• Course Categories
    • Business
    • Finance
    • Personal Development
    • Productivity
    • Marketing
    • Trading
    • Design
    • Health & Fitness
    • Languages
    • Videography
    • Photography
    • Web Development
  • Cart
  • Gift Bundles
  • Popular courses
  • All Courses
  • All Access Pass
      • Sign UpLogin
    Edplx Online CoursesEdplx Online Courses
    • Course Categories
      • Business
      • Finance
      • Personal Development
      • Productivity
      • Marketing
      • Trading
      • Design
      • Health & Fitness
      • Languages
      • Videography
      • Photography
      • Web Development
    • Cart
    • Gift Bundles
    • Popular courses
    • All Courses
    • All Access Pass
    • Browse
    • Cart
    • All Access Pass
      • Sign UpLogin
      • Build
      • Business
      • Finance
      • Personal Development
      • Productivity
      • Marketing
      • Trading
      • Create
      • Design
      • Health & Fitness
      • Languages
      • Photography
      • Videography
      • Web Development
      • All Courses
      • Gift Bundles
      • Popular Courses
      • Live Courses

      Technology

      • Home
      • All courses
      • Technology
      • Certified Ethical Hacking Course

      Certified Ethical Hacking Course

      Admin bar avatar
      admin
      Technology
      £99.00
      Buy Membership
      Ethicle-Haking
      • Overview
      • Curriculum

      Course Overview

      If you would like to learn ethical hacking in 2020, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux and Python hacking with over 28 hours of HD video tutorials! We will cover the following topics in this course:

      • How to setup a Kali Linux system
      • Essential Linux system commands
      • How to create a secure penetration testing environment
      • Footprinting
      • Scanning
      • Website penetration testing
      • WPA2 wireless network cracking
      • Man in the middle attacks
      • System hacking
      • Python programming fundamentals
      • Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)
      • Tips for building a career in cyber security

      This course was designed for absolute beginners, so no previous ethical hacking or programming knowledge is necessary.

      Why choose this course?

      •     Internationally recognised accredited qualification
      •     Access to our free career advisors
      •     Over 95% pass rate
      •     1 year accessibility to the course
      •     Attain PDF or hardcopy certificate to show employers 
      •     Comprehensive Syllabus to kick start your career 
      •     Study at your own pace anywhere 
      •     Employer has access to certificate validation 
      •     Tutor Support available
      •     Invitation to future job fairs

      Course Curriculum

      This Course will cover some of the following topics:-

      • How to setup a Kali Linux system
      • Essential Linux system commands, 
      • How to create a secure penetration testing environment, 
      • Footprinting, 
      • Scanning, 
      • Website penetration testing, 
      • WPA2 wireless network cracking, 
      • Man in the middle attacks, 
      • System hacking, 
      • Python programming fundamentals, 
      • Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer), 
      • Tips for building a career in cyber security 

      and much more.

      Who is this Course for

      This course is suitable for absolute beginners, so no previous ethical hacking or programming knowledge is necessary.

      Career Path 

      This training course will lead you to many different career opportunities, Here are few prospects:

      • Ethical Hacker- £52,121 per annum 
      • Information security manager – £49,985 per annum
      • Information security analyst – £33,317 per annum
      • Chief information security officer – £85,497 per annum
      • Software developer – £30,661 per annum

      Course Features

      • Lectures 148
      • Quizzes 0
      • Duration 28h 44m
      • Skill level All levels
      • Language English
      • Students 767
      • Certificate Yes
      • Assessments Yes
      CoursesTechnologyCertified Ethical Hacking Course
      • Introduction and Installation 4

        • Lecture1.1
          Introduction to the course 05 min
        • Lecture1.2
          VirtualBox installation 16 min
        • Lecture1.3
          Kali Linux installation 14 min
        • Lecture1.4
          Enabling full-screen 18 min
      • Basic Linux Commands 3

        • Lecture2.1
          Basic commands part 1 10 min
        • Lecture2.2
          Basic commands part 2 21 min
        • Lecture2.3
          Basic commands part 3 13 min
      • Creating a Secure Hacking Environment 6

        • Lecture3.1
          Changing IP address and wireless adapter setup 05 min
        • Lecture3.2
          Creating a bootable Kali USB drive 05 min
        • Lecture3.3
          Essential networking terms 10 min
        • Lecture3.4
          Essential hacking terms 18 min
        • Lecture3.5
          Additional Kali tools to install 09 min
        • Lecture3.6
          Changing our MAC address with macchanger 07 min
      • Footprinting 6

        • Lecture4.1
          Google hacking 13 min
        • Lecture4.2
          Nikto basics 11 min
        • Lecture4.3
          Whois tool 07 min
        • Lecture4.4
          Email harvesting 06 min
        • Lecture4.5
          Shodan 11 min
        • Lecture4.6
          Zone transfer with Dig 07 min
      • Scanning 9

