Anatomy of a Cyber Attack: A beginner's course on hacking!
4.6 (128 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,728 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Anatomy of a Cyber Attack: A beginner's course on hacking! to your Wishlist.

Add to Wishlist

Anatomy of a Cyber Attack: A beginner's course on hacking!

Learn the attacker's methodology and how to start your career in the cyber security industry and penetration testing!
4.6 (128 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,728 students enrolled
Created by Jason Dion
Last updated 8/2017
Current price: $10 Original price: $195 Discount: 95% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 4 hours on-demand video
  • 2 Articles
  • 19 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand the steps of a cyber attack
  • Understand the basic methodology, tools, and techniques used by hackers in exploiting networks and systems
View Curriculum
  • You should have a PC or Mac with at least 4 GB of RAM in order to install the software used in this course.

Recently Updated on May 2017 with the EternalBlue & WannaCry Ransomware Exploit Labs against Windows 7/Server 2008 victims!

** Dissect the Threat! Understand the Importance of Cyber Security **

Your networks are facing a constant barrage of attacks by malicious actors: hackers, hacktivists, script kiddies, advanced persistent threats, and even nation states are all searching for footholds into networks around the globe. System administrators have always been the first line of defense in system security, and in this global cyber war your role has become increasingly important to the security our networks. As the lynchpin to network defense, it is imperative that system administrators understand the vulnerabilities and methodology employed by malicious cyber actors in order to assist in stopping cyber attacks.

In “The Anatomy of a Cyber Attack”, you will learn to dissect the techniques used by hackers in their exploitation of a network. From open-source research and reconnaissance to the exploitation and covering of their tracks, you will learn hands-on techniques to probe your network for vulnerabilities and understand how they are exploited. Taught by an expert in cybersecurity, you will learn to think like a hacker in order to thwart their future attacks on your networks.

A truly eye-opening experience into the world of cybersecurity, “The Anatomy of a Cyber Attack” is essential to understanding the landscape of today’s cyber threats.

What You Will Receive In The Course:

  • Video lectures that are fun, entertaining, and enlightening
  • Walkthrough of building your own penetration testing lab for use in the course
  • Labs for every step of the hacker methodology
    • You can watch the instructor to better understand the threat, or learn to conduct the attack yourself!
  • Practice questions to ensure mastery of each section of the course
  • A thorough foundation upon which to conduct further study or certification preparation
    • This course provides a great foundation upon which to begin your Certified Ethical Hacker (CEH) or penetration testing studies!

What This Course Is NOT:

  • Certified Ethical Hacker preparation course
  • IT Certification preparation course
  • Designed to provide a mastery of penetration testing techniques (but will give you a great introduction)

What Students Are Saying About This Course:

  • This is impressive, opened my eyes, and taught me skills necessary for my career. Thanks, Jason! Really good work! (Wayne, 5 stars)
  • I liked the simple and straight foreword explanation. Relatively short videos with a specific topic and making it clear. (Lami, 5 stars)
  • One of the best courses I have seen to integrate lecture with demo/labs. (Greg, 5 stars)

NOTE: This course is designed for all IT personnel and provides a great overview of the need for cyber security through hands-on examples of network and system exploitation. Beginners will be able to understand the concepts and enjoy the course, but may have some difficult in conducting the attacks themselves. A basic understanding of computers and computer networks is required to understand this course.

Who is the target audience?
  • This course is designed for all students who are interested in the cyber threat that exists in today's culture.
  • This course is a beginner/overview course for those interested in the penetration testing/hacking realm, or those just interested in learning how hackers are able to attack our networks and systems.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
37 Lectures
Welcome to "The Anatomy of a Cyber Attack"
7 Lectures 15:21

In this video, you will be introduced to your instructor, Jason Dion. We will discuss a quick overview of the course and the importance of cybersecurity in today's malicious cyber environment.

Preview 01:09

In this video, you will learn how to download and install VirtualBox in order to create a penetration testing lab. Also, you will understand why it is important to create our penetration testing lab in a safe, secluded virtual environment to ensure we don't run into trouble with the law.

Preview 02:10

This video shows students how to install Kali Linux in a virtual machine for use in our attack lab.

