Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Ethical Hacking Foundations & Network Security

Packt via Coursera

Overview

Coursera Plus Annual Sale:
All Certificates & Courses 50% Off!
Grab it
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. This course provides a comprehensive introduction to ethical hacking and network security. By completing this course, learners will acquire the foundational skills necessary to secure networks and systems, along with the hands-on experience to implement key cybersecurity techniques. With practical lessons on setting up hacking labs, using Kali Linux, and performing penetration testing, students will be well-equipped to identify and mitigate network vulnerabilities. The journey begins with setting up your ethical hacking environment, including installing and configuring Virtualbox and Kali Linux on both Windows and Mac devices. From there, learners will dive into Kali Linux fundamentals, ensuring they are comfortable navigating the system, managing files, and using essential tools for ethical hacking. The course progresses to more complex topics such as maintaining online anonymity, exploring the dark web, and network penetration testing, all while developing a strong foundation in practical, real-world security techniques. The course takes a deep dive into various areas of cybersecurity, such as network sniffing, wireless attacks, post-connection attacks, and system penetration testing. These are complemented by detailed instructions on using tools like nMap, Wireshark, Bettercap, and Metasploit. Ethical hacking practices are enhanced with key exercises on wireless encryption cracking, sniffing passwords, and executing ARP poisoning. By the end of the course, students will have hands-on experience that prepares them for real-world ethical hacking scenarios. This course is ideal for anyone interested in cybersecurity, penetration testing, or ethical hacking. Beginners in the field will benefit from the thorough breakdown of core concepts and practical skills. No prior knowledge of ethical hacking or network security is required, though familiarity with basic computer systems and networks is helpful. The course is beginner-friendly, with plenty of opportunities for hands-on learning.

Syllabus

  • Course Introduction
    • In this module, we will provide an overview of the course and introduce the course manual, which will be a vital resource for supporting your ethical hacking journey. We’ll guide you through the learning structure, ensuring you are prepared for the technical topics ahead.
  • Hacking Lab Setup
    • In this module, we will walk you through the essential steps of setting up a hacking lab, including virtual machine installation and configuring Kali Linux. You'll also learn to troubleshoot installation issues and make use of snapshots to ensure a secure environment for learning and experimentation.
  • Kali Linux 101
    • In this module, we will cover the basics of Kali Linux, familiarizing you with the interface, essential tools, and navigation methods. You'll also learn key Linux concepts such as file management, permissions, and system configuration.
  • Anonymity Online
    • In this module, we will focus on how to maintain your anonymity online, utilizing tools like VPNs and DNS to safeguard your privacy. You’ll gain a strong understanding of online anonymity and how to address common privacy-related challenges.
  • Dark Web
    • In this module, we will introduce you to the dark web, focusing on its structure, potential dangers, and best practices for secure access. You will also learn to install and use Tor to ensure your anonymity while exploring the dark web.
  • Network Pentesting
    • In this module, we will introduce you to network penetration testing, covering foundational concepts and tools. You will learn about network reconnaissance, WiFi setup, and critical techniques for identifying security weaknesses in networks.
  • Gathering Information From Networks
    • In this module, we will dive into network reconnaissance and sniffing, focusing on techniques like Airodump-ng and deauthentication attacks. You will gain practical experience in gathering and analyzing network information to identify potential vulnerabilities.
  • Wireless Attacks
    • In this module, we will explore various wireless network attacks, focusing on techniques for cracking WEP, WPA, and WPA2. You'll also learn how to capture key data for encryption cracking and how to strengthen wireless network security.
  • Post Connection Attacks
    • In this module, we will cover post-connection attacks, focusing on tools for network reconnaissance, such as nMap and Wireshark. You’ll also learn techniques for intercepting network traffic and how to protect against such attacks.
  • System Pentesting
    • In this module, we will introduce system penetration testing, guiding you through practical exercises like scanning with nMap and exploiting vulnerabilities. You will learn to use Metasploit and other tools to penetrate vulnerable systems securely.
  • Pentesting with ChatGPT
    • In this module, we will explore how ChatGPT can enhance your penetration testing skills. You will learn how to use it to analyze scan results, identify vulnerabilities, and execute advanced techniques like privilege escalation.

Taught by

Packt - Course Instructors

Reviews

Start your review of Ethical Hacking Foundations & Network Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.