Ethical Hacking Course Free

5 Best YouTube Channels To Learn Ethical Hacking Course For Free

Who should take the Ethical Hacking Course?

The Ethical Hacker CEH training course provides detailed technical knowledge and is best suited for: –

  • Information Security Consultant
  • IT operations manager
  • IT security specialist/analyst, manager or architect
  • Network specialist/analyst
  • Technical support engineer
  • Senior systems engineer
  • Systems analyst or administrator
  • IT auditor

Youtube is a great platform for all sorts of learning. In this post, we will tell you the best Youtube videos you can use to learn ethical hacking from scratch. All these courses are very detailed and if you understand all the concepts well, you may land into a very rewarding career of cyber security.

1. Ethical Hacking Tutorial By Edureka

This is a free full length Ethical Hacking course from Edureka. These are the topics covered in detail. Click on the link to open respective section.

2. Ethical Hacking Course For Beginners 2022 By Simplilearn

In this Ethical Hacking Full Course, will help you learn all about ethical hacking concepts. This ethical hacker tutorial will acquaint you with the importance of ethical hacking, what is ethical hacking, types of cyberattacks with a hands-on demo for each; you will also learn how to become an ethical hacker.

3. Ethical Hacking in 12 Hours – Full Course – Learn to Hack!

Following topics covered in detail. Click on the link to open respective section.

  • 0:00 – Introduction/whoami
  • 35:23 – Networking Refresher: Introduction
  • 1:53:32 – Kali Linux Overview
  • 5:21:09 – The 5 Stages of Ethical Hacking
  • 6:23:30 – Identifying Website Technologies
  • 6:30:39 – Gathering Information w/ Burp Suite
  • 8:05:59 – Researching Potential Vulnerabilities
  • 8:24:03 – Scanning w/ Nessus Part
  • 8:40:57 – Reverse Shells vs Bind Shells
  • 8:48:02 – Staged vs Non-Staged Payloads
  • 8:51:27 – Gaining Root w/ Metasploit
  • 8:59:13 – Manual Exploitation

4. Ethical Hacking Course By Intellipaat

Following topics covered in detail. Click on the link to open respective section.

  • 00:00 – ethical hacking course
  • 02:26 – introduction to hacking
  • 03:08 – types of hackers
  • 04:44 – what is ethical hacking
  • 05:35 – common hacks
  • 08:06 – phases of ethical hacking
  • 12:05 – introduction to ceh
  • 15:58 – income of ethical hacker
  • 16:30 – hacking configuration
  • 20:24 – footprinting with netcraft
  • 26:25 – nmap hcking tutorial
  • 28:21 – workflow of nmap
  • 39:46 – network enumeration with netbios
  • 44:57 – vulnerability analysis with nessus
  • 50:52 – system hacking with lophtcrack
  • 59:01 – arp poisoning with cain and abel
  • 59:58 – arp spoofing detection with wireshark
  • 01:05:53 – phishing with se toolkit
  • 01:11:19 – ddos attack with h.o.i.c
  • 01:13:22 – ddos prevention with anti ddos guardian
  • 01:18:44 – session hijacking with bettercap
  • 01:23:57 – honeypotting with honeybot
  • 01:27:34 – web server reconnaissance with httprecon
  • 01:31:44 – web application footprinting with whatweb
  • 01:36:25 – sql injection
  • 01:48:20 – hands on sql injection
  • 01:58:55 – cracking wifi password with aircrack-ng
  • 02:01:30 – creating a trojan with njrat
  • 02:08:51 – hacking live testing
  • 03:09:04 – cryptography

5. Full Ethical Hacking Course by FreeCodeCamp

Following topics covered in detail in this free ethical hacking course. Click on the link to open respective section.

  • (0:00) – Course Introduction/whoami
  • (6:12) – Part 1: Introduction, Notekeeping, and Introductory Linux
  • (1:43:45) – Part 2: Python 101
  • (3:10:05) – Part 3: Python 102 (Building a Terrible Port Scanner)
  • (4:23:14) – Part 4: Passive OSINT
  • (5:41:41) – Part 5: Scanning Tools & Tactics
  • (6:56:42) – Part 6: Enumeration
  • (8:31:22) – Part 7: Exploitation, Shells, and Some Credential Stuffing
  • (9:57:15) – Part 8: Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
  • (11:13:20) – Part 9: NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
  • (12:40:46) – Part 10: MS17-010, GPP/cPasswords, and Kerberoasting
  • (13:32:33) – Part 11: File Transfers, Pivoting, Report Writing, and Career Advice

Leave a Comment

Your email address will not be published. Required fields are marked *