Anatomy of a Cyber Attack: Beginner Hacking with Metasploit!
4.6 (461 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
6,045 students enrolled

Anatomy of a Cyber Attack: Beginner Hacking with Metasploit!

Learn the attacker's methodology and start your career in cybersecurity, penetration testing, and ethical hacking!
Highest Rated
4.6 (461 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
6,045 students enrolled
Current price: $12.99 Original price: $199.99 Discount: 94% off
17 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 4 hours on-demand video
  • 1 article
  • 21 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to Udemy's top 3,000+ courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Understand the steps of a cyber attack
  • Understand the basic methodology, tools, and techniques used by hackers in exploiting networks and information systems

  • PC or Mac with at least 4 GB of RAM in order to install the virtualization software used in this course
  • Windows XP disc or disc image to setup a vulnerable machine for the labs
  • Kali Linux disc image (free to download, instructions provided in the course)
  • VirtualBox software (free to download, instructions provided in the course)

Updated with the EternalBlue & WannaCry Ransomware Exploit Labs against Windows 7/Server 2008 victims!

** Dissect the Threat! Understand the Importance of Cyber Security **

Your networks are facing a constant barrage of attacks by malicious actors: hackers, hacktivists, script kiddies, advanced persistent threats, and even nation states are all searching for footholds into networks around the globe. System administrators have always been the first line of defense in system security, and in this global cyber war your role has become increasingly important to the security our networks. As the lynchpin to network defense, it is imperative that system administrators understand the vulnerabilities and methodology employed by malicious cyber actors in order to assist in stopping cyber attacks.

In “The Anatomy of a Cyber Attack”, you will learn to dissect the techniques used by hackers in their exploitation of a network. From open-source research and reconnaissance to the exploitation and covering of their tracks, you will learn hands-on techniques to probe your network for vulnerabilities and understand how they are exploited. Taught by an expert in cybersecurity, you will learn to think like a hacker in order to thwart their future attacks on your networks.

A truly eye-opening experience into the world of cybersecurity, “The Anatomy of a Cyber Attack” is essential to understanding the landscape of today’s cyber threats.

What You Will Receive In The Course:

  • Video lectures that are fun, entertaining, and enlightening
  • Walkthrough of building your own penetration testing lab for use in the course
  • Labs for every step of the hacker methodology
    • You can watch the instructor to better understand the threat, or learn to conduct the attack yourself using Metasploit!
  • Practice questions to ensure mastery of each section of the course
  • A solid foundation upon which to conduct further study or certification preparation
    • This course provides a great foundation upon which to build upon for Certified Ethical Hacker (CEH) or penetration testing studies!

What This Course Is NOT:

  • Certified Ethical Hacker preparation course
  • IT Certification preparation course
  • Designed to provide a mastery of penetration testing techniques (but will give you a great introduction)

What Students Are Saying About This Course:

  • This is impressive, opened my eyes, and taught me skills necessary for my career. Thanks, Jason! Really good work! (Wayne, 5 stars)
  • One of the best courses I have seen to integrate lecture with demo/labs. (Greg, 5 stars)
  • Nice overview with practical examples. You get an introduction to the tools used so that can be used as a starting point to learn more. (Seppo, 5 stars)

This course is designed for all IT personnel and provides a great overview of the need for cybersecurity through hands-on examples of network and system exploitation. Even beginners will be able to understand the concepts and enjoy the course, but may have some difficult in conducting the attacks themselves. A basic understanding of computers and computer networks is required to understand this course.

Who this course is for:
  • Students who are interested in the cyber threat that exists in today's culture
  • Students interested in learning how hackers are able to attack networks and information systems
  • Students looking for a beginner/overview course for penetration testing and hacking
  • Students wanting an easy to understand course on using Metasploit to conduct penetration testing
Course content
Expand all 36 lectures 03:53:40
+ Welcome to "The Anatomy of a Cyber Attack"
7 lectures 15:21

In this video, you will be introduced to your instructor, Jason Dion. We will discuss a quick overview of the course and the importance of cybersecurity in today's malicious cyber environment.

