Complete Ethical Hacking Bootcamp: Zero to Mastery
Authors: Andrei Neagoie, Aleksa Tamburkovski
Categories:
Last updated:
November 2024
Subtitles:
English, Français, Deutsch, Español, العربية, Nederlands, Vlaams, हिन्दी, हिंदी, Bahasa indonesia, 日本語 (にほんご/にっぽんご), Português, Română
Audio:
English
Overview
Join us on an exciting journey for complete beginners, where you'll set up your own hacking lab (including Kali Linux) and progress to mastering security skills that allow you to use and counter hacking techniques effectively!
Graduates of Zero To Mastery have secured roles at top tech companies like Google, Tesla, Amazon, Apple, IBM, Uber, Facebook, and Shopify, among others.
Many of our alumni thrive as freelancers, enjoying the flexibility of remote work worldwide.
You could be next.
By signing up today, you’ll access our vibrant live online classroom community, connecting and learning alongside thousands of fellow students, alumni, mentors, teaching assistants, and instructors.
Most importantly, you’ll be guided by industry experts with real-world experience in securing major companies and high-traffic applications.
Whether you're a complete beginner aiming to become an Ethical Hacker, a tech enthusiast wishing to protect computer systems, or a developer wanting to enhance your site's security against hackers, this Ethical Hacking course is perfect for you.
We’ll dive deep into hacking and penetration testing.
What if I lack programming skills?
No problem! We’ve included a section teaching Python programming from scratch, enabling you to create your own hacking and penetration testing tools.
This course focuses primarily on hands-on learning.
You’ll learn how hacking works by practically applying techniques and methods currently used by hackers.
We’ll start by building your own hacking lab, keeping your computer safe and following legal practices throughout the course.
Once your computer is set up for ethical hacking, we’ll cover basic and advanced topics such as:
0️⃣ HACKING LAB
Create your own hacking lab to execute our attacks (compatible with any operating system).
This lab serves as a virtual environment for hacking with Kali Linux, supported by additional virtual vulnerable machines for practice.
Using virtual machines is essential as testing our attacks on real-world sites and networks is prohibited; thus, we’ll create our test environments.
- Downloading Virtual Box & Kali Linux
- Setting Up Our First Virtual Machine
- Installing the Kali Linux OS
- 5 Stages Of A Penetration Test
- Exploring Kali Linux System
- Creating Files & Directory Management
- Network Commands & Sudo Privileges In Kali
1️⃣ OPTIONAL: PYTHON 101
Learn Python 3 programming from basics. This section is optional for those looking to gain programming skills to create their own ethical hacking tools!
- Understanding Python Basics
- Intermediate Python Concepts
- Error Handling in Python
- File I/O in Python
2️⃣ RECONNAISSANCE
Master the art of Footprinting (Information Gathering). After selecting our target, we gather as much relevant data about it as possible.
- Understanding Information Gathering
- Using the Whois Tool for Physical Addresses
- Conducting Web Stealthy Scans
- Aggressive Website Technology Discovery Across an IP Range
- Email Collection with theHarvester & Hunterio
- Downloading Tools From Online Sources
- Username Discovery Using Sherlock
- Bonus: Creating an Email Scraper Tool in Python 3
3️⃣ SCANNING
This section gets exciting. Here, we also gather data but focus on technical details (like open ports, firewall status, software running on these ports, and whether the OS is outdated).
- Scanning Theory
- TCP & UDP Explained
- Installing a Vulnerable Virtual Machine
- Using Netdiscover
- Performing Your First Nmap Scan
- Various Nmap Scan Types
- Identifying the Target OS
- Detecting the Version of Services on Open Ports
- Filtering Port Ranges & Analyzing Scan Output
- Understanding Firewalls/IDS
- Using Decoys and Packet Fragmentation
- Nmap Security Evasion Options
- Python Project - Port Scanner
4️⃣ VULNERABILITY ANALYSIS
Use data from scanning (like software running on open ports) to identify potential vulnerabilities.
- Identifying Vulnerabilities Using Nmap Scripts
- Manual Vulnerability Analysis & Searchsploit
- Nessus Installation Process
- Discovering Vulnerabilities Using Nessus
- Scanning a Windows 7 Machine with Nessus
5️⃣ EXPLOITATION & GAINING ACCESS
This section is the highlight as we launch attacks to breach target machines.
We’ll explore multiple vulnerabilities and targets, practicing these attacks in virtual environments while learning about a crucial tool for ethical hackers: the Metasploit Framework.
The aim of exploitation is to access the target machine, allowing us to deploy a payload to traverse their systems, inspect files, execute commands, and delete items without the target's awareness.
