Certified WhiteHat Hacker Level 1 ( CWHH Level 1)
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
This training focuses on providing the best knowledge to students about various issues related to Cyber Security and Information Security by giving them live demonstrations of various forms of Cyber Attacks. You will learn Ethical Hacking(Penetration testing, White Hat Hacking, Web Portal hacking.
White Hat Hacking has several names like web hacking, ethical hacking, penetration testing, web/network auditing. This is a introduction course, we have total 3 level of white hat hacking course.
Ethical Hacking/Pentesting is a demand of present era where most of our important tasks include cyber world. Everyone should learn ethical hacking. It is a process in which you learn to find and fix loop holes in an application, software, network, webportal, mobile apps. Company can take steps to secure their product or Network.
What will you get after completing the course?
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction|
|Section 2: Information Gathering.|
Information Gathering Theory
Information Gathering Practical
|Section 3: Password Cracking Techniques.|
Password Cracking Theory
Password Cracking Practical
Linux passwd cracking - John the ripper
|Section 4: Session Hijacking And Sniffing|
Session Hijacking Theory
Session Hijacking Using XSS
Session Hijacking Using Wireshark
|Section 5: Web Search Hacking.|
Google Hacking TheoryPreview
Google Hacking Practical
|Section 6: Deep Dark Web.|
Deep Dark Web
|Section 7: Sandboxing and Virtual Machines.|
Sandboxing and Virtual Machines PDFPreview
Sandboxie - Part 2
Virtual Machines Practical
Virtual Box - Introduction
Virtual Box - Part 2
|Section 8: Web Application Hacking Techniques.|
What is a Web Application ?Preview
Web Application Pentesting.
Sql Injection Theory
Sql Injection Practical
Click Jacking Theory
Click Jacking Practical
File Inclusion Theory
File Inclusion Practical (LFI)
File Inclusion Practical (RFI)
XSS Practical (Reflected)
XSS Practical (Stored)
|Section 9: Kali Basics|
Kali Basics TheoryPreview
Kali Basics Practical
|Section 10: Social Enginnering|
Phishing Practical Part 1Preview
Phishing Practical Part 2
|Section 11: Windows Hacking|
Windows Hacking Theory
Windows Hacking Practical (Konboot)
Windows Hacking Practical (Offline Windows Password & Registry Editor)
|Section 12: Intercepting Wifi with Mobile/Computer - ARP Poisoining|
Defending against ARP Poisoning(Wifi) on Windows MachinePreview
Defending against ARP Poisoning attack on Win Machine(XARP Tool)
Defending against ARP poisoning-WIFI attack(on Android Mobile)
|Section 13: Steganography|
Image Steganography Practical
Audio Steganography Practical
|Section 14: Quiz|
|Quiz 1||38 questions|
There are 38 questions, please answer atleast 30 to get selected for certification
Cyber Security and Privacy Foundation Pte Ltd. is a Consulting, Services & Training Company based in Singapore. We do Vulnerability Assessment, Penetration Testing, Web Application Security Testing, Mobile Application Security Testing and Cyber Security Training. We do zero day security assessment and APT analysis and technical security certifications for organisation.
Cyber Security & Privacy Foundation, India is setup with objective to do non commercial work. It has around 14000+ members and almost 9000+ students and CISO's of major companies on its board. We are involved in active research in field on cyber security, web portal security management, product research which is useful for all computer users.
J Prasanna : 20+ year full time experience in field of computer security. He has worked for anti virus companies & run my own consulting companies. He have worked on standards implementation, consulting, testing, handled team of security experts, coders & networking experts. Can provide value to any organization by thinking out of box,implementing ideas from conceptual stage. Great networking ability, have handled media relating to Cyber security issue on many occasions and good at training(both technical, non technical subjects). Taking ownership, delivering results, crisis management and cross functional skills are key strengths.
Specialties: Managing technical team, handling delivery & taking ownership of team. Virus analysis, Antivirus & Security products testing, Application security design & review, Secure enterprise architecture & design, ISO 27001 Standards implementation, Training. Presented in various CII conference on Cyber Security and Defense IT consultative committee(DITCC). He has Got numerous commendations from Indian army. He has done guest lecturing for various law enforcement and military academy in india.