Booking options
£25
£25
On-Demand course
18 hours 13 minutes
All levels
Register on the The Complete Ethical Hacking Course today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career.
The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials.
Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion.
The The Complete Ethical Hacking Course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones.
The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly!
What You Get With The The Complete Ethical Hacking Course
Receive a e-certificate upon successful completion of the course
Get taught by experienced, professional instructors
Study at a time and pace that suits your learning style
Get instant feedback on assessments
24/7 help and advice via email or live chat
Get full tutor support on weekdays (Monday to Friday)
The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.
You are taught through a combination of
Video lessons
Online study materials
Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99.
The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge.
The online training is open to all students and has no formal entry requirements. To study the The Complete Ethical Hacking Course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.
Introduction to Ethical Hacking | |||
What is an Ethical Hacker | 00:07:00 | ||
Terminology Crash Course pt. 1 | 00:09:00 | ||
Terminology Crash Course pt. 2 | 00:14:00 | ||
Terminology Crash Course pt. 3 | 00:08:00 | ||
Legal Considerations | 00:11:00 | ||
Reconnaissance - Surveying the Attack Surface | |||
Surveying the Attack Surface | 00:10:00 | ||
Recon Types | 00:08:00 | ||
Passive Recon Part 1 | 00:07:00 | ||
Passive Recon Part 2 | 00:10:00 | ||
Active Recon | 00:15:00 | ||
Recon Walkthrough Tools Summary | 00:14:00 | ||
Maltego Demo | 00:07:00 | ||
FOCA Demo | 00:05:00 | ||
DEMO - Harvester | 00:02:00 | ||
Scanning and Enumeration - Getting Down to Business | |||
Scanning & enumeration | 00:08:00 | ||
Identifying Active Hosts pt. 1 | 00:10:00 | ||
Identifying Active Hosts pt. 2 | 00:13:00 | ||
Identifying Active Services | 00:18:00 | ||
OS and Services Fingerprinting | 00:15:00 | ||
Network Mapping | 00:10:00 | ||
Final Thoughts | 00:05:00 | ||
DEMO - Nmap Syntax pt. 1 | 00:14:00 | ||
DEMO - Nmap Syntax pt. 2 | 00:16:00 | ||
DEMO - Nmap Hosts Discovery | 00:12:00 | ||
DEMO - Nmap Service Discovery | 00:17:00 | ||
DEMO - Nmap Scripts | 00:11:00 | ||
DEMO - Masscan | 00:11:00 | ||
Network Presence | |||
Network Insecurity | 00:04:00 | ||
Sniffing and Spoofing | 00:13:00 | ||
Sniffing Tools | 00:09:00 | ||
Spoofing, Crypto and Wifi | 00:15:00 | ||
DEMO - tcpdump | 00:11:00 | ||
DEMO - Wireshark | 00:11:00 | ||
DEMO - Ettercap | 00:13:00 | ||
DEMO - Burp Suite | 00:15:00 | ||
DEMO - Scapy | 00:10:00 | ||
Attacking | |||
Security Overview pt. 1: Windows Architecture | 00:18:00 | ||
Security Overview pt. 2: Credentials Security | 00:16:00 | ||
Security Overview pt. 3: Memory Corruption and Exploitation | 00:16:00 | ||
Windows Hacking Basics | 00:20:00 | ||
Local Access and Privilege Escalation | 00:20:00 | ||
Dumping Hashes and Cracking Passwords | 00:18:00 | ||
Linux Attacking Basics pt. 1 | 00:13:00 | ||
Linux Attacking Basics pt. 2 | 00:14:00 | ||
References | 00:08:00 | ||
DEMO - Windows MSF Exploit pt. 1 | 00:13:00 | ||
DEMO - Windows MSF Exploit pt. 2 | 00:15:00 | ||
DEMO - Post Exploitation Activities | 00:13:00 | ||
DEMO - Mimikatz | 00:07:00 | ||
DEMO - Hashcat | 00:08:00 | ||
DEMO - Konboot | 00:13:00 | ||
DEMO - Post Exploitation Windows CMD | 00:14:00 | ||
DEMO - Post Exploitation Windows Powershell | 00:13:00 | ||
DEMO - Attacking Linux targets pt. 1aa | 00:10:00 | ||
DEMO - Attacking Linux targets pt. 1 | 00:13:00 | ||
Web Hacking | |||
Introduction to Web Hacking | 00:03:00 | ||
Web Security Architecture Overview pt. 1 | 00:17:00 | ||
Web Security Architecture Overview pt. 2 | 00:12:00 | ||
Attacking the Web Server pt. 1 | 00:10:00 | ||
Attacking the Web Server pt. 2 | 00:11:00 | ||
Attacking the Platform pt. 1 | 00:19:00 | ||
Attacking the Platform pt. 2 | 00:08:00 | ||
Attacking the Technology pt. 1 | 00:21:00 | ||
Attacking the Technology pt. 2 | 00:17:00 | ||
OWASP Top 10 pt. 1 | 00:09:00 | ||
OWASP Top 10 pt. 2 | 00:21:00 | ||
Attacking the Business Logic pt. 1 | 00:11:00 | ||
Attacking the Business Logic pt. 2 | 00:15:00 | ||
Tools and Methodology | 00:20:00 | ||
References | 00:05:00 | ||
DEMO - OWASP Mutillidae | 00:09:00 | ||
SQLI | 00:07:00 | ||
SQL Map Intro | 00:08:00 | ||
SQL Map | 00:25:00 | ||
DEMO - Burpsuite | 00:37:00 | ||
DEMO - Burpsuite XSS Hunter | 00:16:00 | ||
DEMO - mitmproxy | 00:10:00 | ||
DEMO - Skipfish pt.1 | 00:05:00 | ||
DEMO - Skipfish pt.2 | 00:05:00 | ||
Social Engineering - Hacking Humans | |||
Social Engineering Basics | 00:15:00 | ||
Social Engineering Methods | 00:16:00 | ||
Tools and Techniques pt. 1 | 00:15:00 | ||
Tools and Techniques pt. 2 | 00:12:00 | ||
Tools and Techniques pt. 3 | 00:09:00 | ||
Physical Security Considerations | 00:13:00 | ||
Final Thoughts99 | 00:11:00 | ||
DEMO - Credential harvesting | 00:02:00 | ||
DEMO - Website cloning | 00:06:00 | ||
DEMO - Automating an attack | 00:03:00 | ||
DEMO - Anti-virus evasion pt. 1 | 00:08:00 | ||
DEMO - Anti-virus evasion pt. 2 | 00:12:00 |
Are there any prerequisites for taking the course?
There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.
Can I access the course at any time, or is there a set schedule?
You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.
How long will I have access to the course?
For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.
Is there a certificate of completion provided after completing the course?
Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.
Can I switch courses or get a refund if I'm not satisfied with the course?
We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.
How do I track my progress in the course?
Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.
What if I have technical issues or difficulties with the course?
If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.