The Complete Ethical Hacking Masterclass

3 Reviews
1048 Enrolled
11 Hours
You save 92% -

68 Lessons (11h)

  • Setting Up Your Environment
    How to setup a virtual penetration testing lab28:53
    Installing VMware3:41
    Installing Metasploitable28:34
    Downloading Kali Linux4:51
    Installing kali Linux18:19
    How To Install Kali Linux On Windows 10 - Windows Subsystem For Linux12:58
    Best Linux Distros For Ethical Hacking And Penetration Testing11:23
  • Anonymity
    How To Setup Proxychains In Kali Linux - Part 17:53
    How To Setup Proxychains In Kali Linux - Part 210:58
    How To Setup And Use anonsurf On Kali Linux - Stay Anonymous9:55
    How To Setup VPN For Free On Kali Linux - Stay Anonymous15:59
    VPN And DNS For Beginners on Kali Linux9:52
  • Getting Started With Linux
    Linux Terminal Tutorial For Beginners - 1 - Basic Commands16:18
    Linux Terminal Tutorial For Beginners - 2 - File Ownership & Permissions14:23
    Terminator - Kali Linux - Multiple Terminals4:37
  • Networking Fundamentals
    1-Understanding The OSI Model2:32
    2-The Network Layer4:38
    3-The Transport Layer5:59
    4-The TCP 3 Way Handshake4:49
  • Information Gathering
    Installing Nmap On Windows7:21
    Installing Nmap On Linux4:33
    Installing Zenmap On Linux3:49
    Network Discovery with netdiscover10:14
    Information Gathering Whois and DNS7:24
    Whois Lookup4:23
    Gathering Emails7:02
    Scanning A Single Target5:18
    2 -Scanning Multiple Targets5:20
    3 -Scanning An Ip range7:07
    4 - Scanning An Entire Subnet3:37
    5 - Scanning A List Of Targets5:05
    6 - Excluding Targets From A Scan5:24
  • Getting Started With Metasploit
    Metasploit For Beginners - 1 - The Basics - Modules, Exploits & Payloads22:58
    Metasploit For Beginners - 2 - Understanding Metasploit Modules19:38
    Metasploit For Beginners - 3 - Information Gathering - Auxiliary Scanners12:18
    Metasploit For Beginners - 4 - Basic Exploitation11:47
    Metasploit Community Web GUI - Installation And Overview10:12
  • Web Server Hacking
    Gaining Access - Web Server Hacking - Metasploitable - 115:35
    Web Server Hacking - FTP Backdoor Command Execution With Metasploit - 210:00
    Web Server Hacking - Samba Command Executions - Metasploit Payloads - 39:35
    Nikto Web Vulnreability Scanner10:57
  • Exploitation
    Wordpress Hacking With wpscan14:20
    John the Ripper12:25
    Password Cracking With Medusa7:59
    BeEF Browser Exploitation19:09
    Veil Evasion17:20
    How To Generate Wordlists With Crunch10:49
    Netcat Tutorial - The Swiss Army Knife Of Networking - Reverse Shell17:01
  • Wired & Wireless Attacks
    MITM With Ettercap8:17
    WPA WPA2 Exploitation With Aircrack and Bully38:38
    How To DDoS - Xerxes - The Most Powerful DoS Tool9:43
    DoS Protection3:46
  • Wireshark - Network Sniffing
    Wireshark Tutorial for Beginners - Installation5:40
    Wireshark Tutorial for Beginners - Overview of the environment6:13
    Wireshark Tutorial for Beginners - Capture options2:47
    Wireshark Tutorial for Beginners - Filters3:47
  • Post Exploitation
    The Complete Meterpreter Guide20:08
    Generating backdoor with weevely9:32
  • Remote Access Tools (RAT's)
    BeeLogger - Kali Linux 2017.1 - How To Create A Windows Keylogger15:49
    sAINT - Spyware Generator For Windows - Keylogger - Webcam and Screen Capture14:34
    QuasarRAT - The Best Windows RAT - Remote Administration Tool for Windows26:00

Go From Beginner to Advanced in the Ethical Hacking Essentials



Alexis Ahmed is the founder and CTO at HackerSploit, a cybersecurity consultancy company that specializes in: cybersecurity consultancy, network security, web application security, malware and ransomware protection and prevention, cybersecurity and ethical hacking training. HackerSploit is aimed at protecting companies and businesses from the ever-growing threat of hackers, malware, and ransomware. HackerSploit has trained over 100,000 students in ethical hacking, penetration testing and Linux administration. Alexis is an experienced Ethical Hacker and Penetration Tester with over 6 years of experience in the cybersecurity field. In addition, he is also a web and Android developer with over 4 years of experience and has created beautiful and functional websites for clients all over the world. He has a YouTube channel with over 100,000 subscribers and more than 4 million views where he makes videos on ethical hacking, Linux, and programming.


Put yourself on the path to becoming a bona fide ethical hacker with this wall-to-wall masterclass. Covering everything from basic terminology to advanced exploitation with frameworks like Metasploit, this training will show you the tools and techniques these pros use to keep networks safe and beat hackers at their own game.

  • Access 68 lectures & 11 hours of content 24/7
  • Learn how to set up a virtual penetration testing environment & detect vulnerabilities
  • Explore the networking fundamentals of ethical hacking
  • Dive into advanced client-side & server-side exploitation
  • Discover how to attack wired & wireless networks and perform network sniffing w/ Wireshark


Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner


  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...