Who Should Become A
Certified White
Hat Hacker

  • IT Managers

  • Network Engineers

  • Chief Information Security Officer

  • IT Consultant

  • IT Directors

  • Chief Technology Officers

  • Cyber Security Beginners/Experts

  • Threat Hunters

  • Cyber Crime Investigators

In Order To Catch A Hacker It Takes A Hacker...

We read about it every day how companies such as Target, Home Depot, and organizations such as the Democratic National Convention (DNC) have been hacked.  The reason why these companies and organizations like them keep getting hacked, is often because the "Computer Security Experts" they hire have likely never been taught to hack anything, except through a virtual server.

The purpose of this course is to give students of all backgrounds and experience levels, a well-researched and engaging introduction to the realm of becoming a real hacker.  Starting with the first step of thinking like a hacker.   With real-world examples that reflect today's most important and relevant security topics. This course addresses how and why people attack computers and networks, so students can be armed with the knowledge and techniques to successfully combat hackers.

Because the world of hacking changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts. 

Many hands-on exercises are included that allow students to practice the skills they have learned in hacking into real networks and/or websites.


Unlike other PenTest or Ethical Hacker courses, Certified White Hat Hacker teaches you how to use hardware that requires very little knowledge to perform attacks, including attacks on  cell phones.


What You Will Learn

This Course Includes Videos, Pdf's, Challenges, Labs And More

  • 1

    Introduction

    • Support Chat/Forum

    • Career In Cyber Security

    • Cyber Defense - Military Training for Cyber Warfare

    • What You Should Expect

    • Security Controls

    • What Is Hacking

    • Why Is Hacking?

    • Why Do We Hack?

    • Ethics

    • Methodology

    • Types Of Attacks

    • Skills Necessary And Skills To Be Learned

    • What Is Penetration Testing Scope

  • 2

    Getting Started

    • Computer Security Dictionary

    • Linux Is A Must

    • How To Install Kali Linux As An App In Windows 10

    • Linux For Beginners

    • About Kali

    • Installing And Running Kali On Your Windows 10 Computer

    • Kali Linux Installation on Flash Drive

    • Kali Linux Installation in VirtualBox

  • 3

    Installing The Tools

    • What You Need to Know Before Starting

    • About Burp Suite For Web Applications

    • Download Burp Suite Mac OS

    • Download Burp Suite For Windows

    • Setting Up A Proxy

  • 4

    The Law

    • Ethics of Hacking and Cracking

    • Hacking Laws Examples

    • Example Of A Pen-Testing Agreement

    • Quiz - The Law

  • 5

    Reconnaissance

    • Learn the Basic Reconnaissance

    • Reconnaissance

    • Download Footprinting and Reconnaissance Tools

    • Web Data Extractor

    • Who Is

    • Google Hacking Database

    • Introduction To Skipfish

    • Using Skipfish Video Part 1

    • Using Skipfish Video Part 2

    • What is Banner Grabbing

    • Open Source Intelligence

    • Footprinting

    • The Way Back Machine

    • Using Your Resources

    • Whois Lookups

    • Using DNS To Extract Information

    • Finding Network Ranges

    • Google hacking

    • Mining For Information Using Google Hacking

    • Hacking Databases With Google

  • 6

    Network Fudamentals

    • Download Wireshark

    • Capturing and Analyzing Data with Wireshark

    • History of TCPIP

    • How To Use Wireshark To Examine Packets

    • OSI And IP Models

    • Addressing

    • Learning UDP

    • Learning TCP

    • Services

    • Using Wireshark For Deep Analysis

    • DHCP

    • Using ARP

    • Quiz

  • 7

    Encryption, Cryptography and Password Cracking

    • History Of Cryptography

    • Types Of Cryptography

    • Public Key

    • Certificates

    • What Is A Hash

    • AES, DES And 3DES

    • SSH

    • Disk Encryption

    • Cryptographics

    • What Are The Types Of Cryptography

    • Learning Password Basics

    • Whats The Best Way For Cracking Passwords

    • Encryption and Password Cracking

    • Public Key Cryptography

    • Using Dictionary Password Cracker

    • Download Encryption, Cryptography and Password Cracking Tools

    • Download System Hacking

    • Understanding Password Storage

    • What Are Digital Certificates

    • How To Find Hidden Passwords

    • Introduction To Password Security

    • How To Use Tunneling and Pivoting

    • What Is SSL

  • 8

    Vulnerability/Scanning

    • Vulnerability And Scanning Tools Techniques

    • What Is Footprinting?

