The Complete Ethical Hacking Bootcamp 2023: Zero to Mastery Certification Bundle

11 Courses & 151.5 Hours
You save 97% -

What's Included

Learn Python & Ethical Hacking From Scratch 2023
  • Experience level required: Beginner
  • Access 176 lectures & 23 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

176 Lessons (23h)

  • Your First Program

  • Introduction

    What is Programming, What is Hacking & Why Learn Them6:13
    Lab Overview & Needed Software7:48
    Installing Kali as a virtual Machine10:34
    Basic Overview of Kali Linux5:10
    The Terminal & Linux Commands11:21
    Python 2 VS Python 3 & Writing Our First Program9:08
    Installing & Using a Python IDE9:32
  • Writing a MAC Address Changer - Python Basics

    What is MAC Address & How To Change it7:41
    Using Python Modules & Executing System Commands9:18
    Implementing a Very Basic MAC Changer5:16
    Variables & Strings10:12
    Using Variables in MAC Changer4:36
    Getting Input From The User6:18
    Handling User Input9:40
    Handling Command-line Arguments9:44
    Initialising Variables Based on Command-line Arguments7:51
    Returning Values From Functions6:55
    Decision Making - Theory6:53
    Using Conditional Statements in MAC Changer9:05
  • MAC Changer - Algorithm Design

    What is an Algorithm3:15
    Reading Output Returned By System Commands6:24
    Regular Expressions (Regex)8:14
    Extracting a Substring Using Regex6:39
    Refactoring & Housekeeping10:59
    Implementing The Algorithm to Check The Mac Did Change6:11
  • Programming a Network Scanner

    Introduction & Teaser10:11
    Installing Windows as a Virtual Machine3:32
    What is ARP & What its Used For?9:43
    Designing an Algorithm To Discover Clients Connected To The Same Network4:00
    Using Scapy To Create an ARP Request6:48
    Combining Frames To Broadcast Packets9:37
    Sending & Receiving Packets6:57
    Iterating Over Lists & Analysing Packet10:09
    Using Escape Characters To Enhance Program Output6:29
    Improving the Program Using a List of Dictionaries8:55
    Iterating Over Nested Data Structures7:18
    Python 3 Compatibility6:55
  • Writing an ARP Spoofer

    What is ARP Spoofing?6:20
    Redirecting the Flow of Packets in a Network Using arpspoof5:08
    Creating an ARP Response7:11
    Sending ARP Responses5:34
    Extracting MAC Address From Responses6:59
    More on Loops & Counters7:56
    Dynamic Printing6:54
    Handling Exceptions5:16
    Implementing a Restore Function11:55
    Restoring ARP Tables When an Exception Occures5:33
  • Writing a Packet Sniffe

    Introduction & Teaser4:39
    Sniffing Packets Using Scapy7:20
    Extracting data From a Specific Layer6:50
    Analysing Sniffed Packets & Extracting Fields From Layers12:21
    Analysing Fields & Extracting Passwords11:05
    Extracting URLs8:00
    Capturing Passwords From Any Computer Connected to the Same Network8:03
  • Writing a DNS Spoofer

    Intercepting Packets - Creating a Proxy13:00
    Converting Packets to Scapy Packets9:21
    What is DNS Spoofing7:20
    Filtering DNS Responses6:26
    Analysing & Creating a Custom DNS Response7:56
    Modifying Packets On The Fly7:57
    Redirecting DNS Responses (Preview)5:45
  • Writing a File Interceptor

    Introduction & Teaser (Preview)4:27
    Filtering Traffic Based on the Port Used9:22
    Analysing HTTP Requests5:54
    Intercepting HTTP Requests10:19
    Modifying HTTP Responses on The Fly10:47
    Intercepting & Replacing Downloads on The Network (Preview)9:24
  • Writing a Code Injector

    Introduction & Teaser (Preview)1:20
    Analysing HTTP Responses6:49
    Replacing a Substring Using Regex7:15
    Decoding HTTP Responses9:48
    Modifying HTTP Responses & Injecting Javascript Code in HTML Pages8:50
    Refactoring & Housekeeping8:29
    Debugging Issues6:01
    Using Groups & None-capturing Regex8:57
    Recalculating Content Length11:38
    BeEF Overview & Basic Hook Method11:41
    Hooking Computers Using code_injector5:37
    Basic BeEF Commands4:24
    Delivering Malware Using BeEF5:41
  • Bypassing HTTPS

    How to Bypass HTTPS (Preview)10:49
    Bypassing HTTPS & Sniffing Login Credentials8:04
    Replacing Downloads on HTTPS Pages10:56
    Injecting Code in HTTPS Pages8:35
  • Writing an ARP Spoof Detector

    Running Python Programs on Windows9:45
    Capturing & Analysing ARP Responses6:43
    Detecting ARP Spoofing Attacks7:49
  • Writing Malware

    Introduction & Teaser1:57
    Execute System Command Payload9:40
    Sending Reports By Email11:25
    Filtering Command Output Using Regex10:07
    Stealing WiFi Passwords Saved on a Computer9:34
    Downloading Files From Program7:49
    Writing Files on Disk11:24
    Password Recovery Basics8:19
    Using all the Above to Steal Saved Passwords Remotely8:03
    Interacting With The File System9:43
  • Writing Malware - Keylogger

