Certified WhiteHat Hacker Level 1

Learn all topics on ethical hacking. Learn what others teach you about ethical hacking charging you so much money.
26 reviews
TAUGHT BY
  • Cyber Security & Privacy Foundation Cyber Security & Privacy Foundation Pte Ltd

    Cyber Security and Privacy Foundation Pte Ltd. is a Consulting, Services & Training Company based in Singapore. Cyber Security and Privacy Foundation Pte Ltd has non profit foundation Cyber Security and Privacy Foundation operating in India.

    Cyber Security & Privacy Foundation(CSPF) is a non profit foundation operating in India. It has around 6300+ members and almost 6200+ students and CISO's of major companies on its board. We are dedicated to provide subsidized training on computer security to all. We are involved in active research in field on cyber security, web portal security management, product research.

    J Prasanna : 18+ year full time experience in field of computer security. He has worked for anti virus companies & run my own consulting companies. He have worked on standards implementation, consulting, testing, handled team of security experts, coders & networking experts. Can provide value to any organization by thinking out of box,implementing ideas from conceptual stage. Great networking ability, have handled media relating to Cyber security issue on many occasions and good at training(both technical, non technical subjects). Taking ownership, delivering results, crisis management and cross functional skills are key strengths.

    Specialties: Managing technical team, handling delivery & taking ownership of team. Virus analysis, Antivirus & Security products testing, Application security design & review, Secure enterprise architecture & design, ISO 27001 Standards implementation, Training. Presented in various CII conference on Cyber Security and Defense IT consultative committee(DITCC). He has Got numerous commendations from Indian army. He has done guest lecturing for various law enforcement and military academy in india.

    Mr Nikhil is a 21 year old one of the youngest Cyber Security Researchers of India. He was one of the key speakers at DEFCON Bangalore Meet where he presented his research paper on Credit Card Frauds. He has helped various companies such as DELL, TechCrunch, Apple, Microsoft, Google, Adobe, Barracuda Networks, Engine Yard, etc. in improving their Network Security. He has been listed and acknowledged in various “HALL OF FAMES” of various including Microsoft.

    Mr. Sabari Selvan is a Sr. Security Researcher with CSPF. His core skills are in all areas of security both at web, network level. He is also the Editor-in-Chief of the famous E-magazine “E HACKING NEWS” (one of India’s Leading IT Security Portal). He has an experience of more than 4 years in the field of Cyber Security. He has discovered security flaws in various high profile websites including Nokia, AT&T, Microsoft and most recently on Apple.

    Mr. Suriya Prakash has been in the security field for more than three years. He has exposed and helped fix vulnerabilities in lots of high profile websites. He has done research into malware , particularly he predicted the raise of TOR based botnets and showed how they work before major antivirus vendors where even aware of them. He has found important privacy violation bugs on facebook and is on their hall of fame.

WHAT'S INSIDE
  • Lifetime access to 44 lectures and 1 quizzes
  • 2+ hours of high quality content
  • A community of 3600+ students learning together!
  • 100+ discussions
SHARE

Certified WhiteHat Hacker Level 1

Learn all topics on ethical hacking. Learn what others teach you about ethical hacking charging you so much money.
26 reviews

HOW UDEMY WORKS?

Discover courses made by experts from around the world.

Take your courses with you and learn anytime, anywhere.

Learn and practice real-world skills and achieve your goals.

COURSE DESCRIPTION

This training focuses on providing the best knowledge to students about various issues related to Cyber Security and Information Security by giving them live demonstrations of various forms of Cyber Attacks. You will learn Ethical Hacking(Penetration testing, White Hat Hacking, Web Portal hacking.

White Hat Hacking has several names like web hacking, ethical hacking, penetration testing, web/network auditing. This is a introduction course, we have total 3 level of white hat hacking course.

Ethical Hacking/Pentesting is a demand of present era where most of our important tasks include cyber world. Everyone should learn ethical hacking. It is a process in which you learn to find and fix loop holes in an application, software, network, webportal, mobile apps. Company can take steps to secure their product or Network.

What will you get after completing the course?

  • Knowledge on Ethical Hacking, Webportal testing, network testing.
  • Huge Job opportunities with second highest pay in industry
  • Full practical Videos
  • You will get support from us on Udemy and on our facebook.
    • Computer with internet connectivity .
    • Over 44 lectures and 2.5 hours of content!
    • Learn about cyber attacks
    • Ethical hacking
    • Network, webportal assessment
    • Web related vulnerability testing
    • penetration testing
    • IT professionals
    • Cyber Security professionals
    • CISO , IT managers
    • System/Network Admins
    • Students studying in college who like information security
    • Programmers

THE UDEMY GUARANTEE

30 day money back guarantee
Lifetime access
Available on Desktop, iOs and Android
Certificate of completion