    • Download Sanning Network Tools

    • Download Nessus

    • Using Nessus

    • Using WordPressScan, Part 1

    • Using WordPressScan, Part 2

    • Types Of Scans

    • Using Nmap

    • Using Hping And Its Uses

    • War Dialing

    • IDS Evasion

    • Banner Grabbing

    • Vulnerability Scanning

    • Using Nessus

    • Enumeration Techniques

    • SNMP

    • LDAP

    • Using Proxies

    • Tor And Anonymizers

    • Tunneling

  • 9

    Penetration Testing

    • Breaking Download the 5 Phases of Hacking

    • The Scope Of Penetration Testing

    • 5 Stages To Computer Hacking Broken Down

    • Pent Testing Work Flow

    • The Goals Of A Pen-Testing

    • Password Cracking And Complexity

    • Password Attacks

    • Password Storage Tehniques

    • Escalating Privileges

    • Spyware, Rootkits And Key Loggers

    • Spyware, Rootkits And Key Loggers

    • Metasploit Basics

    • Auditing And Logging

    • Metasploit Attack Basics

  • 10

    Website Sever Attacks - Student Taught

    • Network Security Tutorial - Introduction

    • Network Security Tutorial - Basic Overview

    • Network Security Tutorial - Using Tools and Exploits

    • Network Security Tutorial - FTP Login

    • Network Security Tutorial - Setting Up Metasploitable

    • Network Security Tutorial - Payloads and Backdoors

    • Metasploit Scripts

    • Scanning for access with smb_login

    • VNC Authentication

    • Hacking Databases

    • TFTP Fuzzer

    • Simple IMAP Fuzzer

  • 11

    Website Hacking

    • Web Application Hacking

    • Web Application Hacking - Part 2

    • Web Application Hacking - Part 3

    • Mapping A Website Using Sitemap

    • Web Application Hacking - Part 5

    • Web Application Hacking - Part 6

    • Web Application Hacking - Part 7

    • Web Application Hacking - Part 8

    • Web Application Hacking - Part 9

    • Web Application Hacking - Part 10

    • Web Application Vulnerabilities

    • Quiz

  • 12

    Wireless Networking

    • Wireless Networking Overview

    • WEP, WPA, WPA2 Encryption

    • Finding Hotspots

    • Breaking WEP Encryption

    • Rogue Access Points And Attacks

    • Wireless Sniffing

    • Protecting Wireless Networks

  • 13

    Detecting Evasion

    • Steganography

    • What Is Evasion And Why Do We Use It

  • 14

    Trojans, Viruses and Malware

    • The Most Dangerous Viruses Of All Time

    • Definitions And History

    • Trojan Horses

    • Detection Of Malware

    • Anti-Virus Evasion

    • Types Of Viruses

    • Deploying Of Malware

    • Analyze Malware

    • Windows ADS And Hiding Malware

    • Debugging

    • Packing And Automated Anti-Virus Maker Tools

    • More Malware Analysis

    • Download Malware Tools

    • How To Make A Worm - Student Taught

    • Virus Maker - Student Taught

  • 15

    Exploits

    • Programming Exploits

  • 16

    Programming Attacks

    • Memor Layout - Stacks And Heaps

    • Buffer Overflows

    • Protecting Buffer Overflow Attacks

    • Format String

    • De-Compilation

    • Reverse Engineering

  • 17

    Session Hijacking

    • Download Session Hijacking

    • In's and Out's of Session Hijacking

    • Session Hijacking

  • 18

    Sniffers

    • Understanding And Using Sniffers

  • 19

    Hacking Windows

    • Now That Your In....

