Course Highlights
  • Learn Ethical Hacking from scratch & All 5 phases of Penetration Testing
  • Learn Python from scratch so you are able to write your own tools for ethical hacking
  • Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with Windows/Mac/Linux)
  • Create additional virtual *vulnerable* machines that we can practice our attacks on
  • Create trojans, viruses, keyloggers for ethical hacking
  • Learn how to bypass Firewalls & Intrusion Detection System with Advanced Scanning
  • Learn how to crack Wireless Access Point passwords
  • Bug Bounty: Discover all types of Web Application Bugs that could cause a threat
  • Learn how to gain access to any type of machine: Windows/Linux/MacOS
  • Sniff passwords over the local area network with Man In The Middle Attacks
  • SQL Injection, XSS, Command Injection and other techniques
  • Learn how to trick people into opening your program (i.e Social Engineering)
  • Learn Advance Metasploit Framework usage
  • Learn Basics of Linux and Linux Terminal
  • Master Information Gathering and Footprinting
  • Learn how to perform Vulnerability Analysis
  • Perform advanced scanning of an entire network
  • Perform Deauthentication Attack to disconnect everyone from the Wireless Access Point
  • Learn Website Application Penetration Testing from scratch
  • Learn Advance Nmap Usage
  • Code your own Advanced Backdoor that you can use in your Penetration Tests
  • Create Persistence on target machines
  • Perform newest Windows 7 + 10 exploits & attacks
  • Learn how to gain access to a router in various ways
  • Learn Networking & different Networking Protocols
  • Combine programming knowledge and ethical hacking knowledge so you can mix techniques and adapt them to different situations
Curriculum

6 Topics
Course Outline
Join Our Online Classroom!
Exercise: Meet Your Classmates & Instructor
What Is Ethical Hacking ?
Course Resources + Guide
ZTM Resources

14 Topics
What is A Virtual Machine ?
Why Linux ?
Monthly Coding Challenges Free Resources and Guides
Downloading Virtual Box & Kali Linux
Note: Kali Linux Updates All The Time!
Creating Our First Virtual Machine
Note: Common Errors With Your First VM
Installing Kali Linux Operating System
Update 1 - New & Old Versions of Kali Linux
Networking Basics
Full Screen Mode & Network Settings
Troubleshooting Network Connection in Kali Linux
Note: Getting Familiar With Kali Linux!
5 Stages Of A Penetration Test

5 Topics
Navigating Through Linux System
Creating Files & Managing Directories
Network Commands & Sudo Privileges In Kali
Note: Linux File System & Additional Commands
Endorsements On LinkedIN

10 Topics
What is Information Gathering ?
Obtaining IP Address Physical Address Using Whois Tool
Whatweb Stealthy Scan
Aggressive Website Technology Discovering on IP Range
Note: Same Tools Different Results!
Gathering Emails Using theHarvester & Hunter.io
How To Download Tools Online
Finding Usernames With Sherlock
Bonus - Email Scraper Tool In Python 3
Note: More About Information Gathering

15 Topics
Theory Behind Scanning
TCP & UDP
Note: Installing Vulnerable Machine
Installing Vulnerable Virtual Machine
Netdiscover
Performing First Nmap Scan
Different Nmap Scan Types
ZTM Nmap Cheat Sheet
Discovering Target Operating System
Detecting Version Of Service Running On An Open Port
Filtering Port Range & Output Of Scan Results
What is a Firewall/IDS ?
Using Decoys and Packet Fragmentation
Security Evasion Nmap Options
Note: Time To Switch Things Up!

3 Topics
The 2 Paths
Note: Do We Need To Learn Programming To Be An Ethical Hacker ?
Coding a Portscanner in Python 3

6 Topics
Finding First Vulnerability With Nmap Scripts
Manual Vulnerability Analysis & Searchsploit
Nessus Installation
Discovering Vulnerabilities With Nessus
Scanning Windows 7 Machine With Nessus
Lets cool down for a bit!

19 Topics
What is Exploitation ?
What is a Vulnerability ?
Reverse Shells Bind Shells ...
Metasploit Framework Structure
Msfconsole Basic Commands
Our First Exploit - vsftp 2.3.4 Exploitation
Misconfigurations Happen - Bindshell Exploitation
Information Disclosure - Telnet Exploit
Software Vulnerability - Samba Exploitation
Attacking SSH - Bruteforce Attack
Exploitation Challenge - 5 Different Exploits
Explaining Windows 7 Setup
Eternal Blue Attack - Windows 7 Exploitation
DoublePulsar Attack - Windows Exploit
BlueKeep Vulnerability - Windows Exploit
Note: We Can Also Target Routers!
Update 2 - Routersploit
Update 3 - Router Default Credentials
Exercise: Imposter Syndrome

4 Topics
Note: Not Everything Will Work Smooth!
Setting Up Vulnerable Windows 10
Crashing Windows 10 Machine Remotely
Exploiting Windows 10 Machine Remotely

