Complete Ethical Hacking Masterclass: Go from Zero to Hero

The only course you need to learn Ethical Hacking. Hack computer system like a black hat hacker and secure them like pro
4.09 (1985 reviews)
Udemy
platform
English
language
Network & Security
category
Complete Ethical Hacking Masterclass: Go from Zero to Hero
55,122
students
130 hours
content
Apr 2025
last update
$64.99
regular price

What you will learn

550 detailed & 130+ hours of on-demand video about ethical hacking & computer security

Complete Certified Ethical Hacking & Cyber Security training course from Scratch

Step by step instruction with practical & Real-World hacking examples without neglecting the theory

Basics Of Ethical Hacking & Penetration Testing

Installing Kali Linux - a penetration testing operating system

Install windows & vulnerable operating systems as virtual machines for testing

Install Mac OS X & Ubuntu For Penetration Testing

Installing Android operating system as virtual machine for testing

Learn Linux commands and how to interact with the terminal

Learn linux basics & Configuring Kali Linux for better performance

Learn to be anonymous when doing hacking and penetration testing activities

Install the best operating system that hackers use only for Anonymity

Virtual Private Network (VPN) - Basics to Advanced

Setting Up - Open VPN Server

Setting Up - Open VPN Client

Get The Best Virtual Private Network For Free

Tor & Tails - Basics to Advanced

Tor Relays, Tor Bridges, Pluggable Transports & Obfsproxy

Tor Hidden Services, Security & Anonymity Practices

Using JonDonym For Anonymity

Using Macchanger For Changing Our MAC Address

Advanced Uses Of Macchanger For Anonymity

Basics of different Proxies & Proxy Chain

Set Up Your Own Proxy Server

Set Up Your Own Proxy Chain

Proxy Tunneling, Traffic Monitoring & Practical Anonymity

Using Best Kali Linux Tools For Staying Anonymous Online

Cellular Networks & I2P For Maintaining Privacy and Anonymity Online

Advance Methods For Staying Anonymous Using Nesting and Chaining Together

Gather passive & active information using different tools & techniques

Gathering Information about the target weather it is a person, website or a company

Pre Connection Attacks - WiFi & Wired Hacking

Disconnecting any device from the network

Learn to hack Wi-Fi NETWORK weather it is using WEP/WPA/WPA2

Gaining access attack - WiFi & Wired Hacking

Gaining access to Captive Portals (Airports, Hotels, etc...)

Post Connection Attacks - WiFi & Wired Hacking

Writing Custom Scripts & Executing Our Custom Attacks

Create Rogue access point

Create Fake Captive Portals

Covering our tracks after cracking Wi-Fi network

Real-World Example Of WiFi & Wired Hacking [Demonstration

Scanning the Network

Scanning for finding Vulnerabilities

Learn to Scan using different tools & techniques

Learn to Scan outside of your Network

Real-World Example Of Scanning [Demonstration]

Understand Denial of Service & Distributed Denial of Service properly

Understanding Computer Networking OSI model

Botnets & Stressers for DOS & DDOS

SYN Flood attacks

HTTP Flood attacks

UDP and ICMP Flood attacks

Slowloris attack

LOIC & Js LOIC attack

Peer to Peer attack

Using DDOS as a service

Creating Zombie Computers, Botnets & Executing DDOS Attack

Crash or Taking Down Websites & Signal Jamming Using DOS & DDOS ATTACK

Real-World Example Of DOS & DDOS Attacks [Demonstration]

Sniff packets using ARP Poisoning

Sniff packets using ARP Spoofing

Learn to do Sniffing attacks using DNS Poisoning

Advance Man In The Middle- Writing script, Converting downloads to Trojan on fly

Use flooding , spoofing & poisoning together for Sniffing

Use different tools for Capturing packets

Sniff packets and analyse them to extract important information

Real-World Example Of Sniffing [Demonstration]

Learn to hijack session

Network level session hijacking

Hijacking session using - TCP

Hijacking session using - UDP

Attacking browser for hijacking Session

Web application session hijacking

Brute Forcing for hijacking session

Hijacking cookies of Web application

Using of different tools for automating session hijacking

Using Burp Suite tool

Using OWASP-ZAP & Netsparker

Real-World Example Of Session Hijacking [Demonstration]

Learn & Understand Buffer Overflow

Buffer Overflow using Programming

Database Hacking using Buffer Overflow

Buffer Overflow using Malwares

Getting access to the system using Buffer Overflow

Compromising the Victim using Buffer Overflow

Advanced techniques of Buffer Overflow

Mastering Buffer Overflow

Real-World Example Of Buffer Overflow [Demonstration]

Learn & Understand Cryptography

Using best tools for Cryptography

Real-World Example Of Cryptography [Demonstration]

Guessing Methods For Hacking Password - Using Tools Included

Brute Force methods from password cracking

Using Keylogger for stealing passwords

Kali Linux for hacking password

Advanced Password Hacking Techniques

Real-World Example Of Password Hacking [Demonstration]

Learn Web Application hacking from Scratch

Understand the basic of Web application hacking

Gathering information for hacking web applications

Using different tools for gathering information such as: Nmap , Wget , Burpsuite ..etc

Learn to tamper web application

Client based web application attacks

Cross Site Scripting (XSS) & Cross Site Request Forgery (CSRF) attack on web application

Identity Management & Access Control attack

Real-World Example Of Hacking Web Applications [Demonstration]

Basics of Malware such as: definition , types ,destructiveness, etc ...

