In Order To Catch A Hacker It Takes A Hacker...

We read about it every day how companies such as Target, Home Depot, and organizations such as the Democratic National Convention (DNC) have been hacked.  The reason why these companies and organizations like them keep getting hacked, is often because the "Computer Security Experts" they hire have likely never been taught to hack anything, except through a virtual server

The purpose of this course is to give students of all backgrounds and experience levels, a well-researched and engaging introduction to the realm of becoming a real hacker.  Starting with the first step of thinking like a hacker.   With real-world examples that reflect today's most important and relevant security topics. This course addresses how and why people attack computers and networks, so students can be armed with the knowledge and techniques to successfully combat hackers.

Because the world of hacking changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts. 

Many hands-on exercises are included that allow students to practice the skills they have learned in hacking into real networks and/or websites.

Specific topics covered includes:

  • Ethics of Hacking and Cracking
  • Thinking Like A Criminal
  • Reconnaissance
  • Scanning Tools
  • Sniffers
  • TCP/IP Vulnerabilities
  • Encryption and Password Cracking
  • Spoofing
  • Session Hijacking
  • Hacking Network Devices
  • Trojan Horses
  • Denial-of-Service Attacks
  • Buffer Overflows
  • Programming Exploits
  • Mail Vulnerabilities
  • Web Application Vulnerabilities
  • Windows Vulnerabilities
  • Linux Vulnerabilities
  • Incident Handling

All Students Will Receive A Certificate As A
"Certified White Hat Hacker"

National Cyber Security University is recognized by governments and corporations around the world.
Click Here More Information!

How much does a Penetration Tester make in the United States?

The average salary for a Penetration Tester is $111,916 per year in the United States. Salary estimates are based on 286 salaries submitted anonymously to Indeed by Penetration Tester employees, users, and collected from past and present job advertisements on Indeed in the past 36 months.

Do You Think Your Ready For The NBA?

Think about this, if you attended Labron James’ basketball camp for 4 years, then Kobe Bryant's camp another 4 years, and Magic Johnsons' 4 years after that, does that mean you are now qualified to play in the NBA? Now think about this, big corporations hire CTO's, CIO's, IT Managers and others possessing college degrees, and numerous certifications from different varieties of cyber security organizations. Does this qualify them to be on the same level as a hacker? What these institutes and organizations do not teach is how to think like that bad guy... the hacker. The hackers attacking Fortune 500 companies and government infrastructures probably did not attend college or receive cyber security certifications. They are self-taught.

Included With This Course....

The man-in-the-middle that's nuts for networks The Packet Squirrel is a stealthy pocket-sized man-in-the-middle. This Ethernet multi-tool is designed to give you covert remote access, painless packet captures, and secure VPN connections with the flip of a switch.

Included With This Course....

The leading rogue access point and WiFi pentest toolkit for close access operations. Passive and active attacks analyze vulnerable and misconfigured devices. The WiFi Pineapple® NANO and TETRA are the 6th generation pentest platforms. Thoughtfully developed for mobile and persistent deployments, they build on over 10 years of WiFi attack expertise.

Bonus material

Includes additional content to your course curriculum to provide further value to your students.

  • Software

    You will receive over 200 hacking tools, for Linux and Windows.

  • Paid

    Start Making Money! Upon completion, NCSU will show you how to start profiting of your new skill sets.

  • Community Discussions

    Join our community and grow everyday through real interaction with fellow students and experts!

Course curriculum

  • 1


    • Support Chat/Forum

    • Career In Cyber Security

    • Cyber Defense - Military Training for Cyber Warfare

    • What You Need to Know Before Starting

    • Understanding Company Security Controls

    • Security Controls

  • 2

    The Law

    • Ethics of Hacking and Cracking

    • Hacking Laws Examples

    • Example Of A Pen-Testing Agreement

    • Here is your first Quiz!

  • 3

    Getting Started

    • Breaking Download the 5 Phases of Hacking

    • 5 Stages To Computer Hacking Broken Down

    • Pent Testing Work Flow

    • Computer Security Dictionary

    • Linux Is A Must

    • How to Install Kali Linux as an App in Windows 10

    • Linux For Beginners

    • About Kali

    • Installing And Running Kali On Your Windows 10 Computer

    • Kali Linux Installation on Flash Drive

    • Kali Linux Installation in VirtualBox

  • 4

    Installing The Tools

    • About Burp Suite For Web Applications

    • Download Burp Suite Mac OS

    • Download Burp Suite For Windows

    • Burp Suite For Web Application

    • Setting Up A Proxy

    • How To Configure Your Browser

    • Burp Suite for Web Application - Payload Configuration

  • 5


    • Learn the Basic Reconnaissance

    • Tips and Tools On Information Gathering

    • Running Background Checks On Your Target

    • Using Social Media To Run Background Checks

    • Reconnaissance

    • Download Footprinting and Reconnaissance Tools

    • Google Dorking Part 1

    • Google Dorking Part 2

    • Adding Bing to Your Google Dork

    • Web Data Extractor

    • Who Is

    • Google Hacking Database

    • Introduction To Skipfish

    • Using Skipfish Video Part 1

    • Using Skipfish Video Part 2

    • What is Banner Grabbing

    • Open Source Intelligence

  • 6


    • Vulnerability Scanning Overview

    • Vulnerability And Scanning Tools Techniques

    • Overview Of Different Scan Types

    • Scanner Options And Demo

    • What Is Footprinting?

