top of page

Udemy Free Courses

Real Ethical Hacking in 43 Hours Certificated CSEH+CEH 2024


Learn valuable, practical skills from free online video courses. Explore tech essentials and keep pace with change. Become more focused and productive. Top it off with courses that round out your skills and enrich your day to day.


1. Introduction and First Steps


2. Operating System


Mastering Boot Starting Firmware Interfaces

File Allocation Tables


3. Creating our ethical hacking lab




Getting Started



Installing Virtual Machines


Installing Kali


Installing Metasploitable


4. Introduction to Networking


What is network protocol and what it does

Layers of TCPIP Model


How emails sent and received over internet


PDU Explained


Basic Use of Switch and Data Transmission


2 Networks Talking with Router in Middle



5. Bypassing Network Access Control


Introduction to Section and Fundamentals of Media Control Filtering

Linux WAP and Bypassing Mac Filtering



6. Cybersecurity - Beginning


Introduction to Passive Information Gathering


What is Cybercrime


Three Types of Cybercrime


Examples to Cybercrime


What is Cyber Security


Firewalls


Windows Firewall


DMZ


VPN



7. Vulnerability Assassment


Introduction to Section


Why is VulnScanning is BAD



8. OSINT


Introduction to Passive Information Gathering



Differences Between Recon and Footprinting



Understanding Passive Information Gathering and OSINT



Introduction to OSINT



Principles of Recon



Offensive OSINT



Using SBLSTR for Finding Subdomains



USUFY as Osint Tool




Finding Deleted WebPages




THRVSTR as Osint Tool




Reverse Image Search




GHDB




GHDB Part 2




9. Storage Media - Module 1


The History of Storage Media


Magnetic Tape Drives



Floppy Disks




Optical Storage Media




DVD




Blu-ray




10. Storage Media - Module 2


Flash Storage Media



USB Flash Drives




Flash Memory Card




11. Storage Media - Module 3


Hard Disk Drives (HDD)




Solid State Drives (SSD)




