Get $1 credit for every $25 spent!

The Complete White Hat Hacker Certification Bundle

Ending In:
Add to Cart - $29
Add to Cart ($29)
$894.92
96% off
wishlist
(87)
Courses
8
Lessons
539
Enrolled
866

What's Included

Product Details

Access
Lifetime
Content
2 hours
Lessons
8

Hacking & Penetration Testing With Metasploit

Pinpoint Vulnerabilities Using One of the Most Popular Pentesting Frameworks

By IT Security Academy | in Online Courses

If you're serious about becoming an ethical hacker, you're going to need to know Metasploit. One of the most popular pentesting frameworks out there, Metasploit empowers cybersecurity pros to verify vulnerabilities, manage security assessments, and more while staying ahead of their cybercriminal foes. Let this course serve as your Metasploit primer, starting you off with a deep introduction into the framework and walking you though conducting attacks and testing vulnerabilities, and more.

  • Access 8 lectures & 2 hours of content 24/7
  • Follow along practical training for using the Metasploit framework
  • Learn how to locate security issues, verify vulnerability mitigations & more
  • Develop the required skills to keep hackers out of your network
  • Validate your training w/ a certificate of completion

Instructor

IT Security Academy is a company that associates IT Security Professionals. Now it's proud to share its knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements

  • Internet required

Course Outline

  • Introduction to Metasploit
    • Metasploit - what's that? - 3:19
    • Deep introduction to Metasploit framework - 35:07
  • Metasploit in practice
    • Working with Metasploit modules - 19:18
    • Conducting penetration tests - 27:59
  • Conducting attacks and testing vulnerabilities
    • Attack vectors that work - 32:46
    • Database-oriented attacks - 17:20
  • Metasploit for professionals
    • Taking control over working machines - 30:50
  • Course notes
    • Notes and presentation

View Full Curriculum


Access
Lifetime
Content
4 hours
Lessons
58

Hacking Wireless Networks: Theory & Practice

Explore the Essentials of Hacking Networks with this Example-Driven Course

By IT Security Academy | in Online Courses

We're living in the middle of a digital arms race. As cybersecurity pros develop better encryption methods, hackers fight back with more sophisticated attacks, making now the best time to jump into this ever-evolving field. This course covers all the important techniques related with WiFi hacking that are employed by hackers, system administrators and pentesters. In addition to netting more than 50 lectures on WiFi hacking, you'll also get access to the Training Operating System, loaded with all the source code and tools needed to develop your hacking skills.

  • Access 60 lectures & 4 hours of content 24/7
  • Download the course handbook as a PDF (180 pages)
  • Explore 25 different wireless network hacking techniques & experiments
  • Access all of the required source code & tools via the included Training Operating System environment
  • Learn how to prepare your training environment so you can safely conduct hacking experiments
  • Get an introduction to wireless networks & security
  • Familiarize yourself w/ WEP/WPA attacks
  • Validate your training w/ a certificate of completion

Instructor

IT Security Academy is a company that associates IT Security Professionals. Now it's proud to share its knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements

  • Internet required
  • Note: All the techniques presented in this course can only be used ethically and in your own testing/researching environment. You will get all the required tools and information to prepare your own training system. Please see the Legal information in the 1st section for further legal reference.

Course Outline

  • Download your Training Operating System v2.0 CE
    • Download the TOS v2.0 CE (CUDA Extension) ISO image
  • Download the whole course Handbook
    • Download the course Handbook in PDF
  • Course overview
    • Table of contents
    • Legal information
  • Introduction to wireless networks
    • Introduction
    • Wireless transmission standards
    • 802.11 wireless network types
    • Encryption and authentication standards
    • Wireless network cards in Linux - overview
    • Wireless network interface cards in Linux - 1:45
  • Wireless security (half) measures: An overview
    • MAC address filtering
    • Changing the MAC address of the wireless network card - 4:24
    • Disabling ESSID broadcast
    • Finding a hidden access point with disabled ESSID broadcast - 4:13
    • Limiting wireless coverage
  • Wireless network attacks independent of used encryption
    • Introduction
    • DoS: RF jamming
    • DoS: CSMA/CA jamming
    • The use of deauthentication attack for jamming network traffic - 4:02
    • DoS: Deauthentication attack
    • Wireless MITM
  • WEP attacks
    • Section outline
    • WEP encryption
    • Chopchop
    • The overview and demonstration of the chop-chop attack - 3:15
    • Keystream reuse
    • Generating packets without knowing the network key - 3:40
    • Interactive packet replay and ARP request replay - 4:52
    • The demonstration of the PTW and KoreK attacks - 2:43
    • Caffe Latte Attack
    • Creating a fake access point – the Caffe Latte attack - 2:07
  • WPA attacks
    • Introduction
    • WPA
    • The dictionary attack on WPA - 2:46
    • WPA2
    • Rainbow tables
    • The dictionary attack on WPA – using hash tables - 2:10
    • Cowpatty attack
    • DoS: Taking advantage of the MIC failure holdoff time
  • CUDA-powered attacks
    • What is CUDA?
    • CUDA – the initial preparation of the environment - 1:29
    • The installation of CUDA-SDK and CUDA-Toolkit - 2:39
    • The compilation and installation of the tools with CUDA support - 5:34
    • The optimization of the parameters of an nVidia video card - 3:56
    • CUDA – preparation for the attack - 2:23
    • CUDA – the attack on WPA - 8:17
    • Generating your own dictionary - 2:13
    • Applications for cracking MD4 and MD5 hashes with the use of CUDA technology - 4:28
    • Wardriving experiment
  • Advanced attacks against WPA
    • WKA TKIP attack
    • WPA TKIP broken
    • Beck-Tews attack enhanced
    • Michael Reset attack
    • Summary
  • Course summary and references
    • Summary
    • References
  • BONUS section
    • Hacking in Practice MEGA Course - WiFi security module 1 - 27:34
    • Hacking in Practice MEGA Course - WiFi security module 2 - 18:35

