Free Ethical Hacking Course
Introduction to Ethical Hacking
Learn the essentials of ethical hacking in this free ethical hacking course. Discover hacking types, essential tools, and how to protect web, mobile, and network applications from common cyber threats.
Modules updated 07/2025
About this course
Learn ethical hacking in this free hacking course, perfect for beginners! Understand different hacking types like black hat, white hat, and grey hat. Discover the goals and legal side of ethical hacking.
Explore common web and mobile app attacks like SQL injection, XSS, and DDoS. Learn how to protect networks and applications from these threats.
Get familiar with Kali Linux and bWAPP for real-world testing. By the end of this ethical hacking free course, you'll be ready to secure systems and defend against cyber attacks.
Course outline
What is Hacking?
This module covers a fundamental concept – hacking. You will understand what hacking is and its three types: black hat, white hat, and grey hat hackers. Lastly, you will also get familiar with ethical and unethical hacking.
Goals of Ethical Hacking
In this module, you will learn the goals of ethical hacking. You will understand how ethical hacking is legal and adapted by many organizations.
Skills and Tools required for Ethical Hackers
The learner will learn about various skills to be pursued by ethical hackers. The learners will also get to know about tools used by ethical hackers.
Process of Ethical Hacking - Demonstration
The process of ethical hacking is demonstrated with an example.
Process of Ethical Hacking - Demonstration Part 2
The process of ethical hacking is demonstrated with an example
Ethical Hacking across Domains
The learner will understand the importance of ethical hacking across various domains such as web application environment, network architecture, mobile applications, etc.
Domains under Ethical Hacking
The learner will learn about various domains under ethical hacking, such as web applications, network architecture, etc.
Web Application Domain: Common Attacks
The learner will get familiar with common web application attacks, injection flaws, cross-site scripting, and web services attacks.
Web Application Domain: Hacking Methodology
The learners will learn about hacking methodologies such as web footprinting, vulnerability scanners, identifying entry points, and attack surface.
Mobile Application Domain: Types of Android Attacks
The learner will be able to understand types of android attacks such as untrusted APKs, SMS, Email, Spying, App sandboxing issues, and rooting.
Network Application Domain: Types of Network Attacks
The learner will be able to understand endpoint attacks, malware attacks, vulnerabilities, and exploits.
Network Application Domain: Examples
The learner will understand DDoS attacks in this section.
Demonstration - SQL Injection
SQL Injection process is demonstrated in this section.
Why are Web Applications a Target
The learner will be able to analyze why web applications are subjected to hacking.
What is bWAPP?
bWAPP stands for a buggy web application, an insecure web application that includes vulnerabilities.
bWAPP Architecture
bWAPP architecture is discussed in this section. bWAPP is an open-source PHP application.
bWAPP Features
The significant features of bWAPP are discussed in this section.
Why should you learn bWAPP?
The learners will understand why ethical hackers need to learn bWAPP.
Kali Linux
Kali Linux is an operating system that focuses on security and we will be exploring that in this module.
Demonstration - Web Application attack: Broken Authentication
Web application attack such as broken authentication is demonstrated in this section.
Demonstration - Web Application attack: Blind SQL Injections
Web application attacks such as blind SQL injections are demonstrated in this section.
Demonstration - Web Application attack: Cross site scripting
Web application attack such as cross-site scripting is demonstrated in this section.
Computer Security Threats
Hacking occurs because of computer security threats such as computer viruses, computer worms, scareware, keylogger, adware, malware, backdoor, trojan, ransomware, and spyware.
Process of Ethical Hacking
This module covers the ethical hacking process, such as information gathering, scanning, gaining and maintaining access, clearing tracks, and reporting.
Web Application Domain
Around 75% of the total attacks are on web application domains.
Mobile Application Domain
The learner will understand how attackers can easily compromise the mobile network due to vulnerabilities.
Tap Jacking
The learner will be able to understand tap jacking with an example.
Network Application Domain
The learner will be able to understand network attacks and their types, i.e., active and passive attacks.
Other Domains
Domains such as cloud computing, IoT, Blockchain, and edge computing are discussed in this section.
Web and Mobile Application Security
In this module you will learn web applications which is prime target for attackers, its common threats and the importance of web application firewalls. We will also cover mobile-specific attack vectors and strategies for securing mobile applications.
Get access to the complete curriculum once you enroll in the course
What our learners enjoyed the most
Skill & tools
68% of learners found all the desired skills & tools
Frequently Asked Questions
Will I receive a certificate upon completing this free course?
Is this course free?
What is ethical hacking and how does it differ from illegal hacking?
Ethical hacking involves legally breaking into systems to identify potential threats and vulnerabilities, with the intent of improving security. Unlike illegal hacking, it's done with permission and aims to prevent cyber attacks.
What skills are required to become an ethical hacker?
Essential skills include understanding of networks, operating systems, and programming languages (like Python, JavaScript). Knowledge in cybersecurity practices and tools is also important.
What are the legal and ethical boundaries in ethical hacking?
Ethical hackers must always have explicit permission to access and test systems. They should adhere to legal guidelines and respect data privacy and integrity.