Learn Hacking From Scratch: Ethical Hacking Course
Learn how to ethically hack computer systems from the ground up. This hands-on course takes you from zero to advanced, covering network attacks, web application exploits, client-side access, and securing systems from real-world threats. Learn penetration testing and vulnerability assessment using the top security tools, tactics, and techniques.

What You’ll Learn
This ethical hacking from scratch course will teach you:
- Network Penetration Testing: Learn to hack and secure both wired and wireless networks using real-world tools and techniques.
- Client & Server Attacks: Use Metasploit, backdoors, and exploits to hack systems via vulnerabilities or social engineering.
- Website Hacking: Perform SQL injection, XSS, file inclusion, and file upload exploits to gain access to vulnerable web apps.
- Malware & Social Engineering: Backdoor files, spoof emails, and analyze malware to understand hacker tactics and defense methods.
- Hacking Methodology: Learn the steps to take, from information gathering and vulnerability scanning to initial attack to maintaining persistence.
- Wi-Fi Exploitation: Crack WEP, WPA, and WPA2 encryptions, create rogue access points, and conduct ARP spoofing and DNS redirection.
- Post-Exploitation Skills: Spy on targets, maintain access, capture keystrokes, pivot to other systems, and cover your tracks.
- Linux & Kali Basics: Learn Linux fundamentals, terminal navigation, and setup of a professional-grade hacking lab.
- Security Best Practices: Learn how to detect, prevent, and secure systems against the exact attacks you've been taught.
Included in the Learn Hacking From Scratch: Ethical Hacking Course
Suitable for the Following Careers
Course Content
1. Introduction
2. Setting up a Hacking Lab
3. Linux Basics
4. Network Hacking
5. Network Hacking - Pre Connection Attacks
6. Network Hacking - Gaining Access - WEP Cracking
7. Network Hacking - Gaining Access - WPA / WPA2 Cracking
8. Network Hacking - Gaining Access - Security
9. Network Hacking - Post Connection Attacks
10. Network Hacking - Post-Connection Attacks - Information Gathering
11. Network Hacking - Post Connection Attacks - MITM Attacks
12. Network Hacking - Detection & Security
13. Gaining Access To Computer Devices
14. Gaining Access - Server Side Attacks
15. Gaining Access - Client Side Attacks
16. Gaining Access - Client Side Attacks - Social Engineering
17. Gaining Access - Using The Above Attacks Outside The Local Network
18. Post Exploitation
19. Website Hacking
20. Website Hacking - Information Gathering
21. Website Hacking - File Upload, Code Execution & File Inclusion Vulns
22. Website Hacking - SQL Injection Vulnerabilities
23. Website Hacking - Cross Site Scripting Vulnerabilities
24. Website Hacking - Discovering Vulnerabilities Automatically Using OWASP ZAP
25. Bonus Section
Audio Version of Training
OPEN FULL CURRICULUM
Requirements
Description of Ethical Hacking Training
This ethical hacking course is designed to take you from absolute beginner to advanced penetration tester. You'll begin by setting up your own hacking lab and learning essential Linux commands. From there, you’ll dive into hands-on network attacks, exploiting wireless and wired networks without needing access credentials, and learning how to defend them.
Next, you'll move into system exploitation—hacking both clients and servers using offensive security tools like Metasploit and social engineering. You'll learn to backdoor files, intercept traffic, send spoofed emails, and exploit software vulnerabilities to gain full access to systems. You’ll also explore post-exploitation techniques like maintaining access, spying on users, and lateral movement.
- Hack and secure WiFi and LAN networks using industry-standard security tools
- Perform man-in-the-middle attacks, DNS spoofing, and traffic injection
- Gain access to systems using client-side and server-side attacks
- Use real-world exploits to compromise Windows and Linux targets
- Perform web hacking using SQLi, XSS (cross-site scripting), LFI/RFI, and file upload flaws
- Analyze malware behavior and spoof email sources for phishing
- Build a complete penetration testing toolkit and generate pentest reports
By the end of the course, you’ll be equipped with a strong foundation in ethical hacking, capable of modifying and applying techniques in real-world scenarios—and defending against them.
Who Is This Course For
This course is ideal for aspiring ethical hackers, penetration testers, and security professionals who want to learn by doing. It's also great for anyone curious about how hackers work—and how to stop them.
Course Instructor
Zaid Al-Quraishi is an accomplished ethical hacker, pentester, and computer scientist passionate about hacking and breaking the rules ethically. With extensive experience in ethical hacking, Zaid began creating video tutorials for iSecur1ty in 2009, earning positive feedback that led to his promotion as an editor. He is also a member of iSecur1ty's penetration testing team.
In 2013, Zaid launched his first online course at iSecur1ty's training center, receiving outstanding learner reviews. Motivated by this success, Zaid developed additional courses, all of which have been well-received.
Zaid's teaching method is primarily example-based. He begins by explaining the theory behind each technique and then demonstrates its application in real-life situations, providing learners with a comprehensive understanding of ethical hacking practices.
Read More
Read Less
Testimonials
Michael F.
I found the course to be a great match for my learning goals. The content was well-structured and covered both the theoretical and practical aspects of ethical hacking. The hands-on labs were particularly useful for gaining real-world experience. Overall, I gained valuable skills that I can apply in cybersecurity, and I feel more confident in my ability to tackle security challenges. Highly recommended for anyone looking to deepen their knowledge in ethical hacking!
Axel Bryan Joel Y.
It really opened my eyes how hacking is actually done. One may expect a lot of programming is required to do so, but after taking this course you find out that that is not entirely true. The teacher's explanations are excellent, he makes complex concepts simple. The course if very complete for a beginner in cybersecurity or for people that are curious about how any of this is done. I recommend this course, but you need to have a buffy PC to run 3 virtual machines at the same time.
Kath
This course is a real gem—both practical and theoretical. Zaid keeps it engaging and fresh throughout. I've learned so much, progressing from an absolute beginner to becoming more mindful of my own personal security practices. I would highly recommend it to beginners, or anyone interested in understanding how hackers operate.
Show More
Show Less