    • Windows Hacking

    • What Is Computer Networking

    • What Is LDAP

  • 20

    Using Web Browser To Attack

    • How Can I Use A Browser To Hack

    • Which Web Browser Is Best For Security

    • Browser History, Bookmark, and Cache

    • Important Browsers Files

    • Cookie Files

    • What Is PHF

    • Using The "Test" Hack

    • How To Use "~" Character

    • The JJ.c Problem

    • The Deal With Forms

    • What It Looks Like In The Log

    • How To View Passwords In A Browser

  • 21

    Hacking Devices

    • Hacking Network Devices

    • Hacking Hardware 2

    • Windows ADS ( Alternate Data Stream)

    • Using log files for Hacking

    • Introduction to SNMP

    • How To Turn On The Camera On Mac OS, To Spy.

  • 22

    Unix and Linux Vulnerabilities

    • How to Hack Unix and Linux

  • 23

    Buffer Overflows

    • Buffer Overflows Technique

    • How To Exploit A Buffer Overflow

  • 24

    Denial-Of-Service

    • Denial Of Service Attacks

    • Download Denial of Service Tools

    • What Is A Dos And DDoS Attack

    • Dos Attacks

    • Cyber Crime

    • Botnets

    • Attack Countermeasures

  • 25

    E-Mail Hacking

    • Mail Vulnerabilities

    • How To Perform A Phishing Attack

    • Download Password Hacking Tools

    • How To Perform A Phishing Attack

  • 26

    Incident Handling

    • Incident Handling

  • 27

    Clearing Your Tracks

    • Leave No Trace Behind

  • 28

    Final Exam Project

    • Final Exam Project

There Are Also Over 70 Challenges & Labs Include With This Course

There Are 3 Levels To Our Challenges & Labs

  • Guided

    A Guided Challenge is similar to a traditional lab, but replaces the step-by-step instructions with goals and objectives along with detailed hints, which allow students to check their work as they progress.

  • Advance

    An Advanced Challenge is based on a series of requirements built around an overall objective. It lets you figure out if you know how to perform administrative tasks, and helps you learn new ones by utilizing resource information.

  • Expert

    An Expert Challenge is based on a large configuration task to showcase mastery of the topic, which could span multiple products and technologies.

Challenge labs are goal oriented, short-duration, scenario-based hands-on exercises. Ideal for cloud technologies, they provide skills development and assessments across multiple platforms and technologies.

Add challenges labs to your organization’s existing offerings to set yourself apart from your competition and drive true value for your customers. They are useful before, during and/or after training.

  • Before – As an assessment tool to determine what course someone may need to take.
  • During – As a way to provide safe practice opportunities during a course.
  • After – A continuing education tool that allows safe practice opportunities.

Students will receive digital badges upon the completion of certain challenge labs or challenge lab collection.

One Click Verification

Each Challenge badge image contains personalized metadata which tie the badge to your personal certification achievement hosted on Credly’s Acclaim platform.


Sharing Your Badge

Your Challenges badge can be used to highlight your achievements across multiple media and all major social networks, like LinkedIn, Facebook and Twitter.  Sharing your Challenges badge is a great way to develop your professional brand and let everyone know that you’ve completed a hands-on lab learning experience in your technical area. You can begin sharing from Credly’s Acclaim platform once your badge is accepted and your account is created.


How It Works
  1. You will receive an email notifying you to claim your badge at our partner Acclaim’s website.
  2. Click the link in that email.
  3. Create an account on the Acclaim site.
  4. Claim your badge.
  5. Start sharing.



As Of April 24th, 2020 There Are 77 Challenges Available.