    • How To Use A Proxy Server

    • Using Tor For Proxy

    • Download Sanning Network Tools

    • IDS Evasion And Firewall

    • How To Use Hping

    • Learning Nmap Techniques

    • Using Nessus

    • Mapping Manually And Scope

    • Active And Passive Scans

    • Using WordPressScan, Part 1

    • Using WordPressScan, Part 2

    • Introduction To Nmap

  • 7

    Gaining Access To A Network

    • Network Security Tutorial - Introduction

    • Network Security Tutorial - Basic Overview

    • Introduction To Metasploit For Penetration Testing

    • Network Security Tutorial - Using Tools and Exploits

    • Network Security Tutorial - FTP Login

    • Metasploit Minute

    • Network Security Tutorial - Setting Up Metasploitable

    • Network Security Tutorial - Payloads and Backdoors

    • Metasploit Scripts

    • Scanning for access with smb_login

    • VNC Authentication

    • Hacking Databases

    • TFTP Fuzzer

    • Simple IMAP Fuzzer

  • 8

    Encryption, Cryptography and Password Cracking

    • What Are the Downfall Of Password Cracking

    • Learning Password Basics

    • Whats The Best Way For Cracking Passwords

    • Encryption and Password Cracking

    • Using Dictionary Password Cracker

    • What Are The Types Of Cryptography

    • Encryption Broken Down In Layman Terms

    • Download Encryption, Cryptography and Password Cracking Tools

    • How To Brute Force Password

    • Download System Hacking

    • Public Key Cryptography

    • Understanding Password Storage

    • What Are Digital Certificates

    • How To Find Hidden Passwords

    • Introduction To Password Security

    • How To Perform A Password Attack

    • How To Use Tunneling and Pivoting

    • What Is SSL

  • 9

    Session Hijacking

    • In's and Out's of Session Hijacking

    • Session Hijacking

    • Download Session Hijacking

  • 10

    Hacking The Easy Way

    • Learn How To Hack Cell Phons In 15 Minutes

    • Learn How To Hack Networks In 15 Minutes

    • Learn How To Hack Voicemails In 60 Seconds

    • How To Hack ATM Machines And Public Networks In 15 Minutes

    • Learn How To Have An IT Manager Give You Admin Access To Their Network

  • 11

    Website Hacking

    • Web Application Hacking

    • Web Application Hacking - Part 2

    • Web Application Hacking - Part 3

    • Mapping A Website Using Sitemap

    • Web Application Hacking - Part 5

    • Web Application Hacking - Part 6

    • Web Application Hacking - Part 7

    • Web Application Hacking - Part 8

    • Web Application Hacking - Part 9

    • Web Application Hacking - Part 10

    • Web Application Vulnerabilities

  • 12


    • Understanding And Using Sniffers

  • 13

    Hacking Windows

    • Now That Your In....

    • Windows Hacking

    • What Is Computer Networking

    • What Is LDAP

  • 14

    Using Web Browser To Attack

    • How Can I Use A Browser To Hack

    • Which Web Browser Is Best For Security

    • Browser History, Bookmark, and Cache

    • Important Browsers Files

    • Cookie Files

    • What Is PHF

    • Using The "Test" Hack

    • How To Use "~" Character

    • The JJ.c Problem

    • The Deal With Forms

    • What It Looks Like In The Log

    • How To View Passwords In A Browser

  • 15

    Logging & Auditing

    • Why You Should Care About Logging & Auditing

    • What Are Some Different Logging Techniques

    • Deleting Log Files

  • 16

    Hacking Devices

    • Hacking Network Devices

    • Hacking Hardware 2

    • Windows ADS ( Alternate Data Stream)

    • Using log files for Hacking

    • Introduction to SNMP

    • How To Turn On The Camera On Mac OS, To Spy.

  • 17

    Unix and Linux Vulnerabilities

    • How to Hack Unix and Linux

  • 18

    Buffer Overflows

    • Buffer Overflows Technique

    • How To Exploit A Buffer Overflow

  • 19

    Old School Attacks

    • Attacking Anonymously

    • The Campas Attack

    • The ASP Attack

    • The Finger.cgi Attack

    • The Glimpse Exploit

  • 20


    • Denial Of Service Attacks

    • How A Dos Attack Works

    • Difference Between A DOS And DDOS

    • Download Denial of Service Tools

  • 21

    Trojans, Viruses and Malware

    • The Most Dangerous Viruses Of All Time

    • Trojan Horses

    • How To Make A Worm

    • Virus Maker

    • Download Malware Tools

  • 22

    E-Mail Hacking

    • Mail Vulnerabilities

    • How To Perform A Phishing Attack

    • Download Password Hacking Tools

    • How To Perform A Phishing Attack

  • 23


    • Programming Exploits

  • 24


    • In's and Out's of Spoofing

  • 25

    Incident Handling

    • Incident Handling

  • 26

    Clearing Your Tracks

    • Leave No Trace Behind

  • 27

    Final Exam Project

    • Final Exam Project


At the completion of the course you will receive a Certified White Hat Hacker Shirt.

Get This Course For Less!

Download The "National Cyber Security University" App To Get Weekly Discount Codes.