• legofiedu (@) gmail.com
  • Mumbai | Nashik
  • +91-9820853150

Ethical Hacking

Ethical Hacking Mastery: From Fundamentals to Exploitation

Duration: 3 Months

Next Batch: July 1, 2025

Category: Security

Ethical Hacking

Course Description

Step into the world of cybersecurity with this hands-on, beginner-friendly course in Ethical Hacking. Designed for aspiring cybersecurity professionals, developers, and tech enthusiasts, this course provides a structured pathway from foundational knowledge to real-world exploitation techniques—equipping you to ethically test and secure modern digital systems.

Whether you’re aiming to become a penetration tester, boost your IT skillset, or understand how attackers think, this course helps you develop the mindset and technical toolkit needed for ethical hacking success.

Next Batch (July 1, 2025)

Enroll Now

1.1 Introduction (7 mins)

1.1 Introduction (7 mins)

1.1 Introduction (7 mins)

1.2 Ethical hacking (5 mins)

1.2 Ethical hacking (5 mins)

1.2 Ethical hacking (5 mins)

1.3 Stages of Security testing (5 mins)

1.3 Stages of Security testing (5 mins)

1.3 Stages of Security testing (5 mins)

2.1 What is a virtual machine? (5 mins)

2.1 What is a virtual machine? (5 mins)

2.2 Install Virtual Box (3 mins)

2.2 Install Virtual Box (3 mins)

2.3 Install Kali Linux (12 mins)

2.3 Install Kali Linux (12 mins)

2.4 Create Virtual Machine (8 mins)

2.4 Create Virtual Machine (8 mins)

2.5 Install OS (6 mins)

2.5 Install OS (6 mins)

3.1 Installation and Initial Execution (3 mins)

3.1 Installation and Initial Execution (3 mins)

3.2 Basics - 1 (Vars, Constants, Assignment, Operators) (9 mins)

3.2 Basics - 1 (Vars, Constants, Assignment, Operators) (9 mins)

3.3 Basics - 2 (If, Loops, Collections) (8 mins)

3.3 Basics - 2 (If, Loops, Collections) (8 mins)

3.4 Classes (8 mins)

3.4 Classes (8 mins)

3.5 Modules (4 mins)

3.5 Modules (4 mins)

3.6 Securiy Related Constructs (5 mins)

3.6 Securiy Related Constructs (5 mins)

4.1 Terminal (3 mins)

4.2 Files and Directories (5 mins)

4.3 nano and vi editors (5 mins)

4.4 ssh and ftp (3 mins)

4.5 Find and grep (3 mins)

4.6 ipconfig (3 mins)

5.1 Section Introduction (5 mins)

5.2 WhoIs tool (5 mins)

5.3 Whatweb : Basic (5 mins)

5.4 Whatweb : Advanced (5 mins)

5.5 Gather Emails (5 mins)

5.6 Extra Tools (5 mins)

5.7 Extra Tools: Example(Sherlock) (5 mins)

5.8 Coding: Email Scraper (5 mins)

6.1 Section Introduction (5 mins)

6.2 TCP and UDP (5 mins)

6.3 Install Target Machine (5 mins)

6.4 Netdiscover (5 mins)

6.5 nmap: Introduction (5 mins)

6.6 nmap: scan types (5 mins)

6.7 nmap: Find OS (5 mins)

6.8 nmap: Services and Versions (5 mins)

6.9 nmap: Port Scans (5 mins)

6.10 nmap: Firewall/IDS (5 mins)

6.11 nmap: Decoys and Packet Fragmentation (5 mins)

6.12 nmap: options (5 mins)

7.1 nmap: Scripts Introduction (5 mins)

7.1 nmap: Scripts Introduction (5 mins)

7.2 nmap: Scripts Groups (5 mins)

7.2 nmap: Scripts Groups (5 mins)

7.3 nmap: Running a single script (5 mins)

7.3 nmap: Running a single script (5 mins)