Name Description Time
Backup and Restore Data in Linux [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Backup and Restore Data in Windows [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Can You Add Server Access for a Group? [Advanced] In this challenge, you will configure shared access to a server. First, you will add three user accounts. Next, you will create a new group, and then you will add the user accounts to the new group. Finally, you will verify that the new users can access the server via SSH.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 45 Min.
Can You Backup and Restore Data in Windows and Linux? [Advanced] This challenge is currently in development. Details will be published soon. 45 Min.
Can You Configure Alerts and Archiving for Log Files in Linux? [Advanced] In this challenge, you will use Logwatch and Logrotate to manage Linux log files.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 45 Min.
Can You Configure Drive Encryption by Using LUKS and BitLocker? [Advanced] In this challenge you will implement LUKS drive encryption on a Linux system and BitLocker drive encryption on a Windows system. NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 45 Min.
Can You Configure Patch Management in Linux and Windows? [Advanced] This challenge is currently in development. Details will be published soon. 45 Min.
Can You Configure Remote Administration Using Putty and SSH? [Expert] In this challenge you will use PuTTY and SSH on Windows and Linux to provide secure remote administration. NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 60 Min.
Can You Configure Standard Linux and Windows Permissions? [Advanced] This challenge is currently in development. Details will be published soon. 45 Min.
Can You Configure the Firewall in Linux and Windows? [Advanced] This challenge is currently in development. Details will be published soon. 45 Min.
Can You Deploy a Certificate Authority and Issue Certificates? [Advanced] In this challenge, you will install the Window Server Certification Authority role and configure an Enterprise root CA. Next, you will customize a certificate template and use it to automatically issue code signing certificates to Active Directory users.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 45 Min.
Can You Discover Network Services by Using Nmap? [Expert] In this challenge, you will use Nmap to gather information about network services.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 60 Min.
Can You Enumerate Network Services by Using Port Scanning in Linux? [Advanced] In this challenge you conduct network scanning to discover MAC addresses, IP addresses, and listening ports on a target server.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 45 Min.
Can You Harden a Linux Web Server? [Expert] In this challenge, you will secure SSH access to a server. First, you will create a new group, and then you will create two new users and add the users to the new group. Next, you will configure passwordless authentication, and then you will prevent the root user from logging in via SSH. Finally, you will restrict SSH access to users from a specified network, and then you will configure SSH to run on a non-standard port.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 60 Min.
Can You Harden a Server By Restricting Access Per Protocol? [Advanced] In this challenge, you will add blacklisted IP addresses to your web server, and you need to allow access to the server from a specific network only. First, you will allow access to a web server for everyone. Next, you will add blacklisted IP addresses to the web server, and then you will test access to the web server from a blacklisted IP address. Finally, you will allow access to a server from a specified network.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 45 Min.
Can You Harden SSH on a Linux Server? [Advanced] In this challenge, you will improve the security posture of your organization. First, you will determine which services are actively responding to network requests. Next, you will configure the service to run on a non-standard port by modifying the service configuration file for the running service. Finally, you will ensure that the root account is not allowed to log in by using a remote connection.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 45 Min.
Can You Harden Windows Hosts? [Expert] In this challenge, you configure Windows firewall rules, Group Policy security settings, IPSec and a PPTP VPN server.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 60 Min.
Can You Manage Access in Linux and Windows? [Expert] This challenge is currently in development. Details will be published soon. 60 Min.
Can You Manage Password Requirements in Windows and Linux? [Advanced] This challenge is currently in development. Details will be published soon. 45 Min.
Can You Manage Users and Groups Windows and Linux? [Advanced] This challenge is currently in development. Details will be published soon. 45 Min.
Can You Manage Windows and Linux Systems? [Expert] This challenge is currently in development. Details will be published soon. 60 Min.
Can You Secure a Website with an SSL/TLS Certificate? [Advanced] In this challenge, you will enable HTTPS for a web site and require trusted client PKI certificates.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 45 Min.
Can You Secure DNS Resource Records and Windows NTFS Volume File Objects? [Advanced] In this challenge, you will enable DNSSEC on clients and server and protect data at rest using Microsoft Encrypting File System.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 45 Min.
Can You Secure Host Settings through Firewall Settings and Group Policy? [Advanced] In this challenge, you will configure the Windows firewall, configure Group Policy password and file system auditing settings.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 45 Min.
