Ethical Hacking Foundation
Hack like a pro with 30 hours of intensive, hands-on training led by a real hacker. All the prerequisite knowledge for getting started will be provided.
Entry Level
30 hours
Discount
Save 16% on Ethical Hacking 101
Created by
Semicolon Academy
What you'll learn
- Principles and basics of cybersecurity and ethical hacking.
- Setting up and creating a virtual hacking environment using Kali Linux.
- Conducting WI-FI attacks such as WPA/WPA2 hacking, ARP exploitation, MITM, and more.
- Network penetration testing, using information gathering, scanning, and tools like Nmap.
- Exploiting web vulnerabilities like logical vulnerabilities, IDOR, CSRF, XSS, Injections, and more.
- Understanding theoretical and practical aspects of each attack and how to defend against it.
- Real-world examples of how we hacked the tech giants (Meta, Google, Tiktok, and others).
- Fundamentals of bug bounty hunting and how to write professional security reports.
- How to start making money and build a career in this exciting field.
Upcoming Live Session
Get ready to meet your instructor in the upcoming ETH 101 live session. Enroll now and join on time.
- kickoff session
- Monday, October 28, 2024
- 8:00 PM
Course Syllabus
0
Let's Start
- ETH 101 Overview
- Meet Majd Dhainy
- Extremely Important Instructions ⚠️
1
Chapter 1: Introduction To Cybersecurity
- Getting Started
- Demystifying Hacking
- Red Team vs. Blue Team
- Black, White, and Gray Hat Hackers
- Penetration Testing
- Penetration Testing vs. Bug Bounty Hunting
- Setting Up The Lab
- Kali Linux
- Linux Commands: Part 1
- Linux Commands: Part 2
- Linux Commands: Part 3
- Linux Commands: Part 4
- Linux Commands: Part 5
- Protocols, IP & MAC Addresses
- Port, TCP and UDP Protocols
- Router
- Server
- HTTP & DNS
- Cryptography
- Caesar Cipher
- Cryptography Challenge
- Hashing
- Recommended Books & Articles
- External Resource: Public Key Cryptography
- External Resource: Learn the 50 most popular Linux commands
Learn from real hackers
Majd Dhainy
Course Instructor
Cybersecurity Researcher with a strong background in software engineering, specializing in securing web services, enhancing APIs, and addressing issues from requirements to deployment. Acknowledged for uncovering global vulnerabilities, listed on bug bounty Hall of Fames for Meta, Google, Revolut, LinkedIn, Medium, Trivago, and more.
Students Feedback
Still Have Any Questions?
Check out the FAQs.
- No Linux, programming, or hacking knowledge required.
- Computer with a minimum of 4GB ram/memory.
- Operating System: Windows/ OS X/ Linux.
- Wireless adapter that supports monitor mode for Wi-Fi Hacking.
- Being passionate about learning security.
- Beginners
- Web Application Developers
- Anyone interested in learning ethical hacking/penetration testing
- Anyone interested in Web Application Security and Bug Bounty Hunting
- No, the approach we will take for this course will be a black box approach. Therefore, we do not assume previous coding skills.
- Hunting for bugs on big companies like Facebook, Google, and Instagram.
- Become a junior web application penetration tester.
- If you are a developer of Web applications, you will be able to develop a secure application.
- You can start your career as a junior penetration tester.
- Upon successful completion of the course, students will be issued a digital certificate.
- When learning a skill like hacking, you want to be taught by someone who actually works in the industry and has dedicated their life in this field, not just another online instructor!