Learn practical skills for ethical hacking & penetration testing with this comprehensive course, no experience necessary


This course is for anyone interested in becoming an ethical hacker, no matter your current skill level. The curriculum is designed for absolute beginners interested in a career as a security professional, beginning with the absolute basics of penetration testing, and progressing to advanced topics and techniques. Get started today in your Ethical Hacking career.

The goal of ethical hacking is to find security vulnerabilities in an organization’s digital systems and networks. The best way to test the security of this infrastructure is to attempt to break in through penetration testing techniques. The increasing amount of high-profile cyber incidents continues to emphasize the need for individuals with these skills, with job demand projected to continue at an exponential rate.

The techniques shown here leverage free tools which are explained throughout the course, including instructions for creating your own home lab for practice and study. One of the primary tools you will become familiar with is Kali Linux, which is a Debian-based Linux distribution aimed at penetration testing and security auditing.

This course explores the following topics and more:

–  Networking Basics

–  Creating a Virtual Lab

–  Kali Linux Tools for Penetration Testing

–  Linux Basics

–  Python Basics

–  Penetration Testing Methodology

–  Legal Considerations

–  Report Writing

–  Passive and Active Reconnaissance

–  Scanning and Enumeration

–  Reverse and Bind Shell

–  Automated Payloads and Exploitation

–  Brute Force Attacks

–  Credential Stuffing

–  Password Spraying

–  Tips for Maintaining Access and Covering Tracks

–  Web Server Vulnerabilities

– Wifi Hacking

Erik25 July 2021

David Bombal is the best, I came to this site just because of him and now recommend to any beginning learner or someone wanting to learn something new!! He is definitely worth his weight in gold!! A+ instructor and seems to be an all around good guy!

Saif23 July 2021

To all the instructors in this course. All my gratitude to you. This is one of the best course I have gone through for Ethical Hacking. Still have not completed the course but I am absolutely loving it so far. If there is anything I can do to support you’ll please let me know.

Giovanni22 July 2021

The course is very explainable, I hope to learn a lot in this course. The teacher is dynamic and uses simple language to explain.

Kiran15 July 2021

The course is absolutely amazing…!!
It will help you to get a broad Level 1 knowledge about how things work.

Simon13 July 2021

So far so good. I like the format and the fact that you are taking the time to make clear the resources and functionality of the site/s. Although I am an experienced Linux user (I now use nothing else) I am new to EH/pen-testing.
Halfway through, and it is getting meaty. There are a few parts that take some re-watching, and I did not get all the behaviors/returns from some of the commands, like hosts on nmap -sn, but overall very good, learning a lot.

Joshua13 July 2021

Not really for beginners exactly, a lot of the times they are using terms that you need a bit of experience to know about and they move fast. (have your google search ready if you are a complete beginner to IT). Other than that its a great course.

Matthew12 July 2021

This is just a great course to give you practical examples of ethical hacking so you can choose for yourself if security is right for you.

Thomas11 July 2021

This is not a beginners course. It skims over the basics really fast, feeling more like refreshers than explanations, and it touches on way too many topics in a too short amount of time. I wish it was less rushed and longer. Or he could’ve discussed less topics, but more in depth. Like this, it’s pretty useless to me unfortunately.

I’m not saying there’s no good info here, but you should approach it as a pocket guide reference when you already have some knowledge on networking and ethical hacking, and it should be marketed that way.

Laurens11 July 2021

Even though I already knew some parts of this course (because I study IT), like network basics, they explain it all comprehensively. Its also easy to listen to them

Riaan11 July 2021

Started out well,
but I got lost a bit from section 8 onwards. Got back on track from chapter 15. Overall very good course though.

Anders11 July 2021

I have been studying networking back in the days but the section about ip and netmask was really blury for me…

Joseph10 July 2021

This course is very thorough and the information presented is very useful and easy to understand. I would advise note taking because of the volume of subject matter. This course is well worth the money. Highly recommend.

kye10 July 2021

Explains what we will learn before proceeding the lesson so you know where to look when you need help with something. Also provides necessary things for what there doing in the lesson which is massively appreciated.