12. Starting with Basic Linux Commands - CSEH


Understanding Linux Commands and Pipes




What is a Command




Pipeline example




Weird LS Command




Different Linux Commands using with Pipe




13. Starting with Linux Terminal - CSEH


Understanding key concepts




Finding Helpful manuals




Linux Directories




Linux Directories - Part 2




14. Starting with Linux Shell - CSEH


The bridge between You and Shell


Exploring the Linux System - CSEH


LS Command


RD vs APD




Filtering LS




CP Command




Tab Auto-completion




SYM AND HRD Link Files




Manipulating Files




16. Starting with Linux Shell - CSEH


Introduction to Shell and Expansion




Arithmetic Expressions with Shell




Automating Folder Creation with Shell




Quoting in Shell




17. Permissions - CSEH


Introduction to Permissions in Linux




Differences between UID, GID and Shadow




File and Dir Permissions




Examples with File Permissions




After this video you'll understand all LINUX Permissions




Chmod




18. Processes in Linux - CSEH


Fundamentals of Processes in System




The Magic with PS Aux Command




The Magic with TOP Command




Foreground and Background Processes




From Background to Foreground




The Tutorial with Linux Process Signals




19. Packet Management Systems in Linux - CSEH


Introduction to Packet Management Systems




Why we need package management tools




Package Management in Linux - Final




20. Network Security Cyber Security


The main goal and importance of Network Security




3 Main Ways to Make your Network Stronger




A Chain is no stronger than its weakest link




What is Network Maps in Cyber Security




21. Network Security Concepts


Main Guidelines for Network Security




Analysis to Consider and Action Priority




Threat Modeling




22. Getting Started with Networking - CSEH


Trcrt command




Networking with Linux




23. Linux - File System


Linux - Filesystem Part 1




Linux - Filesystem Part 2




Linux - Logging and Remaining Stealthy




Linux Creating our own Web Server




24. Linux - Working with Archive files


Linux - Working With Archive Files 1




Linux - Working With Archive Files 2




25. Linux - Working With Files and Permissions


Linux Working With Files - Part 1





Linux Working With Files - Part 2




26. Linux - Working with Processes


Working with Processes - Part 1





Linux Filtering Processes





Working With Processes - Part 2





Working with Processes - Part 3




27. Linux - Working With USER Environment Variables


User Environment Variable Introduction





Changing Environment Variables





Editing and Creating New Variables




28. Linux - Networking


Fundamentals of Linux Introduction





Dealing With Files





Linux Network Manipulation - Part 1





Linux Mac Address Spoofing





Changing DNS in Linux





Manipulating Hosts File





29. Linux - Software Control


Linux APT Part 1





Linux APT Part 2




30. Networking


TCP-IP - Part 1





TCP-IP - Part 2





TCP-IP - Part 3





TCP-IP - Part 4





TCP-IP - Part 5




31. Wireshark Ninja - Fundamentals


What is Wireshark and What you'll learn in this section





Introduction to Interface and Important Shortcuts





The Importance of Promiscuous Mode





Displaying the Captured Data and Plugins




32. Networking - Capturing Network Traffic




Passive Capture and Wireshark





Active and Passive Capture




33. Starting with Wireshark


1. Unlocking the Secrets of Network Traffic Unleash the Power of Wireshark!





2. Power Trio Exploring IDS, ACLs, and Firewalls for Network Security





3. Wireshark's Capture Power Dive into Live Traffic Analysis with Live Filters




Decoding Signal Types Unveiling the Language of Communication




34. Advanced Networking Topics for Wireshark


1. Beginning to use Wireshark Display Filters





2. Learning TCP States




35. Android Hacking - Mobile Hacking - IOS Hacking


The Anatomy of Android System Architecture




36. Information Gathering


Introduction to Information Gathering





DNS Info Gathering





Maltego - Part 1





Reconnaissance and Foot printing




37. Starting Practical with Nmap


Nmap's Network Scanning Capabilities





Beginning to Using NSE Scripts





Port scanning on Servers





Port scanning techniques and Interface Selection





Targeting and Excluding Networks with CIDR





Nmap Operating System Detection




Random Port Scanning and Legal Issues




38. Being Real Nmap Pro


Unique Techniques that you'll learn in this section





Advanced TCP ACK and SYN Scan





Advanced ICMP




39. Reconnaissance with Nmap


Introduction to Reconnaissance





IP Geolocation and WhoIS using Nmap





Graphical Traceroute





40. Scanning Web Servers with Nmap


Explanation and What Skills you'll earn in this section





Scanning HTTP Methods and Potential Risks





Searching for Digital Gold in the Web Server Maze




41. Detecting Firewalls


Web Application Firewall and IPS Detection




