Certified WhiteHat Hacker Level 1 ( CWHH Level 1)

Learn all topics on ethical hacking. Learn what others teach you about ethical hacking charging you so much money.
  • Lectures 53
  • Video 4 Hours
  • Skill level all level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

Course Description

This training focuses on providing the best knowledge to students about various issues related to Cyber Security and Information Security by giving them live demonstrations of various forms of Cyber Attacks. You will learn Ethical Hacking(Penetration testing, White Hat Hacking, Web Portal hacking.

White Hat Hacking has several names like web hacking, ethical hacking, penetration testing, web/network auditing. This is a introduction course, we have total 3 level of white hat hacking course.

Ethical Hacking/Pentesting is a demand of present era where most of our important tasks include cyber world. Everyone should learn ethical hacking. It is a process in which you learn to find and fix loop holes in an application, software, network, webportal, mobile apps. Company can take steps to secure their product or Network.

What will you get after completing the course?

  • Knowledge on Ethical Hacking, Webportal testing, network testing.
  • Huge Job opportunities with second highest pay in industry
  • Full practical Videos
  • You will get support from us on Udemy and on our facebook.

What are the requirements?

  • Computer with internet connectivity .

What am I going to get from this course?

  • Over 53 lectures and 3 hours of content!
  • Learn about cyber attacks
  • Ethical hacking
  • Network, webportal assessment
  • Web related vulnerability testing
  • penetration testing

What is the target audience?

  • IT professionals
  • Cyber Security professionals
  • CISO , IT managers
  • System/Network Admins
  • Students studying in college who like information security
  • Programmers

What you get with this course?

Not for you? No problem.
30 day money back guarantee

Forever yours.
Lifetime access

Learn on the go.
Desktop, iOS and Android

Get rewarded.
Certificate of completion

Curriculum

Section 1: Introduction
Introduction
Preview
03:18
Section 2: Information Gathering.
Information Gathering Theory
04:20
Information Gathering Practical
02:46
Section 3: Password Cracking Techniques.
Password Cracking Theory
03:31
Password Cracking Practical
01:35
Linux passwd cracking - John the ripper
01:54
Section 4: Session Hijacking And Sniffing
Session Hijacking Theory
03:17
Session Hijacking Using XSS
02:55
Session Hijacking Using Wireshark
05:39
Section 5: Web Search Hacking.
Google Hacking Theory
Preview
07:33
Google Hacking Practical
05:25
Shodan
02:50
Shodan Practical
02:44
Section 6: Deep Dark Web.
Deep Dark Web
05:36
Section 7: Sandboxing and Virtual Machines.
Sandboxing and Virtual Machines PDF
Preview
11 slides
Sandboxing
00:33
Sandboxing Practical
01:47
Sandboxie - Part 2
04:27
Virtual Machines
04:24
Virtual Machines Practical
01:54
Virtual Box - Introduction
05:58
Virtual Box - Part 2
02:20
Section 8: Web Application Hacking Techniques.
What is a Web Application ?
Preview
02:17
Web Application Pentesting.
01:43
Sql Injection Theory
04:24
Sql Injection Practical
02:34
CSRF Theory
03:46
CSRF Practical
03:55
Click Jacking Theory
03:29
Click Jacking Practical
02:20
File Inclusion Theory
03:39
File Inclusion Practical (LFI)
01:43
File Inclusion Practical (RFI)
01:48
XSS Theory
00:58
XSS Practical (Reflected)
01:49
XSS Practical (Stored)
01:59
Section 9: Kali Basics
Kali Basics Theory
Preview
03:23
Kali Basics Practical
05:01
Section 10: Social Enginnering
Social Engineering
06:46
Phishing Theory
03:54
Phishing Practical Part 1
Preview
03:38
Phishing Practical Part 2
02:18
Section 11: Windows Hacking
Windows Hacking Theory
03:59
Windows Hacking Practical (Konboot)
02:52
Windows Hacking Practical (Offline Windows Password & Registry Editor)
06:48
Section 12: Intercepting Wifi with Mobile/Computer - ARP Poisoining
Intercepting WIFI
02:17
Defending against ARP Poisoning(Wifi) on Windows Machine
Preview
04:13
Defending against ARP Poisoning attack on Win Machine(XARP Tool)
03:14
Defending against ARP poisoning-WIFI attack(on Android Mobile)
04:18
Section 13: Steganography
Steganography Theory
06:22
Image Steganography Practical
01:40
Audio Steganography Practical
03:15
Conclusion
01:45
Section 14: Quiz
Certified White Hat Hacker Level 1 basic
38 questions