View Full Curriculum


Access
Lifetime
Content
5 hours
Lessons
37

Rootkits & Stealth Apps: Creating & Revealing 2.0

Detect & Combat Malicious Programs That Hide on Your Computer

By IT Security Academy | in Online Courses

Used to mask certain processes and and even grant privileged access to a computer, a rootkit is a stealthy type of software that can undermine your privacy without you even knowing it. This course shows you how rootkits work, how they can hide inside your system, and how you can protect yourself against them. Leveraging the same techniques used by hackers, system administrators, and the like, you'll take on creating invisible software, understanding how it ticks, and the steps you can take to protect yourself from them.

  • Access 37 lectures & 5 hours of content 24/7
  • Dive into how rootkits work & how you can detect them
  • Discover how to create a backdoor & bypass firewalls
  • Learn how to hide processes, files, directories & registry entries
  • Explore creating an invisible keylogger & remote console
  • Learn how to deceive Anti-Virus applications
  • Validate your training w/ a certificate of completion

Instructor

IT Security Academy is a company that associates IT Security Professionals. Now it's proud to share its knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements

  • Internet required

Course Outline

  • Introduction
    • Theory: Foreword, What is a rootkit?, Rootkit structure, Examples of rootkits
    • Introduction and setup - VIDEO TRAINING - 26:12
  • Download your training source code and examples
    • Your ZIP package with the source code and examples
  • Basics of shellcode
    • Theory: Assembly language crash course, Register types, Instruction syntax
    • Basics of shellcode development - VIDEO TRAINING - 17:35
  • Hiding processes, files and registry entries
    • Theory: Intro, Writing rootkit code, Hiding processes
    • Hiding processes - VIDEO TRAINING - 17:46
    • Theory: Hiding files
    • Hiding files and directories - VIDEO TRAINING - 19:07
    • Theory: Intro, Notes about the 64-bit mode, Hiding registry entries
    • Hiding registry entries - VIDEO TRAINING - 11:52
  • Creating a backdoor and a keylogger
    • Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending
    • Creating a keylogger - VIDEO TRAINING - 23:50
    • Theory: Remote console
    • Creating a remote console - VIDEO TRAINING - 12:26
  • Windows security features
    • Theory: What defense mechanisms are included in Windows?
    • Windows security features - VIDEO TRAINING - 10:32
  • Creating undetectable applications
    • Theory: Understanding how antiviruses detect threats, Signatures
    • Creating undetectable applications - VIDEO TRAINING - 12:50
    • Theory: Heuristics, Deceiving a heuristic scanner
    • Deceiving a heuristic scanner - VIDEO TRAINING - 8:00
    • Theory: Emulation, RC4 overview, System calls and 64-bit architecture
    • Anti-emulation techniques - VIDEO TRAINING - 10:10
  • Bypassing a firewall
    • Theory: Bypassing a firewall, Modifying the remote console
    • Bypassing a firewall - VIDEO TRAINING - 14:09
  • Keeping a rootkit in a system
    • Theory: Areas for hiding programs, Running a program as a system service, Dll spoofing
    • Keeping a rootkit in a system - VIDEO TRAINING - 17:34
  • Defense and rootkit detectors
    • Theory: Rootkit detectors
    • Defense and rootkit detectors - VIDEO TRAINING - 19:04
  • Rootkit development and summary
    • Theory: Rootkit development and summary
    • Rootkit development and summary - VIDEO TRAINING - 16:02
  • BONUS section
    • Monitoring Transmitted Data in Wireshark - Part 1 - 19:59
    • Monitoring Transmitted Data in Wireshark - Part 2 - 19:57
    • Certified Hacking Training - WiFi Security - Part 1 - 14:21
    • Certified Hacking Training - WiFi Security - Part 2 - 13:15
    • Certified Hacking Training - WiFi Threats and Attacks - 18:35
    • Website Hacking in Practice - SQL Injection - 18:39

