Certified White Hat Hacker (CWHH)

Certified White Hat Hacker

Get your certification as a "Certified White Hat Hacker" - This course teaches you how to become a hacker. You will use the same tools that hackers use to gain....

In Order To Catch A Hacker It Takes A Hacker...

Are you that hacker?


We read about it everyday, how companies such as Target and Home Depot as well as organizations such as the DNC have been hacked.  The reason why these companies and organizations like them keep getting hacked, is often because the "Computer Security Experts" they hire have likely never been taught to hack anything, with the exception of a virtual server. 

Do You Think Your Ready For The NBA?

Think about this, if you attended Labron James' basketball camp for 4 years, and then attended Kobe Bryant's basketball camp for another 4 years and spent 4 more years at Magic Johnsons' basketball camp, does that mean that you are now qualified to play in the NBA?

Now think about this, big corporations hire CTO's, CIO's, IT Mangers and others who have college degrees as well as numerous certifications from a variety of cyber security organizations. Does this now qualify them to be on the same level as a hacker?  What these institutes and organizations do not teach is how to think like that bad guy... the hacker. The hackers that are attacking Fortune 500 companies and our government infrastructure likely did not attend college or receive  certifications in cyber security.  They are self taught. 

The purpose of this course is to give students of all backgrounds and experience levels a well-researched and engaging introduction to the realm of becoming a real hacker. Starting with the first step of thinking like a hacker.  With real-world examples that reflect today's most important and relevant security topics. This course addresses how and why people attack computers and networks, so that students can be armed with the knowledge and techniques to successfully combat hackers. 

Because the world of hacking changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts. Many hands-on exercises are included, which allow students to practice skills they've  learned to hack into a real network and/or website.

Specific topics covered includes:

  • Ethics of Hacking and Cracking
  • Thinking Like A Criminal
  • Reconnaissance
  • Scanning Tools
  • Sniffers
  • TCP/IP Vulnerabilities
  • Encryption and Password Cracking
  • Spoofing
  • Session Hijacking
  • Hacking Network Devices
  • Trojan Horses
  • Denial-of-Service Attacks
  • Buffer Overflows
  • Programming Exploits
  • Mail Vulnerabilities
  • Web Application Vulnerabilities
  • Windows Vulnerabilities
  • Linux Vulnerabilities
  • Incident Handling
 

Computer Hacking Is The Future

Curriculum

Introduction

52:44

  • Support Chat/Forum
  • What Makes A Good Hacker
  • How To Think Like A Bad Guy
  • Career In Cyber Security
  • Cyber Defense - Military Training for Cyber Warfare

The Law

03:24

  • Ethics of Hacking and Cracking
  • Hacking Laws Examples
  • Example Of A Pen-Testing Agreement

Getting Started

79:52

  • Breaking Download the 5 Phases of Hacking
  • Computer Security Dictionary
  • Download Hacking Tools
  • Linux Is A Must
  • Linux For Beginners
  • About Kali
  • Kali Linux Installation on Flash Drive
  • Kali Linux Installation in VirtualBox

Hacking The Easy Way

  • Learn How To Hack Cell Phons In 15 Minutes
  • Learn How To Hack Networks In 15 Minutes
  • Learn How To Hack Voicemails In 60 Seconds
  • How To Hacker ATM Machines And Public Networks In 15 Minutes
  • Learn How To Have An IT Manager Give You Admin Access To Their Network

Installing The Tools

29:00

  • About Burp Suite For Web Applications
  • Download Burp Suite Mac OS
  • Download Burp Suite For Windows
  • Burp Suite For Web Application
  • Setting Up A Proxy
  • How To Configure Your Browser
  • Burp Suite for Web Application - Payload Configuration

Reconnaissance

130:30

  • Running Background Checks On Your Target
  • Using Social Media To Run Background Checks
  • Reconnaissance
  • Overview Of Different Scan Types
  • Download Footprinting and Reconnaissance Tools
  • Learn the Basic Reconnaissance
  • Google Dorking Part 1
  • Google Dorking Part 2
  • Adding Bing to Your Google Dork
  • Web Data Extractor
  • Who Is
  • Google Hacking Database
  • Introduction To Skipfish
  • Using Skipfish Video Part 1
  • Using Skipfish Video Part 2
  • What is Banner Grabbing
  • Open Source Intelligence