Preview 01:09

In this video, you will learn how to download and install VirtualBox in order to create a penetration testing lab. Also, you will understand why it is important to create our penetration testing lab in a safe, secluded virtual environment to ensure we don't run into trouble with the law.

Preview 02:10

This video shows students how to install Kali Linux in a virtual machine for use in our attack lab.

Installing Kali Linux (...our attack platform)

An important message from Jason on the course!

An Important Course Message

This video shows students how to install Windows in a virtual machine for use as a victim in our attack lab.

Installing Windows (…our first victim)

This video shows students how to install Metasploitable in a virtual machine for use as another

 victim in our attack lab.

Installing Metasploitable (...another victim for our amusement)

An assignment for you to take the time to build your Penetration Testing lab.

Create Your Own Lab Environment
+ Security (...and the threats to it)
2 lectures 11:49

A discussion of the importance of Confidentiality, Integrity, and Availability in cyber security, and the tradeoff between operations and security, allowing a hacker to breach your networks and systems.

Preview 05:30

A look into the various types of hackers, crackers, and attackers in the hacking world, as well as the various tools and techniques that they utilize to accomplish their specific goals.

Preview 06:19

This quiz covers concepts from the CIA Triad and the Hackers, Crackers, and Attackers lessons.

Security (...and the threats to it)
5 questions
+ The Hacker Methodology (...a malicious mindset)
2 lectures 07:48

A discussion of the Six Step Hacker's Methodology that will form the basis for our attacks throughout this course: (1) Performing Reconnaissance (2) Scanning and Enumeration (3) Gaining Access (4) Escalation of Privilege (5) Maintaining Access (6) Covering Tracks and Placing Backdoors.

Preview 05:13

This lecture provides a discussion of Ethical Hackers and how they have modified the Hacker's Methodology for their use in penetration testing. The discussion also provides the details of what to include in your "get out of jail free" letter as an ethical hacker.

Preview 02:35

Quiz covering the topics from The Hacker's Methodology and Ethical Hackers lectures.

The Hacker's Methodology (...a malicious mindset)
3 questions
+ Step 1: Reconnaissance (...I can see you but you can't see me)
3 lectures 41:47

This is a lengthy discussion of the Reconnaissance Phase, including the tool that are utilized during this phase of the cyber attack. This includes Creepy, Discover, Maltego, Central Ops, and more!

Preview 17:17

In this hands-on lab video, students will learn the how to use Creepy, an open-source, cross-platform Geolocation tool to create a "pattern of life" on a victim location or person. During this lab, students will be provided with a sample Twitter user (TitanCipher) to work against in their reconnaissance.

Preview 11:07

In this hands-on lab video, students will learn the how to perform OSINT (Open-Source Intelligence) using CentralOps, a web-based service that allows us to collect lots of information on our victim organization and networks. During this lab, students will explore the information found through this tool and how it relates to performing reconnaissance to aid in a future cyber attack. 

Lab (...OSINT with CentralOps)
+ Step 2: Scanning and Enumeration (...poke, poke, poke)
3 lectures 36:33

In this lecture, you will learn various tools, techniques, and theory to consider when performing the scanning and enumeration phase of the hacker's methodology. Next, we will put this theory into practice in our lab environment.

Scanning and Enumeration (...poke, poke, poke)

This video lecture introduces students to the importance of the Scanning and Enumeration Phase, as well as the tool Zenmap that we use to perform our scans. Also, this video shows students how to configure their virtual network properly in order to conduct the rest of the labs during this course.

Lab Introduction and Setup ('ve got to find the hole)

In this lab, we are going to use Zenmap and Nmap to scan the lab environment and find the open ports to conduct our enumeration on. Various scanning and enumeration techniques will be covered throughout this lesson.