8 Topics
Generating Basic Payload With Msfvenom
Advance Msfvenom Usage Part 1
Advance Msfvenom Usage Part 2
Generating Powershell Payload Using Veil
TheFatRat Payload Creation
Note: My Payloads Are Getting Detected By An Antivirus!
Hexeditor & Antiviruses
Making Our Payload Open An Image

7 Topics
Post Exploitation Theory
Meterpreter Basic Commands Part 1
Meterpreter Basic Commands Part 2
Elevating Privileges With Different Modules
Creating Persistence On The Target System
Post Exploitation Modules
Exploitation Recap

9 Topics
What Are We Creating ?
Connecting Server And Backdoor
Processing Instructional Commands
Sending and Receiving Data
Executing Commands And Compiling The Program
Changing Directory Inside Of Our Backdoor
Uploading & Downloading Files
Testing All The Commands
Note: You Can Continue Building Onto This Project!

15 Topics
Website Penetration Testing Theory
HTTP Request & Response
Information Gathering & Dirb Tool
Burpsuite Configuration
ShellShock Exploitation
Command Injection Exploitation
Getting Meterpreter Shell With Command Execution
Reflected XSS & Cookie Stealing
Stored XSS
HTML Injection
SQL Injection
CSRF Vulnerability
Hydra Bruteforce Attack Example 1
Hydra Bruteforce Attack Example 2
Burpsuite Intruder

3 Topics
Creating 2 Programs
Bruteforcer In Python
Hidden Directory Discovery

4 Topics
Theory - Man In The Middle Attack
Bettercap ARP Spoofing
Ettercap Password Sniffing
Manually Poisoning Targets ARP Cache With Scapy

5 Topics
Wireless Cracking Theory
Putting Wireless Card In Monitor Mode
Deauthenticating Devices & Grabbing Password
Aircrack Password Cracking
Hashcat Password Cracking

6 Topics
Android Hacking Theory
Android VM Install
Gaining Access With Android Meterpreter
Evil Droid
Is it Flappy Bird or Malware
Hack Any Device On Any Network With Ngrok

5 Topics
Anonymity Theory
Tor Browser
Proxychains With Nmap
Installing VPN in Kali Linux
WhoAmI Anonymity Tool

3 Topics
Enumerating Active Directory
Exploiting Active Directory
Escalating Privileges on the Domain

11 Topics
Become An Alumni
Endorsements On LinkedIN
What is Next?
Learning Guideline
Practice
Bug Bounty
Coding For Hackers
Exploit Development
Python Monthly
Course Review
The Final Challenge

7 Topics
What Is A Programming Language
Python Interpreter
How To Run Python Code
Latest Version Of Python
Our First Python Program
Python 2 vs Python 3
Exercise: How Does Python Work?

81 Topics
Learning Python
Python Data Types
How To Succeed
Numbers
Math Functions
DEVELOPER FUNDAMENTALS: I
Operator Precedence
Exercise: Operator Precedence
Optional: bin() and complex
Variables
Expressions vs Statements
Augmented Assignment Operator
Strings
String Concatenation
Type Conversion
Escape Sequences
Formatted Strings
String Indexes
Immutability
Built-In Functions + Methods
Booleans
Exercise: Type Conversion
DEVELOPER FUNDAMENTALS: II
Exercise: Password Checker
Lists
List Slicing
Matrix
List Methods
List Methods 2
List Methods 3
Common List Patterns
List Unpacking
None
Dictionaries
DEVELOPER FUNDAMENTALS: III
Dictionary Keys
Dictionary Methods
Dictionary Methods 2
Tuples
Tuples 2
Sets
Sets 2
Breaking The Flow
Conditional Logic
Indentation In Python
Truthy vs Falsey
Ternary Operator
Short Circuiting
Logical Operators
Exercise: Logical Operators
is vs ==
For Loops
Iterables
Exercise: Tricky Counter
range()
enumerate()
While Loops
While Loops 2
break continue pass
Our First GUI
DEVELOPER FUNDAMENTALS: IV
Exercise: Find Duplicates
Functions
Parameters and Arguments
Default Parameters and Keyword Arguments
return
Methods vs Functions
Docstrings
Clean Code
*args and **kwargs
Exercise: Functions
Scope
Scope Rules
global Keyword
nonlocal Keyword
Why Do We Need Scope?
Modules in Python
Quick Note: Upcoming Videos
Optional: PyCharm
Packages in Python
Different Ways To Import

5 Topics
Errors in Python
Error Handling
Error Handling 2
Exercises: Error Handling
Error Handling 3

6 Topics
Working With Files In Python
File Paths
File IO Errors
Read Write Append
Next Steps
Exercise: Translator

1 Topic
Special Bonus Lecture

  Write a Review

Complete Ethical Hacking Bootcamp

Go to Paid Course