Last Update July 14, 2021
2 already enrolled

About This Course

Welcome this comprehensive Ethical Hacking course! This course assumes you have NO prior knowledge in hacking and by the end of it you’ll be able to hack systems like black-hat hackers and secure them like security experts!

This course is specially designed so that if you are not having a windows or mac os you can perform everything just with you Phone.
So we will mainly use one application named Termux and will perform everything from it.

Learning Objectives

Start from scratch and learn all basic concepts used in hacking upto intermediate level
Learn what is ethical hacking, it’s fields and different types of hackers
Discovering vulnerability in systems & exploit them to hack servers
Various hacking tools which allows you to phish Facebook, Instagram, Netflix, etc.
Hack Camera, Take control over android and router.
Types of hacking techniques and making virus and spreading it through link, creating Malicious application which is very powerful.
Case studies and getting started with hacking


  • Anyone with keen interest can learn hacking.
  • Having knowledge of basic programming languages and software architecture is a plus point.
  • Hunger to learn, practice and you can get started today!
  • An android or ios device. Better if above version 4.
  • 1 Gb free Ram and a storage space of 2 Gb for smooth function.

Target Audience

  • Anyone who wants to learn hacking from scratch or brush up his knowledge in hacking.
  • If you wish to build a career in cyber security or professional white hat hacking.


22 Lessons


Security overview pt. 1 Windows architecture00:00:00
Security overview pt. 2 credentials security00:00:00
Security overview pt. 3 memory corruption & exploitation00:00:00
Windows hacking basics00:00:00
Local access and privilege escalation00:00:00
Dumping hashes and cracking passwords00:00:00
Linux attacking basics pt. 100:00:00
Linux attacking basics pt. 200:00:00
DEMO – Windows msf exploit pt. 100:00:00
DEMO – Windows msf exploit pt. 200:00:00
DEMO – Post exploitation activities00:00:00
DEMO – Mimikatz00:00:00
DEMO – Dumping hashes00:00:00
DEMO – Hashcat00:00:00
DEMO – Konboot00:00:00
DEMO – Post exploitation Windows cmd00:00:00
DEMO – Online password cracking pt. 100:00:00
DEMO – Online password cracking pt. 200:00:00
DEMO – Attacking Linux targets pt. 100:00:00
DEMO – Attacking Linux targets pt. 200:00:00
DEMO – Post exploitation Windows powershell00:00:00

Your Instructors


9 Courses
0 Reviews
12 Students
See more

Write a review

22 lectures

Material Includes

  • We will provide you with online lecture videos and resources which will be available lifetime. We will also provide you with pdfs and modules on instructions of every step and to practice hacking which will be available at our website.
  • We will also provide 24*7 help.

Want to receive push notifications for all major on-site activities?

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
  • Attributes
  • Custom attributes
  • Custom fields
Click outside to hide the compare bar
Wishlist 0
Open wishlist page Continue shopping