CURRICULUM

  • SECTION 1:
    Introduction
  • 1
    Introduction
    03:18
  • SECTION 2:
    Information Gathering.
  • 2
    Information Gathering Theory
    04:20
  • 3
    Information Gathering Practical
    02:46
  • SECTION 3:
    Password Cracking Techniques.
  • 4
    Password Cracking Theory
    03:31
  • 5
    Password Cracking Practical
    01:35
  • SECTION 4:
    Session Hijacking And Sniffing
  • 6
    Session Hijacking Theory
    03:17
  • 7
    Session Hijacking Using XSS
    02:55
  • 8
    Session Hijacking Using Wireshark
    05:39
  • SECTION 5:
    Web Search Hacking.
  • 9
    Google Hacking Theory
    07:33
  • 10
    Google Hacking Practical
    05:25
  • 11
    Shodan
    02:50
  • 12
    Shodan Practical
    02:44
  • SECTION 6:
    Deep Dark Web.
  • 13
    Deep Dark Web
    05:36
  • SECTION 7:
    Sandboxing and Virtual Machines.
  • 14
    Sandboxing and Virtual Machines PDF
    11 slides
  • 15
    Sandboxing
    00:33
  • 16
    Sandboxing Practical
    01:47
  • 17
    Virtual Machines
    04:24
  • 18
    Virtual Machines Practical
    01:54
  • SECTION 8:
    Web Application Hacking Techniques.
  • 19
    What is a Web Application ?
    02:17
  • 20
    Web Application Pentesting.
    01:43
  • 21
    Sql Injection Theory
    04:24
  • 22
    Sql Injection Practical
    02:34
  • 23
    CSRF Theory
    03:46
  • 24
    CSRF Practical
    03:55
  • 25
    Click Jacking Theory
    03:29
  • 26
    Click Jacking Practical
    02:20
  • 27
    File Inclusion Theory
    03:39
  • 28
    File Inclusion Practical (LFI)
    01:43
  • 29
    File Inclusion Practical (RFI)
    01:48
  • 30
    XSS Theory
    00:58
  • 31
    XSS Practical (Reflected)
    01:49
  • 32
    XSS Practical (Stored)
    01:59
  • SECTION 9:
    Kali Basics
  • 33
    Kali Basics Theory
    03:23
  • 34
    Kali Basics Practical
    05:01
  • SECTION 10:
    Social Enginnering
  • 35
    Social Engineering
    06:46
  • 36
    Phishing Theory
    03:54
  • 37
    Phishing Practical Part 1
    03:38
  • 38
    Phishing Practical Part 2
    02:18
  • SECTION 11:
    Windows Hacking
  • 39
    Windows Hacking Theory
    03:59
  • 40
    Windows Hacking Practical (Konboot)
    02:52
  • 41
    Windows Hacking Practical (Offline Windows Password & Registry Editor)
    06:48
  • SECTION 12:
    Steganography
  • 42
    Steganography Theory
    06:22
  • 43
    Image Steganography Practical
    01:40
  • 44
    Audio Steganography Practical
    03:15
  • SECTION 13:
    Quiz
  • 45
    Certified White Hat Hacker Level 1 basic
    38 questions

UDEMY BY THE NUMBERS

5,200,000
Hours of video content
19,000,000
Course Enrollments
5,800,000
Students

RATING

  • 19
  • 3
  • 0
  • 1
  • 3
AVERAGE RATING
NUMBER OF RATINGS
26

REVIEWS

  • John Coyle
    Excellent Course with an excellent Tutor

    Well, I have taken several of these courses and am Qualified COMPTIAA+....AND I FIND IT AN EXCELLENT COURSE WITH AN EXCELLENT TUTOR. Of course the lecturer uses Virtual Box System to practice on---and---he expects us all to have the common sense to do the same, as it would be foolish to use wireshark etc on your own system. I say again the lecturer expects us to have the common sense to understand that, an I do. It is an excellent course with an excellent tutor.

  • Darryl Christensen
    Meh

    If you've done any basic reading or researching on pen testing or hacking do not take this course. If you know nothing at all about either of those two subjects, this course will give you a good high level of terminology and tools available.

  • Blake Alderfer
    Great Starting point

    Excellent place to start. Affordable, videos are quick concise and informative. Great for a introductory overview to the different strategies and attacks used in White hat hacking and Pentesting. I plan to take more courses from CSPF! Thank you for a great experience!

  • Rohini
    Best course

    i really like this course. This course is not for dumb people who don't even know how to install windows and Linux.

  • Manny Hernandez
    Lots of Demos - Poor explanations. No clear instructions.

    The biggest problem that I had is that the instructor would zip through a number of demos with a general assumption that you can read his thoughts, or the assumption that you have the tools and scripts. The frustrating part is that the presenter does not explain why certain things are important, or what relevance certain pieces of information have. I would NOT recommend this course for people that operate in Windows, or people that are not familiar with Linux.

  • 30 day money back guarantee!
  • Lifetime Access. No Limits!
  • Mobile Accessibility
  • Certificate of Completion
MORE FROM Cyber Security & Privacy Foundation