Ethical Hacking Complete Course

Learn Ethical Hacking Technologies

4.7 (5 ratings) 9 students enrolled

Instructed by SUNIL GUPTA

  • This Cyber Security Training will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
  • The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. 
  • This course is a Complete Course of Ethical Hacking and Pentesting .

  • Basic Knowledge of Computer and Networking is recommended before taking this course
  • A computer or laptop or android mobile with internet connection to follow this course lectures.
  • A note book and pen is recommended to take notes during the entire course.
  • You will become a professional ethical hacker by learning all the required essentials of ethical hacking
  • You will have a complete understanding of Ethical Hacking and Penetration Testing Techniques and Concepts
  • The lab intensive environment gives each student in-depth knowledge and practical hands-on experience
  • You will be confident to take Job interviews related to Cyber Security Industry
  • This course has been prepared for those who want to learn Ethical Hacking Basics and Advanced Techniques
  • Cyber Security Professionals, Web Developer, Admins can take this course
  • Even fresher college students who are aspired to learn and take a bit more efforts to understand and develop there career in Ethical Hacking can take this course.
Total Time : 07:46:55

Section 1 : introduction of Ethical Hacking

  • Lecture 1 :
  • Ethical Hacking Introduction - 1
  • Preview The Course
  • 00:10:06
  • Lecture 2 :
  • Ethical Hacking Introduction - 2
  • 00:08:34
  • Lecture 3 :
  • Ethical Hacking Introduction - 3
  • 00:07:04
  • Lecture 4 :
  • Ethical Hacking Introduction - 4
  • 00:06:42

Section 2 : Installation Of Kali linux

  • Lecture 1 :
  • Installation Procedure
  • 00:08:06

Section 3 : Password Cracking Practicals

  • Lecture 1 :
  • Create your own dictionary
  • 00:16:38
  • Lecture 2 :
  • Medusa
  • 00:16:22
  • Lecture 3 :
  • Hydra
  • 00:10:57
  • Lecture 4 :
  • John The Ripper
  • 00:11:00

Section 4 : Footprinting

  • Lecture 1 :
  • Practical - 1
  • 00:04:01
  • Lecture 2 :
  • Practical -2
  • 00:03:23
  • Lecture 3 :
  • Practical -3
  • 00:05:02

Section 5 : Scanning Networks

  • Lecture 1 :
  • Scanning -1
  • 00:05:08
  • Lecture 2 :
  • Scanning -2
  • 00:06:45
  • Lecture 3 :
  • Scanning -3
  • 00:05:11
  • Lecture 4 :
  • Scanning -4
  • 00:05:50
  • Lecture 5 :
  • Scanning -5
  • 00:04:50
  • Lecture 6 :
  • Practical - 1
  • 00:07:34
  • Lecture 7 :
  • Practical - 2
  • 00:07:36
  • Lecture 8 :
  • Practical - 3
  • 00:04:15
  • Lecture 9 :
  • Practical - 4
  • 00:09:12

Section 6 : Enumeration

  • Lecture 1 :
  • Enumeration-1
  • 00:06:19
  • Lecture 2 :
  • Enumeration-2
  • 00:07:02
  • Lecture 3 :
  • Enumeration-3
  • 00:08:09

Section 7 : System Hacking and Malware Threats

  • Lecture 1 :
  • Practical - 1
  • 00:03:57
  • Lecture 2 :
  • Practical - 2
  • 00:06:44
  • Lecture 3 :
  • Practical - 3
  • 00:04:32
  • Lecture 4 :
  • System Hacking - 1
  • 00:04:30
  • Lecture 5 :
  • System Hacking - 2
  • 00:04:34
  • Lecture 6 :
  • System Hacking - 3
  • 00:04:32
  • Lecture 7 :
  • System Hacking - 4
  • 00:04:33
  • Lecture 8 :
  • System Hacking - 5
  • 00:04:26

