Learn Ethical Hacking From Scratch

User Avatar
(23 reviews)
All levels
138
12.5 hours
90283
$195.00 $99.00

How to become an Ethical Hacker

Do you want to become a hacker? Do you want to secure your website or mobile app? How about launching a new career in the world of professional penetration testing or ethical hacking? If so, this is the course for you.

This course is designed for beginners with no previous knowledge who want to become hackers. The great news is that you don’t need prior programming or hacking knowledge – I assume you’re starting from scratch and by the end of the course you’ll be at an intermediate level, being able to hack systems like black-hat hackers and secure them like security experts.

The difference is, you’ll be doing it for the good of your company or clients. Plus, you’ll benefit from the recognition that comes with being skilled in this high-demand field.

Learn Ethical Hacking From Scratch course content

Lean Network hacking fundamentals
Learn Website hacking fundamentals
Learn server-side and client-side attacks fundamentals
Learn Post exploitation fundamentals

Why is this course so in demand?

Lifetime access to course materials and videos
Set the pace of your own study
Learn the way that best suits you
Get answers from our Support Team within 15 hours
Verifiable zSecurity certificate of completion
Unlimited updates to course materials and videos

Plus! Free 1-month VIP membership with:

Live mentoring and Q&A session with course instructor and CTO, Zaid
Instant support from community members through our private discord channel
Daily updates with the latest tutorials and news from the hacking world
Daily resources like CTFs, bug bounty programs, onion services and more
Access our VIP community and connect with like-minded people
Discounts and offers on other zSecurity products and services

Here's how it works

This course is highly practical but it won’t neglect the theory; we’ll start with ethical hacking basics, breakdown the different penetration testing fields and install the needed software (on Windows, Linux and Mac OS X), then we’ll dive and start hacking straight away. You’ll learn everything by example, by analyzing and exploiting different systems such as networks, servers, clients, websites …..etc, we’ll never have any boring dry theoretical lectures.

The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you’ll first learn the fundamentals of the target system, its weaknesses and how to practically exploit theses weaknesses to hack into this system.

By the end of the course you will have a strong foundation in most hacking or penetration testing fields. You’ll also learn how to detect, prevent and secure systems and yourself from the discussed attacks.

All the techniques in this course are practical and work against real systems, you’ll understand the whole mechanism of each technique first, then you’ll learn how to use it to hack into the target system, by the end of the course you’ll be able to modify these techniques to launch more powerful attacks, and adopt them to suit different situations and different scenarios.

What do you need to complete the Learn Ethical Hacking From Scratch course?

Basic Information Technology knowledge
No Linux, programming or hacking knowledge
Computer with a minimum of 4GB RAM/Memory
Operating System: Windows / OS X / Linux
WiFi cracking (10 lectures ONLY): WiFi adapter supporting monitor mode
$195.00 $99.00

Reviews

5
23 ratings
5
96%
4
4%
3
0%
2
0%
1
0%
  • SupremeEthan2708

    Hacking

    Great course by Zaid. Course explains deeply on each topic and covers things the average user would not be able to find. So glad I wondered upon the zsecurity Youtube page. Without it I don't think I would of ever gotten an interest in hacking and cyber security.

  • Pierpaolo

    Nice course

    course explained very well, it is not a waste of money.

Curriculum

  • Introduction 3

  • Setting up a Hacking Lab 3

    • Lecture2.1
      Lab Overview & Needed Software 03 min
    • Lecture2.2
      Installing Kali 2020 As a Virtual Machine 11 min
    • Lecture2.3
      Creating & Using Snapshots 06 min
  • Linux Basics 2

    • Lecture3.1
      Basic Overview of Kali Linux 05 min
    • Lecture3.2
      The Terminal & Linux Commands 11 min
  • Network Hacking 5

  • Network Hacking - Pre Connection Attacks 2

    • Lecture5.1
      Packet Sniffing Basics 06 min
    • Lecture5.2
      WiFi Bands – 2.4Ghz & 5Ghz Frequencies 08 min
  • Network Hacking - Gaining Access - WEP Cracking 2

    • Lecture6.1
      Targeted Packets Sniffing 10 min
    • Lecture6.2
      Deauthentication Attack (Disconnection Any Device From The Network) 07 min
  • Network Hacking - Gaining Access (WEP/WPA/WPA2 Cracking) 2

    • Lecture7.1
      Gaining Access Introduction 01 min
    • Lecture7.2
      Theory Behind Cracking WEP Encryption 06 min
  • Network Hacking - Gaining Access - WPA / WPA2 Cracking 6

    • Lecture8.1
      WEP Cracking Basics 06 min
    • Lecture8.2
      Fake Authentication 06 min
    • Lecture8.3
      ARP Request Replay Attack 06 min
    • Lecture8.4
      Introduction to WPA and WPA2 Cracking 04 min
    • Lecture8.5
      Hacking WPA & WPA2 Without a Wordlist 10 min
    • Lecture8.6
      Capturing The Handshake 07 min
  • Network Hacking - Gaining Access - Security 4

