Uthena

Course description

Would you like to learn ethical hacking and gain the knowledge required to pass the CEH exam because this will help you level up your cyber security and ethical hacking career?

In this course you will learn:

  • Introduction to Ethical Hacking
  • Reconnaissance - Surveying the Attack Surface
  • Scanning and Enumeration - Getting Down to Business
  • Network Presence
  • Attacking
  • Web Hacking
  • Social Engineering - Hacking Humans


This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!

Course curriculum

  • 1

    Introduction to Ethical Hacking

  • 2

    Reconnaissance - Surveying the Attack Surface

    • Surveying the attack surface

    • Recon types and goals

    • Passive recon part 1

    • Passive recon part 2

    • Active recon

    • Recon walk-through and tools summary

    • DEMO - Maltego real world example

    • DEMO - FOCA to examine metadata

    • DEMO - Harvester

    • DEMO - Information collection using Recon-ng

  • 3

    Scanning and Enumeration - Getting Down to Business

    • Scanning & enumeration

    • Identifying active hosts part 1

    • Identifying active hosts part 2

    • Identifying active services

    • OS and services fingerprinting

    • Network mapping

    • Final thoughts

    • DEMO - Nmap syntax part 1

    • DEMO - Nmap syntax part 2

    • DEMO - Nmap hosts discovery

    • DEMO - Nmap service discovery

    • DEMO - Nmap scripts

    • DEMO - masscan

  • 4

    Network Presence

    • Network insecurity

    • Sniffing and spoofing

    • Sniffing tools

    • Spoofing, crypto, and wifi

    • DEMO - tcpdump

    • DEMo - Wireshark

    • DEMO - Ettercap

    • DEMO - Burp Suite

    • DEMO - Scapy

  • 5

    Attacking

    • Security overview part 1: Windows architecture

    • Security overview part 2: credentials security

    • Security overview part 3: memory corruption & exploitation

    • Windows hacking basics

    • Local access and privilege escalation

    • Dumping hashes and cracking passwords

    • Linux attacking basics part 1

    • Linux attacking basics part 2

    • References

    • DEMO - Windows msf exploit part 1

    • DEMO - Windows msf exploit part 2

    • DEMO - Post exploitation activities

    • DEMO - Mimikatz

    • DEMO - Dumping hashes

    • DEMO - Hashcat

    • DEMO - Konboot

    • DEMO - Post exploitation Windows cmd

    • DEMO - Post exploitation Windows powershell

    • DEMO - Online password cracking part 1

    • DEMO - Online password cracking part 2

    • DEMO - Attacking Linux targets part 1

    • DEMO - Attacking Linux targets part 2

  • 6

    Web Hacking

    • Introduction to web hacking

    • Web security architecture overview part 1

    • Web security architecture overview part 2

    • Attacking the web server part 1

    • Attacking the web server part 2

    • Attacking the platform part 1

    • Attacking the platform part 2

    • Attacking the technology part 1

    • Attacking the technology part 2

    • OWASP top 10 part 1

    • OWASP top 10 part 2

    • Attacking the business logic part 1

    • Attacking the business logic part 2

    • Tools and methodology

    • References

    • DEMO - OWASP Mutillidae

    • DEMO - SQL injection

    • DEMO - SQLMAP intro

    • DEMO - SQLMAP practice

    • DEMO - Burpsuite

    • DEMO - Burpsuite XSS Hunter

    • DEMO - mitmproxy

    • DEMO - Skipfish part 1

    • DEMO - Skipfish part 2

  • 7

    Social Engineering - Hacking Humans

    • Social engineering basics

    • Social engineering methods

    • Tools and techniques part 1

    • Tools and techniques part 2

    • Tools and techniques part 3

    • Physical security considerations

    • Final thoughts

    • DEMO - Social engineering intro

    • DEMO - Social engineering toolkit prep

    • DEMO - Credential harvesting

    • DEMO - Website cloning

    • DEMO - Automating an attack

    • DEMO - Anti-virus evasion part 1

    • DEMO - Anti-virus evasion part 2

Meet your instructor!

Joseph Delgadillo
Best-Selling Instructor

The digital age is upon us. Would you like to build/protect the systems that shape our future?

I am here on Uthena to produce valuable educational resources for students who wish to learn skills related to information technology, network security, programming languages and much more. Enroll in one of my courses for a practical, down to earth approach to learning.

Take this course today!

"Certified Ethical Hacker Boot Camp!"