Instructor Biography

Cyber Security & Privacy Foundation Pte Ltd , Cyber Security & Privacy Foundation Pte Ltd

Cyber Security and Privacy Foundation Pte Ltd. is a Consulting, Services & Training Company based in Singapore. We do Vulnerability Assessment, Penetration Testing, Web Application Security Testing, Mobile Application Security Testing and Cyber Security Training. We do zero day security assessment and APT analysis and technical security certifications for organisation.

Cyber Security & Privacy Foundation, India is setup with objective to do non commercial work. It has around 9600+ members and almost 7400+ students and CISO's of major companies on its board. We are involved in active research in field on cyber security, web portal security management, product research which is useful for all computer users.

J Prasanna : 18+ year full time experience in field of computer security. He has worked for anti virus companies & run my own consulting companies. He have worked on standards implementation, consulting, testing, handled team of security experts, coders & networking experts. Can provide value to any organization by thinking out of box,implementing ideas from conceptual stage. Great networking ability, have handled media relating to Cyber security issue on many occasions and good at training(both technical, non technical subjects). Taking ownership, delivering results, crisis management and cross functional skills are key strengths.

Specialties: Managing technical team, handling delivery & taking ownership of team. Virus analysis, Antivirus & Security products testing, Application security design & review, Secure enterprise architecture & design, ISO 27001 Standards implementation, Training. Presented in various CII conference on Cyber Security and Defense IT consultative committee(DITCC). He has Got numerous commendations from Indian army. He has done guest lecturing for various law enforcement and military academy in india.

Mr Nikhil is a 21 year old one of the youngest Cyber Security Researchers of India. He was one of the key speakers at DEFCON Bangalore Meet where he presented his research paper on Credit Card Frauds. He has helped various companies such as DELL, TechCrunch, Apple, Microsoft, Google, Adobe, Barracuda Networks, Engine Yard, etc. in improving their Network Security. He has been listed and acknowledged in various “HALL OF FAMES" of various including Microsoft.

Mr. Sabari Selvan is a Sr. Security Researcher with CSPF. His core skills are in all areas of security both at web, network level. He is also the Editor-in-Chief of the famous E-magazine “E HACKING NEWS" (one of India's Leading IT Security Portal). He has an experience of more than 4 years in the field of Cyber Security. He has discovered security flaws in various high profile websites including Nokia, AT&T, Microsoft and most recently on Apple.

Mr. Suriya Prakash has been in the security field for more than three years. He has exposed and helped fix vulnerabilities in lots of high profile websites. He has done research into malware , particularly he predicted the raise of TOR based botnets and showed how they work before major antivirus vendors where even aware of them. He has found important privacy violation bugs on facebook and is on their hall of fame.

Join the biggest student community

7,000,000

Hours of video content

26,000,000

Course Enrollments

7,100,000

Students

Reviews

Average Rating
4.3
Details
  1. 5 Stars
    27
  2. 4 Stars
    7
  3. 3 Stars
    3
  4. 2 Stars
    1
  5. 1 Stars
    3
    • Auditz

    good course for me

    good course for me

    • Julie Cashin Oster

    Excellent!

    Found this course very informative and engaging. Was delivered well. Excellent resources.

    • Voislav Vasiljevski

    Nice basic course

    • Rizwan Bin Sulaiman

    Just i can say awesome

    Learnt many thinks ! I can't explain in this such little space

    • Patrick Cormeau

    Good introduction to general knowledge used in pentesting

    If the start was a bit basic IT level knowledge, the rest of the course introduce a vairous technique and tools used in hacking and pentesting. The course does not go in deep knowledge of the tools but present the bases required to go deeper in the subject. Dont let the sometime bad sound quality or the accent of the instructor stop you. The quality of the content will let you forget these small problems.

Show more reviews
Ready to start learning?
Preview this course