Skip to content

pralinkhaira/ethical-hacking

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 

Repository files navigation

πŸ›‘οΈ Ethical Hacking Roadmap for Beginners (By Pralin)

πŸ“š Note: All the courses listed below are ones I’ve personally purchased on Udemy. This roadmap is tailored to help me (and maybe you!) learn ethical hacking in a structured, effective, and beginner-friendly way.

This is a step-by-step guide to help you learn ethical hacking from absolute basics to advanced concepts. It includes 53 handpicked courses categorized into levels, with estimated time, priority, and progress tracking.


βœ… Legend

  • ⏳ Estimated Time β€” How long it might take to finish
  • πŸ” Priority β€” When to take the course
  • πŸ“Œ Notes β€” Optional thoughts or next steps
  • β˜‘οΈ Progress β€” Mark when complete

πŸ”° START HERE – Absolute Beginner (Fundamentals)

βœ… Course Name ⏳ Time πŸ” Priority β˜‘οΈ πŸ“Œ Notes
CyberSecurity Bootcamp: The Ultimate Beginner’s Course 6h 1️⃣ [ ] Foundation
Complete Ethical Hacking Course 2025: Go From Zero to Hero 10h 1️⃣ [ ] Great overview
Kali Linux Guide For Beginners 4h 1️⃣ [ ] Tool setup
The Anonymity Course For Beginners 3h 1️⃣ [ ] Stay hidden online
Windows Command Mastery for Ethical Hackers 4h 2️⃣ [ ] CMD basics
Kali Linux for Ethical Hackers 4h 2️⃣ [ ] Continue Kali
The Kali OS Uses In Cyber Security 3h 2️⃣ [ ] Complement above
Ethical Hacking: Hacker Methodology 5h 2️⃣ [ ] Mindset & flow
Network Mastery for Ethical Hackers 6h 2️⃣ [ ] Learn protocols
Ultimate Ethical Hacking from Zero To Hero 8h 2️⃣ [ ] Hands-on recap

πŸ”§ GET COMFORTABLE – Tools & Basic Attacks

βœ… Course Name ⏳ Time πŸ” Priority β˜‘οΈ πŸ“Œ Notes
Ethical Hacking: Pentesting Tools 4h 3️⃣ [ ] Intro to tools
The Complete Nmap Ethical Hacking MasterClass 5h 3️⃣ [ ] Port scanning
Wireshark Ninja 6h 3️⃣ [ ] Packet analysis
Recon for Bug Bounty & Pentesting 5h 3️⃣ [ ] Info gathering
Hands on Ethical Hacking 2024 6h 3️⃣ [ ] Practice-focused
How to Hack WiFi Networks for Beginners 3h 4️⃣ [ ] Good intro
Complete WiFi Hacking Course 6h 4️⃣ [ ] Deep dive

πŸ’» SYSTEM TARGETING – Windows, Linux, Android

βœ… Course Name ⏳ Time πŸ” Priority β˜‘οΈ πŸ“Œ Notes
Hack Windows 4h 5️⃣ [ ] Exploiting Win OS
Ethical Hacking: Hack Linux Systems 4h 5️⃣ [ ] Exploiting Linux
Ethical Hacking: Hack Android 3h 5️⃣ [ ] Android-specific
Learn Android Hacking For Beginners 5h 5️⃣ [ ] Complements above

🌐 WEB HACKING FUNDAMENTALS

βœ… Course Name ⏳ Time πŸ” Priority β˜‘οΈ πŸ“Œ Notes
Learn Ethical Hacking by Hacking Real Websites Legally 6h 6️⃣ [ ] Legal safe labs
Web Hacking for Beginners 5h 6️⃣ [ ] Good starting point
Ethical Hacking: SQL Injection for Beginners 3h 6️⃣ [ ] Core skill
Ethical Hacking: File Inclusion 3h 6️⃣ [ ] LFI/RFI
Ethical Hacking: Command Injection 3h 6️⃣ [ ] Input flaws
Ethical Hacking: Web Enumeration 3h 6️⃣ [ ] Footprinting

🐍 PYTHON & SCRIPTING

βœ… Course Name ⏳ Time πŸ” Priority β˜‘οΈ πŸ“Œ Notes
Python Hacking 7h 7️⃣ [ ] Real-world use
Python Hacking: Create Backdoor 4h 7️⃣ [ ] Malware logic

πŸ”₯ POST-EXPLOITATION & PASSWORDS

βœ… Course Name ⏳ Time πŸ” Priority β˜‘οΈ πŸ“Œ Notes
Ethical Hacking: Metasploit 4h 8️⃣ [ ] Tool-based exploits
Ethical Hacking Using Metasploit Hacking OS 4h 8️⃣ [ ] Pair with above
Ethical Hacking: Post-Exploitation 4h 8️⃣ [ ] After exploit access
Ethical Hacking: Reverse Shells 3h 8️⃣ [ ] Shell backdoor
Ethical Hacking: Introduction to Exploits 4h 8️⃣ [ ] Learn CVEs
Cracking MS Office Passwords 2h 8️⃣ [ ] Specific use
Complete Windows Password Cracking 3h 8️⃣ [ ] Dump + crack
Ethical Hacking: Master Password Cracking 4h 8️⃣ [ ] Hashes, brute-force

πŸ” ADVANCED & REVERSE ENGINEERING

βœ… Course Name ⏳ Time πŸ” Priority β˜‘οΈ πŸ“Œ Notes
Reverse Engineering & Malware Analysis in 21 Hours 21h 9️⃣ [ ] Only when ready
Mastering x86-64 Real Assembly Language 12h 9️⃣ [ ] Low-level ops
Computer Hacking Forensic Investigator 6h 9️⃣ [ ] Forensics approach
Linux Security 4h 9️⃣ [ ] Secure systems
Data Security, Recovery and Storage 4h 9️⃣ [ ] Storage-focused

🌐 BONUS / OPTIONAL / MISC

βœ… Course Name ⏳ Time πŸ” Priority β˜‘οΈ πŸ“Œ Notes
Real Ethical Hacking in 46 Hours: CSEH+CEH PRO 46h πŸ”„ [ ] Use to revise
Bug Bounty - Ethical Hacking 2025 6h πŸ”„ [ ] Great after web hacking
Ethical Hacking: AI Chatbots 3h πŸ”„ [ ] Fun side-topic
Ethically Hack the Planet 3h πŸ”„ [ ] Creative
Ethically Hack the Planet Part 2 3h πŸ”„ [ ] Continuation
Certified Growth Hacking Professional 4h πŸ”„ [ ] Not cybersecurity
The Cyber Security Course: End Point Protection 3h πŸ”„ [ ] Only if curious
Presentation Skills 101 2h πŸ”„ [ ] Helps for interviews

πŸ“Έ Screenshot Of My Course Gallery

image image image image image

πŸš€ Final Notes

  • 🎯 Follow the priority sequence for optimal learning.
  • 🧠 Track your progress using checkboxes.
  • ✍️ Feel free to add links or completion dates next to each course.
  • πŸ” Practice on platforms like TryHackMe, HackTheBox, or PortSwigger Labs alongside.

Made with ❀️ by Pralin Khaira | Security BSides Jammu | Instagram

About

This is a step-by-step guide to help you learn ethical hacking from absolute basics to advanced concepts

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published