View Full Curriculum


Access
Lifetime
Content
3 hours
Lessons
44

Website Hacking In Practice: Hands-On

Understand Today's Top Hacking Threats & How to Combat Them

By IT Security Academy | in Online Courses

There's much to learn about ethical hacking, and you'll inevitably need to get some hands-on experience before you throw your hat into the cybersecurity ring. Guiding you through 21 hacking techniques and how they can be used in real-life scenarios, this course takes a practical approach to teaching you the ethical hacking essentials. You'll walk through preparing a training environment to work in and get to flexing your cybersecurity muscles with all the essential source code and examples provided.

  • Access 44 lectures & 3 hours of content 24/7
  • Receive a step-by-step education on website & Web application ethical hacking and security
  • Explore the 10 Most Critical Web Application Attacks presented yearly by OWASP (Open Web Application Security Project)
  • Learn how to hack using 21 techniques & see how each of them can be used in a practical, real-life example
  • Familiarize yourself w/ cross-site scripting, SQL injections, phishing & other attacks
  • Validate your training w/ a certificate of completion

Instructor

IT Security Academy is a company that associates IT Security Professionals. Now it's proud to share its knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Note: All the techniques presented in this course can only be used ethically and in your own testing/researching environment. You will get all the required tools and information to prepare your own training system. Please see the Legal information in the 1st section for further legal reference.

Requirements

  • Internet required
  • Windows operating system

Course Outline

  • Introduction
    • Table of Contents
    • Legal information
  • Environment setup and training system configuration
    • Module 01. Introduction - Download ZIP package with source codes and examples
    • Module 01. Introduction and environment configuration - Video Training - 22:36
  • Basic techniques
    • Module 02. Deep data hiding
    • Module 02. Deep data hiding - Video Training - 5:00
    • Module 03. Brute-force and dictionary attacks
    • Module 03. Brute-force and dictionary attacks - Video Training - 14:23
    • Module 04. Account lockout attack
    • Module 04. Account lockout attack - Video Training - 9:05
  • Lets get deeper - data leaks
    • Module 05. Web parameter tampering
    • Module 05. Web parameter tampering - Video Training - 3:38
    • Module 06. Path and information disclosure
    • Module 06. Path and information disclosure - Video Training - 10:51
    • Module 07. Forced browsing
    • Module 07. Forced browsing - Video Training - 4:38
    • Module 08. Path traversal
    • Module 08. Path traversal - Video Training - 7:19
    • Module 09. Unicode encoding
    • Module 10. Parameter delimiter
    • Module 10. Parameter delimiter - Video Training - 7:59
  • Incjection attacks
    • Module 11. PHP injection
    • Module 11. PHP injection - Video Training - 9:21
    • Module 12. Direct static code injection
    • Module 12. Direct static code injection - Video Training - 8:23
    • Module 13. SQL injection
    • Module 13. SQL injection - Video Training - 18:39
  • XSS related attacks
    • Module 14. XSS - Cross Site Scripting attack
    • Module 14. XSS - Cross Site Scripting attack - Video Training - 10:44
    • Module 14B. XST - Cross Site Tracing attack
    • Module 14B. XST - Cross Site Tracing attack - Video Training - 5:30
    • Module 15. XSRF - Cross Site Request Forgery attack
    • Module 15. XSRF - Cross Site Request Forgery attack - Video Training - 7:49
  • More advanced techniques
    • Module 16. Spying on data with a browser
    • Module 16. Spying on data with a browser - Video Training - 7:27
    • Module 17. Session hijacking
    • Module 17. Session hijacking - Video Training - 6:07
    • Module 18. Session fixation
    • Module 18. Session fixation - Video Training - 4:42
  • Phishing
    • Module 19. Phishing
    • Module 19. Phishing - Video Training - 7:18
  • Security testing in practice
    • Module 20. Automated security testing
    • Module 20. Automated security testing - Video Training - 10:57
  • Summary
    • Summary and references

View Full Curriculum


Access
Lifetime
Content
4 hours
Lessons
36

IT Surveillance & Computer Forensics From Scratch

Explore Bypassing Firewalls, Taking Over Remote Computers & More in This Practical Course

By IT Security Academy | in Online Courses

Data is worth more than gold nowadays, and cybercriminals know it. That's why companies aren't shy about paying top-dollar salaries to capable ethical hackers to keep their networks safe. With more than 30 lectures on surveillance methods, computer forensics, and ethical hacking techniques, this course can fast track your move into this booming field. You'll dive into file encryption methods and vulnerabilities, taking over a remote computer, and more as you make your way through this practical cybersecurity primer.

