Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Ethical Hacking - Complete Course with Kali Linux, Penetration Testing, and Social Engineering

Sundeep Saradhi Kanthety via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn ethical hacking fundamentals through this comprehensive 16-hour course covering essential cybersecurity concepts, tools, and techniques. Master the differences between hacking and ethical hacking while exploring basic terminology and classifications of hackers including white hat, black hat, and gray hat categories. Set up your penetration testing environment by installing VMware Workstation 16 Pro and configuring virtual machines with Windows OS, Kali Linux, and Parrot Security OS. Navigate Kali Linux effectively using basic commands, sudo privileges, and package management with apt-get while installing specialized tools like Veil Framework and LOIC. Understand various types of hacking including password, website, and email attacks, plus explore malicious software categories such as viruses, exploits, and payloads. Discover network fundamentals including ports, packets, frames, and protocols like ARP, HTTP, TCP/IP, UDP, SMTP, SNMP, and POP. Practice hands-on penetration testing using industry-standard tools including Burp Suite for web application testing, Wireshark for network analysis, and Metasploit Framework for creating reverse shells and gaining system access. Execute advanced techniques like webcam access through Meterpreter shell commands and learn the complete phases of ethical hacking from reconnaissance and scanning to gaining access and clearing tracks. Explore social engineering attacks including phishing, baiting, and shoulder surfing while setting up DVWA (Damn Vulnerable Web Application) for practice. Conduct phishing attacks using the Social Engineering Toolkit, discover Wi-Fi passwords through command prompt techniques, and use Sherlock tool for social media account reconnaissance. Understand DoS and DDoS attacks while learning protective measures against social engineering threats to develop comprehensive cybersecurity skills for ethical penetration testing careers.

Syllabus

INTRODUCTION TO ETHICAL HACKING || WHAT IS ETHICAL HACKING || HACKING vs ETHICAL HACKING
BASIC TERMINOLOGY IN ETHICAL HACKING || HACKING TERMINOLOGY || ETHICAL HACKING
How to Download & Install VMware Workstation 16 Pro || Virtual Machines || VMware Installation
How to Download & Install WINDOWS OPERATING SYSTEM in VMware Workstation 16 Pro || WINDOWS OS
How to Download & Install Kali Linux in VMware Workstation 16 Pro || Kali Linux Installation
WHAT IS KALI LINUX? || WHAT IS THE IMPORTANCE OF KALI LINUX? || ETHICAL HACKING
COMMANDS IN KALI LINUX || BASIC COMMANDS IN KALI LINUX || ETHICAL HACKING
SUDO COMMAND IN KALI LINUX || WHAT IS SUDO COMMAND || ETHICAL HACKING || IMPORTANCE OF SUDO COMMAND
HOW TO INSTALL AND REMOVE TOOLS / PACKAGES IN KALI LINUX || ETHICAL HACKING || WHAT IS sudo apt-get
HOW TO INSTALL VEIL FRAMEWORK IN KALI LINUX || VEIL EVASION FRAMEWORK || ETHICAL HACKING
How to Add / Remove New User in Kali Linux || Add User to Sudoers Group || Ethical Hacking
TYPES OF HACKING || PASSWORD HACKING || WEBSITE HACKING || EMAIL HACKING || ETHICAL HACKING
TYPES OF HACKERS || WHITE HAT || BLACK HAT ||GRAY HAT ||CLASSIFICATION OF HACKERS || ETHICAL HACKING
TYPES OF MALICIOUS SOFTWARE || TYPES OF MALWARE || MALICIOUS CODE || VIRUS || ETHICAL HACKING
WHAT IS AN EXPLOIT IN CYBER SECURITY & TYPES OF EXPLOITS || ZERO DAY EXPLOIT || ETHICAL HACKING
WHAT IS PAYLOAD IN CYBER SECURITY & TYPES OF PAYLOADS || STAGE , STAGER , STAGED || ETHICAL HACKING
LOIC TOOL INSTALLATION || LOW ORBIT ION CANNON TOOL || DDos / DoS ATTACK TOOL || ETHICAL HACKING
DoS / DDoS ATTACKS IN CYBER SECURITY || Denial of Service || Distributed Denial of Service Attacks
PHASES OF ETHICAL HACKING || RECONNAISANCE , SCANNING , GAINING & MAINTAIN ACCESS , CLEARING TRACKS
WHAT IS BURP SUITE TOOL IN KALI LINUX || UNDERSTANDING WORKING OF BURP SUITE TOOL || ETHICAL HACKING
UNDERSTANDING NETWORK PORTS IN ETHICAL HACKING || TYPES OF PORTS IN COMPUTER || LOGICAL PORTS
PACKETS IN NETWORKING || UNDERSTANDING PACKETS IN NETWORKING || DATA || FRAMES
HOW TO GAIN ACCESS TO ANY SYSTEM USING VEIL & METASPLOIT FRAMEWORK ||REVERSE SHELL||ETHICAL HACKING
METERPRETER SHELL COMMANDS IN ETHICAL HACKING || SHUTDOWN || SYSINFO || REBOOT || UICTL || IPCONFIG
PROTOCOLS IN NETWORKING || TYPES OF PROTOCOLS || ARP || HTTP || TCP/IP || UDP || SMTP || SNMP || POP
WHAT IS WIRESHARK TOOL IN KALI LINUX || WORKING OF WIRESHARK TOOL IN WINDOWS OS || ETHICAL HACKING
HOW TO GAIN ACCESS OF LAPTOP CAMERA USING METERPRETER SHELL || WEBCAM COMMANDS || ETHICAL HACKING
Installing DVWA || How to Install and Setup Damn Vulnerable Web Application in Kali Linux
What is SOCIAL ENGINEERING ATTACK and Life Cycle of SOCIAL ENGINEERING ATTACKs || ETHICAL HACKING
Types of SOCIAL ENGINEERING ATTACKS (Baiting, Phishing, Shoulder Surfing etc. ) || ETHICAL HACKING
PHISHING ATTACK using SE Toolkit in KALI LINUX || SOCIAL ENGINEERING ATTACKS || ETHICAL HACKING
How to Protect Yourself from Social Engineering Attacks || Preventive Measures || Ethical Hacking
How to Find Wi-Fi Passwords using CMD prompt in Windows OS || Show Wi-Fi Password || Ethical Hacking
How to find Social Media Accounts with Sherlock || How to Install & Use Sherlock Tool in Kali Linux
How to Download & Install PARROT SECURITY OS in VMWare || Parrot OS for Ethical Hacking
ETHICAL HACKING COURSE IN 8 HOURS || KALI LINUX || PHISHING ATTACKS || VEIL || BURP SUITE || DVWA

Taught by

Sundeep Saradhi Kanthety

Reviews

Start your review of Ethical Hacking - Complete Course with Kali Linux, Penetration Testing, and Social Engineering

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.