Udemy

Complete Hacking Course : From Beginner to Intermediate

Enroll Now
  • 1,060 Students
  • Updated 12/2025
4.6
(07 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
2 Hour(s) 44 Minute(s)
Language
English
Taught by
Hicham Lamsaouri
Rating
4.6
(07 Ratings)

Course Overview

Complete Hacking Course : From Beginner to Intermediate

Ethical Hacking course and Penetration Testing incl: Metasploit, Wireshark, Phishing, Nmap, Wifi Hacking and OSINT.

Welcome to this course, designed to guide you step by step into the world of ethical hacking and cybersecurity.

My name is Hicham Lamsaouri, and I will be your instructor throughout this training. To learn more about my background and experience, you can watch the Introduction video available on this page.

This course is built around a strongly practical, hands‑on approach. Rather than focusing only on theory, you will spend most of your time working through real‑world scenarios that demonstrate how common attack techniques are performed and, more importantly, how they can be detected and prevented. All demonstrations are carried out using Kali Linux and widely used, industry‑standard tools.

The course is designed for beginners with no prior experience, while also gradually advancing to more intermediate and advanced topics. You will start by learning essential cybersecurity and networking concepts, then progress to practical skills such as information gathering, Wi‑Fi security testing, social engineering, phishing techniques, and controlled access testing on Windows systems.

By the end of the course, you will be able to:


  • Understand how real attackers think and operate

  • Identify common security weaknesses in networks, systems, and user behavior

  • Perform an ethical security audit in a controlled and legal environment

  • Design better defenses by understanding real attack methods

Whether your goal is to become an ethical hacker, a cybersecurity analyst, or simply to better protect systems and users, this course provides a solid foundation. Ethical hacking and cybersecurity are among the most in‑demand fields today, offering strong career opportunities and long‑term growth. With enough motivation and practice, this course can help you take your first professional steps in this domain.

Course Outline :


  1. Introduction : Overview of the course structure and objectives

  2. Basic Concepts : Fundamental cybersecurity terminology

  3. Setting Up the Lab : Installing and configuring Kali Linux and creating a safe and legal testing environment

  4. Information Gathering (OSINT) : Understanding how attackers profile organizations and individuals

  5. Network Hacking (Wi‑Fi Security Testing) : Practical demonstrations of Wi‑Fi security testing

  6. Vulnerability Scanning Fundamentals : Introduction to vulnerability scanners

  7. Gaining Access to Devices : Common techniques used to gain controlled access

  8. Social Engineering & Phishing : Different phishing techniques and attack vectors

  9. Social Media Security Testing : Common social media account security weaknesses

  10. Conclusion : Next steps in cybersecurity and ethical hacking

Course Content

  • 10 section(s)
  • 52 lecture(s)
  • Section 1 Introduction
  • Section 2 Basic Concepts
  • Section 3 Setting Up The Lab
  • Section 4 Information Gathering
  • Section 5 Network Hacking
  • Section 6 Vulnerability Scanning Fundamentals
  • Section 7 Gaining Access To Devices
  • Section 8 Social Engineering & Phishing
  • Section 9 Social Media Hacking
  • Section 10 Conclusion

What You’ll Learn

  • Perform ethical hacking and penetration testing using real-world offensive security techniques., Learn how to use Wireshark for Ethical hacking., Ethical Hacking & Penetration Testing with Metasploit., Understand DNS and the different record types., How to use the Linux terminal., Linux basics., Install a hacking lab & needed software (on Windows, OS X and Linux)., Install & use Kali Linux - a hacking operating system., Hack secure systems using client-side & social engineering., Learn Network Hacking / Penetration Testing., Crack WEP/WPA/WPA2 encryptions., Brute-force attack, ARP Spoofing / ARP Poisoning., Create a fake Wi-Fi network with internet connection & spy on clients., Gather detailed information about networks & connected clients like their OS, ports ...etc., Discover devices connected to the same network., Hack secure systems using social engineering., Hack Windows using fake updates., Discover MITM & ARP Spoofing attacks., Bypassing the Windows Firewall., Bypassing the Windows Antivirus., Create custom payloads using the Metasploit Framework., Accessing an Android Device., Maintain Access Outside The LAN.


Reviews

  • F
    Folo
    4.0

    so far so good, i am getting the grasp of it

  • C
    Cryptonakazaki
    5.0

    thank you so much , this course help me a lot and i recommend to purchase this course

  • س
    سجاد ثائر
    4.0

    نعم هي مناسبة لي وخصيصا اني ادرس قسم الامن السيبراني اكادميا

  • y
    yazide idrissi
    5.0

    An excellent course with clear explanations, strong content, and real practical value.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed