Uthena

Course description

Would you like to learn ethical hacking and gain the knowledge required to pass the CEH exam because this will help you level up your cyber security and ethical hacking career?

In this course you will learn:

  • Introduction to Ethical Hacking
  • Reconnaissance - Surveying the Attack Surface
  • Scanning and Enumeration - Getting Down to Business
  • Network Presence
  • Attacking
  • Web Hacking
  • Social Engineering - Hacking Humans


This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!

Course curriculum

    1. What is an ethical hacker?

      FREE PREVIEW
    2. Terminology crash course part 1

      FREE PREVIEW
    3. Terminology crash course part 2

      FREE PREVIEW
    4. Terminology crash course part 3

    5. Confidentiality, integrity and availability

    6. Legal considerations

    1. Surveying the attack surface

    2. Recon types and goals

    3. Passive recon part 1

    4. Passive recon part 2

    5. Active recon

    6. Recon walk-through and tools summary

    7. DEMO - Maltego real world example

    8. DEMO - FOCA to examine metadata

    9. DEMO - Harvester

    10. DEMO - Information collection using Recon-ng

    1. Scanning & enumeration

    2. Identifying active hosts part 1

    3. Identifying active hosts part 2

    4. Identifying active services

    5. OS and services fingerprinting

    6. Network mapping

    7. Final thoughts

    8. DEMO - Nmap syntax part 1

    9. DEMO - Nmap syntax part 2

    10. DEMO - Nmap hosts discovery

    11. DEMO - Nmap service discovery

    12. DEMO - Nmap scripts

    13. DEMO - masscan

    1. Network insecurity

    2. Sniffing and spoofing

    3. Sniffing tools

    4. Spoofing, crypto, and wifi

    5. DEMO - tcpdump

    6. DEMo - Wireshark

    7. DEMO - Ettercap

    8. DEMO - Burp Suite

    9. DEMO - Scapy

    1. Security overview part 1: Windows architecture

    2. Security overview part 2: credentials security

    3. Security overview part 3: memory corruption & exploitation

    4. Windows hacking basics

    5. Local access and privilege escalation

    6. Dumping hashes and cracking passwords

    7. Linux attacking basics part 1

    8. Linux attacking basics part 2

    9. References

    10. DEMO - Windows msf exploit part 1

    11. DEMO - Windows msf exploit part 2

    12. DEMO - Post exploitation activities

    13. DEMO - Mimikatz

    14. DEMO - Dumping hashes

    15. DEMO - Hashcat

    16. DEMO - Konboot

    17. DEMO - Post exploitation Windows cmd

    18. DEMO - Post exploitation Windows powershell

    19. DEMO - Online password cracking part 1

    20. DEMO - Online password cracking part 2

    21. DEMO - Attacking Linux targets part 1

    22. DEMO - Attacking Linux targets part 2

    1. Introduction to web hacking

    2. Web security architecture overview part 1

    3. Web security architecture overview part 2

    4. Attacking the web server part 1

    5. Attacking the web server part 2

    6. Attacking the platform part 1

    7. Attacking the platform part 2

    8. Attacking the technology part 1

    9. Attacking the technology part 2

    10. OWASP top 10 part 1

    11. OWASP top 10 part 2

    12. Attacking the business logic part 1

    13. Attacking the business logic part 2

    14. Tools and methodology

    15. References

    16. DEMO - OWASP Mutillidae

    17. DEMO - SQL injection

    18. DEMO - SQLMAP intro

    19. DEMO - SQLMAP practice

    20. DEMO - Burpsuite

    21. DEMO - Burpsuite XSS Hunter

    22. DEMO - mitmproxy

    23. DEMO - Skipfish part 1

    24. DEMO - Skipfish part 2

About this course

  • $27.81
  • 98 lessons
  • 19.5 hours of video content

Meet your instructor!

Joseph Delgadillo
Best-Selling Instructor

The digital age is upon us. Would you like to build/protect the systems that shape our future?

I am here on Uthena to produce valuable educational resources for students who wish to learn skills related to information technology, network security, programming languages and much more. Enroll in one of my courses for a practical, down to earth approach to learning.

Take this course today!

"Certified Ethical Hacker Boot Camp!"