What you'll learn
- Cyberattacks
- Ethical hacking
- Network, webportal assessment
- Web-related vulnerability cyber testing
- Penetration testing
Who is this course for
- Anyone interested in learning about cybersecurity
- Business and IT Managers who need a working knowledge of Cybersecurity
- Inexperienced and aspiring IT professionals
- Cybersecurity professionals
After finishing this course, you will have a deep understanding of how you can protect your servers and data with White Hat Hacking.
With this, you can get free access to
- Course Materials for Life
- Expertise in all things related to Cybersecurity and White Hat Hacking
Your Instructor
Over 100,000 students have received instruction from Skills Shine Academy in topics including Lift Style, Fitness Training, Cyber Security, Ethical Hacking, Facebook Ads, SEO, Email Marketing, e-commerce, Business Investing, Social Media Marketing, Launching Your Own Business, and Marketing/Ad Agency!
The Multination firm Skills Shine Academy provides a wide variety of top-notch online courses that educate through real-world examples from subject matter Shines and tried-and-true research, all supported by top-notch, studio vocally narrated videos! Teaching practical life skills, which are crucial in today's environment, is the focus.
Every course offered by Skills Shine Academy is instructed by subject-matter specialists who genuinely love what they do and want to share it with others.
Course Curriculum
- 1. Build and Configure your White Hat Hacking Lab (2:27)
- 2. Building a LAB Concepts (5:50)
- 3. Building a LAB Networking (9:04)
- 4. Deploy a Kali Linux VM (14:01)
- 5. Adding Metasploitable to Your Lab (9:50)
- 6. Adding Windows to Your Lab (14:01)
- 7. Configure a Static IP on Kali (3:50)
- 8. Ethics and Hacking (7:01)
- 9. Hacking Vocabulary (5:03)
- 10. InfoSec Concepts (5:12)
- 11. Attack Categories, Types, and Vectors (4:17)
- 12. Five Phases of Hacking (5:29)
- 13. Footprinting and Reconnaissance Concepts (9:30)
- 14. Search Engine Tools (7:24)
- 15. Hacking Using Google (11:20)
- 16. Website Recon Tools (8:25)
- 17. Metagoofil Metadata Tool (3:30)
- 18. Email Headers for Footprinting (4:42)
- 19. Using WHOIS for Recon (4:06)
- 20. DNS Tools (9:40)
- 21. Network Scanning Overview (3:53)
- 22. Network Scanning Methodology (7:17)
- 23. Port Discovery (9:11)
- 24. Stealth Idle Scanning (9:10)
- 25. OS and Application Fingerprinting (9:49)
- 26. Vulnerability Scanning (7:27)
- 27. Network Mapping Tools (4:32)
- 28. NMAP (36:32)
- 29. Scapy (23:17)
- 30. Hping3 (28:24)
- 31. Proxy Servers (8:17)
- 32. Using Public Proxy Services (5:08)
- 33. Shellshock (5:00)
- 34. Enumeration Concepts (5:28)
- 35. NetBIOS Enumeration (7:10)
- 36. SNMP Enumeration Concepts (8:44)
- 37. SNMP Enumeration Tools (7:27)
- 38. LDAP Enumeration Concepts (4:24)
- 39. LDAP Enumeration Example (6:35)
- 40. NTP Enumeration (6:38)
- 41. SMTP Enumeration (8:05)
- 42. System Hacking Overview (8:57)
- 43. Password Cracking Concepts (10:44)
- 44. Password Attack Example MITM and Sniffing (12:02)
- 45. Rainbow Crack Lab Setup (8:39)
- 46. Rainbow Crack Demonstration (8:09)
- 47. Password Reset Hacking (7:03)
- 48. DHCP Starvation (10:47)
- 49. Remote Access (14:52)
- 50. NTFS Alternate Data Streams Exploit (8:35)
- 51. Steganography with OpenPuff (7:39)
- 52. Steganography with SNOW (5:44)
- 53. Covering Tracks (6:45)
