.4 Broken Authentication
13.5 Sensitive Data Exposure
13.6 XML External Entities (XXE)
13.7 Broken Access Control
13.8 Security Misconfigurations
13.9 Cross-Site Scripting (XSS)
13.10 Insecure Deserialization
13.11 Known Vulnerabilities
13.12 Insufficient Logging and Monitoring

WiFi Theory

WiFi Introduction
Introduction to Wireless LANs (WLANs)
WLAN Antennas
Wireless Range Extenders
WLAN Frequencies and Channels
WLAN Standards

WiFi Hacking

Cracking WiFi with a single Linux Command (wifite)
Easy GUI WPA2 cracking using Fern
Cracking WiFi with airmon-ng
GPU WPA2 cracking using hashcat
Python WiFi DOS script

WiFi Adapters and Troubleshooting

WiFi adapters - are they required? And which are best?
Example of monitor vs managed mode
Get Alfa Adapter get working on Kali Linux
Fix TP-Link TL-WN722N Adapter issues
Wifite: Fixing issues

Course Wrap-Up

Course Wrap-Up


November 20, 2021
I've never thought that i would be able to find all those kind of interesting and important information about cyber security in one place and i am so glad for having such an experience, i want to thank the people who made this content reachable for us
November 9, 2021
Very good course as a primer for the concepts of ethical hacking and overview of tools used. Loved the David's practical aspect to the course which put some of the concepts into action which was the highlight of the course.
October 31, 2021
F-no. Subneting wasn't explained well at all. I kept getting lost at the value at the end of the IP range given. He kept saying 2h-2 but what in the hell does that have to do with the /## at the end of the IP? Piece of crap class.
October 30, 2021
Excellent course Clear English High quality video Excellent sound. The material studied is relevant and enriching
October 22, 2021
This course is designed for those who knows in computers and basic networking, and wanting to get some inspiration. Of course you won't become professional hacker only by taking an online course, you need to understand the underlying stuff of networking and the operating systems, but this course is enough for you to "do" the stuff you're looking for. Based on what I was able to find until now, this was the best course and the most organized one on the internet, If you are someone who's searching for a hacking course, this one is the best on the platforms. The instructor is not boring, and his voice is nice. you can complete the course within 4 days if you're on a hurry. other courses are (sorry for that) literally a collection of garbage YouTube videos. The instructor is the best on Udemy for this subject because he knows in networking, other folks will just show you how to utilize some tools
October 17, 2021
Good match. I have some linux experience and a little bit of programming experience. New to cybersecurity. Really helpful so far.
October 13, 2021
Curso legal, embora dê um pulo muito grande entre alguns capítulos, entendo que é pra ter uma noção geral de tópicos e saber COMO pesquisar mais a fundo algumas coisas específicas.
October 13, 2021
The course is educative and i enjoy every tutors lesson, most especially Mr. Bombal..I am grateful i was opportune to get access to his tutorials.He makes me wanna get more involved.
October 12, 2021
It's really good course of beginners in ethical hacking. We do need to buy some stuff to learn wifi hacking in this course. But, it did not include explanation of owasp top 10 in detail, so need to update on that.
October 4, 2021
im absolutely zero knowledge about everything in this course, Thank You im gaining knowledge from this course
October 4, 2021
amazing class really, impressive hands on dynamic, really feel like I'm getting the gist of this thing.
September 5, 2021
Loving it so far. I would give it 4 out of 5 as i need room later on to give it a 5 star rating. I like things to be set out and explained which this course is doing. It helps me to learn. I also like how friendly both presenters have been so far
September 4, 2021
l'installation de kali linux ma pris beaucoup plus de temps que prévu ;-; , sinon tout le cours est très bien !
August 30, 2021
I have found this course absolutely amazing, it will enable me to greatly improve my chances of getting worth while employment in the industry.
August 30, 2021
Comprehensive ! Its easy for me now to watch the videos in here. Just got busy but I'm really interested.



Ethical Hacking for Beginners - Price chart


Ethical Hacking for Beginners - Ratings chart

Enrollment distribution

Ethical Hacking for Beginners - Distribution chart


7/4/2021100% OFF
7/5/202150% OFF
7/5/202135% OFF
8/13/2021100% OFF
8/27/2021100% OFF
9/3/2021100% OFF
11/26/202150% OFF

Related Topics

udemy ID
course created date
course indexed date
course submited by