Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
This training focuses on providing the best knowledge to students about various issues related to Cyber Security and Information Security by giving them live demonstrations of various forms of Cyber Attacks. You will learn Ethical Hacking(Penetration testing, White Hat Hacking, Web Portal hacking.
White Hat Hacking has several names like web hacking, ethical hacking, penetration testing, web/network auditing. This is a introduction course, we have total 3 level of white hat hacking course.
Ethical Hacking/Pentesting is a demand of present era where most of our important tasks include cyber world. Everyone should learn ethical hacking. It is a process in which you learn to find and fix loop holes in an application, software, network, webportal, mobile apps. Company can take steps to secure their product or Network.
What will you get after completing the course?
Not for you? No problem.
30 day money back guarantee
Learn on the go.
Desktop, iOS and Android
Certificate of completion
|Section 1: Introduction|
|Section 2: Information Gathering.|
Information Gathering TheoryPreview
Information Gathering Practical
|Section 3: Password Cracking Techniques.|
Password Cracking TheoryPreview
Password Cracking Practical
Linux passwd cracking - John the ripper
|Section 4: Session Hijacking And Sniffing|
Session Hijacking Theory
Session Hijacking Using XSS
Session Hijacking Using Wireshark
|Section 5: Web Search Hacking.|
Google Hacking TheoryPreview
Google Hacking Practical
|Section 6: Deep Dark Web.|
Deep Dark Web
|Section 7: Sandboxing and Virtual Machines.|
Sandboxing and Virtual Machines PDFPreview
Sandboxie - Part 2
Virtual Machines Practical
Virtual Box - Introduction
Virtual Box - Part 2
|Section 8: Web Application Hacking Techniques.|
What is a Web Application ?Preview
Web Application Pentesting.Preview
Sql Injection Theory
Sql Injection Practical
Click Jacking Theory
Click Jacking Practical
File Inclusion Theory
File Inclusion Practical (LFI)
File Inclusion Practical (RFI)
XSS Practical (Reflected)
XSS Practical (Stored)
|Section 9: Kali Basics|
Kali Basics TheoryPreview
Kali Basics Practical
|Section 10: Social Enginnering|
Phishing Practical Part 1Preview
Phishing Practical Part 2
|Section 11: Windows Hacking|
Windows Hacking Theory
Windows Hacking Practical (Konboot)
Windows Hacking Practical (Offline Windows Password & Registry Editor)
|Section 12: Intercepting Wifi with Mobile/Computer - ARP Poisoining|
Defending against ARP Poisoning(Wifi) on Windows MachinePreview
Defending against ARP Poisoning attack on Win Machine(XARP Tool)
Defending against ARP poisoning-WIFI attack(on Android Mobile)
|Section 13: Steganography|
Image Steganography Practical
Audio Steganography Practical
|Section 14: Quiz|
Certified White Hat Hacker Level 1 basic
Cyber Security and Privacy Foundation Pte Ltd. is a Consulting, Services & Training Company based in Singapore. We do Vulnerability Assessment, Penetration Testing, Web Application Security Testing, Mobile Application Security Testing and Cyber Security Training. We do zero day security assessment and APT analysis and technical security certifications for organisation.
Cyber Security & Privacy Foundation, India is setup with objective to do non commercial work. It has around 8000+ members and almost 7300+ students and CISO's of major companies on its board. We are involved in active research in field on cyber security, web portal security management, product research which is useful for all computer users.
J Prasanna : 18+ year full time experience in field of computer security. He has worked for anti virus companies & run my own consulting companies. He have worked on standards implementation, consulting, testing, handled team of security experts, coders & networking experts. Can provide value to any organization by thinking out of box,implementing ideas from conceptual stage. Great networking ability, have handled media relating to Cyber security issue on many occasions and good at training(both technical, non technical subjects). Taking ownership, delivering results, crisis management and cross functional skills are key strengths.
Specialties: Managing technical team, handling delivery & taking ownership of team. Virus analysis, Antivirus & Security products testing, Application security design & review, Secure enterprise architecture & design, ISO 27001 Standards implementation, Training. Presented in various CII conference on Cyber Security and Defense IT consultative committee(DITCC). He has Got numerous commendations from Indian army. He has done guest lecturing for various law enforcement and military academy in india.
Mr Nikhil is a 21 year old one of the youngest Cyber Security Researchers of India. He was one of the key speakers at DEFCON Bangalore Meet where he presented his research paper on Credit Card Frauds. He has helped various companies such as DELL, TechCrunch, Apple, Microsoft, Google, Adobe, Barracuda Networks, Engine Yard, etc. in improving their Network Security. He has been listed and acknowledged in various “HALL OF FAMES" of various including Microsoft.
Mr. Sabari Selvan is a Sr. Security Researcher with CSPF. His core skills are in all areas of security both at web, network level. He is also the Editor-in-Chief of the famous E-magazine “E HACKING NEWS" (one of India's Leading IT Security Portal). He has an experience of more than 4 years in the field of Cyber Security. He has discovered security flaws in various high profile websites including Nokia, AT&T, Microsoft and most recently on Apple.
Mr. Suriya Prakash has been in the security field for more than three years. He has exposed and helped fix vulnerabilities in lots of high profile websites. He has done research into malware , particularly he predicted the raise of TOR based botnets and showed how they work before major antivirus vendors where even aware of them. He has found important privacy violation bugs on facebook and is on their hall of fame.
Hours of video content