  • Access 36 lectures & 4 hours of content 24/7
  • Take your training further w/ a free downloadable source code package
  • Dive into using tunneling to access firewall-protected services
  • Learn how to create & install a keylogger
  • Explore capturing data from various file types
  • Expand your understanding by analyzing a corporate data leak scenario
  • Validate your training w/ a certificate of completion

Instructor

IT Security Academy is a company that associates IT Security Professionals. Now it's proud to share its knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements

  • Internet required

Course Outline

  • Introduction
    • What you will learn - 1:45
  • Before you start
    • Get your source code package
  • System configuration
    • Environment Preparation - 3:08
  • Video Training
    • Transmitting volatile evidence from an evaluated system - 27:12
    • Disk backup over the network - 7:46
    • Searching data based on last access or modification timestamps - 13:21
    • Analyzing the data sent by a web browser - 7:50
    • Analyzing the data revealed in e-mail headers - 4:23
    • Remote capturing the data about user and hardware - 9:27
    • Harvesting user's IP address on message board - 10:29
    • Methods of creating a partition image - 16:28
    • Hiding data inside NTFS alternate data streams - 7:23
    • Steganography techniques - 11:02
    • Using tunneling to access firewall-protected services - 5:18
    • File encryption methods and vulnerabilities - 12:07
    • Recovering MS Windows user passwords - 6:03
    • Analyzing run applications based on Prefetch folder - 8:19
    • Acquiring data from pagefile, thumbnails and raw disk fragments - 11:02
    • Acquiring data from binary files and process memory dump - 5:11
    • Acquiring data from e-mail files - 13:33
    • Acquiring user's browsing history - 6:38
    • Discovering web search queries - 2:25
    • Examining remote host's availability over LAN - 5:41
    • Checking e-mail's deliverability and analyzing recipient's data - 9:12
    • Creating and installing a keylogger - 12:00
    • Building custom tools to analyze system security - 14:11
    • Restricting access to chosen websites and computers - 13:11
    • Taking over a remote computer - 13:20
    • Using WMI console for acquiring and analyzing evidence - 5:26
    • Using DNS cache for gathering information on visited websites - 3:50
    • Using Sleuth Kit for acquiring data from a disk image - 10:38
    • Recovering passwords to FTP, e-mail accounts and websites - 9:28
    • Analyzing a corporate data leak scenario - 10:37
  • Handbook: Evidence collection basics (BONUS)
    • Evidence collection basics
  • Handbook: Evidence left in Local Area Network and the Internet (BONUS)
    • Handbook: Evidence left in Local Area Network and the Internet (BONUS)
  • Handbook: Evidence left in the local system (BONUS)
    • Handbook: Evidence left in the local system (BONUS)

View Full Curriculum


Access
Lifetime
Content
3 hours
Lessons
45

Computer & Network Hacking Mastery: Practical Techniques

Master Proven Hacking Techniques to Safeguard Your Own Network

By IT Security Academy | in Online Courses

You don't need to be a computer science wiz to keep your networks safe from attack. Even if you're a complete beginner, this course takes you through key security loopholes and techniques. From intercepting information to identifying various application attacks, you'll come to grips with the ethical hacking essentials and get the tools needed to test the security and vulnerability of your own computer or computer system.

  • Access 45 lectures & 3 hours of content 24/7
  • Discover how to recover lost passwords and intercept information
  • Learn how to obstruct encrypted data & hide files using kernel modules
  • Understand how to handle overflow attacks & recognize remote attacks
  • Learn how to identify application attacks, like string attacks & overwriting
  • Dive into securing your own system w/ scanners, detection & patches
  • Validate your training w/ a certificate of completion

Instructor

IT Security Academy is a company that associates IT Security Professionals. Now it's proud to share its knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Note: To get the most out of this course, you should be familiar with programming and scripting language