    • Lecture9.1
      Creating a Wordlist 07 min
    • Lecture9.2
      Cracking WPA and WPA2 Using a Wordlist Attack 06 min
    • Lecture9.3
      Securing Your Network From Hackers
    • Lecture9.4
      Configuring Wireless Settings for Maximum Security 06 min
  • Network Hacking - Post Connection Attacks 1

  • Network Hacking - Post-Connection Attacks - Information Gathering 4

    • Lecture11.1
      Installing Windows As a Virtual Machine 03 min
    • Lecture11.2
      Discovering Devices Connected to the Same Network 08 min
    • Lecture11.3
      Gathering Sensitive Info About Connected Devices (Device name, Ports…etc) 07 min
    • Lecture11.4
      Gathering More Sensitive Info (Running Services, Operating System…etc) 08 min
  • Network Hacking - Post Connection Attacks - MITM Attacks 17

    • Lecture12.1
      What is ARP Poisoning ? 09 min
    • Lecture12.2
      Intercepting Network Traffic 06 min
    • Lecture12.3
      Bettercap Basics 08 min
    • Lecture12.4
      ARP Spoofing Using Bettercap 08 min
    • Lecture12.5
      Spying on Network Devices (Capturing Passwords, Visited Websites…etc) 05 min
    • Lecture12.6
      Creating Custom Spoofing Script 10 min
    • Lecture12.7
      MITM – Understanding HTTPS & How to Bypass it 06 min
    • Lecture12.8
      Bypassing HTTPS 07 min
    • Lecture12.9
      Bypassing HSTS 10 min
    • Lecture12.10
      DNS Spoofing – Controlling DNS Requests on The Network 11 min
    • Lecture12.11
      MITM – Injecting Javascript Code 10 min
    • Lecture12.12
      Wireshark – Basic Overview & How To Use It With MITM Attacks 09 min
    • Lecture12.13
      Wireshark – Sniffing & Analysing Data 05 min
    • Lecture12.14
      Wireshark – Using Filters, Tracing & Dissecting Packets 06 min
    • Lecture12.15
      Wireshark – Capturing Passwords & Cookies Entered By Any Device In The Network 08 min
    • Lecture12.16
      Creating a Fake Access Point (Honeypot) – Theory 09 min
    • Lecture12.17
      Creating a Fake Access Point (Honeypot) – Practical 10 min
  • Network Hacking - Detection & Security 4

  • Gaining Access To Computer Devices 1

  • Gaining Access - Server Side Attacks 8

    • Lecture15.1
      Installing Metasploitable As a Virtual Machine 06 min
    • Lecture15.2
      Introduction to Server-Side Attacks 04 min
    • Lecture15.3
      Basic Information Gathering & Exploitation 10 min
    • Lecture15.4
      Hacking a Remote Server Using a Basic Metasploit Exploit 07 min
    • Lecture15.5
      Exploiting a Code Execution Vulnerability to Hack into a Remote Server 10 min
    • Lecture15.6
      Nexpose – Installing Nexpose 10 min
    • Lecture15.7
      Nexpose – Scanning a Target Server For Vulnerabilities 09 min
    • Lecture15.8
      Nexpose – Analyzing Scan Results & Generating Reports 08 min
  • Gaining Access - Client Side Attacks 9

  • Gaining Access - Client Side Attacks - Social Engineering 19

    • Lecture17.1
      Introduction to Social Engineering 03 min
    • Lecture17.2
      Maltego Basics 07 min
    • Lecture17.3
      Discovering Websites, Links & Social Networking Accounts Associated With The Target 07 min
    • Lecture17.4
      Discovering Twitter Friends & Associated Accounts 05 min
    • Lecture17.5
      Discovering Emails Of The Target’s Friends 04 min
    • Lecture17.6
      Analyzing The Gathered Info & Building An Attack Strategy 09 min
    • Lecture17.7
      Backdooring Any File Type (images,pdf’s …etc) 05 min
    • Lecture17.8
      Compiling & Changing Trojan’s Icon 06 min
    • Lecture17.9
      Spoofing .exe Extension To Any Extension (jpg, pdf …etc) 08 min
    • Lecture17.10
      Spoofing Emails – Setting Up an SMTP Server 07 min
    • Lecture17.11
      Email Spoofing – Sending Emails as Any Email Account 12 min
    • Lecture17.12
      Email Spoofing – Method 2 08 min
    • Lecture17.13
      BeEF Overview & Basic Hook Method 11 min
    • Lecture17.14
      BeEF – Hooking Targets Using Bettercap 03 min
    • Lecture17.15
      BeEF – Running Basic Commands On Target 04 min
    • Lecture17.16
      BeEF – Stealing Credentials/Passwords Using A Fake Login Prompt 02 min
    • Lecture17.17
      BeEF – Hacking Windows 10 Using a Fake Update Prompt 04 min
    • Lecture17.18
      Detecting Trojans Manually 05 min
    • Lecture17.19
      Detecting Trojans Using a Sandbox 03 min
  • Gaining Access - Using The Above Attacks Outside The Local Network 4

