Learn Hacking From Scratch: Ethical Hacking Course

Learn how to ethically hack computer systems from the ground up. This hands-on course takes you from zero to advanced, covering network attacks, web application exploits, client-side access, and securing systems from real-world threats. Learn penetration testing and vulnerability assessment using the top security tools, tactics, and techniques.

4.6
(130,000)
650,000 Students
15.5 Hours
Stage 4 - Advanced

Last update: Jun 2024

Audio Language: English

Subtitles/Captions: Yes

Caption Language: English

Focus: Ethical Hacking Courses, Penetration Testing Training Courses

Type of Training: Online, self-paced

Ethical Hacking Course

What You’ll Learn

This ethical hacking from scratch course will teach you:

  • Network Penetration Testing: Learn to hack and secure both wired and wireless networks using real-world tools and techniques.
  • Client & Server Attacks: Use Metasploit, backdoors, and exploits to hack systems via vulnerabilities or social engineering.
  • Website Hacking: Perform SQL injection, XSS, file inclusion, and file upload exploits to gain access to vulnerable web apps.
  • Malware & Social Engineering: Backdoor files, spoof emails, and analyze malware to understand hacker tactics and defense methods.
  • Hacking Methodology: Learn the steps to take, from information gathering and vulnerability scanning to initial attack to maintaining persistence.
  • Wi-Fi Exploitation: Crack WEP, WPA, and WPA2 encryptions, create rogue access points, and conduct ARP spoofing and DNS redirection.
  • Post-Exploitation Skills: Spy on targets, maintain access, capture keystrokes, pivot to other systems, and cover your tracks.
  • Linux & Kali Basics: Learn Linux fundamentals, terminal navigation, and setup of a professional-grade hacking lab.
  • Security Best Practices: Learn how to detect, prevent, and secure systems against the exact attacks you've been taught.

Included in the Learn Hacking From Scratch: Ethical Hacking Course

15.5 Hours of On-Demand Video

22 Downloadable Resources

2 Articles

Access on Mobile

Certificate of Completion

Suitable for the Following Careers

Penetration Tester

Ethical Hacker

Red Team Specialist

Cyber Security Analyst

Information Security Specialist

Course Content

Training Overview

icon-yt Description of Training Preview
icon-yt Video Overview Preview

1. Introduction

icon-yt Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam Preview
icon-yt Course Introduction & Overview Preview
icon-yt What Is Hacking & Why Learn It Preview

2. Setting up a Hacking Lab

icon-yt Update Notice Preview
icon-yt Lab Overview Preview
icon-yt Initial Preparation Preview
icon-yt Installing Kali Linux as a VM on Windows Preview
icon-yt Installing Kali Linux as a VM on Apple Computers (Intel & Apple Silicon) Preview
icon-yt Installing Kali Linux as a VM on Linux Preview

3. Linux Basics

4. Network Hacking

5. Network Hacking - Pre Connection Attacks

6. Network Hacking - Gaining Access - WEP Cracking

7. Network Hacking - Gaining Access - WPA / WPA2 Cracking

8. Network Hacking - Gaining Access - Security

9. Network Hacking - Post Connection Attacks

10. Network Hacking - Post-Connection Attacks - Information Gathering

11. Network Hacking - Post Connection Attacks - MITM Attacks

12. Network Hacking - Detection & Security

13. Gaining Access To Computer Devices

14. Gaining Access - Server Side Attacks

15. Gaining Access - Client Side Attacks

16. Gaining Access - Client Side Attacks - Social Engineering

17. Gaining Access - Using The Above Attacks Outside The Local Network

18. Post Exploitation

19. Website Hacking

20. Website Hacking - Information Gathering

21. Website Hacking - File Upload, Code Execution & File Inclusion Vulns

22. Website Hacking - SQL Injection Vulnerabilities

23. Website Hacking - Cross Site Scripting Vulnerabilities

24. Website Hacking - Discovering Vulnerabilities Automatically Using OWASP ZAP

25. Bonus Section

Audio Version of Training

OPEN FULL CURRICULUM

Requirements

Basic IT skills

A computer with at least 4GB RAM

Operating System: Windows, macOS, or Linux and internet connection

For WiFi hacking sections: Wireless adapter that supports monitor mode (details in course)

M1 Mac users not supported for WiFi attacks

No prior knowledge of Linux, programming, or hacking required

Description of Ethical Hacking Training

This ethical hacking course is designed to take you from absolute beginner to advanced penetration tester. You'll begin by setting up your own hacking lab and learning essential Linux commands. From there, you’ll dive into hands-on network attacks, exploiting wireless and wired networks without needing access credentials, and learning how to defend them.

Next, you'll move into system exploitation—hacking both clients and servers using offensive security tools like Metasploit and social engineering. You'll learn to backdoor files, intercept traffic, send spoofed emails, and exploit software vulnerabilities to gain full access to systems. You’ll also explore post-exploitation techniques like maintaining access, spying on users, and lateral movement.

  • Hack and secure WiFi and LAN networks using industry-standard security tools
  • Perform man-in-the-middle attacks, DNS spoofing, and traffic injection
  • Gain access to systems using client-side and server-side attacks
  • Use real-world exploits to compromise Windows and Linux targets
  • Perform web hacking using SQLi, XSS (cross-site scripting), LFI/RFI, and file upload flaws
  • Analyze malware behavior and spoof email sources for phishing
  • Build a complete penetration testing toolkit and generate pentest reports

By the end of the course, you’ll be equipped with a strong foundation in ethical hacking, capable of modifying and applying techniques in real-world scenarios—and defending against them.

Who Is This Course For

This course is ideal for aspiring ethical hackers, penetration testers, and security professionals who want to learn by doing. It's also great for anyone curious about how hackers work—and how to stop them.

Course Instructor

ZAID AL QURAISHI

Zaid Al-Quraishi is an accomplished ethical hacker, pentester, and computer scientist passionate about hacking and breaking the rules ethically. With extensive experience in ethical hacking, Zaid began creating video tutorials for iSecur1ty in 2009, earning positive feedback that led to his promotion as an editor. He is also a member of iSecur1ty's penetration testing team.

In 2013, Zaid launched his first online course at iSecur1ty's training center, receiving outstanding learner reviews. Motivated by this success, Zaid developed additional courses, all of which have been well-received.

Zaid's teaching method is primarily example-based. He begins by explaining the theory behind each technique and then demonstrates its application in real-life situations, providing learners with a comprehensive understanding of ethical hacking practices.

Read More

Read Less

Testimonials

Anonymous

Michael F.

I found the course to be a great match for my learning goals. The content was well-structured and covered both the theoretical and practical aspects of ethical hacking. The hands-on labs were particularly useful for gaining real-world experience. Overall, I gained valuable skills that I can apply in cybersecurity, and I feel more confident in my ability to tackle security challenges. Highly recommended for anyone looking to deepen their knowledge in ethical hacking!

Anonymous

Axel Bryan Joel Y.

It really opened my eyes how hacking is actually done. One may expect a lot of programming is required to do so, but after taking this course you find out that that is not entirely true. The teacher's explanations are excellent, he makes complex concepts simple. The course if very complete for a beginner in cybersecurity or for people that are curious about how any of this is done. I recommend this course, but you need to have a buffy PC to run 3 virtual machines at the same time.

Anonymous

Kath

This course is a real gem—both practical and theoretical. Zaid keeps it engaging and fresh throughout. I've learned so much, progressing from an absolute beginner to becoming more mindful of my own personal security practices. I would highly recommend it to beginners, or anyone interested in understanding how hackers operate.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!