        • Lecture5.1
          Installing Metasploitable 07 min
        • Lecture5.2
          Nmap part 1 16 min
        • Lecture5.3
          Nmap part 2 12 min
        • Lecture5.4
          Nmap part 3 13 min
        • Lecture5.5
          Zenmap 08 min
        • Lecture5.6
          TCP scans 16 min
        • Lecture5.7
          Nmap bypassing defenses 18 min
        • Lecture5.8
          Nmap scripts part 1 10 min
        • Lecture5.9
          Nmap scripts part 2 14 min
      • Website Penetration Testing 24

        • Lecture6.1
          Installing OWASP 09 min
        • Lecture6.2
          HTTP request 10 min
        • Lecture6.3
          HTTP response 11 min
        • Lecture6.4
          Burpsuite configuration 13 min
        • Lecture6.5
          Editing packets in Burpsuite 13 min
        • Lecture6.6
          Whatweb and Dirb 10 min
        • Lecture6.7
          Password recovery attack 16 min
        • Lecture6.8
          Burpsuite login bruteforce 11 min
        • Lecture6.9
          Hydra login bruteforce 09 min
        • Lecture6.10
          Session fixation 14 min
        • Lecture6.11
          Injection attacks 06 min
        • Lecture6.12
          Simple command injection 11 min
        • Lecture6.13
          Exploiting command injection vulnerability 08 min
        • Lecture6.14
          Finding blind command injection 14 min
        • Lecture6.15
          SQL basics 11 min
        • Lecture6.16
          Manual SQL injection part 1 13 min
        • Lecture6.17
          Manual SQL injection part 2 21 min
        • Lecture6.18
          SQLmap basics 17 min
        • Lecture6.19
          XML injection 16 min
        • Lecture6.20
          Installing XCAT and preventing injection attacks 06 min
        • Lecture6.21
          Reflected XSS 11 min
        • Lecture6.22
          Stored XSS 12 min
        • Lecture6.23
          Changing HTML code with XSS 08 min
        • Lecture6.24
          XSSer and XSSsniper 14 min
      • Wireless Cracking 13

        • Lecture7.1
          Wireless attacking theory 11 min
        • Lecture7.2
          Enabling monitor mode 04 min
        • Lecture7.3
          Capturing handshake with airodump 15 min
        • Lecture7.4
          RockYou.txt 14 min
        • Lecture7.5
          Cracking with Aircrack 16 min
        • Lecture7.6
          Cracking with Hashcat 15 min
        • Lecture7.7
          Creating password lists with Crunch 19 min
        • Lecture7.8
          Creating password lists with Cupp 07 min
        • Lecture7.9
          Rainbow tables part 1 17 min
        • Lecture7.10
          Rainbow tables part 2 06 min
        • Lecture7.11
          Installing Fluxion 06 min
        • Lecture7.12
          Finding and cracking hidden networks 08 min
        • Lecture7.13
          Preventing wireless attacks 08 min
      • Man in the Middle Attacks 11

        • Lecture8.1
          ARP protocol basics 11 min
        • Lecture8.2
          Man in the middle attack theory 07 min
        • Lecture8.3
          Installing MITMf 07 min
        • Lecture8.4
          Manual ARP spoofing 13 min
        • Lecture8.5
          Problems while installing MITMf 06 min
        • Lecture8.6
          HTTP traffic sniffing 09 min
        • Lecture8.7
          DNS spoofing and HTTPS password sniffing 21 min
        • Lecture8.8
          Hooking browsers with BEEF 16 min
        • Lecture8.9
          Screenshotting targets browser 11 min
        • Lecture8.10
          Cloning any webpage 09 min
        • Lecture8.11
          Ettercap basics 07 min
      • System Hacking with Metasploit 21

        • Lecture9.1
          MSFconsole environment 16 min
        • Lecture9.2
          Metasploit modules explained 12 min
        • Lecture9.3
          Bruteforcing SSH with Metasploit 15 min
        • Lecture9.4
          Attacking Tomcat with Metasploit 09 min
        • Lecture9.5
          Getting Meterpreter with command injection 25 min
        • Lecture9.6
          PHP code injection 06 min
        • Lecture9.7
          2 Metasploitable exploits 07 min
        • Lecture9.8
          Wine installation 12 min
        • Lecture9.9
          Creating Windows payloads with Msfvenom 10 min
        • Lecture9.10
          Encoders and Hex editor 19 min
        • Lecture9.11
          Windows 10 Meterpreter shell 12 min
        • Lecture9.12
          Meterpreter environment 12 min
        • Lecture9.13
          Windows 10 privilege escalation 12 min
        • Lecture9.14
          Preventing privilege escalation 07 min
        • Lecture9.15
          Post exploitation modules 14 min
        • Lecture9.16
          Getting Meterpreter over Internet with port forwarding 11 min
        • Lecture9.17
          Eternalblue exploit 21 min
        • Lecture9.18
          Persistence module 13 min
        • Lecture9.19
          Hacking over the internet with Ngrok 11 min
        • Lecture9.20
          Android device attack with Venom 10 min
        • Lecture9.21
          The real hacking begins now! 03 min
      • Python Crash Course 11

