Certified White Hat Hacker (CWHH)

Certified White Hat Hacker

Get your certification as a "Certified White Hat Hacker" - This course teaches you how to become a hacker. You will use the same tools that hackers use to gain....

In Order To Catch A Hacker It Takes A Hacker...

Are you that hacker?

We read about it everyday, how companies such as Target and Home Depot as well as organizations such as the DNC have been hacked.  The reason why these companies and organizations like them keep getting hacked, is often because the "Computer Security Experts" they hire have likely never been taught to hack anything, with the exception of a virtual server. 

Do You Think Your Ready For The NBA?

Think about this, if you attended Labron James' basketball camp for 4 years, and then attended Kobe Bryant's basketball camp for another 4 years and spent 4 more years at Magic Johnsons' basketball camp, does that mean that you are now qualified to play in the NBA?

Now think about this, big corporations hire CTO's, CIO's, IT Mangers and others who have college degrees as well as numerous certifications from a variety of cyber security organizations. Does this now qualify them to be on the same level as a hacker?  What these institutes and organizations do not teach is how to think like that bad guy... the hacker. The hackers that are attacking Fortune 500 companies and our government infrastructure likely did not attend college or receive  certifications in cyber security.  They are self taught. 

The purpose of this course is to give students of all backgrounds and experience levels a well-researched and engaging introduction to the realm of becoming a real hacker. Starting with the first step of thinking like a hacker.  With real-world examples that reflect today's most important and relevant security topics. This course addresses how and why people attack computers and networks, so that students can be armed with the knowledge and techniques to successfully combat hackers. 

Because the world of hacking changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts. Many hands-on exercises are included, which allow students to practice skills they've  learned to hack into a real network and/or website.

Specific topics covered includes:

  • Ethics of Hacking and Cracking
  • Thinking Like A Criminal
  • Reconnaissance
  • Scanning Tools
  • Sniffers
  • TCP/IP Vulnerabilities
  • Encryption and Password Cracking
  • Spoofing
  • Session Hijacking
  • Hacking Network Devices
  • Trojan Horses
  • Denial-of-Service Attacks
  • Buffer Overflows
  • Programming Exploits
  • Mail Vulnerabilities
  • Web Application Vulnerabilities
  • Windows Vulnerabilities
  • Linux Vulnerabilities
  • Incident Handling

Computer Hacking Is The Future




  • Support Chat/Forum
  • What Makes A Good Hacker
  • How To Think Like A Bad Guy
  • Career In Cyber Security
  • Cyber Defense - Military Training for Cyber Warfare

The Law


  • Ethics of Hacking and Cracking
  • Hacking Laws Examples
  • Example Of A Pen-Testing Agreement

Getting Started


  • Breaking Download the 5 Phases of Hacking
  • Pent Testing Work Flow
  • Computer Security Dictionary
  • Linux Is A Must
  • Linux For Beginners
  • About Kali
  • Kali Linux Installation on Flash Drive
  • Kali Linux Installation in VirtualBox

Installing The Tools


  • About Burp Suite For Web Applications
  • Download Burp Suite Mac OS
  • Download Burp Suite For Windows
  • Burp Suite For Web Application
  • Setting Up A Proxy
  • How To Configure Your Browser
  • Burp Suite for Web Application - Payload Configuration



  • Running Background Checks On Your Target
  • Using Social Media To Run Background Checks
  • Reconnaissance
  • Overview Of Different Scan Types
  • Download Footprinting and Reconnaissance Tools
  • Learn the Basic Reconnaissance
  • Google Dorking Part 1
  • Google Dorking Part 2
  • Adding Bing to Your Google Dork
  • Web Data Extractor
  • Who Is
  • Google Hacking Database
  • Introduction To Skipfish
  • Using Skipfish Video Part 1
  • Using Skipfish Video Part 2
  • What is Banner Grabbing
  • Open Source Intelligence



  • Vulnerability And Scanning Tools Techniques
  • Vulnerability Scanning Overview
  • Using Tor For Proxy
  • Scanner Options And Demo
  • How To Use A Proxy Server
  • IDS Evasion And Firewall
  • How To Use Hping
  • Learning Nmap Techniques
  • Download Sanning Network Tools
  • Using Nessus
  • Mapping Manually And Scope
  • Active And Passive Scans
  • Using WordPressScan, Part 1
  • Using WordPressScan, Part 2