    Introduction & Teaser (Preview)3:41
    Writing a Basic Local Keylogger9:59
    Global Variables8:07
    Logging Special Keys6:58
    Threading & Recursion10:59
    OOP - Object Oriented Programming Basics15:07
    Constructor Methods & Instance Variables8:06
    Logging Key-strikes and Reporting Them By Email11:58
  • Writing Malware - Backdoors

    Introduction & Teaser5:46
    Client - Server Communication & Connection Types7:46
    Connecting Two Remote Computers Using Sockets10:09
    Sending & Receiving Data Over TCP5:19
    Executing System Commands Remotely10:06
    Implementing a Server9:08
    Implementing Skeleton For Server - Client Communication6:58
    Refactoring - Creating a Listener Class8:13
    Refactoring - Creating a Backdoor Class6:23
    Serialisation - Theory11:14
    Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP7:55
    Serialisation - Reliably Sending & Receiving Data6:20
    Sending Commands as List & Implementing Exit Command8:16
    Interacting With the File System - Implementing "cd" Command9:24
    Reading Files7:30
    Writing Files6:52
    Downloading Files From Hacked Computer7:54
    Implementing Upload Functionality in Listener7:53
    Implementing Upload Functionality in Backdoor6:12
    Handling Unknown Exceptions9:37
    Using the Backdoor to Hack Windows, Linux & OS X12:32
  • Writing Malware - Packaging

    Introduction & Teaser (Preview)3:15
    Converting Python Programs To Windows Binary Executables7:12
    Running Executables Silentely7:22
    Installing Windows Pyinstaller on Linux7:43
    Packaging Programs For Windows From Linux8:33
    Persistence Idea8:15
    Running Programs on Startup14:43
    Creating a Basic Trojan Using Download & Execute Payload10:36
    Creating a Trojan By Embedding Files In Program Code8:33
    Bypassing Anti-Virus Programs - Theory5:22
    Bypassing Anti-Virus Programs - Practical9:04
    Adding an Icon to Generated Executables5:14
    Spoofing File Extension9:35
    Converting Python Programs To OS X Executables8:41
    Converting Python Programs to Linux Executables7:23
  • Website / Web Application Hacking

    Introduction & Teaser6:42
    What is a Website4:13
    How to Hack a Website5:31
  • Website Hacking - Writing a Crawler

    Sending GET Requests To Web Servers10:00
    Discovering Subdomains11:43
    Discovering Hidden Paths in Websites10:54
    Reading Response Content6:26
    Extracting Useful Data From Response7:08
    Filtering Results7:10
    Extracting Unique Links & Storing Them In a List6:42
    Recursively Discovering All Paths On a Target Website9:37
  • Writing a Program To Guess Login Information

    Sending Post Requests to Websites11:59
    Guessing Login Information on Login Pages9:05
  • Writing a Vulnerability Scanner

    Introduction & Teaser2:35
    HTTP Requests - POST VS GET7:05
    Parsing HTML Code8:19
    Extracting HTML Attributes10:30
    Posting Forms10:27
    Building Basic Structure For Vulnerability Scanner11:24
    Using Default Parameters5:08
    Sending Requests in a Session9:16
    Extracting & Submitting Forms Automatically10:06
    Implementing a Method To Run The Scanner6:08
    Discovering XSS Vulnerabilities9:07
    Exploiting XSS Vulnerabilities5:08
    Implementing Code To Discover XSS in Forms8:15
    Implementing Code To Discover XSS in Parameters7:43
    Automatically Discovering Vulnerabilities Using the Vulnerability Scanner8:46
  • Bonus Section

    Bonus Lecture - What's Next??

Learn Python & Ethical Hacking From Scratch 2023


Zaid Sabih | Ethical Hacker, Computer Scientist & CEO of zSecurity

4.6/5 Instructor Rating: ★ ★ ★ ★

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

In 2017, Zaid started his own cybersecurity company, zSecurity. zSecurity is now a leading provider of ethical hacking and cyber security training, helping people become ethical hackers so they can test and secure systems from black-hat hackers.


Learn both ethical hacking and programming at the same time in this comprehensive course. The course assumes you have no prior knowledge in any of these topics, and by the end of it, you'll be at a high intermediate level being able to combine both of these skills to write python programs to hack into computer systems exactly the same way that black hat hackers do. That's not all, you'll also be able to use the programming skills you learn to write any program even if it has nothing to do with hacking. You'll learn everything by example, by writing useful hacking programs, no boring dry programming lectures.

4.6/5 average rating: ★ ★ ★ ★

  • Access 176 lectures & 23 hours of content 24/7
  • Learn 2 topics at the same time - Python programming & Ethical Hacking
  • Start from scratch up to a high-intermediate level
  • Write over 20 ethical hacking and security programs
  • Learn by example, by writing exciting programs
  • Model problems, design solutions & implement them using Python
  • Write programs in Python 2 and 3
  • Write cross-platform programs that work on Windows, OS X & Linux
  • Have a deep understanding of how computer systems work
  • Have a strong base and be able to use the skills learned to write any program even if it's not related to hacking

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.


Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here


  • Basic IT knowledge
  • No Linux, programming, or hacking knowledge required
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux


  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...