Requirements

  • Internet required

Course Outline

  • Hacking School Training - Getting started
    • Title and table of course contents
    • Who are hackers? Introduction to Hacking School training
    • Legal information
  • Training Operating System
    • Get the Hacking School Training Operating System
  • Password recovering
    • Recovering lost passwords
  • Interception of data and information
    • Interception of information
    • Interception of information - Training Video - 9:45
    • Interception of encrypted data, attacks on SSL sessions
    • Interception of encrypted data, attacks on SSL sessions - Training Video - 8:07
    • Hiding files using kernel modules
    • Hiding files using kernel modules - Training Video - 5:16
  • Overflow attacks
    • Buffer overflow attacks
    • Buffer overflow attacks - Training Video - 8:11
    • Practical examples of remote attacks
    • Practical examples of remote attacks - Training Video - 15:24
    • Heap overflow attacks
    • Heap overflow attacks - Training Video - 7:26
  • Attacks on applications
    • Format string attacks
    • Format string attacks - Training Video - 17:51
    • Practical examples of format string attacks
    • Practical examples of format string attacks - Training Video - 10:08
    • File stream pointer overwrite attacks
    • File stream pointer overwrite attacks - Training Video - 8:35
  • Network security & attacks
    • Exploiting the ICMP protocol
    • Exploiting the ICMP protocol - Training Video - 9:07
    • Remote identification of the operating system
    • Remote identification of the operating system - Training Video - 13:44
    • Netfilter and system security services
    • Netfilter and system security services - Training Video - 12:22
  • Secure your system & network
    • Securing the system step by step
    • Securing the system step by step - Training Video - 8:24
    • Security scanners
    • Security scanners - Training Video - 20:31
    • Improving security with patches
    • Improving security with patches - Training Video - 15:32
    • Intrusion detection systems
    • Intrusion detection systems - Training Video - 7:10
  • Attacks on Operating Systems
    • Errors on the system kernel level
    • Errors on the system kernel level - Training Video - 8:12
    • Entering the system by the backdoor
    • Entering the system by the backdoor - Training Video - 5:31
    • Creating shellcodes in the Win32 environment
  • Attacks on web applications and servers
    • Attacking a web server
    • Attacking a web server - Training Video - 16:20
  • Thank you for your attention
    • Postscript

View Full Curriculum


Access
Lifetime
Content
23 hours
Lessons
236

Hacking In Practice: Certified Ethical Hacking Mega Course

Explore Today's Cyber Threats & Shut Them Down with 20+ Hours of Practical Training

By IT Security Academy | in Online Courses

With a few lines of code, cybercriminals can access protected networks, view encrypted files, and even steal identities online—if there's not an ethical hacker standing in their way. This extensive course contains over 20 hours of practical training designed to help you thwart these criminals as a certified professional. You'll start with an introduction to cyber threats and IT security myths. Then you'll move on to security policies, risk management, disaster recovery, and even get a free voucher for the ISA CISS examination when you complete the course, setting you up to validate your skills right away.

  • Access 236 lectures & 23 hours of content 24/7
  • Follow step-by-step instructions for advanced hacking techniques
  • Familiarize yourself w/ current cyber threats & hacking trends
  • Explore designing more secure networks
  • Dive into encrypted data, identify spoofing, and windows authorization
  • Get a free voucher for the ISA CISS examination upon completion

Instructor

IT Security Academy is a company that associates IT Security Professionals. Now it's proud to share its knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • A basic understanding of IT and infrastructure is recommended but not required
  • Note: While this comprehensive hacking training includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. It is not recommended to use these techniques to infiltrate networks or IT systems without permission and consent