Basics of Trojan such as: definition , types ,destructiveness, etc ...

Creating a Trojan Virus

Infecting the Victim using our Trojan Virus

Evading Anti Virus software using our Trojan Virus

Evading Anti Virus software

Destroying The System

Creating a Virus Worm

Real-World Example Of Hacking Using Malwares [Demonstration]

Learn to hack systems from Scratch

Cracking Systems using Kerberos , Salting , John the Ripper & much more

Gaining access to the Victim's system

Escalation & Escalating Privileges

Maintaining access to the Victim's PC

Creating & Using Payload

Creating & Using Backdoors

Creating & Using Keyloggers

Post Exploitation on Victim's System

Rootkits , Steganography using for Post Exploitation

Covering our tracks

Basic methods for - Clearing our logs & evidence

Advanced methods for - Clearing our logs & evidence

Real-World Example Of Hacking Systems [Demonstration]

Learn Cloud Computing basics

Hacking through Cloud Computing

Service hijacking via Social Engineering

Economic Denial of Sustainability (EDoS) attack in Cloud Computing

Compromising the victim using Cloud Computing hacking

Real-World Example Of Hacking Through Cloud Computing [Demonstration]

Learn Social Engineering from Scratch

The Art of Human Attack by Social Engineering

Psychological Manipulation Using Social Engineering

Gaining Access Using Social Engineering

Generating Complex Payload

Generating Undetectable Backdoor

Generating Advanced Keylogger

Changing Evil File's Icon, Embedding With Any File & Configuring to Run Silently

Maintaining Access Using Undetectable Methods (Rootkits & more)

Post Exploitation Using Social Engineering

Social Engineering with Kali Linux

Phishing attack using BEEF & PHISH5

Phishing attack using Spearphishing

Phishing pages & Phishing Emails

Learn how to Scam using Social Engineering

Learn Scamming with Real-World example

Get away with Identity Theft

Buying and Selling identities

Learn Website Hacking from Scratch

Local File Inclusion Vulnerabilities(LFI)

Remote File Inclusion Vulnerabilities(RFI)

Code Execution Vulnerabilities

Uploading Files Vulnerabilities

SQL Injection - Data Extracting

SQL Injection - Blind SQL Injection

SQL Injection - Advanced Techniques

SQL Injection - Evasion Techniques & Automating attacks

Cross Site Scripting(XSS) - Understanding Cross Site attacks

Cross Site Scripting(XSS) - Website Hacking Using XSS

Web Server Hacking - Discovering vulnerabilities & Hacking through vulnerability

Web Server Hacking - Taking advantages of Web Server misconfiguration

Web Server Hacking - Advanced Attacks

Learn Mobile hacking from Scratch

Android mobile hacking from Scratch (Complete)

Understanding the architecture of IOS

Hacking IOS device using malware

Hacking IOS mobile using other methods

Hacking other mobile platforms

Hacking mobile devices using malwares

Creating payloads for Android mobile hacking

Social Engineering Attack on Android mobile

Spoofing Emails , Sms , Phone numbers

Attacking with metasploit

Rooting the Device

Using Android to hack other devices

Using DSPLOIT & Bugtroid

Hacking windows phones

Hacking BlackBerry phones

Learn C++ From Scratch

Creating Your Own Advanced Keylogger With C++

Creating Your Own Trojan With C++

Downloading & Installing Nmap

Complete Basics of Nmap

Discovery, Network Scanning, Port Scanning & Algorithms

Finger printing methods used by Nmap

Nmap Scripting Engine (NSE)

Firewall, IDS Evasion & Spoofing In Nmap

Zenmap

Writing custom scripts & Nmap API - Advanced

Learn to use Nmap like a Black-Hat hackers

Real-World Example Of Hacking Using Nmap

Downloading & Installing Wireshark

Complete Basics Of Wireshark

Capturing Packets & Packet Analysis

Command Lines & Other Utilities In Wireshark

Ip networks, Subnets, Switching & Routing

Network protocols, Application protocols, Performance Analysis

Tshark, Tshark Output Formatting

Tunneling, Customization, Unauthorized Traffic monitoring

Wireshark and Nmap Interaction

Advanced Uses Of Wireshark

Real-World Example Of Hacking Using Wireshark

Learn How to Detect & Defend All of The Attacks

Learn Computer Forensics from scratch

Investigation

Operating Systems(Windows, Linux, Mac OS X, etc...)

Image Acquisition For Forensics

Network Acquisition For Forensics

Data Spaces & Data Recovery

Malware Forensic

Mobile Platform Forensic

Kali Linux and Forensics

Complete Bug Bounty (Earn Money Legally)

Using Top 25+ tools for Bug Hunt & much more

Learn even more ways to earn money legally & get retired

Setting Up Lab To Access Deep Web & Dark Net

Hands on Deep Web & Dark Net

All about Bitcoins & Cryptocurrencies

Get Free Bitcoin

PGP Tutorial

Deep Web & Dark Net Links (Huge Onion link collection)

Dark Net Market Place (Purchasing products)

Purchasing Products like: Illegal arms, drugs, Killing, etc...

[Two Bonus Courses] Complete Python & Ethical Hacking, Metasploit course

5195428
udemy ID
3/5/2023
course created date
3/10/2023
course indexed date
Bot
course submited by