Browse Library

Ethical Hacking and Penetration Testing

Hack yourself before someone else does !

Instructed by Darshil Modi

5 days left at this price!
  • Single Course access $25 $30 17% off
    Buy
    Buy
    $25
    It Includes:
    Get access to this course only.
    Access to all marketplace courses
    Lifetime Course Access
    Play & Pause Videos
    High Quality Recorded Lectures
    Learn Online from Mobile/PC/Tablet
    Download Course for Offline Viewing
    Inlcudes Real Projects
    Free Instructor Support
  • 1 Month Full Access$19/moLimited offer! (Access 3000+ courses)
    Buy
    Buy
    $19
    It Includes:
    Get Monthly Unlimited Access (1 user)
    Access to all marketplace courses
    Play & Pause Videos
    High Quality Recorded Lectures
    Learn Online from Mobile/PC/Tablet
    Download Course for Offline Viewing
    Inlcudes Real Projects
    Certificate of Completion
    Free Instructor Support
  • Monthly $15/Per user (min 5 users) ($14/user/mo)
    Buy
    Buy
    $15
    It Includes:
    All Personal plan features +
    Best for small teams or Business
    Unlimited access for team
    Admin Dashboard & Analytics
    Basic reporting
    User Management
    Custom Branding Options
  • Yearly $169/Per user (min 5 users) ($14/user/mo)
    Buy
    Buy
    $169
    It Includes:
    All Personal plan features +
    Best for small teams or Business
    Unlimited access for team
    Admin Dashboard & Analytics
    Basic reporting
    User Management
    Custom Branding Options
  • How to use computers and internet securely.
  • How to secure your system from hackers and intruders
  • Know how hackers hack into systems
  • Windows hacking
  • Accessing Dark web
  • How to use Metasploit framework
  • How to use browser exploitation framework
  • Phishing and its counter measures (Self researched Technique)
  • information gathering
  • CEH guidance

Learn Ethical Hacking and penetration Testing from the author of famous book "Hack yourself before someone else does".

Our most popular information security and hacking training covers the techniques used by malicious, black hat hackers with high energy lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization or individual's system. You’ll leave with the ability to quantitatively assess and measure threats to information assets; and discover where your system is most vulnerable to hacking in this network security training course.

The goal of this course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation. This ethical hacking training course has a significant return on investment, since you gain hacking skills that are highly in demand.

Black Hat hackers are always changing their tactics to get one step ahead of the good guys. We update our course materials regularly to ensure that you learn about the current threats to your organization’s networks and systems.

 More tutorials will be added soon ! The course is still in progress.

  • A computer network with internet connection
  • Intellectuality and responsibility.
  • Anyone using computers and internet
  • Passionate computer geeks
  • Anyone professionally involved in Network administration
  • Anyone professionally involved in Network and information Security
View More...

Section 1 : Introduction

  • Lecture 1 :
  • Google Privacy invasion - live demo Preview
  • Lecture 2 :
  • Types of hackers
  • Lecture 3 :
  • Phases of pen testing

Section 2 : Setting up hacking environment

  • Lecture 1 :
  • Setting up hacking lab using virtual box

Section 3 : Passwords and Windows hacking

  • Lecture 1 :
  • How passwords are stored ?
  • Lecture 2 :
  • Windows hacking

Section 4 : Footprinting

  • Lecture 1 :
  • Foot printing
  • Lecture 2 :
  • Footprinting techniques

Section 5 : Browser Exploitation Framework

  • Lecture 1 :
  • Browser Exploitation Framework - Intro
  • Lecture 2 :
  • BeEf - 2
  • Lecture 3 :
  • Hooking a Browser in BeEf

Section 6 : Denial of service attacks

  • Lecture 1 :
  • Dos and ddos attacks
  • Lecture 2 :
  • Distributed dos attack

Section 7 : Phishing

  • Lecture 1 :
  • Stealing passwords using phishing
  • Lecture 2 :
  • Phishing - live demo
  • Lecture 3 :
  • Self researched technique to avoid being phished
  • Lecture 4 :
  • How hackers bypass OTP (One time password)

Section 8 : Wifi Hacking

  • Lecture 1 :
  • Wifi Hacking
  • Lecture 2 :
  • Wifi phishing
  • Lecture 3 :
  • Protecting Wifi network.

Section 9 : Dark Web

  • Lecture 1 :
  • Accessing Dark-web
  • 1. How do i access the course after purchase?

    Once you purchase a course (Single course or Subscription), you will be able to access the courses instantly online by logging into your account. Use the user name & password that you created while signing up. Once logged in, you can go to the "My Courses" section to access your course.
  • 2. Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • 3. Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • 4. How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • 5. Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • 6. Do i get any certification after completing the course?

    Yes. Once you succesfully complete any course on Learnfly marketplace, you get a certiifcate of course completion emailed to you within 24 hours with your name & the Learnfly badge. You can definately brag about it & share it on your social media or with friends as one of your achievement. Click here to view the sample certificate Click Here
  • 7. For how long can i access my course after the purchase?

    If you buy a single course, that course is accessible to you for a lifetime. If you go for a premium subcription, you can access all the courses on Learnfly marketplace till your subscription is Active.
  • 8. Whats the difference between Single Course Purchase & Go Premium option?

    With Single Course Purchase, you only get an access of one single course. Whereas, with premium monhtly or annual subscription, you can access all the existing or new courses on learnfly marketplace. You can decide what option suits you the best and accordingly you can make your purchase.
  • 9. Is there any free trial?

    Currently, we don't have any free trial but it may be available in near future.
  • 10. What is the refund policy?

    We would hate you to leave us. However, if you are not satisfied, you can ask for a full refund within 30 days & we will be happy to assist you further.

Darshil Modi,

I am Darshil modi, founder of eagle eye network solutions and author of a book "hack yourself before someone else does". I live in Ahmedabad, India and pursuing bachelors in computer science. I am on my way to make internet and technology a better thing to dwell with. I am here to share with you my hacking skills that are extremely high on demand in this information technology dependent world.

View More...
learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Atef

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

cissp-certification-introduction

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

practical-blockchain-smart-contracts-ethereum-solidity

Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40

Sign up and start learning
By signing up, you agree to our Terms of Use and Privacy Policy
Forget Password