Skip to content

Ethical Hacking from A-Z

Updated | FREE Downloadable Resources | Instructor Course | Instant Access | Certificate on Completion


Training Centre

Summary

Price
£400 inc VAT
Or £66.67/mo. for 6 months...
Study method
Online, On Demand What's this?
Duration
11.9 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Reed courses certificate of completion - Free
Additional info
  • Tutor is available to students

Add to basket or enquire

Overview

This Ethical Hacking from A-Z course incorporates great content with the latest e-learning technology. Whether you want to learn new skills to achieve personal and professional goals, or outgrow your career potential, our unique Ethical Hacking from A-Z course might help you get there! Learn from the industry experts and empower yourself with the specific knowledge and skills you need to succeed in your chosen career through theonline training course.

This Ethical Hacking from A-Z course is intended to provide you with the skills and knowledge you'll need to succeed in your career. Thecourse is a fantastic stepping-stone into this industry, as it provides the necessary core knowledge, confidence, and experience to pave the way for a variety of interesting and future-proof careers.

By the end of thiscourse, you will get complete knowledge and marketable skills. Thecourse also comes with an Accredited certificate, which will add extra value to your resume and help you stand out in the job market. In essence, thecourse is the perfect course to fast-track your career. So, why are you waiting? Enroll in this course today!



9 reasons you should choose our Ethical Hacking from A-Z course-

  • After completing the Ethical Hacking from A-Z course you will get an instant Free e-certificate.
  • Lifetime access tocourse materials.
  • No hidden fees with thecourse.
  • Thecourse is designed by professionals.
  • Get 24/7 Instant Learning Assistance and Tutor Support with this course.
  • Thecourse is developed by highly experienced industry experts.
  • All required course materials to thecourse included in the initial fee.
  • The course is accessible through smartphones, tablets, and laptops.
  • Thecourse is fully online, so you can access this course from anywhere and anytime.