7.4 Search for a Exploitable - 1 (5 mins)

7.4 Search for a Exploitable - 1 (5 mins)

7.5 Search for a Exploitable - 2(SearchSpoilt) (5 mins)

7.5 Search for a Exploitable - 2(SearchSpoilt) (5 mins)

7.6 Nessus: Installation (5 mins)

7.6 Nessus: Installation (5 mins)

7.7 Nessus: Finding Vulnerabilities (5 mins)

7.7 Nessus: Finding Vulnerabilities (5 mins)

7.8 Nessus: Scan Windows machine (5 mins)

7.8 Nessus: Scan Windows machine (5 mins)

8.1 What is Exploitation and Vulnerability? (5 mins)

8.1 What is Exploitation and Vulnerability? (5 mins)

8.2 Bind and Reverse Shells (5 mins)

8.2 Bind and Reverse Shells (5 mins)

8.3 MetaSpoilt Framework (5 mins)

8.3 MetaSpoilt Framework (5 mins)

8.4 MsfConsole (5 mins)

8.4 MsfConsole (5 mins)

8.5 Exploiting metaspoliable-1(SSH) (5 mins)

8.5 Exploiting metaspoliable-1(SSH) (5 mins)

8.6 Exploiting metaspoliable-2(Telnet) (5 mins)

8.6 Exploiting metaspoliable-2(Telnet) (5 mins)

8.7 Exploiting metaspoliable-3(FTP) (5 mins)

8.7 Exploiting metaspoliable-3(FTP) (5 mins)

8.8 Exploiting windows machine-1(Install) (5 mins)

8.8 Exploiting windows machine-1(Install) (5 mins)

8.9 Exploiting windows machine-2(EternalBlue) (5 mins)

8.9 Exploiting windows machine-2(EternalBlue) (5 mins)

8.10 Exploiting windows machine-2(DoublePulsar) (5 mins)

8.10 Exploiting windows machine-2(DoublePulsar) (5 mins)

8.11 Exploiting windows machine-3(BlueKeep) (5 mins)

8.11 Exploiting windows machine-3(BlueKeep) (5 mins)

8.12 Exploiting Routers (5 mins)

8.12 Exploiting Routers (5 mins)

9.1 msvenom (5 mins)

9.2 msvenom options (5 mins)

9.3 Using Veil (5 mins)

9.4 FatRat Payload (5 mins)

9.5 Hexeditor (5 mins)

9.6 Create Payload as Image (5 mins)

10.1 What is Post-Exploitation (5 mins)

10.2 Meterpreter 1 (5 mins)

10.3 Meterpreter 2 (5 mins)

10.4 Elevating Priveleges (5 mins)

10.5 Persistence (5 mins)

10.6 Other Post-Exploitation Modules (5 mins)

11.1 What is Website penetrating testing? (5 mins)

11.2 Dirb Tool (5 mins)

11.3 Burpsuite (5 mins)

11.4 ShellShock Exploitation (5 mins)

11.5 Command Injection (12 mins)

11.6 Reflected xss (5 mins)

11.7 Stored xss (5 mins)

11.8 HTML Injection (8 mins)

11.9 SQL Injection (7 mins)

11.10 CSRF Vulnerability (5 mins)

11.11 Hydra Bruteforce (10 mins)

11.12 Burpsuite Intruder BruteForce (7 mins)

12.1 What is Man in the middle? (5 mins)

12.2 BetterCap Tool (8 mins)

12.3 Ettercap Tool (6 mins)

12.4 Scapy tool (5 mins)

13.1 What is Anonimity (3 mins)

13.2 Tor Browser (7 mins)

13.3 Proxychains (4 mins)

13.4 VPN Install (3 mins)

13.5 WhoAmI (5 mins)

Sections 13

Total Time 700.0 minutes

Trainer

Rupesh Saini

I have more than 20 years experience in design , development and deployment of IT systems. My students have gone to have fulfilling careers in the IT industry.

Read more