This free ethical hacking course is designed to guide you through the ethical hacking process, with hands-on demonstrations to strengthen your understanding. You’ll learn key topics such as Web Application, Mobile Application, and Network Application security. You will also learn about the common vulnerabilities, ethical hacking strategies, Android-based attacks, and network attack methodologies. A major focus is on Web Application security, where you’ll work with bWAPP to explore its architecture, functionality, and importance. Using Kali Linux, you'll tackle real-world challenges like broken authentication, blind SQL injections, and cross-site scripting vulnerabilities. By the end of the course, you’ll have the skills and knowledge to effectively approach ethical hacking across multiple domains, laying a solid foundation for implementing secure cybersecurity practices.
Overview
Syllabus
- What is Hacking?
- This module covers a fundamental concept – hacking. You will understand what hacking is and its three types: black hat, white hat, and grey hat hackers. Lastly, you will also get familiar with ethical and unethical hacking.
- Goals of Ethical Hacking
- In this module, you will learn the goals of ethical hacking. You will understand how ethical hacking is legal and adapted by many organizations.
- Skills and Tools required for Ethical Hackers
- The learner will learn about various skills to be pursued by ethical hackers. The learners will also get to know about tools used by ethical hackers.
- Process of Ethical Hacking - Demonstration
- The process of ethical hacking is demonstrated with an example.
- Process of Ethical Hacking - Demonstration Part 2
- The process of ethical hacking is demonstrated with an example
- Ethical Hacking across Domains
- The learner will understand the importance of ethical hacking across various domains such as web application environment, network architecture, mobile applications, etc.
- Domains under Ethical Hacking
- The learner will learn about various domains under ethical hacking, such as web applications, network architecture, etc.
- Web Application Domain: Common Attacks
- The learner will get familiar with common web application attacks, injection flaws, cross-site scripting, and web services attacks.
- Web Application Domain: Hacking Methodology
- The learners will learn about hacking methodologies such as web footprinting, vulnerability scanners, identifying entry points, and attack surface.
- Mobile Application Domain: Types of Android Attacks
- The learner will be able to understand types of android attacks such as untrusted APKs, SMS, Email, Spying, App sandboxing issues, and rooting.
- Network Application Domain: Types of Network Attacks
- The learner will be able to understand endpoint attacks, malware attacks, vulnerabilities, and exploits.
- Network Application Domain: Examples
- The learner will understand DDoS attacks in this section.
- Demonstration - SQL Injection
- SQL Injection process is demonstrated in this section.
- Why are Web Applications a Target
- The learner will be able to analyze why web applications are subjected to hacking.
- What is bWAPP?
- bWAPP stands for a buggy web application, an insecure web application that includes vulnerabilities.
- bWAPP Architecture
- bWAPP architecture is discussed in this section. bWAPP is an open-source PHP application.
- bWAPP Features
- The significant features of bWAPP are discussed in this section.
- Why should you learn bWAPP?
- The learners will understand why ethical hackers need to learn bWAPP.
- Kali Linux
- Kali Linux is an operating system that focuses on security and we will be exploring that in this module.
- Demonstration - Web Application attack: Broken Authentication
- Web application attack such as broken authentication is demonstrated in this section.
- Demonstration - Web Application attack: Blind SQL Injections
- Web application attacks such as blind SQL injections are demonstrated in this section.
- Demonstration - Web Application attack: Cross site scripting
- Web application attack such as cross-site scripting is demonstrated in this section.
- Computer Security Threats
- Hacking occurs because of computer security threats such as computer viruses, computer worms, scareware, keylogger, adware, malware, backdoor, trojan, ransomware, and spyware.
- Process of Ethical Hacking
- This module covers the ethical hacking process, such as information gathering, scanning, gaining and maintaining access, clearing tracks, and reporting.
- Web Application Domain
- Around 75% of the total attacks are on web application domains.
- Mobile Application Domain
- The learner will understand how attackers can easily compromise the mobile network due to vulnerabilities.
- Tap Jacking
- The learner will be able to understand tap jacking with an example.
- Network Application Domain
- The learner will be able to understand network attacks and their types, i.e., active and passive attacks.
- Other Domains
- Domains such as cloud computing, IoT, Blockchain, and edge computing are discussed in this section.
- Web and Mobile Application Security
- In this module you will learn web applications which is prime target for attackers, its common threats and the importance of web application firewalls. We will also cover mobile-specific attack vectors and strategies for securing mobile applications.
Reviews
5.0 rating, based on 1 Class Central review
4.5 rating at Great Learning based on 11968 ratings
Showing Class Central Sort
-
The “Introduction to Ethical Hacking” course from Great Learning provides a clear and structured overview of core cybersecurity concepts. The explanations are easy to follow, and the modules introduce practical fundamentals such as reconnaissance, system security, threat analysis, and defensive best practices. This course is very useful for beginners who want to build a strong foundation before moving to more advanced ethical hacking topics.