Exclusive Deal! 0% Off, Today Only!
Sale Ends In
Learn how to make a genuine difference in your life by taking our popular Ethical Hacking & IT Security Course. Our commitment to online learning and our technical experience has been put to excellent use within the content of these educational modules. By enrolling today, you can take your knowledge of Ethical Hacking & IT Security to a whole new level and quickly reap the rewards of your study in the field you have chosen.
We are confident that you will find the skills and information that you will need to succeed in this area and excel in the eyes of others. Do not rely on substandard training or half-hearted education. Commit to the best, and we will help you reach your full potential whenever and wherever you need us.
Please note that Ethical Hacking & IT Security provides valuable and significant theoretical training for all. However, it does not offer official qualifications for professional practice. Always check details with the appropriate authorities or management.
By completing the training in Ethical Hacking & IT Security, you will be able to significantly demonstrate your acquired abilities and knowledge of Ethical Hacking & IT Security. This can give you an advantage in career progression, job applications, and personal mastery in this area.
This course is designed to provide an introduction to Ethical Hacking & IT Security and offers an excellent way to gain the vital skills and confidence to start a successful career. It also provides access to proven educational knowledge about the subject and will support those wanting to attain personal goals in this area. Full-time and part-time learners are equally supported, and the study periods are entirely customisable to your needs.
Once you have completed all the modules in the Ethical Hacking & IT Security course, you can assess your skills and knowledge with an optional assignment. Our expert trainers will assess your assignment and give you feedback afterwards.
Show off Your New Skills with a Certification of Completion
The learners have to successfully complete the assessment of this Ethical Hacking & IT Security course to achieve the CPD accredited certificate. Digital certificates can be ordered for only £10. Learners can purchase printed hard copies inside the UK for £29, and international students can purchase printed hard copies for £39.
| Introduction to Ethical Hacking | |||
| What is an Ethical Hacker | 00:07:00 | ||
| Terminology Crash Course pt. 1 | 00:09:00 | ||
| Terminology Crash Course pt. 2 | 00:13:00 | ||
| Terminology Crash Course pt. 3 | 00:08:00 | ||
| Legal Considerations | 00:11:00 | ||
| Reconnaissance - Surveying the Attack Surface | |||
| Surveying the Attack Surface | 00:10:00 | ||
| Recon Types | 00:08:00 | ||
| Passive Recon Part 1 | 00:07:00 | ||
| Passive Recon Part 2 | 00:10:00 | ||
| Active Recon | 00:15:00 | ||
| Recon Walkthrough Tools Summary | 00:14:00 | ||
| Maltego Demo | 00:07:00 | ||
| FOCA Demo | 00:05:00 | ||
| DEMO – Harvester | 00:02:00 | ||
| Scanning and Enumeration - Getting Down to Business | |||
| Scanning & enumeration | 00:08:00 | ||
| Identifying Active Hosts pt. 1 | 00:10:00 | ||
| Identifying Active Hosts pt. 2 | 00:13:00 | ||
| Identifying Active Services | 00:18:00 | ||
| OS and Services Fingerprinting | 00:15:00 | ||
| Network Mapping | 00:10:00 | ||
| Final Thoughts | 00:05:00 | ||
| DEMO – Nmap Syntax pt. 1 | 00:14:00 | ||
| DEMO – Nmap Syntax pt. 2 | 00:16:00 | ||
| DEMO – Nmap Hosts Discovery | 00:12:00 | ||
| DEMO – Nmap Service Discovery | 00:17:00 | ||
| DEMO – Nmap Scripts | 00:11:00 | ||
| DEMO – Masscan | 00:11:00 | ||
| Network Presence | |||
| Network Insecurity | 00:04:00 | ||
