New members: get your first 7 days of ITTutorPro Premium for free! Join for free

Ethical Hacking v10 – Learn Hacking

Course Description

32.57 Hours

239 Videos

Wanting to learn how to hack?

“White-Hat” hacking to be more specific. The Ethical Hacking v10 course covers ethical hacking of networks and system penetration testing. This course covers all of the exam objectives for the EC-Council exam ECC 312-50 version 10 exam. Students are taken step-by-step through hacking and exploiting each network and system type. Tools used in the activities are a combination of Windows and Kali Linux-based. You have access and instructions on setting up a full virtual environment to allow you to gain practical hands-on experience during the course. A broad range of examples used by hackers is covered.

The “Ethical Hacking” and “Forensic Investigator in Computer Hacking” course(s)  are unofficial programs that have been developed by ITU independently of EC-Council. EC-Council has not been endorsed, sponsored or certified this material at any time whatsoever. Usage of these material/books does not provide any guarantee of passing the EC-Council exam.

In this course, you will learn hands-on penetration testing and hacking skills including:

  • Footprinting, scanning, and enumeration
  • Vulnerability analysis
  • Sniffing and Spoofing
  • Social engineering
  • Denial of Service
  • Web server, web application, and database hacking
  • System hacking using various forms of malware and tools
  • Wireless network and mobile device hacking
  • Evading IDS
  • Firewalls and Honeypots
  • Cryptography
  • Cloud computing and Internet of Things hacking

An Ethical Hacker certification is a much-sought-after security certification offered by EC-Council. It demonstrates proficiency in ethical hacking concepts and techniques. The topics in this course cover a broad range of concepts and techniques and will provide you with a solid foundation to pursue advanced cybersecurity studies.

How Much Can I Earn?

With a strong focus on information security these days, positions related to security in the U.S., an ethical hacker salary can average between $107,000 to $115,000 annually. Individuals accomplishing this certification are often IT Security Specialist, Security Engineers and Penetration Testers. is a great resource for up-to-date information on the Ethical Hacker Salary in the United States.

An exceptional compliment to this course is our hands-on CompTIA PenTest+ course. Both courses provide you with an in-depth of all things hacking and testing. For those really serious about cybersercurity, ITU offers a complete line of Cybersecurity and security courses including CompTIA CySA+, CompTIA CASP+, CompTIA Security+, Cisco CCNA Security and more. All included for one low price in our All-Access IT Certification products.


Share on:

Course Syllabus

Ethical Hacking – Introduction to Ethical Hacking

  1. Introduction
  2. Introduction to Hacking
  3. Information Security Threats and Attack Vectors
  4. Hacking Concepts
  5. Ethical Hacking Concepts and Scope
  6. Information Security Controls Part 1
  7. Information Security Controls Part 2
  8. Information Security Laws and Standards

Ethical Hacking – Footprinting and Reconnaissance

  1. Footprinting and Reconnaissance
  2. Footprinting Methodology
  3. Google Hacking
  4. FootPrinting Through Social Networking
  5. Website Foot Printing
  6. Email Foot Printing
  7. Competitive Intelligence Gathering
  8. WhoIs Foot Printing
  9. DNS Logical and Geographical Foot Printing
  10. Network Footprinting
  11. Foot Printing
  12. Foot Printing Tools
  13. Foot Printing Penetration Testing
  14. Conduct Recon with Ping Act
  15. Query DNS with NSLookUp Act
  16. Discover Website Subdomain with Sublist3r Act
  17. Obtain OSINT Information About a Person wit Pipl Act
  18. Gather Contact and Host Information with theHarvester Act
  19. Automate OSINT Research with Recon-ng Act
  20. Get Started with Metasploit Act
  21. Conduct Open Source Intelligence with OSR Framework Act
  22. Obtain Whois Information with Smart Whois Act
  23. Extract Links, URLs, and Emails from Websites with Web Data Extractor Act
  24. Create an Offline Copy of a Website with HTTrack Act
  25. Trace an Email with eMail Tracker Pro Act

Ethical Hacking – Network Scanning

  1. Network Scanning
  2. Discovery Scans
  3. Port Scans
  4. Nmap
  5. Nmap Stealth Scans
  6. Nmap Options
  7. H-ping and Other Scanners
  8. SSDP Scanning
  9. Scanning Beyond IDS and Firewall
  10. Banner Grabbing
  11. Scanning Pen Testing
  12. Checking for Live Systems with Angry IP Scanner Act
  13. Network Scanning with MegaPing Act
  14. Advanced Scanning with nmap Act
  15. Packet Crafting with Hping3 Act
  16. Packet Crafting with Colasoft Packet Builder Act