Can You Secure Network Access? [Advanced] In this challenge, you enable IPSec to secure LAN traffic, and you configure a PPTP VPN server and client.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 45 Min.
Can You Use PowerShell to Gather Computer Information in Windows? [Advanced] In this challenge you will gather system information by creating simple PowerShell scripts.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 45 Min.
Can You Use the Sysinternals Suite to Review Permissions on a Windows System? [Advanced] In this challenge you will use the Sysinternals AccessChk and AccessEnum tools to verify permissions, as well as the Icacles tool to set and verify permissions.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 45 Min.
Can You Use Wireshark to Intercept Network Traffic? [Advanced] In this challenge, you will use Wireshark to intercept and read network traffic.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 45 Min.
Configure a Local Security Policy on Windows Server 2016 [Guided] In this challenge you will use the Windows Server Local Security Policy to configure local password requirements, auditing, and additional security settings. NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Configure a Windows PPTP VPN [Guided] In this challenge, you configure a Microsoft Windows Server PPTP VPN with static VPN client IP addressing.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Configure and Test the Firewall in Linux [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Configure and Test the Firewall in Windows [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Configure Custom Certificate Templates and Deployment Options [Guided] In this challenge, you will configure a custom PKI certificate template; then you will configure certificate auto-enrollment using Microsoft Group Policy.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Configure IPSec [Guided] In this challenge, you will secure LAN traffic using IPSec.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Configure Linux Firewall ACL Rules [Guided] In this challenge, you will configure Linux firewall rules using uncomplicated firewall (ufw).NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Configure Password Management in Linux [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Configure Password Management in Windows [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Configure Patch Management in Linux [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Configure Patch Management in Windows [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Configure Security Settings Using Microsoft Group Policy [Guided] In this challenge, you configure password policy and general security settings through Group Policy.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Configure SSH to Connect Without Passwords [Guided] In this lab, the user will set up a connection to an SSH server to use a key pair and disable the ability to log in using passwords.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Configure Standard Linux Permissions [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Configure Standard Windows Permissions [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Configure Windows Defender on a Windows System [Guided] In this challenge you will use Windows Defender to manage potentially malicious software.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Configure Windows Firewall ACL Rules [Guided] In this challenge, you will configure Windows firewall settings using the GUI and PowerShell.4Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Deploy a Private Certificate Authority [Guided] In this challenge, you will install and configure an Enterprise Root Certification Authority.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Enable Client SSL/TLS [Guided] In this challenge, you will configure an IIS web site to allow access only to trusted client devices.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Enable DNSSEC [Guided] In this challenge, you will configure DNSSEC to harden DNS client and server interactions.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Escalate Privileges in Linux [Guided] During this challenge you will exploit the misconfiguration of the find and the Vim commands, and then elevate your privileges to those of the administrator.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Examine Log Files to Block Bad Actors [Guided] In this challenge, you will log files containing forensic evidence of events that occur on a Linux system, see failed login attempts on your servers in system log files, and protect your server by adding blocks for the originating IP addresses.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Force Users to Change Password Upon First Sign In [Guided] In this challenge, you will create a new user account and set their password to expire upon first login so that they are forced to create their own password.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Getting Started with Cybersecurity Defensive Tools [Getting Started] In this lab, you will manage log files in Windows Server and Linux. You will configure security tools and audit permissions. You will confirm file integrity. Finally, you will manage secure remote administration. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Getting Started with Cybersecurity Offensive Tools [Getting Started] In this lab, you will capture network traffic, identify network services,and gather system information. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Getting Started with Managing Access in Linux and Windows [Getting Started] This challenge is currently in development. Details will be published soon. 60 Min.
Getting Started with Managing Linux and Windows Systems [Getting Started] This challenge is currently in development. Details will be published soon. 60 Min.
