Skip to content

Cyber Security & Ethical Hacking Beginner To Expert

Get Certified in 12 Hours | | CPD Certified Certificates Included | Lifetime Access | Easy Refund


Learndrive

Summary

Price
Save 14%
£12 inc VAT (was £13.99)
Offer ends 31 May 2024
Study method
Online, On Demand What's this?
Duration
12 hours · Self-paced
Qualification
No formal qualification
Certificates
  • CPDQE Certificate on Cyber Security & Ethical Hacking - Free
  • Reed Courses Certificate of Completion - Free
Additional info
  • Tutor is available to students

5 students purchased this course

Add to basket or enquire

Overview

Cyber Security & Ethical Hacking Beginner To Expert

Embark on a journey into the world of Cyber security & Ethical Hacking, transitioning from a novice to an expert. This course is designed to equip you with the knowledge and skills essential for defending digital landscapes and mastering ethical hacking techniques.

Key Performance Metrics:

  • Define core networking concepts pivotal for Cyber security & Ethical Hacking.
  • Establish a robust hacking lab for Cybersecurity practices.
  • Master Linux, Python, Bash, and Powershell for Cyber security excellence.
  • Navigate online anonymity techniques within Cyber security.
  • Decrypt WiFi security to enhance Ethical Hacking skills.
  • Execute passive and active reconnaissance with a Cyber security focus.
  • Deploy strategic attacks for Ethical Hacking mastery.
  • Conduct thorough post-exploitation analysis in Cyber Security.
  • Penetrate websites and web applications leveraging Ethical Hacking.
  • Secure mobile phones against threats, a key aspect of Cyber security.

Accreditation:

This Cyber Security & Ethical Hacking Course is CPDQE accredited, which serves as an impactful mechanism for skill enhancement.

Certificates

CPDQE Certificate on Cyber Security & Ethical Hacking

Digital certificate - Included

Reed Courses Certificate of Completion

Digital certificate - Included

Will be downloadable when all lectures have been completed.

