- Accredited by CPD
- Instant e-certificate
- Fully online, interactive course with Professional voice-over
- Self paced learning and laptop, tablet, smartphone friendly
- 24/7 Learning Assistance
- Discounts on bulk purchases
Sneak Peek
Who should take the course
Anyone with a knack for learning new skills can take this Learn Ethical Hacking From A-Z: Beginner To Expert. While this comprehensive training is popular for preparing people for job opportunities in the relevant fields, it also helps to advance your career for promotions.Certification
Once you’ve successfully completed your course, you will immediately be sent a digital certificate. All of our courses are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.Accreditation
All of our courses, including this Learn Ethical Hacking From A-Z: Beginner To Expert, are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field.Course Curriculum
The detailed curriculum outline of our Learn Ethical Hacking From A-Z: Beginner To Expert is as follows: Learn Ethical Hacking From A-Z: Beginner To Expert Course Introduction- Course Overview
- About Your Instructors
- Section Overview
- Current Cybersecurity Market
- The 3 Types of Hackers
- The 4 Elements of Security
- Ethical Hacker Terminology
- Common Methods of Hacking
- Cybersecurity & Ethical Hacking Overview
- Ethical Hacking vs Penetration Testing
- Job Opportunities in Cybersecurity
- Who is This Course is For?
- Networking Section Overview
- How Data Travels Across The Internet
- Understanding Ports and Protocols
- Understanding IP Addresses: Public & Private
- What Are Subnets?
- The Average Network vs Remote Based
- Hacking Lab Section Overview
- Understanding Virtual Machines
- Setup Your Kali Linux Machine
- VN Setup & Testing Vulnerable Systems
- Linux+Python+Bash+Powershell Section Overview
- Linux Basics
- Working With Directories & Moving Files
- Installing & Updating Application Files
- Linux Text Editors
- Searching For Files
- Bash Scripting Basics
- Python Basics
- Remaining Anonymous Section Overview
- TOR Browser Overview
- Anonsurf Overview
- Changing Mac Addresses
- Using a Virtual Private Network/Server (VPN, VPS)
- WiFi Hacking Section Overview
- WiFi Hacking System Setup
- WEP Hacking Attack #1
- WEP Hacking Attack #2
- WPA/WPA2 Hacking
- Reconnaissance Section Overview
- Passive Recon vs Active Recon
- Recon-ng Overview
- Whois Enumeration
- DNS Enumeration Overview
- Netcraft.com DNS Information
- Google Hacking
- Shodan.io Overview
- Securityheaders.com (Analyze HTTPS Headers of website)
- Ssllabs.com/ssltest (Look for SSL issues on website)
- Pastebin.com (Sensitive Information)
- NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.)
- Netcat Overview + SMB/NFSEnumeration
- Nikto & Sparta Web Application Scanner
- SMPT Enumeration + Nessus/Openvas Scanners
- Launching Attacks Overview
- Analyzing Information Gathered
- Taking Advantage of Telenet
- Searching & Understanding Exploits
- Copy Exploits From Searchsploit
- Understanding Exploits
- Launching Exploits
- Brute Force Attacks
- How To Crack Passwords
- ARP Spoofing Overview
- Introduction To Cryptography
- Post Exploitation Section Overview
- Privilege Escalation
- Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus
- Installing a Keylogger
- Installing a Backdoor
- Website & Web Application Hacking Overview
- Web Application Scanning
- Directory Buster Hacking Tool
- Nikto Web App Hacking Tool
- SQLmap and SQL Ninja Overview
- How To Execute Brute Force Attacks
- Using Command Injection
- Malicious File Upload
- Local & Remote File Inclusion
- SQL Injection Overview
- Using Cross Site Request Forgery
- Cross Site Scripting Overview
- Mobile Phone Hacking Section Overview
- Mobile Attack Vectors
- Mobile Hacking Using URLs
- Jail Breaking and Rooting Considerations
- Privacy Issues (Geo Location)
- Mobile Phone Data Security
- Getting Your Name Out There Section Overview
- Building A Brand
- Personal Branding
- Setup Your Website and Blog
- Writing a Book
- Starting a Podcast
- Networking Overview
- Making Money Section Overview
- Bug Bounty Programs
- How To Start Freelancing
- How To Start Client Consulting
- Potential Salary & Cybersecurity Roadmap
- Books Recommendations
- Places to Practice Hacking for Free
Course Content
103 Lectures 11hr 51min
Learn Ethical Hacking From A-Z: Beginner To Expert - 0 lessons
No lessons available.
