You've likely heard about hacking—perhaps in movies or on the news—and you've certainly taken steps to protect your online identity from hackers. But what is hacking, who does it, and why? In this comprehensive course on the fundamentals of web hacking, answer these questions and more. Begin by reviewing the hacker methodology, types of hack attacks, and learn to configure test servers to hack yourself! Finally, review network mapping, and think through potential careers in cyber security.
This introductory video will teach students: what is a hacker? After watching this video, you will know what a hacker is, what a hacker is not, and what you can do to start learning.
The hacker methodology follows the stages of the kill chain as developed by Lockheed Martin. When ethical hackers begin training, they follow this methodology to ensure they are thorough. In this lesson you'll learn about the hacker methodology and each stage of the kill chain.
You will be building your vulnerable servers and performing your attacks using the Kali linux distribution. In this lesson I will walk you through the installation of this distro.
In this lesson we will install Webgoat, a vulnerable web server. By installing Webgoat, you will start learning introductory security attacks. Because hacking outside networks is illegal, throughout this course we will hack into our own servers. This lesson builds one of the two servers we will be hacking into.
The first stage of ethical hacking to to perform recon. In this lesson I'll walk you through a tried-and-true method for scanning networks. This activity helps you plan your attack and gain useful insight into your target.
In this lesson we introduce poorly formed SQL database attacks. When modern web applications pull data from SQL databases, if poorly written they can be vulnerable to attack. This lesson introduces you to that concept.
In this lesson I'll walk you through a cross-site scripting attack. This is how you can use a hacked website to infect others with your malware. It's an exciting concept.
When hackers are able to download hashed usernames and passwords, they are then able to run dictionary or brute-force attacks against those passwords. In this lesson I'll show how a poorly secured wordpress site lets people actively run a brute force attack against the users passwords.
We need people like you in a cyber security career. Yes, we need ethical hackers, but also non-technical or non-hacker-types who are interested in cyber security. Let me help you get into this exciting career.
I've been a test prep and admissions tutors since 2003. I have also been a cyber security consultant since 2014. I started as an SAT and GMAT tutor with Princeton Review. Whilst in uni, I tutored students. I then became director of operations for the Princeton Review in Texas and Thailand. After Princeton Review, I was senior course director for Prep Zone Singapore, wherein I developed a system of instruction that guarantees non-native English speakers excellent SAT marks.
All of my courses are affordable.
They are also affordable. Why? Because test preparation is inherently unfair. If you have thousands of dollars, you can hire someone like me to sit in your living room and walk you through the lessons. That will always be true. But the information... the strategies, tactics, and knowledge... those should NOT be super expensive.
These courses teach you all you need and afford you the opportunity to ask questions. Take advantage of these in your training and you will do exceptionally well on your exams.