Overview
Master the skills of ethical hacking by attending the most advanced Ethical Hacking Complete Training course.
The growing frequency of cyber threats and security incidents portrays the importance of cybersecurity professionals in today’s tech world. To protect yourself from hackers, you need to think like one.
This complete diploma course will equip you with all the required knowledge and skills you need to possess to think like a hacker. Thus, you will be able to protect your cloud assets entirely, gaining expertise in ethical hacking.
How will I get my certificate?
You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate.
Who is this course for?
There is no experience or previous qualifications required for enrolment on this Ethical Hacking Complete Training. It is available to all students, of all academic backgrounds.
Requirements
Our Ethical Hacking Complete Training is fully compatible with PC’s, Mac’s, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible on tablets and smartphones so you can access your course on wifi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace.
Career path
Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management , Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc.
Course Curriculum
- 9 sections
- 18 lectures
- 00:00:00 total length
-
What is an Ethical Hacker
00:07:00 -
Terminology Crash Course pt. 1
00:09:00 -
Terminology Crash Course pt. 2
00:13:00 -
Terminology Crash Course pt. 3
00:08:00 -
Legal Considerations
00:11:00
-
Surveying the Attack Surface
00:10:00 -
Recon Types
00:08:00 -
Passive Recon Part 1
00:07:00 -
Passive Recon Part 2
00:10:00 -
Active Recon
00:15:00 -
Recon Walkthrough Tools Summary
00:14:00 -
Maltego Demo
00:07:00 -
FOCA Demo
00:05:00 -
DEMO – Harvester
00:02:00
-
Scanning & enumeration
00:08:00 -
Identifying Active Hosts pt. 1
00:10:00 -
Identifying Active Hosts pt. 2
00:13:00 -
Identifying Active Services
00:18:00 -
OS and Services Fingerprinting
00:15:00 -
Network Mapping
00:10:00 -
Final Thoughts
00:05:00 -
DEMO – Nmap Syntax pt. 1
00:14:00 -
DEMO – Nmap Syntax pt. 2
00:16:00 -
DEMO – Nmap Hosts Discovery
00:12:00 -
DEMO – Nmap Service Discovery
00:17:00 -
DEMO – Nmap Scripts
00:11:00 -
DEMO – Masscan
00:11:00
-
Network Insecurity
00:04:00 -
Sniffing and Spoofing
00:13:00 -
Sniffing Tools
00:09:00 -
Spoofing, Crypto and Wifi
00:15:00 -
DEMO – tcpdump
00:11:00 -
DEMO – Wireshark
00:11:00 -
DEMO – Ettercap
00:13:00 -
DEMO – Burp Suite
00:15:00 -
DEMO – Scapy
00:10:00
-
Security Overview pt. 1: Windows Architecture
00:18:00 -
Security Overview pt. 2: Credentials Security
00:16:00 -
Security Overview pt. 3: Memory Corruption and Exploitation
00:16:00 -
Windows Hacking Basics
00:20:00 -
Local Access and Privilege Escalation
00:20:00 -
Dumping Hashes and Cracking Passwords
00:18:00 -
Linux Attacking Basics pt. 1
00:13:00 -
Linux Attacking Basics pt. 2
00:14:00 -
References
00:08:00 -
DEMO – Windows MSF Exploit pt. 1
00:13:00 -
DEMO – Windows MSF Exploit pt. 2
00:15:00 -
DEMO – Post Exploitation Activities
00:13:00 -
DEMO – Mimikatz
00:07:00 -
DEMO – Hashcat
00:08:00 -
DEMO – Konboot
00:13:00 -
DEMO – Post Exploitation Windows CMD
00:14:00 -
DEMO – Post Exploitation Windows Powershell
00:13:00 -
DEMO – Attacking Linux targets pt. 1
00:10:00 -
DEMO – Attacking Linux targets pt. 1
00:13:00
-
Introduction to Web Hacking
00:03:00 -
Web Security Architecture Overview pt. 1
00:17:00 -
Web Security Architecture Overview pt. 2
00:12:00 -
Attacking the Web Server pt. 1
00:10:00 -
Attacking the Web Server pt. 2
00:11:00 -
Attacking the Platform pt. 1
00:19:00 -
Attacking the Platform pt. 2
00:08:00 -
Attacking the Technology pt. 1
00:21:00 -
Attacking the Technology pt. 2
00:17:00 -
OWASP Top 10 pt. 1
00:09:00 -
OWASP Top 10 pt. 2
00:21:00 -
Attacking the Business Logic pt. 1
00:11:00 -
Attacking the Business Logic pt. 2
00:15:00 -
Tools and Methodology
00:20:00 -
References
00:05:00 -
DEMO – OWASP Mutillidae
00:09:00 -
SQLI
00:07:00 -
SQL Map Intro
00:08:00 -
SQL Map
00:25:00 -
DEMO – Burpsuite
00:37:00 -
DEMO – Burpsuite XSS Hunter
00:16:00 -
DEMO – mitmproxy
00:10:00 -
DEMO – Skipfish pt.1
00:04:00 -
DEMO – Skipfish pt.2
00:04:00
-
Social Engineering Basics
00:15:00 -
Social Engineering Methods
00:16:00 -
Tools and Techniques pt. 1
00:15:00 -
Tools and Techniques pt. 2
00:12:00 -
Tools and Techniques pt. 3
00:09:00 -
Physical Security Considerations
00:13:00 -
Final Thoughts
00:11:00 -
DEMO – Credential harvesting
00:02:00 -
DEMO – Website cloning
00:06:00 -
DEMO – Automating an attack
00:03:00 -
DEMO – Anti-virus evasion pt. 1
00:08:00 -
DEMO – Anti-virus evasion pt. 2
00:12:00
-
Assignment – Ethical Hacking
00:00:00
-
Claim Your Certificate
00:00:00

TAKE ALL COURSES FOR £49