Certified White Hat Hacker

Get your certification as a “Certified White Hat Hacker” – This course teaches you how to become a hacker. You will use the same tools that hackers use to gain…. | taught by Chris Dlouhy

 

Course Objectives

The purpose of this course is to give students of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. With real-world examples that reflect today’s most important and relevant security topics, this course addresses how and why people attack computers and networks, so that students can be armed with the knowledge and techniques to successfully combat hackers. Because the world of information security changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts. Many hands-on exercises are included, which allow students to practice skills as they are learned.

Specific topic coverage includes:

  • Ethics of Hacking and Cracking
  • Reconnaissance
  • Scanning Tools
  • Sniffers
  • TCP/IP Vulnerabilities
  • Encryption and Password Cracking
  • Spoofing
  • Session Hijacking
  • Hacking Network Devices
  • Trojan Horses
  • Denial-of-Service Attacks
  • Buffer Overflows
  • Programming Exploits
  • Mail Vulnerabilities
  • Web Application Vulnerabilities
  • Windows Vulnerabilities
  • Linux Vulnerabilities
  • Incident Handling

This course includes over 50 hacking tools.

 

Course Curriculum

Getting Started
18:10
Computer Security Dictionary
Course Discussion
Linux Is A Must
Linux For Beginners
Introduction
Breaking Download the 5 Phases of Hacking
Career In Cyber Security
Cyber Defense – Military Training for Cyber Warfare
Installing The Tools
About Burp Suite For Web Applications
Download Burp Suite Mac OS
Download Burp Suite For Windows
Burp Suite For Web Application
Setting Up A Proxy
How To Configure Your Browser
Burp Suite for Web Application – Payload Configuration
About Kali
Kali Linux Installation on Flash Drive
Kali Linux Installation in VirtualBox
The Law
Ethics of Hacking and Cracking
Hacking Laws Examples
Reconnaissance
Reconnaissance
Overview Of Different Scan Types
Download Footprinting and Reconnaissance Tools
Learn the Basic Reconnaissance
Google Dorking Part 1
Google Dorking Part 2
Adding Bing to Your Google Dork
Web Data Extractor
Who Is
Google Hacking Database
Introduction To Skipfish
Using Skipfish Video Part 1
Using Skipfish Video Part 2
What is Banner Grabbing
Open Source Intelligence
Vulnerability/Scanning
Vulnerability And Scanning Tools Techniques
Vulnerability Scanning Overview
Using Tor For Proxy
Scanner Options And Demo
How To Use A Proxy Server
IDS Evasion And Firewall
Overview of Skipfish, Part 2
How To Use Hping
Learning Nmap Techniques
Overview of Skipfish, Part 1
Download Sanning Network Tools
Overview of Skipfish, Part 2
Using Nessus
Mapping Manually And Scope
Active And Passive Scans
Using WordPressScan, Part 1
Using WordPressScan, Part 2
Encryption, Cryptography and Password Cracking
Encryption and Password Cracking
What Are The Types Of Cryptography
Encryption Broken Down In Layman Terms
Download Encryption, Cryptography and Password Cracking Tools
Download System Hacking
Public Key Cryptography
Understanding Password Storage
What Are Digital Certificates
How To Find Hidden Passwords
Introduction To Password Security
How To Perform A Password Attack
How To Use Tunneling and Pivoting
Session Hijacking
In’s and Out’s of Session Hijacking
Session Hijacking
Download Session Hijacking
Website Hacking
Web Application Vulnerabilities
Web Application Scanning
Mapping A Website Using Sitemap
Download Website Hacking Tools
How To Use A Web Spider
How To Hack A Website Login Page
Intruder Attacks
Intruder Attack Types
Hacking Networks And Desktop
Practice Hacking Windows And Networks
Introduction To Metasploit For Penetration Testing
Metasploit Minute
Sniffers
Sniffers
Hacking Windows
Now That Your In….
Windows Hacking
What Is Computer Networking
What Is LDAP
Hacking Devices
Hacking Network Devices
Hacking Hardware 2
Windows ADS ( Alternate Data Stream)
Using log files for Hacking
Introduction to SNMP
Unix and Linux Vulnerabilities
How to Hack Unix and Linux
Buffer Overflows
Buffer Overflows Technique
How To Exploit A Buffer Overflow
Denial-Of-Service
Denial Of Service Attacks
How A Dos Attack Works
Difference Between A DOS And DDOS
Download Denial of Service Tools
Trojans, Viruses and Malware
The Most Dangerous Viruses Of All Time
Trojan Horses
How To Make A Worm
Virus Maker
Download Malware Tools
E-Mail Hacking
Mail Vulnerabilities
How To Perform A Phishing Attack
Download Password Hacking Tools
How To Perform A Phishing Attack
Exploits
Programming Exploits
Hide Content
Spoofing
In’s and Out’s of Spoofing
Incident Handling
Incident Handling
Final Exam Project
Final Exam Project

Source:http://www.nationalcybersecurityuniversity.net/courses/certified-white-hat-hacker