The 2023 Complete Cyber Security Ethical Hacking Certification Bundle

3 Reviews
1262 Enrolled
10 Courses & 133 Hours
Save 98% -

What's Included

Learn Ethical Hacking: Beginner to Advanced
  • Certification included
  • Experience level required: All levels
  • Access 148 lectures & 28 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

148 Lessons (28h)

  • Your First Program
  • Introduction and Installation
    VirtualBox installation15:36
    Kali Linux installation13:54
    Enabling full screen18:16
  • Basic Linux Commands
    Basic Linux commands part 19:41
    Basic Linux commands part 221:04
    Basic Linux commands part 312:45
  • Creating a Secure Hacking Environment
    Changing IP addresses and wireless adapter setup4:51
    Creating a bootable Kali USB drive4:54
    Important networking terms10:15
    Important hacking terms17:58
    Few things to do after installing Kali Linux8:30
    Changing our mac address with macchanger6:24
  • Footprinting
    Google hacking13:08
    Nikto basics10:55
    Whois tool6:39
    Email harvesting6:07
    Zone transfer with dig7:08
  • Scanning
    Installing Metasploitable6:58
    Nmap part 115:32
    Nmap part 211:43
    Nmap part 312:24
    TCP scans15:50
    Nmap bypassing defenses17:23
    Nmap scripts part 19:28
    Nmap scripts part 213:59
  • Website Penetration Testing
    Installing OWASP8:26
    HTTP request9:57
    HTTP response10:27
    Burpsuite configuration12:49
    Editing packets in Burpsuite12:20
    Whatweb and Dirb10:10
    Password recovery attack15:32
    Burpsuite login bruteforce11:01
    Hydra login bruteforce8:44
    Session fixation13:51
    Injection attacks5:31
    Simple command injection11:04
    Exploiting command injection vulnerability7:38
    Finding blind command injection13:39
    SQL basics10:21
    Manual SQL injection part 113:12
    Manual SQL injection part 220:49
    SQLmap basics16:34
    XML injection15:54
    Installing XCAT and preventing injection attacks5:50
    Reflected XSS10:46
    Stored XSS11:56
    Changing HTML code with XSS7:28
    XSSer and XSSsniper13:32
  • Wireless Cracking
    Wireless attack theory10:49
    Putting network card in monitor mode4:39
    Capturing handshake with airodump14:35
    Cracking with Aircrack15:32
    Cracking with Hashcat14:55
    Making password lists with Crunch18:20
    Making password lists with Cupp7:10
    Rainbow tables part 116:34
    Rainbow tables part 25:38
    Installing Fluxion6:17
    Finding and cracking hidden networks8:18
    Preventing wireless attacks7:57
  • Man in the Middle Attacks
    ARP protocol basics10:28
    MITM attack theory7:18
    Installing MITMf6:36
    Manual ARP spoofing12:47
    Problems while installing MITMf6:18
    HTTP traffic sniffing8:29
    DNS spoofing and HTTPS password sniffing24:18
    Hooking browsers with BEEF16:01
    Screenshotting targets browser11:00
    Cloning any webpage8:53
    Ettercap basics6:57
  • System Hacking with Metasploit
    MSFconsole environment16:05
    Metasploit modules explained12:11
    Bruteforcing SSH with Metasploit15:17
    Attacking Tomcat with Metasploit8:49
    Getting Meterpreter with command injection25:05
    PHP code injection5:43
    2 Metasploitable injections6:57
    Wine installation12:01
    Creating Windows payloads with Msfvenom10:00
    Encoders and Hex editor18:42
    Windows 10 Meterpreter shell11:57
    Meterpreter environment11:25
    Windows 10 privilege escalation11:28
    Preventing privilege escalation6:21
    Post exploitation modules14:10
    Getting Meterpreter over internet with port forwarding10:39
    Eternalblue exploit20:15
    Persistence module13:14
    Hacking over the internet with Ngrok10:24
    Android device attack with Venom9:54
    The real hacking begins now!2:25
  • Python Crash Course
    Raw input10:46
    If else statements10:17
    For loops6:30
    While loops8:23
    Python lists8:03
    Importing libraries6:59
    Files in Python11:43
    Try and except rule5:11
  • Coding an Advanced Backdoor
    Theory behind reverse shells6:47
    Simple server code12:40
    Connection with reverse shell7:07
    Sending and receiving messages10:46
    Sending messages with while true loop7:52
    Executing commands on target system9:37
    Fixing backdoor bugs and adding functions20:08
    First test using our backdoor17:59
    Trying to connect every 20 seconds12:23
    Creating persistence part 16:09
    Creating persistence part 216:45
    Changing directory11:51
    Uploading and downloading files22:29
    Downloading files from internet22:42
    Starting programs using our backdoor6:44
    Capturing screenshot on targets pc18:43
    Embedding backdoor in image part 113:27
    Embedding backdoor in an image part 28:37
    Checking for administrator privileges12:10
    Adding help option8:51
  • Creating a Keylogger for the Backdoor
    Importing Pynput10:20
    Simple keylogger9:55
    Adding report function10:32
    Writing keystrokes to a file13:59
    Adding keylogger to our reverse shell part 122:59
    Adding keylogger to our reverse shell part 27:39
    Final project test14:24
  • Basic Authentication Bruteforcer
    Printing banner11:19
    Adding available options11:12
    Starting threads for bruteforce8:23
    Writing function to run the attack11:02
    Bruteforcing router login9:37
    Bypassing antivirus with your future programs13:41
    Sending malware with spoofed email15:13
  • BONUS - Building a Career in Cyber Security
    Why is ethical hacking important?23:00
    What is the best ethical hacking certification?16:31
    Tips for getting your first job as an ethical hacker18:24
    How I started my career as an ethical hacker14:11
    How to price your work10:47

Learn Ethical Hacking: Beginner to Advanced

Joseph Delgadillo

Joseph Delgadillo | Best-Selling Instructor

4.2/5 Instructor Rating: ★ ★ ★ ★

Joseph Delgadillo teaches skills ranging from computers and technology to entrepreneurship and digital marketing. Take a course with him to get an over-the-shoulder view of how experts are successful in their respective fields. He is a proud alumnus of Central Washington University.


If you would like to master ethical hacking and get a job in the field of cyber security, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux, and Python hacking with over 28 hours of HD video tutorials! This course was designed to be extremely beginner friendly. We will begin by covering how to set up a secure and anonymous pentesting environment, cover essential hacking tools in Kali Linux and finish up with writing our own tools in Python. This course even includes a complete Python crash course, so no previous programming experience is necessary!

4.5/5 average rating: ★ ★ ★ ★

  • Access 148 lectures & 28 hours of content 24/7
  • Set up a Kali Linux system
  • Learn essential Linux system commands
  • Create a secure penetration testing environment
  • Study wireless network security & how to hack WiFi
  • Learn system hacking using Metasploit
  • Write your own pen testing tools

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.


Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here


  • Any device with basic specifications


  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
  • This item is excluded from coupons.
Your cart is empty. Continue Shopping!
Processing order...