Certified White Hat Hacker (CWHH)

Certified White Hat Hacker

Get your certification as a "Certified White Hat Hacker" - This course teaches you how to become a hacker. You will use the same tools that hackers use to gain....

In Order To Catch A Hacker It Takes A Hacker

You won’t regret it!

We read about it everyday how companies like Target, Home Depot or organizations like the DNC or a government agency has been hacked.

The reason why this companies and organizations like these keep getting hacked, is because the "Computer Security Experts" they hired have never hacked anything in their life. 

The purpose of this course is to give students of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. With real-world examples that reflect today's most important and relevant security topics, this course addresses how and why people attack computers and networks, so that students can be armed with the knowledge and techniques to successfully combat hackers. 

Because the world of information security changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts. Many hands-on exercises are included, which allow students to practice skills they've  learned to hack into a real network and/or website.

Specific topic coverage includes:

  • Ethics of Hacking and Cracking
  • Reconnaissance
  • Scanning Tools
  • Sniffers
  • TCP/IP Vulnerabilities
  • Encryption and Password Cracking
  • Spoofing
  • Session Hijacking
  • Hacking Network Devices
  • Trojan Horses
  • Denial-of-Service Attacks
  • Buffer Overflows
  • Programming Exploits
  • Mail Vulnerabilities
  • Web Application Vulnerabilities
  • Windows Vulnerabilities
  • Linux Vulnerabilities
  • Incident Handling
 

Computer Hacking Is The Future

Curriculum

Getting Started

35:41

  • Course Discussion
  • Computer Security Dictionary
  • Linux Is A Must
  • Linux For Beginners
  • About Kali
  • Kali Linux Installation on Flash Drive
  • Kali Linux Installation in VirtualBox

Introduction

96:55

  • Breaking Download the 5 Phases of Hacking
  • Career In Cyber Security
  • Cyber Defense - Military Training for Cyber Warfare

Installing The Tools

29:00

  • About Burp Suite For Web Applications
  • Download Burp Suite Mac OS
  • Download Burp Suite For Windows
  • Burp Suite For Web Application
  • Setting Up A Proxy
  • How To Configure Your Browser
  • Burp Suite for Web Application - Payload Configuration

The Law

03:24

  • Ethics of Hacking and Cracking
  • Hacking Laws Examples

Reconnaissance

130:30

  • Reconnaissance
  • Overview Of Different Scan Types
  • Download Footprinting and Reconnaissance Tools
  • Learn the Basic Reconnaissance
  • Google Dorking Part 1
  • Google Dorking Part 2
  • Adding Bing to Your Google Dork
  • Web Data Extractor
  • Who Is
  • Google Hacking Database
  • Introduction To Skipfish
  • Using Skipfish Video Part 1
  • Using Skipfish Video Part 2
  • What is Banner Grabbing
  • Open Source Intelligence

Vulnerability/Scanning

121:25

  • Vulnerability And Scanning Tools Techniques
  • Vulnerability Scanning Overview
  • Using Tor For Proxy
  • Scanner Options And Demo
  • How To Use A Proxy Server
  • IDS Evasion And Firewall
  • How To Use Hping
  • Learning Nmap Techniques
  • Download Sanning Network Tools
  • Using Nessus
  • Mapping Manually And Scope
  • Active And Passive Scans
  • Using WordPressScan, Part 1
  • Using WordPressScan, Part 2

Encryption, Cryptography and Password Cracking

46:49

  • Encryption and Password Cracking
  • What Are The Types Of Cryptography
  • Encryption Broken Down In Layman Terms
  • Download Encryption, Cryptography and Password Cracking Tools
  • Download System Hacking
  • Public Key Cryptography
  • Understanding Password Storage
  • What Are Digital Certificates
  • How To Find Hidden Passwords
  • Introduction To Password Security
  • How To Perform A Password Attack
  • How To Use Tunneling and Pivoting

Session Hijacking

06:56

  • In's and Out's of Session Hijacking
  • Session Hijacking
  • Download Session Hijacking

Website Hacking

54:35

  • Web Application Vulnerabilities
  • Web Application Scanning
  • Mapping A Website Using Sitemap
  • Download Website Hacking Tools
  • How To Use A Web Spider
  • How To Hack A Website Login Page
  • Intruder Attacks
  • Intruder Attack Types

Hacking Networks And Desktop

09:20

  • Practice Hacking Windows And Networks
  • Introduction To Metasploit For Penetration Testing
  • Metasploit Minute

Sniffers

  • Sniffers

Hacking Windows

83:30

  • Now That Your In....
  • Windows Hacking
  • What Is Computer Networking
  • What Is LDAP

Hacking Devices

23:23

  • Hacking Network Devices
  • Hacking Hardware 2
  • Windows ADS ( Alternate Data Stream)
  • Using log files for Hacking
  • Introduction to SNMP

Unix and Linux Vulnerabilities

  • How to Hack Unix and Linux

Buffer Overflows

09:44

  • Buffer Overflows Technique
  • How To Exploit A Buffer Overflow

Denial-Of-Service

11:39

  • Denial Of Service Attacks
  • How A Dos Attack Works
  • Difference Between A DOS And DDOS
  • Download Denial of Service Tools

Trojans, Viruses and Malware

51:49

  • The Most Dangerous Viruses Of All Time
  • Trojan Horses
  • How To Make A Worm
  • Virus Maker
  • Download Malware Tools

E-Mail Hacking

16:24

  • Mail Vulnerabilities
  • How To Perform A Phishing Attack
  • Download Password Hacking Tools
  • How To Perform A Phishing Attack

Exploits

  • Programming Exploits

Spoofing

  • In's and Out's of Spoofing

Incident Handling

  • Incident Handling

Final Exam Project

  • Final Exam Project

Hacking With Metasploit

39:21

  • Network Security Tutorial - Introduction
  • What Is Footprinting?
  • Metasploit Scripts
  • Scanning for access with smb_login
  • VNC Authentication
  • Hacking Databases
  • Network Security Tutorial - Basic Overview
  • Network Security Tutorial - Using Tools and Exploits
  • Network Security Tutorial - FTP Login
  • TFTP Fuzzer
  • Simple IMAP Fuzzer
  • Network Security Tutorial - Setting Up Metasploitable
  • Network Security Tutorial - Payloads and Backdoors

Course Requirement

Understanding Of Windows

Understanding Of Linux

Compuer Networking

How WIFI Routers Work

How How Firewalls Work

Any Graduate With A Certified Cyber Crime Consultant Level-1

Certified White Hat Hackers, GET PAID!




Pricing

$500.00 Regular Price Buy $500.00

Bonus Material

Tools

Software

$500
You will receive over 200 hacking tools, for Linux and Windows.

Paid!

Start Making Money!

Invaluable!
Upon completion, NCSU will show you how to start profiting of your new skill sets.

Forums

Community Discussions

Amazing Value!
Join our community and grow everyday through real interaction with fellow students and experts!

Let's get started!

Click below to sign up!

Take the Course

EVERY STUDENT RECEIVES

About Your Instructor

NCSU  Instructors

NCSU Instructors

National Cyber Security University Team

This course is taught by National Cyber Security University Instructors. 

ncsuinstructors@nationalcybersecurity.com