Vulnerability/Scanning

121:25

  • Vulnerability And Scanning Tools Techniques
  • Vulnerability Scanning Overview
  • Using Tor For Proxy
  • Scanner Options And Demo
  • How To Use A Proxy Server
  • IDS Evasion And Firewall
  • How To Use Hping
  • Learning Nmap Techniques
  • Download Sanning Network Tools
  • Using Nessus
  • Mapping Manually And Scope
  • Active And Passive Scans
  • Using WordPressScan, Part 1
  • Using WordPressScan, Part 2

Encryption, Cryptography and Password Cracking

46:49

  • Encryption and Password Cracking
  • What Are The Types Of Cryptography
  • Encryption Broken Down In Layman Terms
  • Download Encryption, Cryptography and Password Cracking Tools
  • Download System Hacking
  • Public Key Cryptography
  • Understanding Password Storage
  • What Are Digital Certificates
  • How To Find Hidden Passwords
  • Introduction To Password Security
  • How To Perform A Password Attack
  • How To Use Tunneling and Pivoting

Session Hijacking

06:56

  • In's and Out's of Session Hijacking
  • Session Hijacking
  • Download Session Hijacking

Website Hacking

54:35

  • Web Application Vulnerabilities
  • Web Application Scanning
  • Mapping A Website Using Sitemap
  • Download Website Hacking Tools
  • How To Use A Web Spider
  • How To Hack A Website Login Page
  • Intruder Attacks
  • Intruder Attack Types

Hacking Networks And Desktop

09:20

  • Practice Hacking Windows And Networks
  • Introduction To Metasploit For Penetration Testing
  • Metasploit Minute

Sniffers

  • Understanding And Using Sniffers

Hacking Windows

83:30

  • Now That Your In....
  • Windows Hacking
  • What Is Computer Networking
  • What Is LDAP

Hacking Devices

23:23

  • Hacking Network Devices
  • Hacking Hardware 2
  • Windows ADS ( Alternate Data Stream)
  • Using log files for Hacking
  • Introduction to SNMP

Unix and Linux Vulnerabilities

  • How to Hack Unix and Linux

Buffer Overflows

09:44

  • Buffer Overflows Technique
  • How To Exploit A Buffer Overflow

Denial-Of-Service

11:39

  • Denial Of Service Attacks
  • How A Dos Attack Works
  • Difference Between A DOS And DDOS
  • Download Denial of Service Tools

Trojans, Viruses and Malware

51:49

  • The Most Dangerous Viruses Of All Time
  • Trojan Horses
  • How To Make A Worm
  • Virus Maker
  • Download Malware Tools

E-Mail Hacking

16:24

  • Mail Vulnerabilities
  • How To Perform A Phishing Attack
  • Download Password Hacking Tools
  • How To Perform A Phishing Attack

Exploits

  • Programming Exploits

Spoofing

  • In's and Out's of Spoofing

Hacking With Metasploit

39:21

  • Network Security Tutorial - Introduction
  • What Is Footprinting?
  • Metasploit Scripts
  • Scanning for access with smb_login
  • VNC Authentication
  • Hacking Databases
  • Network Security Tutorial - Basic Overview
  • Network Security Tutorial - Using Tools and Exploits
  • Network Security Tutorial - FTP Login
  • TFTP Fuzzer
  • Simple IMAP Fuzzer
  • Network Security Tutorial - Setting Up Metasploitable
  • Network Security Tutorial - Payloads and Backdoors

Incident Handling

  • Incident Handling

Final Exam Project

  • Final Exam Project

Course Requirements

Understanding Of Windows

Computer Networking

How Firewalls Work

Understanding Of Linux

How Firewalls Work

Any Graduate With A Certified Cyber Crime Consultant Level-1

Certified White Hat Hackers, GET PAID!




Pricing

$700.00 Regular Price Buy $700.00

Bonus Material

Tools

Software

$500
You will receive over 200 hacking tools, for Linux and Windows.

Paid!

Start Making Money!

Invaluable!
Upon completion, NCSU will show you how to start profiting of your new skill sets.

Forums

Community Discussions

Amazing Value!
Join our community and grow everyday through real interaction with fellow students and experts!

Let's get started!

Click below to sign up!

Take the Course

EVERY STUDENT RECEIVES

About Your Instructor

NCSU  Instructors

NCSU Instructors

National Cyber Security University Team

This course is taught by National Cyber Security University Instructors. 

ncsuinstructors@nationalcybersecurity.com