You’ll also learn to create your own viruses and trojans for delivery via email or USB.
- Defining Exploitation
- Understanding Vulnerabilities
- Reverse Shells and Bind Shells Explained
- Structuring the Metasploit Framework
- Basic Commands of Msfconsole
- Executing Our Initial Exploit - vsftp 2.3.4
- Dealing with Misconfigurations - Bindshell Exploitation
- Information Disclosure via Telnet Exploit
- Exploiting Software Vulnerabilities - Samba
- Brute-Force Attacks on SSH
- Exploitation Challenge - Five Variants of Exploit
- Windows 7 Setup Explanation
- Executing the Eternal Blue Attack on Windows 7
- Launching the DoublePulsar Attack on Windows
- Exploit of the BlueKeep Vulnerability on Windows
- Using Routersploit
- Router Default Credentials Analysis
- Configuring a Vulnerable Windows 10
- Remote Crashing of a Windows 10 Machine
- Remote Exploitation of a Windows 10 Machine
- Payload Generation with Msfvenom
- Advanced Msfvenom Techniques
- Generating Powershell Payloads Using Veil
- Payload Creation with TheFatRat
- Using Hexeditor & Antiviruses
- Configuring Our Payload to Open an Image
6️⃣ POST EXPLOITATION
Post exploitation involves actions on the target machine after gaining access.
Inside, various actions can be taken depending on goals, and it’s crucial to remove traces to preserve evidence of our intrusion.
- Post Exploitation Theory
- Basic Meterpreter Commands
- Privilege Escalation Techniques with Various Modules
- Creating System Persistence on the Target
- Post Exploitation Module Functions
- Python Project - Creating a Backdoor
7️⃣ WEBSITE PENETRATION TESTING
This topic is key for Ethical Hackers. We’ll focus primarily on websites and associated vulnerabilities like misconfigurations, SQL Injections (interacting with databases), Information Disclosures (unintentionally accessible data), Command Injection (system interaction via the web), and XSS (Cross Site Scripting involving Javascript code injection).
- Website Penetration Testing Basics
- Understanding HTTP Requests & Responses
- Information Gathering & Utilizing the Dirb Tool
- Setting Up Burpsuite
- Exploiting the ShellShock Vulnerability
- Command Injection Exploitation Techniques
- Obtaining Meterpreter Shells Through Command Execution
- Executing Reflected XSS & Cookie Theft
- Stored XSS Exploits
- HTML Injection Techniques
- Conducting SQL Injection Attacks
- Understanding CSRF Vulnerabilities
- Hydra Brute-Force Methods
- Using Burpsuite Intruder
- Python Project - Brute-force Login + Directory Discovery
8️⃣ MAN IN THE MIDDLE
This tactic targets data packets in a network, enabling the interception of unencrypted information, including viewing plain text passwords. We’ll cover several key tools for this attack.
- Theory Behind Man In The Middle Attacks
- Bettercap ARP Spoofing Tutorial
- Password Sniffing with Ettercap
- Manipulating Target ARP Cache with Scapy
9️⃣ WIFI CRACKING
Learn how to infiltrate networks by cracking their wireless passwords.
- Basics of Wireless Cracking
- Switching Wireless Card to Monitor Mode
- Deauthenticating Devices to Capture Passwords
- Password Cracking Using Aircrack
- Hashcat for Password Cracking
1️⃣0️⃣ SOCIAL ENGINEERING
This vital topic recurs throughout the content. Social Engineering exploits human error, as humans are the weakest security link!
Bonus: We also provide many bonus resources, cheatsheets, and more!
This course offers extensive knowledge and skills. Yet, you may still ask...
Is learning ethical hacking worthwhile?
These statistics speak volumes:
- A hacker attack occurs every 39 seconds
- 64% of companies have faced web-based attacks
- Post COVID-19, the FBI reported a massive 300% increase in cybercrime reports
- By 2025, global cybersecurity spending is expected to reach ~$10.5 trillion
- The global cybersecurity professional shortage jumped 350%, with ~3.5 million unfilled jobs from 2013 to 2021. The market is growing faster than the number of skilled professionals.
Ginni Rometty, IBM’s Chairman, President and CEO, said: “Cybercrime is the greatest threat to every company in the world.”
Her statement holds true. As technology advances, so do hackers. Cybercrime is likely to be an even greater threat in the future.
Learning Ethical Hacking through this course will bolster your skillset, potentially leading to a higher salary as an established programmer or securing a role as an Ethical Hacker with no prior experience.
Plus, you have nothing to lose. You can start learning immediately, and if the course doesn’t meet your expectations, we’ll refund you within 30 days—no questions asked.