Certificates

Reed courses certificate of completion

Digital certificate - Included

Will be downloadable when all lectures have been completed

Curriculum

1
section
104
lectures
11h 57m
total
    • 1: 1_course_overview (360p) 08:23
    • 2: 1_getting_your_name_out_there_section_overview (360p) 02:09
    • 3: 1_hacking_lab_section_overview (360p) 08:43
    • 4: 1_launching_attacks_overview (360p) 10:18
    • 5: 1_linux+python+bash+powershell_basics_overview (360p) 05:38
    • 6: 1_making_money_section_overview (360p) 01:50
    • 7: 1_mobile_phone_hacking_section_overview (360p) 10:31
    • 8: 1_networking_section_overview (360p) 11:57
    • 9: 1_post_exploitation_section_overview (360p) 03:07
    • 10: 1_potential_salary___cybersecurity_roadmap (360p) 10:25
    • 11: 1_reconnaissance_section_overview (360p) 03:58
    • 12: 1_remaining_anonymous_section_overview (360p) 06:02
    • 13: 1_website___web_app_hacking_overview (360p) 06:08
    • 14: 1_wifi_hacking_section_overview (360p) (1) 05:39
    • 15: 1_wifi_hacking_section_overview (360p) 05:39
    • 16: 2_about_your_instructors (360p) 02:31
    • 17: 2_analyzing_information_gathered (360p) 03:30
    • 18: 2_book_recomendations (360p) 02:32
    • 19: 2_bug_bounty_programs (360p) 04:22
    • 20: 2_building_a_brand (360p) 09:13
    • 21: 2_how_data_travels_across_the_internet (360p) 01:39
    • 22: 2_linux_basics (360p) 10:34
    • 23: 2_Mobile_Attack_Vectors 01:57
    • 24: 2_Passive_+_Active_Recon 01:11
    • 25: 2_Privledge_Escalation 29:00
    • 26: 2_tor_browser_overview (360p) 05:31
    • 27: 2_understanding_virtual_machines (360p) 03:22
    • 28: 2_web_application_scanning (360p) 07:51
    • 29: 2_wifi_hacking_system_setup (360p) 09:28
    • 30: 3_anonsurf_overview (360p) 03:15
    • 31: 3_directory_buster_hacking_tool (360p) 02:49
    • 32: 3_how_to_start_freelancing (360p) 10:43
    • 33: 3_mobile_hacking_with_url_s (360p) 02:02
    • 34: 3_personal_branding (360p) 13:18
    • 35: 3_places_to_practice_hacking_for_free (360p) 03:14
    • 36: 3_recon-ng_overview (360p) 14:51
    • 37: 3_section_overview (360p) 03:20
    • 38: 3_setup_your_kali_linux_machine (360p) 09:33
    • 39: 3_taking_advantage_of_telenet (360p) 06:01
    • 40: 3_transferring_files_within_victim,_creating_custom_malware_+evading_av (360p) 27:23
    • 41: 3_understanding_ports_and_protocols (360p) 08:23
    • 42: 3_wep_hacking_attack_#1 (360p) 08:31
    • 43: 3_working_with_directories___moving_files (360p) 02:46
    • 44: 4_changing_mac_addresses (360p) 02:42
    • 45: 4_current_cybersecurity_market (360p) 08:39
    • 46: 4_how_to_start_client_consulting (360p) 09:07
    • 47: 4_installing___updating_app_files (360p) 02:03
    • 48: 4_installing_a_keylogger (360p) 02:33
    • 49: 4_jail_breaking_and_rooting_considerations (360p) 00:55
    • 50: 4_Nikto_Web_App_Hacking_Tool 03:26
    • 51: 4_Public___Private_IP_s_Overview 02:14
    • 52: 4_Searching___Understanding_Exploits 05:46
    • 53: 4_Setup_Your_Website_and_Blog 11:26
    • 54: 4_VN_Setup___Testing_Vulnerable_Systems 23:09
    • 55: 4_WEP_Hacking_Attack_#2 04:26
    • 56: 4_Whois_Enum 01:59
    • 57: 5_Copy_Exploits_From_Searchsploit 02:51
    • 58: 5_DNS_Enumeration_Overview 02:07
    • 59: 5_Installing_a_Backdoor 06:30
    • 60: 5_Linux_Text_Editors 04:28
    • 61: 5_Privacy_Issues_(Geo_Location) 00:54
    • 62: 5_SQLmap_and_SQL_Ninja_Overview 00:46
    • 63: 5_The_3_Types_of_Hackers 04:50
    • 64: 5_Using_a_Virtual_Private_Network___Server_(VPN,_VPS) 04:19
    • 65: 5_What_Are_Subnets 02:58
    • 66: 5_WPA___WPA2_Hacking 10:20
    • 67: 5_Writing_a_Book 09:52
    • 68: 6_How_To_Execute_Brute_Force_Attacks 13:20
    • 69: 6_Mobile_Phone_Data_Security 02:29
    • 70: 6_netcraft_dns_information (360p) 02:30
    • 71: 6_searching_for_files (360p) 02:17
    • 72: 6_starting_a_podcast (360p) 08:14
    • 73: 6_the_4_elements_of_security (360p) 04:06
    • 74: 6_the_average_network_vs_remote_based (360p) 05:33
    • 75: 6_understanding_exploits (360p) 04:25
    • 76: 7_bash_scripting (360p) 09:02
    • 77: 7_ethical_hacking_terminology (360p) 03:45
    • 78: 7_google_hacking_overview (360p) 04:48
    • 79: 7_launching_exploits (360p) 24:26
    • 80: 7_networking_overview (360p) 06:21
    • 81: 7_using_command_injection (360p) 03:21
    • 82: 8_brute_force_attacks (360p) 06:53
    • 83: 8_common_methods_of_hacking (360p) 07:52
    • 84: 8_malicious_file_uploads (360p) 10:27
    • 85: 8_python_basics (360p) 10:38
    • 86: 8_shodanio_overview (360p) 02:12
    • 87: 9_cyber_security___ethical_hacking_overview (360p) 02:31
    • 88: 9_how_to_crack_passwords (360p) 04:12
    • 89: 9_local___remote_file_inclusion (360p) 10:12
    • 90: 9_securityheaderscom_(analyze_https_headers_of_website) (360p) 01:45
    • 91: 10_arp_spoofing_overview (360p) 21:26
    • 92: 10_ethical_hacking_vs_pentration_testing (360p) 05:57
    • 93: 10_sql_injection (360p) 18:32
    • 94: 10_ssllabscomssltest_(look_for_ssl_issues_on_website) (360p) 02:05
    • 95: 11_introduction_to_cryptography (360p) 13:30
    • 96: 11_jobs_opportunities_in_cybersecurity (360p) 01:25
    • 97: 11_pastebincom_(sensitive_information) (360p) 00:58
    • 98: 11_using_cross_site_forgery (360p) 10:58
    • 99: 12_cross_site_scripting_overview (360p) 12:25
    • 100: 12_nmap_port_scanning_(discover_open_ports,_os,_services, (360p) 15:06
    • 101: 12_who_s_this_course_for (360p) 01:15
    • 102: 13_netcat_overview_+_smb___nfs_enumeration (360p) 14:06
    • 103: 14_nikto___sparta_web_application_scanner (360p) 05:29
    • 104: 15_smpt_enumeration_+_nessus_+openvas_scanners (360p) 04:30

Course media

Description

The Ethical Hacking from A-Z course has been developed with the following modules:

Course Introduction

  • Course Overview
  • About Your Instructors
  • Section Overview
  • Current Cybersecurity Market
  • The 3 Types of Hackers
  • The 4 Elements of Security
  • Ethical Hacking Terminology
  • Common Methods of Hacking
  • Cyber Security and Ethical Hacking Overview
  • Ethical Hacking vs Pentration Testing
  • Jobs Opportunities in Cybersecurity
  • Who's This Course For