Course Introduction - 12 lessons
Course Overview
About Your Instructors
Section Overview
Current Cybersecurity Market
The 3 Types of Hackers
The 4 Elements of Security
Ethical Hacker Terminology
Common Methods of Hacking
Cybersecurity & Ethical Hacking Overview
Ethical Hacking vs Penetration Testing
Job Opportunities in Cybersecurity
Who is This Course is For?
Networking Basics - 6 lessons
Networking Section Overview
How Data Travels Across The Internet
Understanding Ports and Protocols
Understanding IP Addresses: Public & Private
What Are Subnets?
The Average Network vs Remote Based
Setting Up Your Hacking Lab - 4 lessons
Hacking Lab Section Overview
Understanding Virtual Machines
Setup Your Kali Linux Machine
VN Setup & Testing Vulnerable Systems
Linux/Python/Bash & PowerShell Basics - 8 lessons
Linux+Python+Bash+Powershell Section Overview
Linux Basics
Working With Directories & Moving Files
Installing & Updating Application Files
Linux Text Editors
Searching For Files
Bash Scripting Basics
Python Basics
How To Remain Anonymous On The Web - 5 lessons
Remaining Anonymous Section Overview
TOR Browser Overview
Anonsurf Overview
Changing Mac Addresses
Using a Virtual Private Network/Server (VPN, VPS)
How To Hack Into WIFI - 5 lessons
WiFi Hacking Section Overview
WiFi Hacking System Setup
WEP Hacking Attack #1
WEP Hacking Attack #2
WPA/WPA2 Hacking
Passive & Active Reconnaissance (Information Gathering) - 15 lessons
Reconnaissance Section Overview
Passive Recon vs Active Recon
Recon-ng Overview
Whois Enumeration
DNS Enumeration Overview
Netcraft.com DNS Information
Google Hacking
Shodan.io Overview
Securityheaders.com (Analyze HTTPS Headers of website)
Ssllabs.com/ssltest (Look for SSL issues on website)
Pastebin.com (Sensitive Information)
NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.)
Netcat Overview + SMB/NFSEnumeration
Nikto & Sparta Web Application Scanner
SMPT Enumeration + Nessus/Openvas Scanners
Launching Attacks - 11 lessons
Launching Attacks Overview
Analyzing Information Gathered
Taking Advantage of Telenet
Searching & Understanding Exploits
Copy Exploits From Searchsploit
Understanding Exploits
Launching Exploits
Brute Force Attacks
How To Crack Passwords
ARP Spoofing Overview
Introduction To Cryptography
Post Exploitation - 5 lessons
Post Exploitation Section Overview
Privilege Escalation
Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus
Installing a Keylogger
Installing a Backdoor
Website & Web Application Hacking - 12 lessons
Website & Web Application Hacking Overview
Web Application Scanning
Directory Buster Hacking Tool
Nikto Web App Hacking Tool
SQLmap and SQL Ninja Overview
How To Execute Brute Force Attacks
Using Command Injection
Malicious File Upload
Local & Remote File Inclusion
SQL Injection Overview
Using Cross Site Request Forgery
Cross Site Scripting Overview
Mobile Phone Hacking & Security - 6 lessons
Mobile Phone Hacking Section Overview
Mobile Attack Vectors
Mobile Hacking Using URLs
Jail Breaking and Rooting Considerations
Privacy Issues (Geo Location)
Mobile Phone Data Security
Getting Your Name Out There As An Ethical Hacker - 7 lessons
Getting Your Name Out There Section Overview
Building A Brand
Personal Branding
Setup Your Website and Blog
Writing a Book
Starting a Podcast
Networking Overview
How To Make Money As An Ethical Hacker - 4 lessons
Making Money Section Overview
Bug Bounty Programs
How To Start Freelancing
How To Start Client Consulting
How To Start A Career In Cybersecurity - 3 lessons
Potential Salary & Cybersecurity Roadmap
Books Recommendations
Places to Practice Hacking for Free