Section 8 : Sniffing - Man in the middle attack

  • Lecture 1 :
  • Sniffing Practical - 1
  • 00:03:13
  • Lecture 2 :
  • Sniffing Practical - 2
  • 00:03:18

Section 9 : DOS Attack (Denial Of Service)

  • Lecture 1 :
  • Denial Of Service -1
  • 00:04:15
  • Lecture 2 :
  • Denial Of Service -2
  • 00:02:46
  • Lecture 3 :
  • Denial Of Service -3
  • 00:03:34
  • Lecture 4 :
  • Denial Of Service -4
  • 00:02:57
  • Lecture 5 :
  • Dos Practical - 1
  • 00:04:34
  • Lecture 6 :
  • Dos Practical - 2
  • 00:06:11

Section 10 : Vulnerability Analysis Tools

  • Lecture 1 :
  • Golismero
  • 00:11:27
  • Lecture 2 :
  • Lynis
  • 00:10:33
  • Lecture 3 :
  • Nikto
  • 00:10:34
  • Lecture 4 :
  • Nmap
  • 00:13:15

Section 11 : Hacking Web Applications

  • Lecture 1 :
  • Web Hacking - 1
  • 00:02:18
  • Lecture 2 :
  • Web Hacking - 2
  • 00:02:27
  • Lecture 3 :
  • Web Hacking - 3
  • 00:02:41
  • Lecture 4 :
  • Web Hacking - 4
  • 00:03:22
  • Lecture 5 :
  • Burp Suite Setup
  • 00:16:54
  • Lecture 6 :
  • Burp Suite Practical
  • 00:16:31
  • Lecture 7 :
  • Skipfish
  • 00:11:55
  • Lecture 8 :
  • Wordpress Scan
  • 00:13:24

Section 12 : SQL Injection

  • Lecture 1 :
  • SQL Injection - 1
  • 00:03:16
  • Lecture 2 :
  • SQL Injection - 2
  • 00:04:03
  • Lecture 3 :
  • SQL Injection - 3
  • 00:03:28
  • Lecture 4 :
  • SQL Injection Practical - 1
  • 00:14:06
  • Lecture 5 :
  • SQL Injection Practical - 2
  • 00:13:17

Section 13 : Social Engineering

  • Lecture 1 :
  • Social Engineering - 1
  • 00:03:23
  • Lecture 2 :
  • Social Engineering - 2
  • 00:04:51
  • Lecture 3 :
  • Social Engineering - 3
  • 00:02:48

Section 14 : Database assessment / Database Hacking Practicals

  • Lecture 1 :
  • jSQL
  • 00:16:15
  • Lecture 2 :
  • SQLite Database
  • 00:11:20
  • Lecture 3 :
  • Sqlsus
  • 00:20:25

SUNIL GUPTA,

Ethical Hacker

Average Rating

4.7

Detail

5 Stars
40% Complete (success)
40%
4 Stars
60% Complete (success)
60%
3 Stars
0% Complete (success)
0%
2 Stars
0% Complete (success)
0%
1 Stars
0% Complete (success)
0%

Soumya Mondal

posted 1 months ago

A wonderful course about ethical hacking.

pooja pahuja

posted 1 months ago

Highly recommended, crisp and simple. One of the most easily understandable content I have come across.

Jatin Arora

posted 1 months ago

The best part about this course is that it kept me engaged all through. Not even once I felt what I am studying is irrelevant or got bored. Interactive, incomplex and comprehensible. Highly recommended.

Gupta Ridhima

posted 1 months ago

At Learnfly they Offer the best ethical hacking training with well defined training modules and course sessions. I had a very good experience as mentors of ethical hacking training helped in major project training, minor project training, live project preparation and so on. I overall had a great experience and planning to learn more from them.

modina .

posted 1 months ago

Highly impressed with the right style and attitude. A very well crafted and comprehensive approach. Knowledgeable and experienced trainer which is showcased perfectly in his lectures.

Students also may like