In Order To Catch A Hacker It Takes A Hacker...

We read about it every day how companies such as Target, Home Depot, and organizations such as the Democratic National Convention (DNC) have been hacked.  The reason why these companies and organizations like them keep getting hacked, is often because the "Computer Security Experts" they hire have likely never been taught to hack anything, except through a virtual server.

The purpose of this course is to give students of all backgrounds and experience levels, a well-researched and engaging introduction to the realm of becoming a real hacker.  Starting with the first step of thinking like a hacker.   With real-world examples that reflect today's most important and relevant security topics. This course addresses how and why people attack computers and networks, so students can be armed with the knowledge and techniques to successfully combat hackers.

Because the world of hacking changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts. 

Many hands-on exercises are included that allow students to practice the skills they have learned in hacking into real networks and/or websites.


Specific topics covered includes:

  • Ethics of Hacking and Cracking
  • Thinking Like A Criminal
  • Reconnaissance
  • Scanning Tools
  • Sniffers
  • TCP/IP Vulnerabilities
  • Encryption and Password Cracking
  • Spoofing
  • Session Hijacking
  • Hacking Network Devices
  • Trojan Horses
  • Denial-of-Service Attacks
  • Buffer Overflows
  • Programming Exploits
  • Mail Vulnerabilities
  • Web Application Vulnerabilities
  • Windows Vulnerabilities
  • Linux Vulnerabilities
  • Incident Handling


Unlike other PenTest or Ethical Hacker courses, Certified White Hat Hacker teaches you how to use hardware that requires very little knowledge to perform attacks, including attacks on  cell phones.

Below are a list of hacker PenTest hardware tools  included in this course.  

Included With This Course....

The leading rogue access point and WiFi pentest toolkit for close access operations. Passive and active attacks analyze vulnerable and misconfigured devices. The WiFi Pineapple® NANO and TETRA are the 6th generation pentest platforms. Thoughtfully developed for mobile and persistent deployments, they build on over 10 years of WiFi attack expertise.

Included With This Course....

The WiFi Pineapple lets pentesters perform targeted man-in-the-middle attacks, advanced reconnaissance, credential harvesting, open source intelligence gathering and more – all from a clean, intuitive web interface.  The leading rogue access point and WiFi pentest toolkit for close access operations. Passive and active attacks analyze vulnerable and misconfigured devices.

Included With This Course....

This covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle surveillance capabilities through a simple graphic shell.

How much does a Penetration Tester make in the United States?

The average salary for a Penetration Tester is $111,916 per year in the United States. Salary estimates are based on 286 salaries submitted anonymously to Indeed by Penetration Tester employees, users, and collected from past and present job advertisements on Indeed in the past 36 months.

Receive Your Certificate

Upon completion of this course, you will receive your certificate as a Certified White Hat Hacker.

Bonus Material

Includes additional content to your course curriculum to provide further value to your students.

  • Software

    You will receive over 200 hacking tools, for Linux and Windows.

  • Paid

    Start Making Money! Upon completion, NCSU will show you how to start profiting of your new skill sets.

  • Community Discussions

    Join our community and grow everyday through real interaction with fellow students and experts!

LET THE WORLD KNOW!

At the completion of the course you will receive a Certified White Hat Hacker Shirt.

Course Curriculum

  • 1

    Introduction

    • Support Chat/Forum

    • Career In Cyber Security

    • Cyber Defense - Military Training for Cyber Warfare

    • What You Should Expect

    • Security Controls

    • What Is Hacking

    • Why Is Hacking?

    • Why Do We Hack?

