Coupon & course info
Course Name: The Complete Ethical Hacking Course for 2016/2017!
Subtitle: Gain the knowledge hackers use to compromise systems and use it to protect your own!
Instructor: Taught by Ermin Kreponic, IT Expert
Category: IT & Software
Subcategory: Network & Security
Provided by: Udemy
Price: $195 (before discount)
Free coupon code: See above (no charge for coupon)
Review info & popularity
As of September 8, 2016…
Students: 831 students enrolled
Ratings: 39 reviews
Rank: ranked #19d in Udemy IT & Software Courses
Brief course description
If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world! Join us now and receive over 50 lectures & 9.5 hours of HD video, and 1 on 1 assistance from experienced network security professionals! We will cover the following topics in this course:
This course will receive monthly updates based on students requests, and our goal is to make this the #1 network security course online!
DISCLAIMER The attacks demonstrated in this course can cause serious damage and are only shown for educational purposes. The intent of this course is to give you the tools to defend your own networks, share skills that are valuable to companies all over the world, and help you to better understand the challenges that information security professionals face on a daily basis.
(Read more about this course on the official course page.)
Ermin Kreponic bio
Strongly motivated young IT expert, Linux enthusiast with a passion for troubleshooting network related problems. With an exceptional eye for details and a sense of urgency when it comes down to problem solving.n n Skillsn – Advanced knowledge of Linux command line n – Installation, configuration and maintenance of servers that run under Unix/Linux typen operating systemsn To name a few: DNS, TFTP, FTP, SSH, APACHE, SMTP, VSFTP and some othersn – Troubleshooting a wide range of network related problems. Meaning, digging deep for n packets on any given network.n Using one of my favourite tools for capturing and filtering packets on the network, Wireshark, n and resolving end-user issues n – Good understanding of Cisco routers and IOS operating systemn – Configuration and implementation of Linux firewall namely Iptablesn – Supervision and filtration of network trafficn – Tightening down security and pen testing networks for possible vulnerabilitiesn – Good knowledge of network gear brands and their strengths or weaknessesn – Preforming system back upn – Fair knowledge of Bash scriptingn – equipment installation, upgrades, patches, and configuration.n n n Personal note:n n I do not sleep much, but that is not only because I work hard, rather instead it is n because I enjoy this line of work,n it is extremely rewarding in every way that matters; What would you be willing to do everyday for the rest of your life? What is your passion? If you asked me these two questions as a young adult, fresh out of university, I am not sure I would have been able to give a complete answer. Today, I am thankful to be serving over 1,000 students in 4 courses on Udemy, and know that teaching is my passion.
(Learn more about this instructor on the official course page.)
If you like this course, you might also be interested in:
These Labs will prepare the student to practice and pass the simulations part of Cisco’s new CCENT o ICND1 certification
Taught by Lazaro Diaz, Network Engineer, Cisco & Microsoft Instructor
The best and the most extensive Ethical Hacking Training Program on the market. Covers CISS, CEH, CompTIA and CISSP
Taught by IT Security Academy, IT Security Certified Professional
This course prepares students for the EC-Countil Certified Ethical Hacker v9 exam.
Taught by Cyber Training, Master cyber security skills and advance your career
Complete guide to rootkit and stealth software development
Taught by Hacking School, IT Security Experts – We turn beginners into professionals.
Unleash the Power of PowerShell. Amazing skills for anyone that deals with IT.
Taught by Tom Meservy, Professor and Consultant
Final details for this Udemy course
Skill level: All Levels
Lectures: 52 lessons
Duration: 9.5 hours of video
What you get: Install Linux
Target audience: This course was designed for students in the IT/Network Security field
Requirements: A computer to follow along with exercises in the course
Access: Lifetime access
Peace of mind: 30 day money back guarantee
Availability: available online, as well as on iOS and Android
Download options: check course to see if you can download lessons