Ethical hacking

Explore the world of hacking and digital security ethically

7h 59m19 lectures6 sections

What you'll learn

  • Understand information security basics
  • Identify information gathering steps
  • Learn how to scan networks
  • Analyze vulnerabilities in systems
  • Conduct penetration tests on systems
  • Secure systems in a professional manner

About this course

The ethical hacking course is an educational program aimed at equipping individuals with the skills and knowledge needed to understand and assess the security of computer systems and networks. An ethical hacker is a specialist who uses their technical skills to test and evaluate systems, identifying vulnerabilities and security gaps to improve overall security. The course covers a variety of topics related to ethical hacking, such as understanding security fundamentals, penetration concepts, and various hacking techniques like targeted hacking, social engineering, and attacks on networks and applications. Students also learn about methods to protect systems and networks, how to discover vulnerabilities, and how to patch and enhance security.

Expected outcomes

  • Conduct ethical penetration tests professionally and securely.
  • Utilize advanced tools and software to analyze networks and systems.
  • Analyze security vulnerabilities and address weaknesses.
  • Implement protection strategies and enhance system security.

Course content

1

Ethical Hacking

6 lectures
  1. Course Introduction5:58
  2. Introduction to Information Security25:35
  3. Denial of Service Methods31:07
  4. Installing Used Software33:54
  5. CIA Triangle of Information Security25:15
  6. Setting Kali Linux Settings31:01
2

Footprint and Recon

3 lectures
  1. Fingerprint and Survey22:10
  2. Site Footprint29:16
  3. Practical Application (Gathering Information about the Victim)33:35
3

Scanning Networks

3 lectures
  1. Network Scanning (Part One)29:19
  2. Network Scanning (Part Two)31:30
  3. Network Scanning Tools and Programs22:31
4

Enumeration

2 lectures
  1. Inventory and Network Resources and Services22:29
  2. Inventory Tools and Programs22:34
5

Vulnerability Analysis

2 lectures
  1. Vulnerability Analysis26:15
  2. Vulnerability Analysis Tools and Programs14:45
6

System Hacking

3 lectures
  1. System Hacking21:39
  2. Hacking Tools and Programs33:16
  3. Practical Application17:15

Instructor

Eng. Moamen Mohamed

Eng. Moamen Mohamed

Telecommunications engineer with a Master's in Information Security and a certified trainer from Microsoft and EC-Council.
4,000 students

This course is part of the diploma

  • Advanced Cybersecurity DiplomaDiploma
    4.6|7|35 h

    Advanced Cybersecurity Diploma

    7 courses
    $59.99
    Buy now

Related courses

  • CCNA Cisco Network
    4.6|5,045|5h 57m

    CCNA Cisco Network

    Network Installation and Management Skills

    Eng. Ahmed Haykal
    Eng. Ahmed Haykal
    $19.99
    Buy now
  • Linux Operating Systems
    4.7|4,954|14h 25m

    Linux Operating Systems

    Learn and Master Linux Operating Skills

    Eng. Ahmed Haykal
    Eng. Ahmed Haykal
    $19.99
    Buy now
  • Cyber Security Fundamentals
    4.9|5,485|13h 6m

    Cyber Security Fundamentals

    Comprehensive Professional Course in Information Security

    Eng. Moamen Mohamed
    Eng. Moamen Mohamed
    $19.99
    Buy now
  • WiFi Hacking and Security
    4.9|5,234|3h 44m

    WiFi Hacking and Security

    Master Network Vulnerability Discovery

    Eng. Kanaan Al-Hallaj
    Eng. Kanaan Al-Hallaj
    $19.99
    Buy now