    • Ethics

    • Methodology

    • Types Of Attacks

    • Skills Necessary And Skills To Be Learned

    • What Is Penetration Testing Scope

  • 2

    Getting Started

    • Computer Security Dictionary

    • Linux Is A Must

    • How To Install Kali Linux As An App In Windows 10

    • Linux For Beginners

    • About Kali

    • Installing And Running Kali On Your Windows 10 Computer

    • Kali Linux Installation on Flash Drive

    • Kali Linux Installation in VirtualBox

  • 3

    Installing The Tools

    • What You Need to Know Before Starting

    • About Burp Suite For Web Applications

    • Download Burp Suite Mac OS

    • Download Burp Suite For Windows

    • Setting Up A Proxy

  • 4

    The Law

    • Ethics of Hacking and Cracking

    • Hacking Laws Examples

    • Example Of A Pen-Testing Agreement

    • Quiz - The Law

  • 5

    Reconnaissance

    • Learn the Basic Reconnaissance

    • Reconnaissance

    • Download Footprinting and Reconnaissance Tools

    • Web Data Extractor

    • Who Is

    • Google Hacking Database

    • Introduction To Skipfish

    • Using Skipfish Video Part 1

    • Using Skipfish Video Part 2

    • What is Banner Grabbing

    • Open Source Intelligence

    • Footprinting

    • The Way Back Machine

    • Using Your Resources

    • Whois Lookups

    • Using DNS To Extract Information

    • Finding Network Ranges

    • Google hacking

    • Mining For Information Using Google Hacking

    • Hacking Databases With Google

  • 6

    Network Fudamentals

    • Download Wireshark

    • Capturing and Analyzing Data with Wireshark

    • History of TCPIP

    • How To Use Wireshark To Examine Packets

    • OSI And IP Models

    • Addressing

    • Learning UDP

    • Learning TCP

    • Services

    • Using Wireshark For Deep Analysis

    • DHCP

    • Using ARP

    • Quiz

  • 7

    Encryption, Cryptography and Password Cracking

    • History Of Cryptography

    • Types Of Cryptography

    • Public Key

    • Certificates

    • What Is A Hash

    • AES, DES And 3DES

    • SSH

    • Disk Encryption

    • Cryptographics

    • What Are The Types Of Cryptography

    • Learning Password Basics

    • Whats The Best Way For Cracking Passwords

    • Encryption and Password Cracking

    • Public Key Cryptography

    • Using Dictionary Password Cracker

    • Download Encryption, Cryptography and Password Cracking Tools

    • Download System Hacking

    • Understanding Password Storage

    • What Are Digital Certificates

    • How To Find Hidden Passwords

    • Introduction To Password Security

    • How To Use Tunneling and Pivoting

    • What Is SSL

  • 8

    Vulnerability/Scanning

    • Vulnerability And Scanning Tools Techniques

    • What Is Footprinting?