Requirements

  • Internet required

Course Outline

  • Introduction to cyber threats
    • Introduction to Current Cyber Threats - 4:46
    • IT Prehistory - 4:41
    • Let’s look a few years back - 4:42
    • Cyber crimes – an evolution not revolution - 4:25
    • Current Cyber Threats – notes for the examination
  • IT security popular myths
    • Popular myths about IT security – origins - 5:33
    • Myths #1 – you’ll never be hacked - 5:55
    • Myths #2 – you don’t need any protection software or hardware - 5:11
    • Myths #3 – IT security is always a priority - 1:13
    • Popular Myths About Computer System Security – notes for the examination
  • IT security trends
    • Trends in IT Security - 3:44
    • The birth of technology society - 3:16
    • EXERCISE: How much info can you gather? - 3:59
    • Fake identity - 5:03
    • Online privacy - 6:14
    • Analyzing sniffing software - 3:33
    • Cyber War - 8:23
    • Changing IT Security Trends – notes for the examination
  • Data security
    • Objective #1 – Data security – Introduction - 6:58
    • Confidentiality of data - 5:33
    • EXERCISE: Finding confidential data with search engines - 6:05
    • Integrity of data - 7:04
    • Data security – notes for the examination
  • Security policies
    • Security policies – introduction - 1:56
    • What is security? - 3:53
    • Information security - 4:13
    • Information security – level up - 4:04
    • Security issues - 4:50
    • Why are security solutions fallible? - 5:42
    • Security policy issues - 4:50
    • Introduction to threat modelling and classification - 5:14
    • Threat modelling – STRIDE - 4:06
    • STRIDE: Spoofing identity - 5:03
    • STRIDE: Tampering with data - 4:28
    • STRIDE: Denial of Service - 3:51
    • Threat Modelling and Classification – notes for the examination
  • Risk management
    • Introduction to Risk Management - 1:27
    • Attack Methods - 6:42
    • Local attacks - 2:56
    • Target scanning and enumeration techniques #1 - 5:52
    • Target scanning and enumeration techniques #2 - 3:30
    • Passive scanning - 5:36
    • Attack Methodologies – notes for the examination
    • Introduction to risk assessment - 6:20
    • DREAD: Risk assessment model - 4:50
    • DREAD: Exploitability - 5:24
    • EXERCISE: Risk Assessment - 7:17
    • Risk Assessment – notes for the examination
    • Introduction to Social Engineering and rogue software - 4:19
    • Manipulation tactics - 9:01
    • EXERCISE: Social Engineering attacks - 6:44
    • SE with KALI / BackTrack - 7:06
    • Rogue Software - 2:28
    • Fraud tools #1 - 7:10
    • Fraud tools #2 - 6:32
    • Social Engineering and Rogue Software – notes for the examination
  • Defence in depth
    • Introduction to Defence in depth - 1:32
    • How to use Defence in depth model? - 5:45
    • DiD: OS and LAN layers - 6:39
    • DiD: Perimeter and Physical Access Layers - 6:06
    • DiD: Demonstration - 2:48
    • Automated attack targeting a service - 5:23
    • Automated user-targeting attack - 4:31
    • The Defence in Depth Model – notes for the examination
    • Introduction to Immutable laws of security – Law #1 - 4:35
    • Law #2 - 2:56
    • Law #3 - 2:23
    • Law #4 - 1:52
    • Law #5 - 3:28
    • Law #6 - 2:07
    • Law #7 - 1:11
    • Law #8 - 1:43
    • Law #9 - 3:57
    • Law #10 - 0:48
    • Laws for administrators - 5:59
  • Disaster recovery
    • Introduction to Disaster Recovery - 1:33
    • How to reduce losses? - 5:24
    • Ensuring continous availability - 4:08
    • Threat discovery #1 - 4:28
    • Threat discovery #2 - 3:40
    • Audit users and keep control accounts - 5:18
    • High risk users - 3:23
    • Collecting and analysing evidence - 7:13
    • Forensics example - 3:52
    • CONFICKER: CASE STUDY - 7:11
    • How to reduce losses – notes for the examination
  • Computer network security - network protocols
    • Network security – introduction - 5:44
    • OSI MODEL #1 – Physical layer - 5:45
    • OSI MODEL #2 – Data link layer - 4:46
    • Threats: MAC spoofing - 5:54
    • Threats: ARP Poisoning - 6:38
    • EXERCISE: Data Link Layer Attack - 7:32
    • OSI MODEL #3 – Network layer - 6:58
    • TCP Tunnelling over ICMP - 7:39
    • Network Protocols – notes for the examination
  • Transport protocols
    • OSI MODEL #4 – Transport Layer - 6:04
    • Threats: Enumerating Remote Computers - 3:40
    • EXERCISE: Transport Layer Attack using METASPLOIT – part 1 - 5:27
    • EXERCISE: Transport Layer Attack using METASPLOIT – part 2 - 5:13
    • OSI MODEL #5 – Session Layer - 3:33
    • Transport Protocols – notes for the examination
  • Application protocols
    • OSI MODEL #6 – Presentation Layer - 6:52
    • OSI MODEL #7 – Application Layer - 3:48
    • EXERCISE: Application Layer Attacks - 6:03
    • KALI / Backtrack: Attack Demonstration - 3:34
    • Man-in-the-Middle and Denial of Service Attacks - 2:49
    • Modifying Transmitted Packets - 4:45
    • Unencrypted protocols - 2:58
    • Application Protocols – notes for the examination
  • Designing secure computer networks
    • Designing Computer Networks – introduction - 2:18
    • Subnetting IPv6 - 3:18
    • Subnetting IPv4 - 7:01
    • IPv6 address notation - 6:46