        • Lecture10.1
          Variables 14 min
        • Lecture10.2
          Raw input 11 min
        • Lecture10.3
          If-else statements 11 min
        • Lecture10.4
          For loops 07 min
        • Lecture10.5
          While loops 09 min
        • Lecture10.6
          Python lists 08 min
        • Lecture10.7
          Functions 14 min
        • Lecture10.8
          Classes 11 min
        • Lecture10.9
          Importing libraries 07 min
        • Lecture10.10
          Files in Python 12 min
        • Lecture10.11
          Try and except rule 05 min
      • Coding an Advanced Backdoor 20

        • Lecture11.1
          Theory behind reverse shells 07 min
        • Lecture11.2
          Simple server code 13 min
        • Lecture11.3
          Connection with reverse shell 07 min
        • Lecture11.4
          Sending and receiving messages 11 min
        • Lecture11.5
          Sending messages with while true loop 08 min
        • Lecture11.6
          Executing commands on target system 10 min
        • Lecture11.7
          Fixing backdoor bugs and adding functions 21 min
        • Lecture11.8
          First test using our backdoor 18 min
        • Lecture11.9
          Trying to connect every 20 seconds 13 min
        • Lecture11.10
          Creating persistence part 1 06 min
        • Lecture11.11
          Creating persistence part 2 17 min
        • Lecture11.12
          Changing directory 12 min
        • Lecture11.13
          Uploading and downloading files 23 min
        • Lecture11.14
          Downloading files from the internet 23 min
        • Lecture11.15
          Starting programs using our backdoor 07 min
        • Lecture11.16
          Capturing screenshot on the target PC 19 min
        • Lecture11.17
          Embedding backdoor in an image part 1 14 min
        • Lecture11.18
          Embedding backdoor in an image part 2 09 min
        • Lecture11.19
          Checking for administrator privileges 12 min
        • Lecture11.20
          Adding help option 09 min
      • Creating a Keylogger for the Backdoor 7

        • Lecture12.1
          Importing Pynput 11 min
        • Lecture12.2
          Simple keylogger 10 min
        • Lecture12.3
          Adding report function 11 min
        • Lecture12.4
          Writing keystrokes to a file 14 min
        • Lecture12.5
          Adding the keylogger to our reverse shell part 1 23 min
        • Lecture12.6
          Adding the keylogger to our reverse shell part 2 08 min
        • Lecture12.7
          Final project test 15 min
      • Basic Authentication Bruteforcer 7

        • Lecture13.1
          Printing banner 12 min
        • Lecture13.2
          Adding available options 11 min
        • Lecture13.3
          Starting threads for bruteforce 09 min
        • Lecture13.4
          Writing function to run the attack 11 min
        • Lecture13.5
          Bruteforcing router login 10 min
        • Lecture13.6
          Bypassing antivirus with your future programs 14 min
        • Lecture13.7
          Sending malware with spoofed email 14 min
      • BONUS-Building a Career in Cyber Security 6

        • Lecture14.1
          What will you learn in this section? 03 min
        • Lecture14.2
          Why is ethical hacking a valuable skill? 23 min
        • Lecture14.3
          What is the best ethical hacking certification? 17 min
        • Lecture14.4
          Tips for getting your first job as an ethical hacker 19 min
        • Lecture14.5
          How I started my career as an ethical hacker 14 min
        • Lecture14.6
          How to price your work 11 min
      • Overview
      • Curriculum
      £99.00
      Buy Membership
      • Share:

      You May Like

      Copywriting Beginner To Advance Read More
      Admin bar avatar
      admin

      Copywriting Beginner To Advance

      497
      £99.00
      Stock Trading & Investing Diploma Read More
      Admin bar avatar
      admin

      Stock Trading & Investing Diploma

      1068
      £99.00
      Introduction to Web development Read More
      Admin bar avatar
      admin

      Introduction to Web development

      877
      £99.00
      Python 3 Programming Complete Course Read More
      Admin bar avatar
      admin

      Python 3 Programming Complete Course

      254
      £99.00
      Pilates For Beginners Read More
      Admin bar avatar
      admin

      Pilates For Beginners

      1358
      £99.00

      Categories

      • Business
      • Design
      • Finance
      • Health
      • Language
      • Marketing
      • Personal Development
      • Photography
      • Productivity
      • Technology
      • Trading
      • Videography

      Edplx is learning community with online courses in design, business, web development, photography, fitness and more. Anyone can join the community to learn cutting-edge skills, network with other creatives and discover new oppotunities.

      Company
      • About
      • Blog
      • Contact
      • FAQ
      Community
      • Become an Instructor
      • Redeem Voucher
      new-logo

      @2022 All rights reserved. Privacy Policy and Terms and condition.

      Facebook-f
      Youtube
      Twitter
      Instagram

      Connect with

      Login with Facebook

      logo

      Login

      Connect with

      Login with Facebook

      logo


      Lost your password?

      Not a member yet? Register now

      Sign up with your Email

      Are you a member? Login now

      • Login
      • Sign Up
      Forgot Password?
      Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.