Complete Penetration Testing and Ethical Hacking: Hands-On2018-12-08T21:35:06+00:00

Project Description

Complete Penetration Testing and Ethical Hacking: Hands-On

Learn Penetration Testing, Phishing, Using Nmap, Ethical Hacking With Metasploit,Network Layer Attacks and become Hacker

Take this course

What you’ll learn
Penetration Test Types
Security Audit
Vulnerability Scan
Penetration Test Approaches
Planning Penetration Test Phases
Penetration Test Phases
Legal Issues Testing Standarts
Network Scan Types
Passive Scan With Wireshark
Passive Scan with ARP Tables
Active Scan with Hping
Hping for Another Purpose: DDos
Ping Scan to Enumerate Network Hosts
TCP/IP Basics on OSI Reference Model
TCP/IP Model on Example
TCP/UP Protocol Basics
Port Scan with Nmap
SYN Scan
Nmap Port Scan Details
TCP Scan
UDP Scan
Version Detection
Operating System Detection
Input & Output Management in Nmap
Nmap Scripting Engine: Some Handy Scripts
How to Bypass Security Measures in Nmap Scans
Timing of the Scans
Some Other Types of Scans: XMAS, ACK, etc.
Idle (Stealth) Scan
Nessus: First Scan
An Aggressive Scan
Results of an Aggressive Scan
Nessus: Report Function
Exploit Databases
Manual Exploitation
Exploitation Frameworks
Metasploit Framework
Password Hashes of Windows Systems
Password Hashes of Linux Systems
Password Cracking Tools
Dictionary Attack
Brute Force Attack
Maltego – Visual Link Analysis Tool
An Automated Tool: Zed Attack Proxy (ZAP)
Cross Site Scripting
BeEF – The Browser Exploitation Framework
The FatRat
Embedding Malware in PDF Files
Embedding Malware in Word Documents
Embedding Malware in Firefox Add-ons
Empire Project
Sending Fake Emails for Phishing
Network Sniffing:
MAC Flood
ARP Spoof
Password Creation Methods of Cisco Routers

  • Attaching Kali to GNS3 Network
  • Active Network Devices
  • Network Sniffing
  • Sniffing Data & Analysing HTTP Traffic via Wireshark
  • Using MITMf Against Real Networks
  • Weakness of Network Devices
  • How to prepare the lab environment for hands-on experiments
  • Penetration Testing tools such as Ettercap, Wireshark and etc.
  • MAC Flooding
  • DHCP Starvation & DHCP Spoof
  • VLAN Hopping
  • Penetration Testing of Network Devices
  • Network Device Audits

A computer for installing all the free software and tools needed to practice
Be able to download and install all the free software and tools
Ethical hackers are in massive demand around the world. What need is: Desire to learn
The average payout to a Ethical Hackers is $70,000. You can be Ethical Hacker,too!
Nothing else! It’s just you, your computer and your ambition to get started today

Welcome to my “Complete Penetration Testing and Ethical Hacking: Hands-on” course.

My name is Muharrem Aydin (White-Hat Hacker), creator of the three best-selling Ethical Hacking and Penetration Testing courses on Udemy.

This time I’ve designed The Complete Penetration Testing and Ethical Hacking Course: Hands-On, for YOU!

My Complete Penetration Testing and Ethical Hacking Course is for everyone! If you don’t have any previous experience, not a problem!  This course is expertly designed to teach everyone from complete beginners, right through to pro hackers. You’ll go from beginner to extremely high-level and I will take you through each step with hands-on examples.

And if you are a pro Ethical Hacker, then take this course to quickly absorb the latest skills, while refreshing existing ones.


Muharrem Aydın
Muharrem AydınComputer Engineer, Cyber Security Expert, IT Lawyer
After 10 years of software engineering experience with titles of software developer, product manager, and integration architect, I have been working in cyber security domain for last 10 years. I am not only a cyber security expert but also the head and kick-starter of a cyber security consultancy unit.

In security field, I have performed dozens of penetration tests for institutes from different sectors: finance, military, state agencies, and telcos.

I have consulted different companies in security field which includes global banks such as ING Bank, HSBC, CitiBank.

In addition, I am an adjunct instructor in a university and teaching cyber security for years.

I involved in technical areas and has taken responsibilities in:

Penetration tests (Pentests) and security audits
Cyber security training & consultancy
Source code analysis & secure software development
Cyber security incident response
Information security management system (ISMS) consultancy Open source cyber security systems, such as OpenVAS, OSSEC, OSSIM, Snort, Suricata, mod security
I’m creating my courses by using my know-how and 10 years of experience. As a result, our first course “Hacking Web Applications and Penetration Testing: Fast Start!” has gained “Best Seller” reputation in its category.

I have risen a lot of cyber security experts from scratch, and you are the next.

Courses and Services


Metropolitan Police, HSBC, University of Cambridge, Citibank, New York University and more

Contact Info

17 Green Lanes, London, England, N16 9BS

Phone: +44 20 3290 6271

Web: Hacker Academy

Recent Posts