How to Learn Hacking Part 2: Intermediate Course

Advance your hacking skills with this intermediate course focused on wireless, web app, and network attacks. Practice privilege escalation, reverse shells, and post-exploitation through hands-on labs. Build in-depth knowledge for CEH certification and OSCP, ethical hacking jobs, and defending computer systems in real-world cyber security scenarios.

4.4
β˜…β˜…β˜…β˜…β˜…
(230)
76,500 Students
10 Hours
Stage 4 - Advanced

Last update: Mar 2024

Audio Language: English

Subtitles/Captions: Yes

Type of Training: Online self-paced

Focus: Ethical Hacking Courses, Penetration Testing Training Courses

Caption Language: English

How to Learn Ethical Hacking Part 2: Intermediate Course

What You’ll Learn

This How to Learn Ethical Hacking Part 2: Intermediate Course will teach you:

  • Web application attacks:
    Exploit common web vulnerabilities using tools like Burp Suite and Commix.
  • Wireless network attacks:
    Launch deauthentication, PMKID, and client-less Wi-Fi attacks.
  • Python scripting for pentesters:
    Automate tasks and transfer files with quick custom scripts.
  • Privilege escalation:
    Use UAC bypass and persistent services on compromised systems.
  • PowerShell Empire:
    Perform post-exploitation and Active Directory enumeration.
  • Reverse shells:
    Create multiple types of shell payloads and upgrade terminals.
  • Wireshark fundamentals:
    Capture TCP handshakes and analyze network traffic.
  • CTF walkthroughs:
    Apply techniques in SQL injection-to-shell and web app CTF labs.

Included in the How to Learn Hacking

10 Hours of On-Demand Video

Access on Mobile

Certificate of Completion

Suitable for the Following Careers

Penetration Tester

Ethical Hacker

Red Team Operator

Network Security Engineer

Cyber Security Analyst

Course Content

Section 1: Course Overview

icon-yt Course Overview Preview

Section 2: Building Your Virtual Lab Environment Using VirtualBox

icon-yt Video - Section 2 Overview Preview
icon-yt Video - Downloading ISO and OVA Files for VirtualBox Preview
icon-yt Video and Lab -Creating a Virtual install of Kali using VirtualBox Preview
icon-yt Video and lab - Create a virtual install of Metasploitable2 Preview
icon-yt Video - Spoofing Your Browser to Get Access to Windows 10 Pro Preview
icon-yt Video and Lab - Creating Windows 10 Target Machine Using VirtualBox Preview
icon-yt Video and Lab - Create a Virtual Install of Metasploitable3 w2k8 Using VB Preview
icon-yt Video - Installing the VirtualBox Extension Pack Preview

Section 3: Troubleshooting VirtualBox

icon-yt Video - Adding a NAT Network in VirtualBox 7.0.2 Preview
icon-yt Video - Fix Duplicate IP Address Issue With VirtualBox Preview

Section 4: NMap

Section 5: Enumerating a Windows 10 Target

Section 6: Reverse Shells, Privilege Escalation and Persistent Backdoors

Section 7: Powershell Empire

Section 8: Post Exploitation of Microsoft Windows

Section 9: Program Scripting

Section 10: Practical Pentesting Labs

Section 11: Auditing Wireless Networks

Section 12: Wireshark

Section 13: Web APP Penetration Testing

Section 14: Anonymity - Remaining Anonymous While Pentesting

Section 15: CTF - SQL Injection to Shell Walkthrough

Audio Version of Training

OPEN FULL CURRICULUM

Requirements

Completion of a beginner ethical hacking or pentesting course

Preferred: Completion of β€œHow to Learn Ethical Hacking Part 1: Beginners Course”

Above-average use of the Kali Linux CLI

Strong troubleshooting skills

System capable of running multiple virtual machines

Description of How to Learn Ethical Hacking Part 2: Intermediate Course Training

This course is designed for learners who already have foundational hacking knowledge and want to sharpen their technical edge. It helps build a strong foundation while offering real practical experience through immersive, step-by-step labs. By mastering intermediate techniques in web apps, wireless networks, and system exploits, you’ll unlock new career opportunities in ethical hacking and cyber security.

You’ll build a multi-target lab, practice red team techniques, and gain hands-on experience with tools like Nmap, Burp Suite, Empire, Wireshark, and Netcat. From privilege escalation and persistent backdoors to advanced recon and CTFs, this course mirrors what professionals use in real penetration tests.

  • Exploit SQL injection, OS command injection, and command upload vulnerabilities
  • Use PowerShell Empire for post-exploitation and domain control
  • Perform wireless attacks using Bettercap and deauthentication techniques
  • Enumerate and brute force Windows environments using WinPEAS and SMB tools
  • Write and run Python scripts for pentesting operations
  • Audit networks with Wireshark and WebMap dashboards
  • Maintain anonymity using Whonix and attack over WAN with NGROK

You'll walk away with practical skills gained through a fully interactive hacking lab, where you’ll explore real-world scenarios like cross-site scripting, privilege escalation, and shell injection. Whether you're aiming to boost your computer security skills or grow into a senior software engineer, this course equips you to operate confidently in advanced pentesting environments.

Who Is This Course For

This course is for aspiring ethical hackers and junior pentesters ready to move beyond beginner techniques. Ideal for those looking to solidify intermediate hacking skills, build lab confidence, and prepare for real-world security assessments.

Course Instructor

Prof. K

Prof. K is a seasoned technology expert with a Master of Science in Cyber Security from UMUC (2015) and a Master of Science in Information Technology from Capella University (2007). Since 1998, he has held various roles, including Microsoft Support Technician, Microsoft Certified Trainer, Technology Support Specialist, Senior Network Technology Consultant, IT Auditor, and currently, owner and operator of CLK Technology Solutions in Tucson, Arizona.

His expertise is designing, building, and supporting network infrastructures and security. Prof. K has taught online since 2008 and works with several online universities and colleges.

He holds multiple certifications, including MCTS in Windows Server 2008 Active Directory, Applications Infrastructure, and Network Infrastructure Configuration, as well as A+, Network+, Security+, CompTIA Secure Infrastructure Specialist (CSIS), and CompTIA IT Operations Specialist (CIOS). Prof. K's extensive experience and credentials make him a highly skilled and knowledgeable instructor in the field of technology.

Read More

Read Less

Testimonials

Anonymous
β˜…β˜…β˜…β˜…β˜…

John H.

Professor K.'s courses are fantastic. I love that Cliff keeps it simple and still conveys a wealth of knowledge about pentesting/ctf. He makes it look easy and I always learn something new!

Anonymous
β˜…β˜…β˜…β˜…β˜…

Terrence A.

Great way to build on top of knowledge learned from part 1 of this series. Overall good course to learn how to find flags the manual way.

Anonymous
β˜…β˜…β˜…β˜…β˜…

Kevin S.

Prof K is an amazing teacher. I highly recommend his courses to anyone interested in Ethical Hacking. He explains the practical aspects of offensive security clearly and guides you through exploiting vulnerabilities with hands-on practice. As long as you have an internet connection and a wireless adapter that supports monitor mode, you’re all set to dive in.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!