Encryption, Cryptography and Password Cracking


  • What Are the Downfall Of Password Cracking
  • Learning Password Basics
  • Whats The Best Way For Cracking Passwords
  • Encryption and Password Cracking
  • Using Dictionary Password Cracker
  • What Are The Types Of Cryptography
  • Encryption Broken Down In Layman Terms
  • Download Encryption, Cryptography and Password Cracking Tools
  • How To Brute Force Password
  • Download System Hacking
  • Public Key Cryptography
  • Understanding Password Storage
  • What Are Digital Certificates
  • How To Find Hidden Passwords
  • Introduction To Password Security
  • How To Perform A Password Attack
  • How To Use Tunneling and Pivoting
  • What Is SSL

Session Hijacking


  • In's and Out's of Session Hijacking
  • Session Hijacking
  • Download Session Hijacking

Hacking The Easy Way

  • Learn How To Hack Cell Phons In 15 Minutes
  • Learn How To Hack Networks In 15 Minutes
  • Learn How To Hack Voicemails In 60 Seconds
  • How To Hack ATM Machines And Public Networks In 15 Minutes
  • Learn How To Have An IT Manager Give You Admin Access To Their Network

Website Hacking


  • Web Application Vulnerabilities
  • Web Application Scanning
  • Mapping A Website Using Sitemap
  • Download Website Hacking Tools
  • How To Use A Web Spider
  • How To Hack A Website Login Page
  • Intruder Attacks
  • Intruder Attack Types

Hacking Networks And Desktop


  • Practice Hacking Windows And Networks
  • Introduction To Metasploit For Penetration Testing
  • Metasploit Minute


  • Understanding And Using Sniffers

Hacking Windows


  • Now That Your In....
  • Windows Hacking
  • What Is Computer Networking
  • What Is LDAP

Using Web Browser To Attack

  • How Can I Use A Browser To Hack
  • Which Web Browser Is Best For Security
  • Browser History, Bookmark, and Cache
  • Important Browsers Files
  • Cookie Files
  • What Is PHF
  • Using The "Test" Hack
  • How To Use "~" Character
  • The JJ.c Problem
  • The Deal With Forms
  • What It Looks Like In The Log

Logging & Auditing

  • Why You Should Care About Logging & Auditing
  • What Are Some Different Logging Techniques
  • Deleting Log Files

Hacking Devices


  • Hacking Network Devices
  • Hacking Hardware 2
  • Windows ADS ( Alternate Data Stream)
  • Using log files for Hacking
  • Introduction to SNMP

Unix and Linux Vulnerabilities

  • How to Hack Unix and Linux

Buffer Overflows


  • Buffer Overflows Technique
  • How To Exploit A Buffer Overflow

Old School Attacks

  • Attacking Anonymously
  • The Campas Attack
  • The ASP Attack
  • The Finger.cgi Attack
  • The Glimpse Exploit



  • Denial Of Service Attacks
  • How A Dos Attack Works
  • Difference Between A DOS And DDOS
  • Download Denial of Service Tools

Trojans, Viruses and Malware


  • The Most Dangerous Viruses Of All Time
  • Trojan Horses
  • How To Make A Worm
  • Virus Maker
  • Download Malware Tools

E-Mail Hacking


  • Mail Vulnerabilities
  • How To Perform A Phishing Attack
  • Download Password Hacking Tools
  • How To Perform A Phishing Attack


  • Programming Exploits


  • In's and Out's of Spoofing

Hacking With Metasploit


  • Network Security Tutorial - Introduction
  • What Is Footprinting?
  • Metasploit Scripts
  • Scanning for access with smb_login
  • VNC Authentication
  • Hacking Databases
  • Network Security Tutorial - Basic Overview
  • Network Security Tutorial - Using Tools and Exploits
  • Network Security Tutorial - FTP Login
  • TFTP Fuzzer
  • Simple IMAP Fuzzer
  • Network Security Tutorial - Setting Up Metasploitable
  • Network Security Tutorial - Payloads and Backdoors

Incident Handling

  • Incident Handling

Final Exam Project

  • Final Exam Project

Course Requirements

Understanding Of Windows

Computer Networking

How Firewalls Work

Understanding Of Linux

How Firewalls Work

Any Graduate With A Certified Cyber Crime Consultant Level-1

Certified White Hat Hackers, GET PAID!


$700.00 Regular Price Buy $700.00

Bonus Material



You will receive over 200 hacking tools, for Linux and Windows.


Start Making Money!

Upon completion, NCSU will show you how to start profiting of your new skill sets.


Community Discussions

Amazing Value!
Join our community and grow everyday through real interaction with fellow students and experts!

Let's get started!

Click below to sign up!

Take the Course


About Your Instructor

NCSU  Instructors

NCSU Instructors

National Cyber Security University Team

This course is taught by National Cyber Security University Instructors.