Networking Basics

  • Networking Section Overview
  • How Data Travels Across The Internet
  • Understanding Ports and Protocols
  • Public and Private IP Address Overview
  • What Are Subnets
  • The Average Network vs Remote Based

Setting Up Your Hacking Lab

  • Hacking Lab Section Overview
  • Understanding Virtual Machines
  • Setup Your Kali Linux Machine
  • VN Setup and Testing Vulnerable Systems

Linux/Python/Bash & PowerShell Basics

  • Linux+Python+Bash+Powershell Basics Overview
  • Linux Basics
  • Working With Directories and Moving Files
  • Installing and Updating App Files
  • Linux Text Editors
  • Searching For Files
  • Bash Scripting

Python Basics

How To Remain Anonymous On The Web

  • Remaining Anonymous Section Overview
  • TOR Browser Overview
  • Anonsurf Overview
  • Changing Mac Addresses
  • Using a Virtual Private Network and Server (VPN, VPS)

How To Hack Into WIFI

  • WiFi Hacking Section Overview
  • Wifi Hacking System Setup
  • WEP Hacking Attack #1
  • WEP Hacking Attack #2
  • WPA and WPA2 Hacking

Passive & Active Reconnaissance (Information Gathering)

  • Reconnaissance Section Overview
  • Passive + Active Recon
  • Recon-ng Overview
  • Whois Enum
  • DNS Enumeration Overview
  • Netcraft DNS Information
  • Google Hacking Overview
  • Shodanio Overview
  • Securityheaderscom (Analyze HTTPS Headers of website)
  • Ssllabscomssltest (Look for SSL issues on website)
  • Pastebincom (Sensitive Information)
  • NMAP Port Scanning (Discover open ports, OS, Services,
  • Netcat Overview + SMB _ NFS Enumeration
  • Nikto and Sparta Web Application Scanner
  • SMPT Enumeration + Nessus +Openvas Scanners

Launching Attacks

  • Launching Attacks Overview
  • Analyzing Information Gathered
  • Taking Advantage of Telenet
  • Searching and Understanding Exploits
  • Copy Exploits From Searchsploit
  • Understanding Exploits
  • Launching Exploits
  • Brute Force Attacks
  • How To Crack Passwords
  • ARP Spoofing Overview
  • Introduction To Cryptography

Post Exploitation

  • Post Exploitation Section Overview
  • Privledge Escalation
  • Transferring Files Within Victim, Creating Custom Malware +Evading AV
  • Installing a Keylogger
  • Installing a Backdoor

Website & Web Application Hacking

  • Website and Web App Hacking Overview
  • Web Application Scanning
  • Directory Buster Hacking Tool
  • Nikto Web App Hacking Tool
  • SQLmap and SQL Ninja Overview
  • How To Execute Brute Force Attacks
  • Using Command Injection
  • Malicious File Uploads
  • Local and Remote File Inclusion
  • SQL Injection
  • Using Cross Site Forgery
  • Cross Site Scripting Overview

Mobile Phone Hacking & Security

  • Mobile Phone Hacking Section Overview
  • Mobile Attack Vectors
  • Mobile Hacking with URLs
  • Jail Breaking and Rooting Considerations
  • Privacy Issues (Geo Location)
  • Mobile Phone Data Security

Getting Your Name Out There As An Ethical Hacker

  • Getting Your Name Out There Section Overview
  • Building A Brand
  • Personal Branding
  • Setup Your Website and Blog
  • Writing a Book
  • Starting a Podcast
  • Networking Overview

How To Make Money As An Ethical Hacker

  • Making Money Section Overview
  • Bug Bounty Programs
  • How To Start Freelancing
  • How To Start Client Consulting

How To Start A Career In Cybersecurity

  • Potential Salary and Cybersecurity Roadmap
  • Book Recomendations
  • Places to Practice Hacking for Free
  • Taking Advantage of Telenet



Certification

After successful completion of your Ethical Hacking from A-Z course, you will get an instant e-certificate. Our courses are fully accredited with updated industry knowledge and skills that aim at making you an expert in the field.

Who is this course for?

This comprehensive Ethical Hacking from A-Z course is ideal for anyone who wants to learn about Ethical Hacking from A-Z and individuals associated with the Ethical Hacking from A-Z sector and the following areas such as:

  • Anybody interested in learning ethical hacking / penetration testing
  • Anybody interested in learning how hackers hack computer systems
  • Anybody interested in learning how to secure systems from hackers

Requirements

To participate in this Ethical Hacking from A-Z course, all you need is —

  • A smart device.
  • A secure internet connection.
  • And a keen interest in Ethical Hacking
  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory.
  • Operating System: Windows / OS X / Linux

Career path

This Ethical Hacking from A-Z course is ideal for anyone who wants to pursue their dream career in a relevant industry, particularly the followings:

  • Security Engineer - £35,000 - £40,000 per annum
  • Network Security Engineer - £45,000 - £50,000 per annum
  • IT Security Engineer - £45,000 - £50,000 per annum

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.