Installing Kali Linux (...our attack platform)

An important message from Jason on the course!

An Important Course Message

This video shows students how to install Windows in a virtual machine for use as a victim in our attack lab.

Installing Windows (…our first victim)

This video shows students how to install Metasploitable in a virtual machine for use as another

 victim in our attack lab.

Installing Metasploitable (...another victim for our amusement)

An assignment for you to take the time to build your Penetration Testing lab.

Create Your Own Lab Environment
Security (...and the threats to it)
2 Lectures 11:49

A discussion of the importance of Confidentiality, Integrity, and Availability in cyber security, and the tradeoff between operations and security, allowing a hacker to breach your networks and systems.

Preview 05:30

A look into the various types of hackers, crackers, and attackers in the hacking world, as well as the various tools and techniques that they utilize to accomplish their specific goals.

Preview 06:19

This quiz covers concepts from the CIA Triad and the Hackers, Crackers, and Attackers lessons.

Security (...and the threats to it)
5 questions
The Hacker Methodology (...a malicious mindset)
2 Lectures 07:48

A discussion of the Six Step Hacker's Methodology that will form the basis for our attacks throughout this course: (1) Performing Reconnaissance (2) Scanning and Enumeration (3) Gaining Access (4) Escalation of Privilege (5) Maintaining Access (6) Covering Tracks and Placing Backdoors.

Preview 05:13

This lecture provides a discussion of Ethical Hackers and how they have modified the Hacker's Methodology for their use in penetration testing. The discussion also provides the details of what to include in your "get out of jail free" letter as an ethical hacker.

Preview 02:35

Quiz covering the topics from The Hacker's Methodology and Ethical Hackers lectures.

The Hacker's Methodology (...a malicious mindset)
3 questions
Step 1: Reconnaissance (...I can see you but you can't see me)
3 Lectures 41:47

This is a lengthy discussion of the Reconnaissance Phase, including the tool that are utilized during this phase of the cyber attack. This includes Creepy, Discover, Maltego, Central Ops, and more!

Preview 17:17

In this hands-on lab video, students will learn the how to use Creepy, an open-source, cross-platform Geolocation tool to create a "pattern of life" on a victim location or person. During this lab, students will be provided with a sample Twitter user (TitanCipher) to work against in their reconnaissance.

Preview 11:07

In this hands-on lab video, students will learn the how to perform OSINT (Open-Source Intelligence) using CentralOps, a web-based service that allows us to collect lots of information on our victim organization and networks. During this lab, students will explore the information found through this tool and how it relates to performing reconnaissance to aid in a future cyber attack. 

Lab (...OSINT with CentralOps)
Step 2: Scanning and Enumeration (...poke, poke, poke)
3 Lectures 36:33

In this lecture, you will learn various tools, techniques, and theory to consider when performing the scanning and enumeration phase of the hacker's methodology. Next, we will put this theory into practice in our lab environment.

Scanning and Enumeration (...poke, poke, poke)

This video lecture introduces students to the importance of the Scanning and Enumeration Phase, as well as the tool Zenmap that we use to perform our scans. Also, this video shows students how to configure their virtual network properly in order to conduct the rest of the labs during this course.

Lab Introduction and Setup ('ve got to find the hole)

In this lab, we are going to use Zenmap and Nmap to scan the lab environment and find the open ports to conduct our enumeration on. Various scanning and enumeration techniques will be covered throughout this lesson.

Lab ('ve got to find the hole)
Step 3: Gaining Access (...finding my foothold)
8 Lectures 47:45

In this lecture, you will learn the various methods used during the gaining access phase, including a brief discussion of shellcode, buffer overflows, and unpatched software vulnerabilities. 

Gaining Access (...finding a foothold)

A brief introduction to the concept of Buffer Overflows, as well as a code review of a short program that we will create a buffer overflow in during our lab.

Buffer Overflows (...dissecting the exploit)

In this lab, we will create a buffer overflow to gain a Linux command shell by overflowing the buffer of a simple 20-line program. written in C.

Lab: Buffer Overflows (...dissecting the exploit)

An introduction to Bind and Reverser Shellcode, and its usage in gaining our foothold during the attack!