Prasanna10 July 2021

I’m loving it. This course is giving me the courage and direction which I needs.
Thanks , for making this amazing course.

Jean-Jacques7 July 2021

I just began studying this course as long as i continued, i found that this course is very informative and awsome! Very good course and path! Cheers




Course Introduction

1.0 Course Introduction

1.1 Introduction and Overview

1.2 Course Tools

Getting help

Answering your questions

Networking Basics

2.0 Networking Basics

2.1 IP Addressing

2.2 MAC Addressing

2.3 The OSI Model

2.4 Binary Numbering

2.5 Subnetting

2.6 Subnetting: Hands-On Practice

2.7 TCP and UDP

2.8 Well-Known Ports

Creating Virtual lab

3.0 Creating a Virtual Lab

3.1 VMware Player

3.2 Virtual Box

3.3 VMware Fusion

3.4 Kali Linux

3.5 VM Snapshots

Kali Linux Tools

4.0 Kali LInux Tools

4.1 Kali Linux Overview

4.2 Keeping Notes

Linux Basics

5.0 Linux Basics

5.1 Sudo Command

5.2 File System Navigation

5.3 File Permissions

5.4 Working with Files

5.5 Linux Users

5.6 Common Commands

5.7 Installing Updates

5.8 Installing Python

5.9 Using GitHub

5.10 Bash Scripting

Python Basics

6.0 Python Basics

6.1 Strings

6.2 Variables

Subscribe to latest coupons on our Telegram channel.


Boolean Expressions









Penetration Testing

7.0 Penetration Testing

7.1 Five Phases of Ethical Hacking

7.2 Legal Documents

7.3 Pentest Report Writing


8.0 Reconnaissance

8.1 Passive Reconnaissance

8.2 Email Address Gathering

8.3 Discovering Breached Credentials

8.4 Passive Kali Tools

8.5 Leveraging the Internet

8.6 Subdomains


9.0 Scanning

9.1 Nmap Scanning

9.2 Web Server Scanning

9.3 File Share Enumeration

9.4 SSH Enumeration

9.5 Vulnerability Scanning

Gaining Access

10.0 Gaining Access

10.1 Reverse Shell

10.2 Bind Shell

10.3 Sending Payloads

10.4 Automated Exploitation

10.5 Brute Force Attacks

10.6 Credential Stuffing

10.7 Password Spraying

Maintaining Access

11.0 Maintaining Access

11.1 Tactics for Maintaining Access

Covering Tracks

12.0 Covering Tracks

12.1 Pentest Cleanup

Exploring OWASP

13.0 Exploring OWASP

13.1 OWASP Top 10

13.2 Using Burp Suite

13.3 SQL Injection

13.4 Broken Authentication

13.5 Sensitive Data Exposure

13.6 XML External Entities (XXE)

13.7 Broken Access Control

13.8 Security Misconfigurations

13.9 Cross-Site Scripting (XSS)

13.10 Insecure Deserialization

13.11 Known Vulnerabilities

13.12 Insufficient Logging and Monitoring

WiFi Theory

WiFi Introduction

Introduction to Wireless LANs (WLANs)

WLAN Antennas

Wireless Range Extenders

WLAN Frequencies and Channels

WLAN Standards

WiFi Hacking

Cracking WiFi with a single Linux Command (wifite)

Easy GUI WPA2 cracking using Fern

Cracking WiFi with airmon-ng

GPU WPA2 cracking using hashcat

Python WiFi DOS script

WiFi Adapters and Troubleshooting

WiFi adapters – are they required? And which are best?

Example of monitor vs managed mode

Get Alfa Adapter get working on Kali Linux

Fix TP-Link TL-WN722N Adapter issues

Wifite: Fixing issues

Course Wrap-Up

Course Wrap-Up