    • DMZ: DeMilitarized Zone - 6:28
    • Subnetting – notes for the examination
    • Protocols and services: IP SEC - 9:33
    • IP SEC: Phase 1 - 7:27
    • Network Address Translation - 12:18
    • Network access control: RADIUS - 10:04
    • Protocols and Services – notes for the examination
  • Network administration and monitoring
    • Introduction to Monitoring Transmitted Data - 1:07
    • Monitoring Transmitted Data – Basic information - 8:03
    • Intrusion detection systems - 7:43
    • Why are firewalls and NDIS not enough? - 5:41
    • Wireshark – Introduction to network analysis - 6:29
    • How to use Wireshark? - 8:27
    • Analyzing captured data - 5:43
    • How to analyze telnet protocol? - 8:09
    • Intrusion detection - 7:48
    • Scanning computers - 7:47
    • Monitoring transmitted data – notes for the examination
  • Wireless networks security
    • Wireless Networks - 1:16
    • WIFI security solutions – introduction - 5:44
    • WIFI – working principles - 5:48
    • Other wireless technologies - 2:56
    • Threats and risks - 4:38
    • Ineffective solutions - 4:11
    • Authentication methods - 8:31
    • 802.11 WEP - 7:06
    • 802.11 WPA - 6:24
    • Standards and Security Solutions – notes for the examination
    • Threats of WIFI networks - 5:58
    • Client Attacks: Launching a rogue access point - 7:03
    • Client Attacks: Evil twin - 4:51
    • Client Attacks: Denial of service - 9:17
    • EXERCISE: WPA attack - 3:24
    • Wi-Fi Security Threats – notes for the examination
  • Operating systems security
    • Operating systems security – introduction - 9:10
    • Security boundaries - 4:44
    • Three core - 7:15
    • EXERCISE: OS boundaries - 7:54
    • Process isolation - 6:30
    • Kernel Mode Code Signing - 6:24
    • Java Virtual Machine and code access security - 4:17
    • OS Security Boundaries – notes for the examination
    • Malware - 12:09
    • EXERCISE: Vulnerability attacks - 10:26
    • EXERCISE: Identifying suspicious processes - 6:54
    • Demonstration: Process Explorer - 9:13
    • EXERCISE: Removing malware - 8:38
    • Rootkits - 6:14
    • EXERCISE: Detecting rootkits - 11:07
    • EXERCISE: Security evaluation - 6:00
    • Malware – notes for the examination
  • Access control
    • Authentication and authorisation – Introduction - 1:57
    • Authentication - users - 6:56
    • How secure is your password? - 5:03
    • Authentication protocols and services - 8:25
    • LM Hash - 7:02
    • Cached Credentials - 4:29
    • KERBEROS - 11:30
    • Authentication – notes for the examination
    • Identity Theft - 9:13
    • EXERCISE: Offline attacks - 12:22
    • Using online cracking services - 8:41
    • Identity Theft – notes for the examination
  • Windows security
    • Windows Security – what you’ll learn - 1:17
    • User Account Control - 6:22
    • UAC configuration - 8:02
    • Additional Security Features – ASLR and DEP - 11:39
    • PatchGuard - 1:34
    • Techniques and Methods – notes for the examination
    • Encryption – key protection - 9:31
    • Drive encryption - 8:25
    • BitLocker - 7:57
    • BitLocker To Go Reader - 4:43
    • File and folder encryption – EFS - 7:30
    • EXERCISE: EFS - 5:36
    • Encryption – notes for the examination
  • Application security
    • Introduction to Application Security - 8:18
    • Attacks on applications - 10:18
    • SQL Injection - 8:10
    • EXERCISE: Analyze the application - 13:31
    • Blind SQL Injection - 9:33
    • Automated SQL Injection - 11:44
    • Cross-site scripting – XSS - 10:10
    • Program security assessment - 5:10
    • Unsafe applications - 10:11
    • Application Attacks – notes for the examination
    • Program Security Assessment – notes for the examination
  • Application security - Configuration and management
    • Here’s what you’ll learn in this module - 1:05
    • Software updates - 2:39
    • MS Update - 6:53
    • System Center Configuration Manager - 2:46
    • Managing applications - 8:26
    • Blocking applications - 7:35
    • Software restrictions policies - 5:57
    • EXERCISE: Application control rules - 12:11
    • Isolating applications - 6:30
    • How to protect users without interrupting their work – notes for the examination
  • Cryptography
    • Introduction to cryptography - 9:42
    • History of ciphers - 10:57
    • Symmetric and asymmetric ciphers - 6:13
    • Symmetric-key algorithms - 5:49
    • Block ciphers - 6:01
    • Data encryption standard - 6:51
    • DES-X - 7:35
    • Advanced encryption standards - 5:28
    • Block cipher modes - 7:16
    • Stream Ciphers – RC4 - 3:40
    • Asymmetric-key algorithms - 8:11
    • RSA - 5:33
    • ELGAMAL - 2:05
    • HASH functions - 5:56
    • Digital signature - 5:56
    • Hybrid Schemes - 6:24
    • Symmetric and Asymmetric Ciphers – notes for the examination
  • Public Key Infrastructure
    • Introduction to cryptology - 2:12
    • Public key infrastructure - 6:10
    • Implementing public key infrastructure - 5:39
    • What will PKI allow you? - 6:29
    • EXERCISE: Certificates - 8:37
    • Certificate life cycle - 6:24
    • Planning the PKI - 8:33
    • PKI Administration - 7:29
    • Public Key Infrastructure – Trust but verify – notes for the examination