Curriculum

14
sections
114
lectures
12h 2m
total
    • 1: Ethical Hacking: Course Overview 08:23
    • 2: Ethical Hacking: About Your Instructors 02:31
    • 3: Ethical Hacking: Section Overview 03:20
    • 4: Ethical Hacking: Current Cybersecurity Market 08:39
    • 5: Ethical Hacking: The 3 Types of Hackers 04:50
    • 6: Ethical Hacking: The 4 Elements of Security 04:06
    • 7: Ethical Hacking: Ethical Hacking Terminology 03:45
    • 8: Ethical Hacking: Common Methods of Hacking 07:52
    • 9: Ethical Hacking: Cyber Security _ Ethical Hacking Overview 02:31
    • 10: Ethical Hacking: Ethical Hacking vs Pentration Testing 05:57
    • 11: Ethical Hacking: Jobs Opportunities in Cybersecurity 01:25
    • 12: Ethical Hacking: Who_s This Course For 01:15
    • 13: Ethical Hacking: Quiz 01:00
    • 14: Feedback 01:00 PDF
    • 15: Ethical Hacking: Networking Section Overview 11:57
    • 16: Ethical Hacking: How Data Travels Across The Internet 01:39
    • 17: Ethical Hacking: Understanding Ports and Protocols 08:23
    • 18: Ethical Hacking: Public _ Private IP_s Overview 02:14
    • 19: Ethical Hacking: What Are Subnets 02:58
    • 20: Ethical Hacking: The Average Network vs Remote Based 05:33
    • 21: Ethical Hacking: Quiz 01:00
    • 22: Ethical Hacking: Hacking Lab Section Overview 08:43
    • 23: Ethical Hacking: Understanding Virtual Machines 03:22
    • 24: Ethical Hacking: Setup Your Kali Linux Machine 09:33
    • 25: Ethical Hacking: VN Setup _ Testing Vulnerable Systems 23:09
    • 26: Ethical Hacking: Quiz 01:00
    • 27: Ethical Hacking: Linux+Python+Bash+Powershell Basics Overview 05:38
    • 28: Ethical Hacking: Linux Basics 10:34
    • 29: Ethical Hacking: Working With Directories _ Moving Files 02:46
    • 30: Ethical Hacking: Installing _ Updating App Files 02:03
    • 31: Ethical Hacking: Linux Text Editors 04:28
    • 32: Ethical Hacking: Searching For Files 02:17
    • 33: Ethical Hacking: Bash Scripting 09:02
    • 34: Ethical Hacking: Python Basics 10:38
    • 35: Ethical Hacking: Quiz 01:00
    • 36: Ethical Hacking: Remaining Anonymous Section Overview 06:02
    • 37: Ethical Hacking: TOR Browser Overview 05:31
    • 38: Ethical Hacking: Anonsurf Overview 03:15
    • 39: Ethical Hacking: Changing Mac Addresses 02:42
    • 40: Ethical Hacking: Using a Virtual Private Network _ Server (VPN, VPS) 04:19
    • 41: Ethical Hacking: Quiz 01:00
    • 42: Ethical Hacking: WiFi Hacking Section Overview 05:39
    • 43: Ethical Hacking: Wifi Hacking System Setup 09:28
    • 44: Ethical Hacking: WEP Hacking Attack #1 08:31
    • 45: Ethical Hacking: WEP Hacking Attack #2 04:26
    • 46: Ethical Hacking: WPA _ WPA2 Hacking 10:20
    • 47: Ethical Hacking: Quiz 01:00
    • 48: Ethical Hacking: Reconnaissance Section Overview 03:58
    • 49: Ethical Hacking: Passive + Active Recon 01:11
    • 50: Ethical Hacking: Recon-ng Overview 14:51
    • 51: Ethical Hacking: Whois Enum 01:59
    • 52: Ethical Hacking: DNS Enumeration Overview 02:07
    • 53: Ethical Hacking: Netcraft DNS Information 02:30
    • 54: Ethical Hacking: Google Hacking Overview 04:48
    • 55: Ethical Hacking: Shodan.io Overview 02:12
    • 56: Ethical Hacking: Securityheaders.com (Analyze HTTPS Headers of website) 01:45
    • 57: Ethical Hacking: Ssllabs.comssltest (Look for SSL issues on website) 02:05
    • 58: Ethical Hacking: Pastebin.com (Sensitive Information) 00:58
    • 59: Ethical Hacking: NMAP Port Scanning (Discover open ports, OS, Services, 15:06
    • 60: Ethical Hacking: Netcat Overview + SMB _ NFS Enumeration 14:06
    • 61: Ethical Hacking: Nikto _ Sparta Web Application Scanner 05:29
    • 62: Ethical Hacking: SMPT Enumeration + Nessus +Openvas Scanners 04:30
    • 63: Ethical Hacking: Quiz 01:00
    • 64: Ethical Hacking: Launching Attacks Overview 10:18
    • 65: Ethical Hacking: Analyzing Information Gathered 03:30
    • 66: Ethical Hacking: Taking Advantage of Telenet 06:01
    • 67: Ethical Hacking: Searching _ Understanding Exploits 05:46
    • 68: Ethical Hacking: Copy Exploits From Searchsploit 02:51
    • 69: Ethical Hacking: Understanding Exploits 04:25
    • 70: Ethical Hacking: Launching Exploits 24:26
    • 71: Ethical Hacking: Brute Force Attacks 06:53
    • 72: Ethical Hacking: How To Crack Passwords 04:12
    • 73: Ethical Hacking: ARP Spoofing Overview 21:26
    • 74: Ethical Hacking: Introduction To Cryptography 13:30
    • 75: Ethical Hacking: Quiz 01:00
    • 76: Ethical Hacking: Post Exploitation Section Overview 03:07
    • 77: Ethical Hacking: Privledge Escalation 29:00
    • 78: Transferring Files Within Victim, Creating Custom Malware +Evading AV 27:23
    • 79: Ethical Hacking: Installing a Keylogger 02:33
    • 80: Ethical Hacking: Installing a Backdoor 06:30
    • 81: Ethical Hacking: Website _ Web App Hacking Overview 06:08
    • 82: Ethical Hacking: Web Application Scanning 07:51
    • 83: Ethical Hacking: Directory Buster Hacking Tool 02:49
    • 84: Ethical Hacking: Nikto Web App Hacking Tool 03:26
    • 85: Ethical Hacking: SQLmap and SQL Ninja Overview 00:46
    • 86: Ethical Hacking: How To Execute Brute Force Attacks 13:20
    • 87: Ethical Hacking: Using Command Injection 03:21
    • 88: Ethical Hacking: Malicious File Uploads 10:27
    • 89: Ethical Hacking: Local _ Remote File Inclusion 10:12
    • 90: Ethical Hacking: SQL Injection 18:32
    • 91: Ethical Hacking: Using Cross Site Forgery 10:58
    • 92: Ethical Hacking: Cross Site Scripting Overview 12:25
    • 93: Ethical Hacking: Quiz 01:00
    • 94: Ethical Hacking: Mobile Phone Hacking Section Overview 10:31
    • 95: Ethical Hacking: Mobile Attack Vectors 01:57
    • 96: Ethical Hacking: Mobile Hacking with URL_s 02:02
    • 97: Ethical Hacking: Jail Breaking and Rooting Considerations 00:55
    • 98: Ethical Hacking: Privacy Issues (Geo Location) 00:54
    • 99: Ethical Hacking: Mobile Phone Data Security 02:29
    • 100: Ethical Hacking: Getting Your Name Out There Section Overview 02:09
    • 101: Ethical Hacking: Building A Brand 09:13
    • 102: Ethical Hacking: Personal Branding 13:18
    • 103: Ethical Hacking: Setup Your Website and Blog 11:26
    • 104: Ethical Hacking: Writing a Book 09:52
    • 105: Ethical Hacking: Starting a Podcast 08:14
    • 106: Ethical Hacking: Networking Overview 06:21
    • 107: Ethical Hacking: Making Money Section Overview 01:50
    • 108: Ethical Hacking: Bug Bounty Programs 04:22
    • 109: Ethical Hacking: How To Start Freelancing 10:43
    • 110: Ethical Hacking: How To Start Client Consulting 09:07
    • 111: Ethical Hacking: Quiz 01:00
    • 112: Ethical Hacking: Potential Salary _ Cybersecurity Roadmap 10:25
    • 113: Ethical Hacking: Book Recomendations 02:32
    • 114: Ethical Hacking: Places to Practice Hacking for Free 03:14