Getting Started with PKI Essentials [Getting Started] This challenge is currently in development. Details will be published soon. 60 Min.
Getting Started with Security Concepts in Windows and Linux Environments [Getting Started] In this lab, you will configure fundamental computer security settings in Windows and Linux environments. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 60 Min.
Getting Started with Security+1 [Getting Started] In this lab, you will configure security and permissions in an Ubuntu Linux environment, perform a port scan of a Linux server, edit the /etc/ssh/sshd_config file to secure SSH access, create an administrative user, create additional groups and add users to the groups, edit the /etc/hosts.allow and the /etc/hosts.deny files to increase security on the Linux server, and use Nmap to verify that the TCP port has been successfully changed. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 60 Min.
Harden a Server by Limiting Access to a Single Subnet [Guided] In this challenge, you will limit access to a system to a single subnet by editing the /etc/hosts.deny file and denying all traffic to this system, editing the /etc/hosts.allow file and allowing SSH traffic to this system from a single subnet, demonstrating that access has been limited, and allowing your subnet access to the system and test connectivity.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Identify Attack Types [Guided] In this challenge you will identify attack types in a scenario-based format. These attack types represent many of the hands-on challenges in this series.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Identify Non-Secure and Secure Network Traffic [Guided] In this challenge, you will capture and analyze HTTP and FTP network traffic.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Identify Standard Security Practices [Guided] In this challenge you will identify standard security practices in scenario-based questions.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Identify Tools and Practices for Security Configurations [Guided] In this challenge you will identify log file management tools, antimalware concepts, encryption concepts, remote administrations practices, and baseline configurations.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Identify Use Case for Asymmetric and Symmetric Encryption and Hash Cryptography [Guided] In this challenge you will identify general encryption concepts, symmetric encryption attributes, asymmetric encryption attributes, and hash cryptography.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Manage Log Files on a Windows Server [Guided] During this challenge you will view and manage log files by using Event Viewer in Windows.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Manage Users and Groups in Linux [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Manage Users and Groups in Windows [Guided] This challenge is currently in development. Details will be published soon. 30 Min.
Manually Request a PKI Certificate [Guided] In this lab, you will use the CertMgr MMC tool to request a computer certificate; then, you will export the certificate and private key for backup purposes.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Remove a User Account from a System [Guided] In this challenge, you will remove a user account from a system. First, you will disable the user account, copy the user's file to a secure location, and then remove the user's account from the system.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Run a Network Scan Using Nmap [Guided] In this challenge, you will scan network hosts for open ports and OS information using nmap.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Test and Mitigate Default Port Vulnerabilities in Linux [Guided] In this challenge, you will verify what services are exposed to your external connection and learn how you can change your default ports to secure your services.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Use a Password Cracking Utility in Linux [Guided] In this challenge you will use John the Ripper to audit passwords. NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Use Banner Grabbing Techniques to Enumerate Services on a Linux Server [Guided] In this challenge, you will use telnet, ftp, curl, ssh and Firefox to gather system information by using banner grabbing.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Use EFS to Encrypt Files on NTFS Volumes [Guided] In this challenge, you will protect data at rest using Windows Encrypting File System.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.
Use Encryption to Secure Information [Guided] In this challenge you will create an asymmetric key pair for the SSH service, view a web certificate, and verify file integrity by using MD5 hashes.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Use Tcpdump to Intercept Network Traffic [Guided] In this challenge you will use tcpdump to intercept and read network traffic.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. 30 Min.
Web Site SSL/TLS Enablement [Guided] In this challenge, you will configure a web site with a PKI certificate to enable HTTPS connectivity. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. 30 Min.

How much does a Penetration Tester make in the United States?

The average salary for a Penetration Tester is $111,916 per year in the United States. Salary estimates are based on 286 salaries submitted anonymously to Indeed by Penetration Tester employees, users, and collected from past and present job advertisements on Indeed in the past 36 months.

Receive Your Certificate

Upon completion of this course, you will receive your certificate as a Certified White Hat Hacker.

LET THE WORLD KNOW!

After registering for this course you will receive a Certified White Hat Hacker T-Shirt.

2 Easy Ways To Pay!

After registration, you will have 1 year access to all course material.