Structure
Structure:
Total sections: 24
Total lessons: 254
1. Introduction
6 lessons
2. Setting Up Our Hacking Lab
14 lessons
3. Linux Operating System
4 lessons
4. Reconnaissance & Information Gathering
9 lessons
5. Scanning
14 lessons
6. Python Coding Project #1 - Portscanner
3 lessons
7. Vulnerability Analysis
6 lessons
8. Exploitation & Gaining Access
18 lessons
9. SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
4 lessons
10. Gaining Access (Viruses, Trojans, Payloads ...)
8 lessons
11. Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
7 lessons
12. Python Coding Project #2 - Backdoor
10 lessons
Reviews
3 months ago
Best course if you have no prior experience in hacking. It covers a lot of topics and the instructor explains the concepts very clearly. The doubts are answered within a few hours and the discord community is very active.
3 months ago
I am confident to call myself an intermediate penetration tester/ethical hacker. I had doubts starting this course due to lack of confidence on the subject, but this 'doubt' is now replaced by a sense of endless possibilities ahead. Bravo!
3 months ago
This is the course you're looking for if you want to get into Ethical Hacking. They cover the foundations of everything before diving into the technical aspects. They are constantly adding new videos and updates. You can't beat this level of quality.
3 months ago
This course is very thorough and easy to follow. I have done other courses and they were less descriptive, and I had to google to find the answers. However, this course I get full understanding of the "What" and "Why" as well as the do's and don'ts!
Authors
Price
Unlimited access to all courses, projects + workshops, and career paths
Access to our private Discord with 400,000+ members
Access to our private LinkedIn networking group
Custom ZTM course completion certificates
Live career advice sessions with mentors, every month
Full access to all future courses, content, and features
Access to our private Discord with 450,000+ members
Unlimited access to all courses, projects, and career paths
Unlimited access to all bootcamps, bytes, and projects, and career paths
Access to our private LinkedIn networking group with 100,000+ members
Unlimited access to all courses, projects + workshops, and career paths
Access to our private Discord with 400,000+ members
Access to our private LinkedIn networking group
Custom ZTM course completion certificates
Live career advice sessions with mentors, every month
Full access to all future courses, content, and features
Access to our private Discord with 450,000+ members
Unlimited access to all courses, projects, and career paths
Unlimited access to all bootcamps, bytes, and projects, and career paths
Access to our private LinkedIn networking group with 100,000+ members
Unlimited access to all courses, projects + workshops, and career paths
Access to our private Discord with 400,000+ members
Access to our private LinkedIn networking group
Custom ZTM course completion certificates
Live career advice sessions with mentors, every month
Full access to all future courses, content, and features
Access to our private Discord with 450,000+ members
Unlimited access to all courses, projects, and career paths
Unlimited access to all bootcamps, bytes, and projects, and career paths
Access to our private LinkedIn networking group with 100,000+ members
Frequently asked questions
Are there any prerequisites for this course?
Are there any prerequisites for this course?
- No prior knowledge of programming or hacking is necessary. We will guide you through every step!
- You will need a computer (whether it's Linux, Windows, or Mac) and a reliable internet connection.
Who is this course for?
Who is this course for?
- Anyone keen on diving into Ethical Hacking and Penetration Testing from the ground up
- Individuals eager to learn Python alongside Ethical Hacking
- Job seekers aiming to become Ethical Hackers or Penetration Testers
- Those wanting to advance beyond basic tutorials that lack practical application
- Curious minds wanting to understand how hackers infiltrate computer systems
- Developers seeking to fortify their systems against cyber threats
Do you provide a certificate of completion?
Do you provide a certificate of completion?
Absolutely! Our certificates are impressive, and after completing the course, you can proudly showcase Zero To Mastery Academy on your LinkedIn profile.
Can I use the course projects in my portfolio?
Can I use the course projects in my portfolio?
Definitely! We believe it's a must! All projects are available for download and accessible as soon as you enroll.
Many of our students have secured interviews thanks to the projects they created during the course. Because they developed these projects, they could discuss their work with confidence during interviews.
This could lead to your next job offer!
Are there subtitles?
Are there subtitles?
Yes, indeed! We offer high-quality subtitles in 11 languages: English, Spanish, French, German, Dutch, Romanian, Arabic, Hindi, Portuguese, Indonesian, and Japanese.
You can even customize the text size, color, background, and more to make the subtitles just right for your preferences!
Still have more questions about the Academy?
Still have more questions about the Academy?
If you have additional inquiries specific to the Academy membership, we’ve got you covered! Check out more answers here.
Guaranty
Guaranty period is 30 days, beginning from the purchase day.
Complete Ethical Hacking Bootcamp: Zero to Mastery