- 54. Malware Overview (10:03)
- 55. Spyware (8:28)
- 56. Buffer Overflow (13:05)
- 57. Trojan Overview (10:44)
- 58. Creating a Trojan (11:47)
- 59. Virus Overview (12:37)
- 60. Virus Creation (8:12)
- 61. Detecting Malware (17:30)
- 62. Malware Analysis (9:26)
- 63. File Verification via Hash (8:53)
- 64. Sniffing Overview (12:25)
- 65. CAM Table Attack and Port Security (9:41)
- 66. DHCP Snooping (11:18)
- 67. Dynamic ARP Inspection (DAI) (8:33)
- 68. Social Engineering Concepts (5:49)
- 69. Social Engineering Phases (4:23)
- 70. Social Engineering Prevention (3:21)
- 71. DoS and DDoS Overview (9:35)
- 72. DoS and DDoS Prevention (7:34)
- 73. Session Hijacking Overview (11:29)
- 74. Reducing the Risk of Session Hijacking (5:02)
- 75. Firewall Evasion (13:02)
- 76. Firewall ACL Example (15:03)
- 77. NAT and PAT Fundamentals (11:46)
- 78. IDSIPS Evasion (17:13)
- 79. Honeypots (12:14)
- 80. Hacking Web Servers (10:12)
- 81. OWASP Broken Web Application Project (11:24)
- 82. Web App Vulnerabilities WordPress (8:59)
- 83. SQL Introduction (9:04)
- 84. SQL Injection (16:33)
- 85. Wireless Hacking Overview (11:48)
- 86. Wireless Topologies and Vocabulary (19:57)
- 87. Standards and Regulations (15:00)
- 88. RF Fundamentals (20:23)
- 89. Antenna Fundamentals (13:09)
- 90. WLAN Frame Types (21:47)
- 91. WLAN Frame Flow (15:05)
- 92. Uncovering Hidden SSIDs (12:03)
- 93. Bypassing MAC Address Filters (14:26)
- 94. Breaking WPA2 Wireless (10:08)
- 95. Rogue Wireless Access Points (24:00)
- 96. Wireless Mis-Association Attacks (15:39)
- 97. MITM Using Wireless Bridging (16:16)
- 98. Protecting Wireless (6:29)
- 99. Using an Android VM (3:32)
- 100. Malware for Mobile (11:17)
- 101. Mobile Device Risks (5:41)
- 102. Improving Mobile Security (6:22)
- 103.Cloud Computing Overview (9:03)
- 104. Cloud Computing Security Concerns (6:30)
- 105. Cloud Computing Security Benefits (7:26)
- 106. IoT Security Overview (5:37)
- 107. IoT Web, Cloud, and Mobile Interfaces (5:44)
- 108. Symmetrical Encryption Concepts (9:39)
- 109. Hashing Concepts for Data Integrity (4:00)
- 110. Asymmetrical Encryption Concepts (3:48)
- 111. Control Types (3:54)
- 112. Multifactor Authentication (3:48)
- 113. CIA Confidentiality, Integrity, and Availability (2:34)
- 114. Quantifying Risk (5:41)
- 115. Separation of Duties (5:56)
- 116. Centralized Identity Management (6:35)
- 117. Kerberos and Single Sign On (SSO) (7:23)
- 118. Backups and Media Management (4:19)
- 119. Operations Security Controls (5:31)
- 120. Physical Security Controls (4:44)
- 121. Incident Response (3:17)
- 122. VPNs (4:33)
- 123. Disaster Recovery Planning (4:58)
- 124. Pen Testing Tips (10:15)
- 125. Useful Tools (11:28)
- 126. Case Study for Security (20:34)
- 127. Additional Resources (4:27)
- white_hat-v10
Frequently Asked Questions
When does the course start and finish?
The course has begun and will never stop! You set the start and end dates for this entirely self-paced online course.
How long do I have access to the course?
Lifetime access—how does that sound? You receive unrestricted access to this course after registering for as long as you like, on any device you own.
Do I get a certificate?
Yes, when you complete the course, you will receive a certificate of completion which you can happily add to your resume or LinkedIn profile.
Can I cancel my subscription?
Yes, you can. You have a 15-days money-back guarantee.