| Sniffing and Spoofing | 00:13:00 | ||
| Sniffing Tools | 00:09:00 | ||
| Spoofing, Crypto and Wifi | 00:15:00 | ||
| DEMO – tcpdump | 00:11:00 | ||
| DEMO – Wireshark | 00:11:00 | ||
| DEMO – Ettercap | 00:13:00 | ||
| DEMO – Burp Suite | 00:15:00 | ||
| DEMO – Scapy | 00:10:00 | ||
| Attacking | |||
| Security Overview pt. 1: Windows Architecture | 00:18:00 | ||
| Security Overview pt. 2: Credentials Security | 00:16:00 | ||
| Security Overview pt. 3: Memory Corruption and Exploitation | 00:16:00 | ||
| Windows Hacking Basics | 00:20:00 | ||
| Local Access and Privilege Escalation | 00:20:00 | ||
| Dumping Hashes and Cracking Passwords | 00:18:00 | ||
| Linux Attacking Basics pt. 1 | 00:13:00 | ||
| Linux Attacking Basics pt. 2 | 00:14:00 | ||
| References | 00:08:00 | ||
| DEMO – Windows MSF Exploit pt. 1 | 00:13:00 | ||
| DEMO – Windows MSF Exploit pt. 2 | 00:15:00 | ||
| DEMO – Post Exploitation Activities | 00:13:00 | ||
| DEMO – Mimikatz | 00:07:00 | ||
| DEMO – Hashcat | 00:08:00 | ||
| DEMO – Konboot | 00:13:00 | ||
| DEMO – Post Exploitation Windows CMD | 00:14:00 | ||
| DEMO – Post Exploitation Windows Powershell | 00:13:00 | ||
| DEMO – Attacking Linux targets pt. 1 | 00:10:00 | ||
| DEMO – Attacking Linux targets pt. 1 | 00:13:00 | ||
| Web Hacking | |||
| Introduction to Web Hacking | 00:03:00 | ||
| Web Security Architecture Overview pt. 1 | 00:17:00 | ||
| Web Security Architecture Overview pt. 2 | 00:12:00 | ||
| Attacking the Web Server pt. 1 | 00:10:00 | ||
| Attacking the Web Server pt. 2 | 00:11:00 | ||
| Attacking the Platform pt. 1 | 00:19:00 | ||
| Attacking the Platform pt. 2 | 00:08:00 | ||
| Attacking the Technology pt. 1 | 00:21:00 | ||
| Attacking the Technology pt. 2 | 00:17:00 | ||
| OWASP Top 10 pt. 1 | 00:09:00 | ||
| OWASP Top 10 pt. 2 | 00:21:00 | ||
| Attacking the Business Logic pt. 1 | 00:11:00 | ||
| Attacking the Business Logic pt. 2 | 00:15:00 | ||
| Tools and Methodology | 00:20:00 | ||
| References | 00:05:00 | ||
| DEMO – OWASP Mutillidae | 00:09:00 | ||
| SQLI | 00:07:00 | ||
| SQL Map Intro | 00:08:00 | ||
| SQL Map | 00:25:00 | ||
| DEMO – Burpsuite | 00:37:00 | ||
| DEMO – Burpsuite XSS Hunter | 00:16:00 | ||
| DEMO – mitmproxy | 00:10:00 | ||
| DEMO – Skipfish pt.1 | 00:04:00 | ||
| DEMO – Skipfish pt.2 | 00:04:00 | ||
| Social Engineering - Hacking Humans | |||
| Social Engineering Basics | 00:15:00 | ||
| Social Engineering Methods | 00:16:00 | ||
| Tools and Techniques pt. 1 | 00:15:00 | ||
| Tools and Techniques pt. 2 | 00:12:00 | ||
| Tools and Techniques pt. 3 | 00:09:00 | ||
| Physical Security Considerations | 00:13:00 | ||
| Final Thoughts | 00:11:00 | ||
| DEMO – Credential harvesting | 00:02:00 | ||
| DEMO – Website cloning | 00:06:00 | ||
| DEMO – Automating an attack | 00:03:00 | ||
| DEMO – Anti-virus evasion pt. 1 | 00:08:00 | ||
| DEMO – Anti-virus evasion pt. 2 | 00:12:00 | ||
| Assignment | |||
| Assignment – IT: Ethical Hacking & IT Security | 3 weeks, 3 days | ||
| Order Your Certificate | |||
| Claim Your Certificates | 00:00:00 | ||
| Introduction to Ethical Hacking | |||
| What is an Ethical Hacker | 00:07:00 | ||
| Terminology Crash Course pt. 1 | 00:09:00 | ||
| Terminology Crash Course pt. 2 | 00:13:00 | ||
| Terminology Crash Course pt. 3 | 00:08:00 | ||
| Legal Considerations | 00:11:00 | ||
| Reconnaissance - Surveying the Attack Surface | |||
| Surveying the Attack Surface | 00:10:00 | ||
| Recon Types | 00:08:00 | ||
| Passive Recon Part 1 | 00:07:00 | ||
| Passive Recon Part 2 | 00:10:00 | ||
| Active Recon | 00:15:00 | ||
| Recon Walkthrough Tools Summary | 00:14:00 | ||
| Maltego Demo | 00:07:00 | ||
| FOCA Demo | 00:05:00 | ||
| DEMO – Harvester | 00:02:00 | ||