Lab ('ve got to find the hole)
+ Step 3: Gaining Access (...finding my foothold)
8 lectures 47:45

In this lecture, you will learn the various methods used during the gaining access phase, including a brief discussion of shellcode, buffer overflows, and unpatched software vulnerabilities. 

Gaining Access (...finding a foothold)

A brief introduction to the concept of Buffer Overflows, as well as a code review of a short program that we will create a buffer overflow in during our lab.

Buffer Overflows (...dissecting the exploit)

In this lab, we will create a buffer overflow to gain a Linux command shell by overflowing the buffer of a simple 20-line program. written in C.

Lab: Buffer Overflows (...dissecting the exploit)

An introduction to Bind and Reverser Shellcode, and its usage in gaining our foothold during the attack!

Introduction to Shellcode (...finding my foothold)

A breakdown of the MS08-067 Vulnerability and how we are going to exploit it in the lab environment using a reverse shell payload.

The MS08-067 Vulnerability (…aka everyone’s first hack)

In this video lecture, students are shown just how easy it is to break into a Windows machine when you have done your Reconnaissance and Scanning/Enumeration Phases properly. Using the MS08-067 vulnerability, we will exploit a Windows workstation, gain system level rights, and prove that the attack was successful by leaving evidence of our successful penetration to a different user's desktop!

Lab: Exploiting Windows (...making it look easy)

An overview of the Meterpreter payload that is provided in the Metasploit Framework, its functions, and usage. This lesson provides the basics upon which we will expound in our lab environment.

Meterpreter (...a crowd favorite for payloads)

In this video lecture, students are introduced to Meterpreter and the powerful shell environment it provides us when we attack a system. Our target system for this exploitation will again be our Windows workstation, showing students the difference between the previous attack using the Reverse Shell and the new Meterpreter Shell inside Metasploit.

Lab (...give 'em an inch, they take a mile)
+ Step 4: Escalation of Privileges (...I've got the power)
2 lectures 26:56

This lesson discusses the various tools used by attackers to crack passwords, gather SAM database hashes, and methods of circumventing password lockout security precautions.

Escalation of Privileges (...I've got the power)

In this lab, you will learn to do basic password cracking, migration between system processes and user process, and conduct keylogging of a victim machine in order to elevate your privileges on a given system.

Lab (...become superman without the fear of kryptonite)
+ Step 5: Maintaining Access (...hold on tight)
2 lectures 18:02

In this lecture, you will learn more about the methods used to maintain access once you have gotten onto a victim system, including creating additional user accounts, stealing passwords, sniffing network traffic, installing keylogging, and more.

Maintaining Access (...hold on tight)

In this lab, you will learn how to maintain access on a victim machine by adding user accounts to the system, elevating them into the Administrators group, and manipulating the firewall to ensure you have continuous access to the victim in the future.

Lab (...spread out and grab on)
+ Step 6: Covering Tracks and Placing Backdoors (...dig in deep)
2 lectures 17:31

In this lecture, you will learn more about the methods used to cover your tracks maintain access once you have gotten onto a victim system. This includes modifying and deleting log entries, hiding files and folders, installing backdoors, opening firewall ports, setting up callbacks from the victim machine, and more.

Covering Tracks and Placing Backdoors (...dig in deep)

In this lab, you will learn how to begin covering your tracks through the use of Alternate Data Streams on NTFS file systems (Windows targets) and installing backdoors through the scheduling features of Windows (the AT program). 

Lab (...hide in case the lights turn on)
+ Conclusion (...and what should I do next?)
3 lectures 03:04

A quick summary of our time together, what we learned during the course.

Conclusion (...scared yet?)

In this video, you will receive a special thank you message from Jason with a special discount code to use on ANY of our other courses on Udemy!

BONUS LECTURE: What's next? (...deep discount on my Network+ course and more!)

In this video, you receive a very broad overview of the course in a fun, visually appealing promotional "course teaser" video. This is the same video students watched prior to enrolling in the course. If you enjoyed the course, please download the video and share with your friends!

Preview 01:15