Ethical Hacking – Enumeration

  1. Enumeration
  2. Enumeration Technicques Tools
  3. NetBIOS Enumeration
  4. SNMP Enumeration
  5. LDAP Enumeration
  6. NTP Enumeration
  7. SMTP and DNS Enumeration
  8. Enumeration Countermeasures
  9. Enumeration Penetration Testing
  10. Enumerate NetBIOS Information with SuperScan Act
  11. Enumerate NetBIOS Information with NetBIOS Enumerator Act
  12. Enumerate NetBIOS and LDAP Information with Hyena Act
  13. Enumerate SNMP WMI and Other Information Using SoftPerfect Network Scanner Act

Ethical Hacking – Vulnerability Analysis

  1. Vulnerability Analysis
  2. Vulnerability Assessment Solutions
  3. Vulnerability Scoring Systems
  4. Vulnerability Assessment Tools and Reports
  5. Perform a Vulnerability Scan and Analysis with Nessus Act

Ethical Hacking – Malware Threats

  1. Malware Threats
  2. Trojan Concepts
  3. Trojan Types
  4. Trojan Tools
  5. Virus and Worm Concepts
  6. Virus Types
  7. Malware Analysis
  8. Malware Reverse Engineering
  9. Malware Detection
  10. Malware Countermeasures
  11. Malware Penetration Testing
  12. Infect a Victim with a Remote Access Trojan Act

Ethical Hacking – Sniffing

  1. Sniffing Concepts
  2. DHCP Attacks
  3. MAC Attacks
  4. ARP Poisoning
  5. DNS Poisoning
  6. Sniffing Tools
  7. Sniffing Countermeasures
  8. Sniff a Clear Text HTTP Session with Wireshark Act
  9. Intercept and Crack a Network Login Act

Ethical Hacking – Social Engineering

  1. Social Engineering
  2. Human Based Social Engineering
  3. Computer Based Social Engineering
  4. Additional Types of Social Enginnering
  5. Social Engineering Countermeasures
  6. Social Engineering Penetration Testing
  7. Fool a User with a Baited USB Stick Act
  8. Harvest Credentials with Spear Phishing Act

Ethical Hacking – Denial of Service

  1. Denial of Service
  2. Common Dos-DDoS Attack Types
  3. Additional DoS Attack Types
  4. BotNets
  5. DoS Countermeasures
  6. Additional DoS Countermeasures
  7. DoS Penetration Testing
  8. Perform a DoS Attack With the Low Orbit ION Cannon Act
  9. Step Up the DoS Attack With the High Orbit ION Cannon Act
  10. Perform a Slowloris DoS Attack Act

Ethical Hacking – Session Hijacking

  1. Session Hijacking
  2. Browser Session Hijacking
  3. Way to Compromise a Session Token
  4. Client Side Attacks
  5. Hijacking at the Network Level
  6. Session Hijacking Tools
  7. Session Hijacking Countermeasures
  8. Session Hijacking Testing

Ethical Hacking – Hacking Webservers

  1. Hacking Web Servers
  2. Webserver Attacks
  3. Methodology of Webserver Attacks
  4. Webserver Attack and Defense Tools
  5. Webserver General Defense
  6. Webserver Specific Attack Countermeasures
  7. Webserver Patch Management
  8. Webserver Pen Testing
  9. Footprint a Web Server with IDServe Act
  10. Conduct a Simple Web Server Vulnerability Scan with Uniscan Act
  11. Conduct a Comprehensive Web Server Vulnerability Scan with Uniscan Act
  12. Brute Force a Web Server with Medusa Act

Ethical Hacking – Hacking Web Applications

  1. Hacking Web Applications
  2. Web App Vulnerabilities and Exploits
  3. Web Application Threats
  4. Injection Attacks
  5. Hidden Fields and Clickjacking
  6. Cross Site Attacks
  7. Additional Web App Attacks
  8. Web Hacking Methodology
  9. Web App Hacking Countermeasures
  10. Web App Security Tools
  11. Web Application Penetration Testing
  12. Conduct a Simple Command Injection Attack Act
  13. Inject a Malicious Link with Cross Site Scripting Act
  14. Conduct a Cross Site Request Forgery Attack

Ethical Hacking – SQL Injection

  1. SQL Injection
  2. Types of SQL Injection
  3. SQL Injection Methodology
  4. SQL Injection Tools
  5. SQL Injection Countermeasures
  6. SQL Injection Penetration Testing
  7. SQL Injection Act

Ethical Hacking – Hacking Wireless Networks

  1. Hacking Wireless Networks
  2. Wireless Discovery and Mapping
  3. WiFi Sniffers
  4. WiFi Attacks
  5. WiFi Cracking
  6. Wireless Hacking Tools
  7. Bluetooth Hacking
  8. Wireless Hacking Countermeasures
  9. Wireless Security Tools
  10. Wireless Penetration Testing
  11. Crack a WEP Key with Aircrack-ng Act
  12. Crack a WPA Key with Aircrack-ng Act