| Scanning and Enumeration - Getting Down to Business | |||
| Scanning & enumeration | 00:08:00 | ||
| Identifying Active Hosts pt. 1 | 00:10:00 | ||
| Identifying Active Hosts pt. 2 | 00:13:00 | ||
| Identifying Active Services | 00:18:00 | ||
| OS and Services Fingerprinting | 00:15:00 | ||
| Network Mapping | 00:10:00 | ||
| Final Thoughts | 00:05:00 | ||
| DEMO – Nmap Syntax pt. 1 | 00:14:00 | ||
| DEMO – Nmap Syntax pt. 2 | 00:16:00 | ||
| DEMO – Nmap Hosts Discovery | 00:12:00 | ||
| DEMO – Nmap Service Discovery | 00:17:00 | ||
| DEMO – Nmap Scripts | 00:11:00 | ||
| DEMO – Masscan | 00:11:00 | ||
| Network Presence | |||
| Network Insecurity | 00:04:00 | ||
| Sniffing and Spoofing | 00:13:00 | ||
| Sniffing Tools | 00:09:00 | ||
| Spoofing, Crypto and Wifi | 00:15:00 | ||
| DEMO – tcpdump | 00:11:00 | ||
| DEMO – Wireshark | 00:11:00 | ||
| DEMO – Ettercap | 00:13:00 | ||
| DEMO – Burp Suite | 00:15:00 | ||
| DEMO – Scapy | 00:10:00 | ||
| Attacking | |||
| Security Overview pt. 1: Windows Architecture | 00:18:00 | ||
| Security Overview pt. 2: Credentials Security | 00:16:00 | ||
| Security Overview pt. 3: Memory Corruption and Exploitation | 00:16:00 | ||
| Windows Hacking Basics | 00:20:00 | ||
| Local Access and Privilege Escalation | 00:20:00 | ||
| Dumping Hashes and Cracking Passwords | 00:18:00 | ||
| Linux Attacking Basics pt. 1 | 00:13:00 | ||
| Linux Attacking Basics pt. 2 | 00:14:00 | ||
| References | 00:08:00 | ||
| DEMO – Windows MSF Exploit pt. 1 | 00:13:00 | ||
| DEMO – Windows MSF Exploit pt. 2 | 00:15:00 | ||
| DEMO – Post Exploitation Activities | 00:13:00 | ||
| DEMO – Mimikatz | 00:07:00 | ||
| DEMO – Hashcat | 00:08:00 | ||
| DEMO – Konboot | 00:13:00 | ||
| DEMO – Post Exploitation Windows CMD | 00:14:00 | ||
| DEMO – Post Exploitation Windows Powershell | 00:13:00 | ||
| DEMO – Attacking Linux targets pt. 1 | 00:10:00 | ||
| DEMO – Attacking Linux targets pt. 1 | 00:13:00 | ||
| Web Hacking | |||
| Introduction to Web Hacking | 00:03:00 | ||
| Web Security Architecture Overview pt. 1 | 00:17:00 | ||
| Web Security Architecture Overview pt. 2 | 00:12:00 | ||
| Attacking the Web Server pt. 1 | 00:10:00 | ||
| Attacking the Web Server pt. 2 | 00:11:00 | ||
| Attacking the Platform pt. 1 | 00:19:00 | ||
| Attacking the Platform pt. 2 | 00:08:00 | ||
| Attacking the Technology pt. 1 | 00:21:00 | ||
| Attacking the Technology pt. 2 | 00:17:00 | ||
| OWASP Top 10 pt. 1 | 00:09:00 | ||
| OWASP Top 10 pt. 2 | 00:21:00 | ||
| Attacking the Business Logic pt. 1 | 00:11:00 | ||
| Attacking the Business Logic pt. 2 | 00:15:00 | ||
| Tools and Methodology | 00:20:00 | ||
| References | 00:05:00 | ||
| DEMO – OWASP Mutillidae | 00:09:00 | ||
| SQLI | 00:07:00 | ||
| SQL Map Intro | 00:08:00 | ||
| SQL Map | 00:25:00 | ||
| DEMO – Burpsuite | 00:37:00 | ||
| DEMO – Burpsuite XSS Hunter | 00:16:00 | ||
| DEMO – mitmproxy | 00:10:00 | ||
| DEMO – Skipfish pt.1 | 00:04:00 | ||
| DEMO – Skipfish pt.2 | 00:04:00 | ||
| Social Engineering - Hacking Humans | |||
| Social Engineering Basics | 00:15:00 | ||
| Social Engineering Methods | 00:16:00 | ||
| Tools and Techniques pt. 1 | 00:15:00 | ||
| Tools and Techniques pt. 2 | 00:12:00 | ||
| Tools and Techniques pt. 3 | 00:09:00 | ||
| Physical Security Considerations | 00:13:00 | ||
| Final Thoughts | 00:11:00 | ||
| DEMO – Credential harvesting | 00:02:00 | ||
| DEMO – Website cloning | 00:06:00 | ||
| DEMO – Automating an attack | 00:03:00 | ||
| DEMO – Anti-virus evasion pt. 1 | 00:08:00 | ||
| DEMO – Anti-virus evasion pt. 2 | 00:12:00 | ||
| Assignment | |||
| Assignment – IT: Ethical Hacking & IT Security | 3 weeks, 3 days | ||
| Order Your Certificate | |||
| Claim Your Certificates | 00:00:00 | ||