42. The Importance of Programming and Thinking in Hacking


Why C++ Is Important for Ethical Hacking





A1 - CPP Newlines, Tabs and Spaces





A1 - Initializers in CPP





A2 - CPP Writing Styles





A3 - Statements and Expressions, RVALUE and LVALUE





A4 - Comma





A5 - Types and Variables





A6 - Literals in CPP





A7 - Defining Constants





A8 - Const Expressions





Beginning to Pointers





A11 - Namespaces in CPP





A12 - Scoping Variables and Static Keyword





Conditional Statements




43. Types and Conditional Statements in C++


A1 - Types in CPP - Binary, Octal and Hex





A2 - Floating Point types in CPP - Float, Double, Long Double





A3 - Char types in CPP





A4 - Enum Types





A4 - Boolean Types and Comparison Operators





A5 - Void Type and Void Function





A6 - 1 Operators 101





A7 - Default Values in CPP





A1 - Switch Statement with ENUM





A2 - Conditional Statements in CPP





A3 - For Loop




A4 - Continue Keyword





A5 - Do-While Loop





A6 - Goto




44. Classes and Pointers in C++


A1 - POD Data Classes





A2 - Unions in CPP





A3 - Methods in Struct





A4 - Access Controls in CPP





A5 - Classes and Initializing Class Member





A6 - Constructors






A7 - Destructors in CPP





A8 - Initializers in CPP





11 - Pointers in CPP





A1 - C++ Beginning to Pointers






A2 - Dereference Operator in CPP





A3 - Pointers and Arrays





B2 - nullptr





B3 - Pointer arithmetic in CPP





C1 - Arrays out of bounds and Deallocating Pointers





C2 - Consts and Casts with Pointers





C3 - Allocating Memory





C4 - Allocating memory as arrays





C5 - Lifetime of Memory




45. STL, References, Pointers in C++


A1 - STL, Vectors and Arrays





A1 - References





A2 - Example Project With References





A3 - Code Example with AUTO, TUPLE and FOR LOOP






A4 - Range Based for Loop






A1 - Pointers in Practice





A2 - Pointers in Practice - Part 2






A3 - Pointers in Practice - Part 3






A4- Pointers in Practice - Part 4





46. Functions in C++


A1 - Introduction to Functions





A2 - Functions - Part 1





A3 - Functions - Part 2





A4 - Functions - Part 3





A5 - Functions - Part 4





A6 - Functions - Part 5





A7 - Functions - Part 6





A8 - Functions - Part 7




47. Data Structures in C++


A1 - Introduction to Basic CPP Programming





A2 - Creating Random Card Generator Using Enum and rand





A3 - Developing main Function and using static_cast





A1 - Introduction to ADT





A2 - Creating ADT Class and using Constructors





A3 - Virtual Methods and Overriding from Class





A4 - Controlling Copy Operations with ADT





A1 - Starting with Templates





A2 - Class Templates in CPP





A1 - Introduction to STL





A2 - Algorithm Analysis





A3 - Scenario Analysis





A4 - Developing Main





A5 - Factorial Method





A1 - Understanding Arrays





A2 - Manipulating Arrays





A3 - Starting with Array Pointers





A4 - Pointer Increment vs Array Indexing





A1 - Creating List ADT





A2 - Developing Get and Insert Methods





A3 - Developing Search and Remove Methods





A4 - Testing ADT List





A1 - Node and Chaining Example





A2 - Creating and Chaining nodes with Different data types





A1 - Creating Custom Linked List





A2 - Get Method






A3 - Developing InsertHead, InsertTail and Insert Methods





A4 - Developing Search Operation




A4 - Removing Items




48. SQL Training for Ethical Hacking - Introduction


Preparing Environment in 16 Mins





A2 - Starting with PostgreSQL





A3 - Customizing pgAdmin





A4 - Creating our First database and Adding Tables





A5 - Creating our First database and Adding Tables Part 2





49. SQL for Ethical Hacking Creating our first Database and Table


A1 - Adding Data into Tables





A2 - Starting with Select Keyword





A3 - Order by





A4 - Magic with WHERE and Operators





A5 - Learning Logical Operation in SQL




50. SQL for Ethical Hacking Datatypes in SQL


1. A1 - Basic Datatypes in SQL





2. A2 - Char and Text Types in Practice and Exporting TXT Files





3. A3 - Integers in SQL





4. A4 - Other ways to use INCREMENT





5. A5 - Floating Point Numbers and Their Disadvantages




51. Ethical Hacking for SQL Dates and Times in SQL


1. A1 - UTC, Dates and Times in SQL





2. A2 - Timestamp with Timezone Interval




52. Learning Python for Ethical Hacking - Variables and Strings in Python


1. First Steps in Python





2. Defining Variable Names





3. Misspelling and Finding Errors in Variable Names





4. String Manipulation





5. Format String in Python





6. String Manipulation Functions





7. String Manipulation Functions - Part 2




53. Learning Python for Ethical Hacking - Numbers in Python


1. Integers and Floats in Python





2. Floats and Constants in Python





3. Comments in Kotlin
















































5 views0 comments

Comments


bottom of page