    • Lecture18.1
      Overview Of The Setup 06 min
    • Lecture18.2
      Ex1 – Generating a Backdoor That Works Outside The Network 05 min
    • Lecture18.3
      Configuring The Router To Forward Connections To Kali 07 min
    • Lecture18.4
      Ex2 – Using BeEF Outside The Network 06 min
  • Post Exploitation 8

    • Lecture19.1
      Introduction to Post Exploitation 02 min
    • Lecture19.2
      Meterpreter Basics 06 min
    • Lecture19.3
      File System Commands 05 min
    • Lecture19.4
      Maintaining Access – Basic Methods 05 min
    • Lecture19.5
      Maintaining Access – Using a Reliable & Undetectable Method 07 min
    • Lecture19.6
      Spying – Capturing Key Strikes & Taking Screen Shots 03 min
    • Lecture19.7
      Pivoting – Theory (What Is Pivoting) 07 min
    • Lecture19.8
      Pivoting – Using a Hacked System to Hack Into Other Systems 08 min
  • Website Hacking 2

  • Website Hacking - Information Gathering 7

    • Lecture21.1
      Gathering Basic Information Using Whois Lookup 06 min
    • Lecture21.2
      Discovering Technologies Used On The Website 06 min
    • Lecture21.3
      Gathering Comprehensive DNS Information 10 min
    • Lecture21.4
      Discovering Websites On The Same Server 04 min
    • Lecture21.5
      Discovering Subdomains 05 min
    • Lecture21.6
      Discovering Sensitive Files 07 min
    • Lecture21.7
      Analyzing Discovered Files 04 min
  • Website Pentesting - File Upload, Code Execution & File Inclusion Vulns 6

    • Lecture22.1
      Discovering & Exploiting File Upload Vulnerabilities To Hack Websites 07 min
    • Lecture22.2
      Discovering & Exploiting Code Execution Vulnerabilities To Hack Websites 07 min
    • Lecture22.3
      Discovering & Exploiting Local File Inclusion Vulnerabilities 05 min
    • Lecture22.4
      Remote File Inclusion Vulnerabilities – Configuring PHP Settings 04 min
    • Lecture22.5
      Remote File Inclusion Vulnerabilities – Discovery & Exploitation 06 min
    • Lecture22.6
      Preventing The Above Vulnerabilities 07 min
  • Website Pentesting - SQL Injection Vulnerabilities 11

    • Lecture23.1
      What is SQL 06 min
    • Lecture23.2
      Dangers of SQL Injection Vulnerabilities 03 min
    • Lecture23.3
      Discovering SQL Injections In POST 08 min
    • Lecture23.4
      Bypassing Logins Using SQL injection 05 min
    • Lecture23.5
      Discovering SQL Injections In GET 07 min
    • Lecture23.6
      Reading Database Information 05 min
    • Lecture23.7
      Finding Database Tables 03 min
    • Lecture23.8
      Extracting Sensitive Data From The Database (Such As Password, User Info…etc) 04 min
    • Lecture23.9
      Reading & Writing Files On The Server Using SQL Injection Vulnerability 06 min
    • Lecture23.10
      Discovering SQL Injections & Extracting Data Using SQLmap 07 min
    • Lecture23.11
      The Right Way To Prevent SQL Injection 05 min
  • Website Hacking - Cross Site Scripting Vulnerabilities 5

    • Lecture24.1
      Introduction to Cross Site Scripting? 03 min
    • Lecture24.2
      Discovering Reflected XSS 04 min
    • Lecture24.3
      Discovering Stored XSS 03 min
    • Lecture24.4
      Exploiting XSS – Hooking Vulnerable Page Visitors To BeEF 05 min
    • Lecture24.5
      Preventing XSS Vulnerabilities 05 min
  • Website Pentesting - Discovering Vulnerabilities Automatically Using OWASP ZAP 2

    • Lecture25.1
      Automatically Scanning Target Website For Vulnerabilities 04 min
    • Lecture25.2
      Analyzing Scan Results 04 min
  • Bonus Section 1

    • Lecture26.1
      Bonus Lecture – What’s Next?

Your instructor

Zaid Sabih

Ethical Hacker, Pentester & Computer Scientist

Zaid Al-Quraishi is an ethical hacker, computer scientist, and founder of zSecurity. He studied Computer Science at University College Dublin, graduating May 2016. Zaid has a strong background and experience in ethical hacking, starting with video tutorials in 2009 in an ethical hacking community, iSecur1ty.org. He also worked as a penetration tester (pentester) for this company. In 2013 he started teaching his first course online in Arabic which received extremely positive feedback. This motivated him to create an English version of the course. The English course became the most popular and top paid course on Udemy for almost a year, which further motivated Zaid to design and teach more courses on ethical hacking. He now offers a number of courses on ethical hacking and more than 200,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity. Zaid says: "I just love hacking and breaking the rules but don't get me wrong, I am an ethical hacker!"