Certified White Hat Hacker (CWHH)

Certified White Hat Hacker

Get your certification as a "Certified White Hat Hacker" - This course teaches you how to become a hacker. You will use the same tools that hackers use to gain....

In Order To Catch A Hacker It Takes A Hacker

You won’t regret it!

We read about it everyday how companies like Target, Home Depot or organizations like the DNC or a government agency has been hacked.

The reason why this companies and organizations like these keep getting hacked, is because the "Computer Security Experts" they hired have never hacked anything in their life. 

The purpose of this course is to give students of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. With real-world examples that reflect today's most important and relevant security topics, this course addresses how and why people attack computers and networks, so that students can be armed with the knowledge and techniques to successfully combat hackers. 

Because the world of information security changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts. Many hands-on exercises are included, which allow students to practice skills they've  learned to hack into a real network and/or website.

Specific topic coverage includes:

  • Ethics of Hacking and Cracking
  • Reconnaissance
  • Scanning Tools
  • Sniffers
  • TCP/IP Vulnerabilities
  • Encryption and Password Cracking
  • Spoofing
  • Session Hijacking
  • Hacking Network Devices
  • Trojan Horses
  • Denial-of-Service Attacks
  • Buffer Overflows
  • Programming Exploits
  • Mail Vulnerabilities
  • Web Application Vulnerabilities
  • Windows Vulnerabilities
  • Linux Vulnerabilities
  • Incident Handling

Computer Hacking Is The Future


Getting Started


  • Course Discussion
  • Computer Security Dictionary
  • Linux Is A Must
  • Linux For Beginners
  • About Kali
  • Kali Linux Installation on Flash Drive
  • Kali Linux Installation in VirtualBox



  • Breaking Download the 5 Phases of Hacking
  • Career In Cyber Security
  • Cyber Defense - Military Training for Cyber Warfare

Installing The Tools


  • About Burp Suite For Web Applications
  • Download Burp Suite Mac OS
  • Download Burp Suite For Windows
  • Burp Suite For Web Application
  • Setting Up A Proxy
  • How To Configure Your Browser
  • Burp Suite for Web Application - Payload Configuration

The Law


  • Ethics of Hacking and Cracking
  • Hacking Laws Examples



  • Reconnaissance
  • Overview Of Different Scan Types
  • Download Footprinting and Reconnaissance Tools
  • Learn the Basic Reconnaissance
  • Google Dorking Part 1
  • Google Dorking Part 2
  • Adding Bing to Your Google Dork
  • Web Data Extractor
  • Who Is
  • Google Hacking Database
  • Introduction To Skipfish
  • Using Skipfish Video Part 1
  • Using Skipfish Video Part 2
  • What is Banner Grabbing
  • Open Source Intelligence



  • Vulnerability And Scanning Tools Techniques
  • Vulnerability Scanning Overview
  • Using Tor For Proxy
  • Scanner Options And Demo
  • How To Use A Proxy Server
  • IDS Evasion And Firewall
  • How To Use Hping
  • Learning Nmap Techniques
  • Download Sanning Network Tools
  • Using Nessus
  • Mapping Manually And Scope
  • Active And Passive Scans
  • Using WordPressScan, Part 1
  • Using WordPressScan, Part 2

Encryption, Cryptography and Password Cracking


  • Encryption and Password Cracking
  • What Are The Types Of Cryptography
  • Encryption Broken Down In Layman Terms
  • Download Encryption, Cryptography and Password Cracking Tools
  • Download System Hacking
  • Public Key Cryptography
  • Understanding Password Storage
  • What Are Digital Certificates
  • How To Find Hidden Passwords
  • Introduction To Password Security
  • How To Perform A Password Attack
  • How To Use Tunneling and Pivoting

Session Hijacking


  • In's and Out's of Session Hijacking
  • Session Hijacking
  • Download Session Hijacking

Website Hacking


  • Web Application Vulnerabilities
  • Web Application Scanning
  • Mapping A Website Using Sitemap
  • Download Website Hacking Tools
  • How To Use A Web Spider
  • How To Hack A Website Login Page
  • Intruder Attacks
  • Intruder Attack Types

Hacking Networks And Desktop


  • Practice Hacking Windows And Networks
  • Introduction To Metasploit For Penetration Testing
  • Metasploit Minute


  • Sniffers

Hacking Windows


  • Now That Your In....
  • Windows Hacking
  • What Is Computer Networking
  • What Is LDAP

Hacking Devices


  • Hacking Network Devices
  • Hacking Hardware 2
  • Windows ADS ( Alternate Data Stream)
  • Using log files for Hacking
  • Introduction to SNMP

Unix and Linux Vulnerabilities

  • How to Hack Unix and Linux

Buffer Overflows


  • Buffer Overflows Technique
  • How To Exploit A Buffer Overflow



  • Denial Of Service Attacks
  • How A Dos Attack Works
  • Difference Between A DOS And DDOS
  • Download Denial of Service Tools

Trojans, Viruses and Malware


  • The Most Dangerous Viruses Of All Time
  • Trojan Horses
  • How To Make A Worm
  • Virus Maker
  • Download Malware Tools

E-Mail Hacking


  • Mail Vulnerabilities
  • How To Perform A Phishing Attack
  • Download Password Hacking Tools
  • How To Perform A Phishing Attack


  • Programming Exploits


  • In's and Out's of Spoofing

Incident Handling

  • Incident Handling

Final Exam Project

  • Final Exam Project

Hacking With Metasploit


  • Network Security Tutorial - Introduction
  • What Is Footprinting?
  • Metasploit Scripts
  • Scanning for access with smb_login
  • VNC Authentication
  • Hacking Databases
  • Network Security Tutorial - Basic Overview
  • Network Security Tutorial - Using Tools and Exploits
  • Network Security Tutorial - FTP Login
  • TFTP Fuzzer
  • Simple IMAP Fuzzer
  • Network Security Tutorial - Setting Up Metasploitable
  • Network Security Tutorial - Payloads and Backdoors

Course Requirement

Understanding Of Windows

Understanding Of Linux

Compuer Networking

How WIFI Routers Work

How How Firewalls Work

Any Graduate With A Certified Cyber Crime Consultant Level-1

Certified White Hat Hackers, GET PAID!


$500.00 Regular Price Buy $500.00

Bonus Material



You will receive over 200 hacking tools, for Linux and Windows.


Start Making Money!

Upon completion, NCSU will show you how to start profiting of your new skill sets.


Community Discussions

Amazing Value!
Join our community and grow everyday through real interaction with fellow students and experts!

Let's get started!

Click below to sign up!

Take the Course


About Your Instructor

NCSU  Instructors

NCSU Instructors

National Cyber Security University Team

This course is taught by National Cyber Security University Instructors.