    • Download Sanning Network Tools

    • Download Nessus

    • Using Nessus

    • Using WordPressScan, Part 1

    • Using WordPressScan, Part 2

    • Types Of Scans

    • Using Nmap

    • Using Hping And Its Uses

    • War Dialing

    • IDS Evasion

    • Banner Grabbing

    • Vulnerability Scanning

    • Using Nessus

    • Enumeration Techniques

    • SNMP

    • LDAP

    • Using Proxies

    • Tor And Anonymizers

    • Tunneling

  • 9

    Penetration Testing

    • Breaking Download the 5 Phases of Hacking

    • The Scope Of Penetration Testing

    • 5 Stages To Computer Hacking Broken Down

    • Pent Testing Work Flow

    • The Goals Of A Pen-Testing

    • Password Cracking And Complexity

    • Password Attacks

    • Password Storage Tehniques

    • Escalating Privileges

    • Spyware, Rootkits And Key Loggers

    • Spyware, Rootkits And Key Loggers

    • Metasploit Basics

    • Auditing And Logging

    • Metasploit Attack Basics

  • 10

    Website Sever Attacks - Student Taught

    • Network Security Tutorial - Introduction

    • Network Security Tutorial - Basic Overview

    • Network Security Tutorial - Using Tools and Exploits

    • Network Security Tutorial - FTP Login

    • Network Security Tutorial - Setting Up Metasploitable

    • Network Security Tutorial - Payloads and Backdoors

    • Metasploit Scripts

    • Scanning for access with smb_login

    • VNC Authentication

    • Hacking Databases

    • TFTP Fuzzer

    • Simple IMAP Fuzzer

  • 11

    Website Hacking

    • Web Application Hacking

    • Web Application Hacking - Part 2

    • Web Application Hacking - Part 3

    • Mapping A Website Using Sitemap

    • Web Application Hacking - Part 5

    • Web Application Hacking - Part 6

    • Web Application Hacking - Part 7

    • Web Application Hacking - Part 8

    • Web Application Hacking - Part 9

    • Web Application Hacking - Part 10

    • Web Application Vulnerabilities

    • Quiz

  • 12

    Wireless Networking

    • Wireless Networking Overview

    • WEP, WPA, WPA2 Encryption

    • Finding Hotspots

    • Breaking WEP Encryption

    • Rogue Access Points And Attacks

    • Wireless Sniffing

    • Protecting Wireless Networks

  • 13

    Detecting Evasion

    • Steganography

    • What Is Evasion And Why Do We Use It

  • 14

    Trojans, Viruses and Malware

    • The Most Dangerous Viruses Of All Time

    • Definitions And History

    • Trojan Horses

    • Detection Of Malware

    • Anti-Virus Evasion

    • Types Of Viruses

    • Deploying Of Malware

    • Analyze Malware

    • Windows ADS And Hiding Malware

    • Debugging

    • Packing And Automated Anti-Virus Maker Tools

    • More Malware Analysis

    • Download Malware Tools

    • How To Make A Worm - Student Taught

    • Virus Maker - Student Taught

  • 15

    Exploits

    • Programming Exploits

  • 16

    Programming Attacks

    • Memor Layout - Stacks And Heaps

    • Buffer Overflows

    • Protecting Buffer Overflow Attacks

    • Format String

    • De-Compilation

    • Reverse Engineering

  • 17

    Session Hijacking

    • Download Session Hijacking

    • In's and Out's of Session Hijacking

    • Session Hijacking

  • 18

    Sniffers

    • Understanding And Using Sniffers

  • 19

    Hacking Windows

    • Now That Your In....

    • Windows Hacking

    • What Is Computer Networking

    • What Is LDAP

  • 20

    Using Web Browser To Attack

    • How Can I Use A Browser To Hack

    • Which Web Browser Is Best For Security

    • Browser History, Bookmark, and Cache

    • Important Browsers Files

    • Cookie Files

    • What Is PHF

    • Using The "Test" Hack

    • How To Use "~" Character

    • The JJ.c Problem

    • The Deal With Forms

    • What It Looks Like In The Log

    • How To View Passwords In A Browser

  • 21

    Hacking Devices

    • Hacking Network Devices

    • Hacking Hardware 2

    • Windows ADS ( Alternate Data Stream)

    • Using log files for Hacking

    • Introduction to SNMP

    • How To Turn On The Camera On Mac OS, To Spy.

  • 22

    Unix and Linux Vulnerabilities

    • How to Hack Unix and Linux

  • 23

    Buffer Overflows

    • Buffer Overflows Technique

    • How To Exploit A Buffer Overflow

  • 24

    Denial-Of-Service

    • Denial Of Service Attacks

    • Download Denial of Service Tools

    • What Is A Dos And DDoS Attack

    • Dos Attacks

    • Cyber Crime

    • Botnets

    • Attack Countermeasures

  • 25

    E-Mail Hacking

    • Mail Vulnerabilities

    • How To Perform A Phishing Attack

    • Download Password Hacking Tools

    • How To Perform A Phishing Attack

  • 26

    Incident Handling

    • Incident Handling

  • 27

    Clearing Your Tracks

    • Leave No Trace Behind

  • 28

    Final Exam Project

    • Final Exam Project

2 Easy Ways To Pay!

After registration, you will have 1 year access to this course.

If your paying in installments, you will receive your hardware in your 3 month of the course.