Course media

Description

Key Lesson Snippets:

  • Master Cyber security Foundations: Acquire a comprehensive understanding of cyber security critical role in protecting information assets.
  • Decode Networking Basics for Ethical Hacking: Dive into the networking fundamentals essential for any aspiring ethical hacker.
  • Leverage Linux, Python, Bash, and Powershell: Become proficient in these pivotal tools, which form the backbone of ethical hacking operations.
  • Ensure Anonymity in Cyber security Practices: Learn advanced techniques to maintain your anonymity while conducting ethical hacking activities online.
  • Execute Thorough Reconnaissance: Employ both passive and active reconnaissance techniques to gather critical information in cyber security assessments.
  • Navigate Post-Exploitation Scenarios in Cyber security: Master the strategies for securing systems post-breach and conducting thorough security audits.
  • Cultivate a Professional Ethical Hacker Persona: Learn how to build a reputable identity in the ethical hacking community.
  • Monetise Your Ethical Hacking Expertise: Discover ethical and legal ways to profit from your cyber security skills.
  • Embark on a Cyber security Career Path: Receive guidance on forging a successful career in the burgeoning field of cyber security.

Who is this course for?

This course will pave the way for higher study in the field of Ethical Hacking & Cyber Security. You can enrol on higher level Ethical Hacking & Cyber Security courses, such as:

  • Level 4 Diploma in Ethical Hacking & Cyber Security
  • Level 5 Diploma in Ethical Hacking & Cyber Security
  • Level 6 Diploma in Ethical Hacking & Cyber Security
  • Level 7 Diploma in Ethical Hacking &Cyber Security
  • Level 3 Diploma in Cyber Security
  • Level 4 Diploma in Cyber Security
  • Level 5 Diploma in Cyber Security
  • Level 7 Diploma in Cyber Security
  • NCFE Level 3 Certificate in Cyber Security
  • NCFE Level 4 Diploma in Cyber Security
  • NCFE Level 5 Diploma in Cyber Security
  • CACHE Level 3 Certificate in Cyber Security
  • CACHE Level 4 Diploma in Cyber Security
  • CACHE Level 5 Diploma in Cyber Security
  • City & Guilds Level 3 Diploma in Cyber Security
  • City & Guilds Level 4 Diploma in Cyber Security
  • City & Guilds Level 5 Diploma in Cyber Security

Career path

  • Ethical Hacker
  • Cyber security Test Specialist
  • Cyber Incident Response Analyst
  • Cyber security Engineer
  • Cyber security Consultant
  • Cyber security Investigator

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.