The Complete Ethical Hacking Course for 2020!
Gain the knowledge hackers use to compromise systems and use it to protect your own!
Watch Promo
If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world! Join us now and receive over 80 lectures & 15 hours of HD video, and 1 on 1 assistance from experienced network security professionals! We will cover the following topics in this course:
- Introduction to ethical hacking
- Linux installation, terminal basics, and Wireshark Setup
- Staying anonymous online, proxy servers, and accessing the dark side of the internet using TOR
- Aircrack-ng, HashCat, and wifi hacking
- Defending your own networks from attacks
- Cloning websites
- Arduino USB keylogger that works out of the box for Windows 7, 8, 8.1, and 10
- Windows power shell scripting
This course will receive monthly updates based on students requests, and our goal is to make this the #1 network security course online!
DISCLAIMER The attacks demonstrated in this course can cause serious damage and are only shown for educational purposes. The intent of this course is to give you the tools to defend your own networks, share skills that are valuable to companies all over the world, and help you to better understand the challenges that information security professionals face on a daily basis.
English & Spanish subtitles available.
Thank you for taking the time to read this, and we hope to see you in the course!
Your Instructor
Strongly motivated young IT expert, Linux enthusiast with a passion for troubleshooting network related problems. With an exceptional eye for details and a sense of urgency when it comes down to problem solving.
Course Curriculum
-
StartCreate a USB for Installation (10:10)
-
StartInstallation Procedure Part 1 (11:17)
-
StartInstallation Procedure Part 2 (6:22)
-
StartImprove safety and anonymity of your browser (7:08)
-
StartFedora KDE Desktop Orientation (optional) (14:44)
-
StartTerminal Basics Part 1 (16:03)
-
StartTerminal Basics Part 2 (11:46)
-
StartWireshark Setup Part 1 (5:02)
-
StartWireshark Setup Part 2 (7:54)
-
StartHow to connect to the Internet via proxy Part 1 (17:47)
-
StartHow to connect to the Internet via proxy Part 2 (2:50)
-
StartHow to set up a proxy server for traffic monitoring Part 1 (19:52)
-
StartHow to setup a proxy server for traffic monitoring Part 2 (9:55)
-
StartHow to setup a proxy server for traffic monitoring Part 3 (14:39)
-
StartHow to setup a proxy server for traffic monitoring Part 4 (19:04)
-
StartHow to setup a proxy server for traffic monitoring Part 5 (9:23)
-
StartHow to connect to a VPN (7:48)
-
StartHow to setup your own VPN server Part 1 (10:14)
-
StartHow to setup your own VPN server Part 2 (9:23)
-
StartHow to setup your own VPN server Part 3 (13:33)
-
StartHow to setup your own VPN server Part 4 (5:58)
-
StartMonitor VPN server traffic (9:45)
-
StartTor Browser (11:21)
-
StartHow to setup a tor relay Part 1 (18:32)
-
StartHow to setup a tor relay Part 2 (5:44)