Introduction to Shellcode (...finding my foothold)

A breakdown of the MS08-067 Vulnerability and how we are going to exploit it in the lab environment using a reverse shell payload.

The MS08-067 Vulnerability (…aka, everyone’s first hack)

In this video lecture, students are shown just how easy it is to break into a Windows machine when you have done your Reconnaissance and Scanning/Enumeration Phases properly. Using the MS08-067 vulnerability, we will exploit a Windows workstation, gain system level rights, and prove that the attack was successful by leaving evidence of our successful penetration to a different user's desktop!

Lab: Exploiting Windows (...making it look easy)

An overview of the Meterpreter payload that is provided in the Metasploit Framework, its functions, and usage. This lesson provides the basics upon which we will expound in our lab environment.

Meterpreter (...a crowd favorite for payloads)

In this video lecture, students are introduced to Meterpreter and the powerful shell environment it provides us when we attack a system. Our target system for this exploitation will again be our Windows workstation, showing students the difference between the previous attack using the Reverse Shell and the new Meterpreter Shell inside Metasploit.

Lab (...give 'em an inch, they take a mile)
Step 4: Escalation of Privileges (...I've got the power)
2 Lectures 26:56

This lesson discusses the various tools used by attackers to crack passwords, gather SAM database hashes, and methods of circumventing password lockout security precautions.

Escalation of Privileges (...I've got the power)

In this lab, you will learn to do basic password cracking, migration between system processes and user process, and conduct keylogging of a victim machine in order to elevate your privileges on a given system.

Lab (...become super man without the fear of kryptonite)
Step 5: Maintaining Access (...hold on tight)
2 Lectures 18:02

In this lecture, you will learn more about the methods used to maintain access once you have gotten onto a victim system, including creating additional user accounts, stealing passwords, sniffing network traffic, installing keylogging, and more.

Maintaining Access (...hold on tight)

In this lab, you will learn how to maintain access on a victim machine by adding user accounts to the system, elevating them into the Administrators group, and manipulating the firewall to ensure you have continuous access to the victim in the future.

Lab (...spread out and grab on)
Step 6: Covering Tracks and Placing Backdoors (...dig in deep)
2 Lectures 17:31

In this lecture, you will learn more about the methods used to cover your tracks maintain access once you have gotten onto a victim system. This includes modifying and deleting log entries, hiding files and folders, installing backdoors, opening firewall ports, setting up callbacks from the victim machine, and more.

Covering Tracks and Placing Backdoors (...dig in deep)

In this lab, you will learn how to begin covering your tracks through the use of Alternate Data Streams on NTFS file systems (Windows targets) and installing backdoors through the scheduling features of Windows (the AT program). 

Lab (...hide in case the lights turn on)
Conclusion (...and what should I do next?)
4 Lectures 04:42

A quick summary of our time together, what we learned during the course.

Conclusion (...scared yet?)

In this bonus lecture, you will learn the 3 keys to success in cyber security and hacking. Also, I will provide you information of more resources to further your hacking career and a DEEP DISCOUNT on my other courses!

BONUS LECTURE: What's next? (...deep discount on my Network+ course and more!)

A message of congratulations on completing the course, and where to go from here!

BONUS: Congratulations and Where to Go From Here!

In this video, you receive a very broad overview of the course in a fun, visually appealing promotional "course teaser" video. This is the same video students watched prior to enrolling in the course. If you enjoyed the course, please download the video and share with your friends!

Preview 01:15
1 More Section
About the Instructor
Jason Dion
4.6 Average rating
549 Reviews
9,164 Students
6 Courses
Cybersecurity Expert (CISSP, CEH, Sec+, Net+, A+, ITIL v3)

Jason Dion, CISSP No. 349867, is a Adjunct Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, and Information Technology Infrastructure Library v3. With networking experience dating back to 1992, Jason has been a network engineer for the United States Navy Southern Command, served as the Deputy Director of the Theater Network Operations Center Middle East, and the Information Systems Officer for Navy Information Operations Command Maryland. He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance from University of Maryland University College, a Master’s of Arts and Religion in Pastoral Counseling, and a Bachelor’s of Science in Human Resources Management from New School University. He lives in the greater Washington D.C./Baltimore, Maryland area with his wife and two children.