Ethical Hacking – System Hacking

  1. System Hacking Methodology
  2. Windows System Vulnerabilities and Exploits
  3. Linux System Vulnerablities and Exploits
  4. Password Cracking Methods
  5. Network Service Password Cracking
  6. Windows Password Cracking
  7. Linux Password Cracking
  8. Password Cracking Tools
  9. Other Methods of Obtaining Passwords
  10. Keylogging
  11. Spyware
  12. RootKits
  13. Hiding Files
  14. Steganography
  15. Privilege Escalation
  16. Creating and Maintaining Remote Access
  17. Hiding Evidence
  18. System Hacking Penetration Testing
  19. Spoof Name Resolution and Capture Credentials with Responder Act
  20. Dump and Crack Password Hashes with pwdump7 and Ophcrack Act
  21. Crack Passwords with L0pht7 Act
  22. Exploit Client Side Vulnerabilities Act
  23. Track User Activity with Spyware Act
  24. View and Clear Audit Policies with Auditpol Act
  25. Hide Data Using Whitespace Steganography Act
  26. Hide Data Using Least Significant Bit Steganography Act
  27. Cover Your Tracks Act

Ethical Hacking – Hacking Mobile Platforms

  1. Hacking Mobile Platforms
  2. Hacking Android OS
  3. Rooting Android
  4. Securing Android
  5. Hacking iOS
  6. Jailbreaking iOS
  7. Securing iOS
  8. Hacking Windows Phone OS
  9. Hacking Blackberry
  10. Mobile Device Management
  11. Mobile Security Guidelines and Tools
  12. Mobile Penetration Testing
  13. Prepare Your Wireless Email Environment Act
  14. Pwn a Mobile Device with Metasploit Act
  15. Use a Mobile Device in a DDoS Campaign Act
  16. Return Your VMs to Original Configuration Act
  17. Uninstall Main Activity Malware from Android Act

Ethical Hacking – Evading IDS, Firewalls, and Honeypots

  1. Evading IDS Firewalls and Honeypots
  2. Firewalls
  3. Honeypots
  4. IDS Firewalls and Honeypots Tools
  5. Evasion
  6. Evasion Countermeasures
  7. IDS Firewall Honeypot Penetration Testing
  8. Fly Below IDS Radar Act
  9. Test and Analyze a Honey Pot Act
  10. Bypass Windows Firewall Act

Ethical Hacking – Cryptography

  1. Cryptography
  2. Encryption Algorithms
  3. Cryptography Tools
  4. Public key Infrastructure
  5. Email Encryption
  6. Disk Encryption
  7. Cryptography Attacks
  8. Crytography Penetration Testing
  9. Examine Hashing Algorithms Act
  10. Protect Data with Symmetric Encryption Act
  11. Protect Data with Asymmetric Encryption Act

Ethical Hacking – Cloud Computing

  1. Cloud Computing
  2. Virtualization
  3. Cloud Computing Threats
  4. Countermeasures to Cloud Computing Threats
  5. Cloud Computing Attacks
  6. Cloud Security
  7. Cloud Security Best Practices
  8. Cloud Penetration Testing

Ethical Hacking- IoT Hacking

  1. IoT Hacking
  2. IoT Vulnerabilities and Attacks
  3. IoT Hacking Methodology and Tools
  4. IoT Hacking Countermeasures
  5. oT Penetration Testing
  6. Search the Internet for Vulnerable IoT Devices Act
  7. Conclusion

From: $14.99 / month

  • Vast selection of courses and labs Access
  • Unlimited access from all devices
  • Learn from industry expert instructors
  • Assessment quizzes and monitor progress
  • Vast selection of courses and labs Access
  • Blended Learning with Virtual Classes
  • Access to new courses every quarter
  • 100% satisfaction guarantee

You Will Get Certification After Completetion This Course.

Instructor Led Lectures
All IT Tutor Pro Formerly It Nuggets Courses replicate a live class experience with an instructor on screen delivering the course’s theories and concepts.These lectures are pre-recorded and available to the user 24/7. They can be repeated, rewound, fast forwarded.
Visual Demonstrations, Educational Games & Flashcards
IT Tutor Pro Formerly It Nuggets recognizes that all students do not learn alike and different delivery mediums are needed in order to achieve success for a large student base. With that in mind, we delivery our content in a variety of different ways to ensure that students stay engaged and productive throughout their courses.
Mobile Optimization & Progress Tracking
Our courses are optimized for all mobile devices allowing students to learn on the go whenever they have free time. Students can access their courses from anywhere and their progress is completely tracked and recorded.
Practice Quizzes And Exams
IT Tutor Pro Formerly It Nuggets Online’s custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. Students will have practice quizzes after each module to ensure you are confident on the topic you are learning.
World Class Learning Management System
IT Tutor Pro Formerly It Nuggets provides the next generation learning management system (LMS). An experience that combines the feature set of traditional Learning Management Systems with advanced functionality designed to make learning management easy and online learning engaging from the user’s perspective.

Frequently Asked Questions

How does online education work on a day-to-day basis?
Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.
Is online education as effective as face-to-face instruction?
Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.
Do employers accept online degrees?
All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.
Is online education more conducive to cheating?
The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.
How do I know if online education is right for me?
Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
What technical skills do online students need?
Our platform typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.