View Full Curriculum


Access
Lifetime
Content
8 hours
Lessons
75

Kali Linux Tutorial For Beginners

Complete Your Cybersecurity Toolbox with Training on This Ethical Hacking Staple

By Hackers Academy | in Online Courses

An ethical hacking education simply wouldn't be complete without a look at Kali Linux. Found in many an ethical hacker's toolbox, Kali Linux is jam-packed with tools for penetration testing, security research, computer forensics, reverse engineering, and other information security tasks. Starting from scratch, you'll explore the Kali Linux basics and dive into the methods hackers use to exploit vulnerabilities, create backdoors, steal sensitive info, and more.

  • Access 75 lectures & 8 hours of content 24/7
  • Learn how to use common Linux commands like hackers do
  • Walk through building a Linux target from scratch
  • Explore Creating shells & backdoors
  • Understand & replicate what malicious hackers can do
  • Validate your training w/ a certificate of completion

Instructor

Hackers Academy is an online community that teaches ethical hacking courses for tens of thousands of students all around the world. It welcomes everyone to join its family of hackers whether you're an expert or a newbie.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Note: this course builds up on some ethical hacking concepts taught in the Hacking For Beginners ethical hacking course

Requirements

  • Internet required

Course Outline

  • Welcome!
    • Course Introduction - 13:44
    • How to install Kali Linux on VMWare Workstation 2018 - 6:38
    • How to install Kali Linux on Virtualbox 2018 - 5:48
    • What changed in 2018 - 2:53
  • Part 1: First Look At Kali Linux
    • GUI changes in Kali Linux 2018 - 2:54
    • Kali Linux Gui - 9:28
    • The terminal and shell - 7:20
    • Getting your first shell! - 3:50
    • Terminal signals and shortcuts - 6:23
    • Root user and directory structure - 6:36
  • Part 2: Building The Foundations
    • Basics of commands - 4:51
    • Changing folders - 2:44
    • Creating files and directories - 1:50
    • Listing folder content - 6:05
    • Listing file content - 3:34
    • Copying files and folders - 5:12
    • Moving files and folders - 4:13
    • Installing and removing packages - 6:13
    • Managing repositories - 5:43
    • APT changes in Kali Linux 2018 - 4:13
    • Removing files and folders - 4:20
    • Archiving and compression - 15:11
    • How and when to use wildcards - 14:20
    • Finding help and navigating man pages - 6:16
    • End Of Section Note - 2:59
  • Part 3: Kali Linux Administration
    • Networking basics on Kali Linux - 5:35
    • How to edit files with nano - 6:25
    • Turning your Kali Linux into a Web Server - 9:15
    • Configuration file changes in Kali Linux 2018 - 2:56
    • Turning your Kali Linux into an SSH server - 8:40
    • Managing users and groups - 11:01
    • Maintaining permissions of users - 9:31
    • Understanding processes - 8:56
    • Managing processes - 8:18
    • New Lecture
    • Command redirection and controlling output - 6:35
    • Chaining multiple commands together - 11:51
    • End of Part 2 - 3:21
  • Part 4: Hacking With Kali Linux
    • Set up your target - 5:49
    • Port scanning with Kali Linux - 6:59
    • New Lecture
    • Port scanning using Kali Linux graphical interface - 4:37
    • Hacking with Kali Linux - FTP hacking - 8:22
    • Vulnerability scanning with Kali Linux - 5:27
    • Hacking with Kali Linux - SSH hacking - 11:58
    • Hacking with Kali Linux - Web service hacking - 10:28
    • Hacking With Kali Linux - Password Cracking - 8:51
    • Hacking with Kali Linux - Sniffing passwords - 11:42
    • Hacking with Kali Linux - Privilege Escalation - 5:56
    • Auto Hacking with Armitage - Part 1 - 13:37
    • Auto Hacking with Armitage - Part 2 - 5:43
    • Hacking with Kali Linux - Quick recap of favorite tools - 5:56
  • Part 5: Putting Things Together
    • Download and build the target - 19:03
    • Hacking your target system - 5:45
    • Can You Hack This? - 1:42
  • Part 6: Shells Used By Good And Bad Guys
    • Understanding basic web shells - 6:35
    • Understanding bind shells - 8:08
    • Understanding reverse shells - 1:57
    • Quick recap - 2:25
    • Creating a Metasploit backdoor - 11:53
    • Bad guy's interactive shell - 5:26
    • Bad guys web shells - 2:56
  • Part 7 - Steal The Credit Cards: Hacking Like The Bad Guys
    • First Mission - 3:06
    • Port scanning - 3:41
    • Vulnerability Scanning - 2:42
    • Vulnerability Scanning Using Nmap - 8:18
    • Initial Break-in - 9:02
    • Getting an Interactive Shell - 8:58
    • Changing SSH config - 4:36
    • Getting SSH Access - 5:08
    • Cracking Users' Passwords - 7:23
    • Attacking Database Authentication - 9:03
    • Stealing The Credit Card Info - 9:03
    • Second Mission - 8:56
  • Part 8: Final Mission
    • Final Mission - 2:41

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 15 days of purchase. Once your license is redeemed, all sales are final.