• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

The Complete Ethical Hacking Course

The Complete Ethical Hacking Course

By Janets

4.7(160)
  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 18 hours 13 minutes

  • All levels

Description

Register on the The Complete Ethical Hacking Course today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career.

The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials.

Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion.

The The Complete Ethical Hacking Course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones.

The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly!

What You Get With The The Complete Ethical Hacking Course

  • Receive a e-certificate upon successful completion of the course

  • Get taught by experienced, professional instructors

  • Study at a time and pace that suits your learning style

  • Get instant feedback on assessments

  • 24/7 help and advice via email or live chat

  • Get full tutor support on weekdays (Monday to Friday)

Course Design

The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.

You are taught through a combination of

  • Video lessons

  • Online study materials

Certification

Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99.

Who Is This Course For:

The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge.

Requirements:

The online training is open to all students and has no formal entry requirements. To study the The Complete Ethical Hacking Course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. 

Course Content

Introduction to Ethical Hacking

What is an Ethical Hacker

00:07:00

Terminology Crash Course pt. 1

00:09:00

Terminology Crash Course pt. 2

00:14:00

Terminology Crash Course pt. 3

00:08:00

Legal Considerations

00:11:00

Reconnaissance - Surveying the Attack Surface

Surveying the Attack Surface

00:10:00

Recon Types

00:08:00

Passive Recon Part 1

00:07:00

Passive Recon Part 2

00:10:00

Active Recon

00:15:00

Recon Walkthrough Tools Summary

00:14:00

Maltego Demo

00:07:00

FOCA Demo

00:05:00

DEMO - Harvester

00:02:00

Scanning and Enumeration - Getting Down to Business

Scanning & enumeration

00:08:00

Identifying Active Hosts pt. 1

00:10:00

Identifying Active Hosts pt. 2

00:13:00

Identifying Active Services

00:18:00

OS and Services Fingerprinting

00:15:00

Network Mapping

00:10:00

Final Thoughts

00:05:00

DEMO - Nmap Syntax pt. 1

00:14:00

DEMO - Nmap Syntax pt. 2

00:16:00

DEMO - Nmap Hosts Discovery

00:12:00

DEMO - Nmap Service Discovery

00:17:00

DEMO - Nmap Scripts

00:11:00

DEMO - Masscan

00:11:00

Network Presence

Network Insecurity

00:04:00

Sniffing and Spoofing

00:13:00

Sniffing Tools

00:09:00

Spoofing, Crypto and Wifi

00:15:00

DEMO - tcpdump

00:11:00

DEMO - Wireshark

00:11:00

DEMO - Ettercap

00:13:00

DEMO - Burp Suite

00:15:00

DEMO - Scapy

00:10:00

Attacking

Security Overview pt. 1: Windows Architecture

00:18:00

Security Overview pt. 2: Credentials Security

00:16:00

Security Overview pt. 3: Memory Corruption and Exploitation

00:16:00

Windows Hacking Basics

00:20:00

Local Access and Privilege Escalation

00:20:00

Dumping Hashes and Cracking Passwords

00:18:00

Linux Attacking Basics pt. 1

00:13:00

Linux Attacking Basics pt. 2

00:14:00

References

00:08:00

DEMO - Windows MSF Exploit pt. 1

00:13:00

DEMO - Windows MSF Exploit pt. 2

00:15:00

DEMO - Post Exploitation Activities

00:13:00

DEMO - Mimikatz

00:07:00

DEMO - Hashcat

00:08:00

DEMO - Konboot

00:13:00

DEMO - Post Exploitation Windows CMD

00:14:00

DEMO - Post Exploitation Windows Powershell

00:13:00

DEMO - Attacking Linux targets pt. 1aa

00:10:00

DEMO - Attacking Linux targets pt. 1

00:13:00

Web Hacking

Introduction to Web Hacking

00:03:00

Web Security Architecture Overview pt. 1

00:17:00

Web Security Architecture Overview pt. 2

00:12:00

Attacking the Web Server pt. 1

00:10:00

Attacking the Web Server pt. 2

00:11:00

Attacking the Platform pt. 1

00:19:00

Attacking the Platform pt. 2

00:08:00

Attacking the Technology pt. 1

00:21:00

Attacking the Technology pt. 2

00:17:00

OWASP Top 10 pt. 1

00:09:00

OWASP Top 10 pt. 2

00:21:00

Attacking the Business Logic pt. 1

00:11:00

Attacking the Business Logic pt. 2

00:15:00

Tools and Methodology

00:20:00

References

00:05:00

DEMO - OWASP Mutillidae

00:09:00

SQLI

00:07:00

SQL Map Intro

00:08:00

SQL Map

00:25:00

DEMO - Burpsuite

00:37:00

DEMO - Burpsuite XSS Hunter

00:16:00

DEMO - mitmproxy

00:10:00

DEMO - Skipfish pt.1

00:05:00

DEMO - Skipfish pt.2

00:05:00

Social Engineering - Hacking Humans

Social Engineering Basics

00:15:00

Social Engineering Methods

00:16:00

Tools and Techniques pt. 1

00:15:00

Tools and Techniques pt. 2

00:12:00

Tools and Techniques pt. 3

00:09:00

Physical Security Considerations

00:13:00

Final Thoughts99

00:11:00

DEMO - Credential harvesting

00:02:00

DEMO - Website cloning

00:06:00

DEMO - Automating an attack

00:03:00

DEMO - Anti-virus evasion pt. 1

00:08:00

DEMO - Anti-virus evasion pt. 2

00:12:00

Frequently Asked Questions

Are there any prerequisites for taking the course?

There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.

Can I access the course at any time, or is there a set schedule?

You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.

How long will I have access to the course?

For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.

Is there a certificate of completion provided after completing the course?

Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.

Can I switch courses or get a refund if I'm not satisfied with the course?

We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.

How do I track my progress in the course?

Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.

What if I have technical issues or difficulties with the course?

If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

About The Provider

Janets
Janets
London
4.7(160)
Janets is an online platform where learners come to learn, and evolve. From the very beginning, the aim of this platform was to create an ever-growing community of avid learners instead of just delivering formulaic education. Emphasising on making the learners equipped for the fu...
Read more about Janets

Tags

Reviews