Fundamentals of Computer Hacking
4.3 (122 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
5,967 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Fundamentals of Computer Hacking to your Wishlist.

Add to Wishlist

Fundamentals of Computer Hacking

Everyone can become a hacker provided they learn it from the basics and build a solid foundation. Start with this course
4.3 (122 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
5,967 students enrolled
Created by infySEC Global
Last updated 8/2017
English
Price: Free
Includes:
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • At the end of your course, students will understand the logic and basics of computer hacking
View Curriculum
Requirements
  • Basic IT Skills
Description

This Course is the fundamental course on Ethical Hacking which delivers knowledge of real time attack vectors and defensive methods. This course has been designed by group of globally recognized Information Security Professionals to meet the participant and organization expectations. For easy understanding for the participants , LIVE practical demonstration on the appropriate full fledged courses.

This course delivers comprehensive deep understanding of how attacker’s works in dark and methodology they follow to deface a network. In other hand, how the Information Security Professionals working in an organization identifies these methodologies and deface attackers.

This course will give a idea to know how our other full courses will be like.

Who is the target audience?
  • Anybody who is interested in learning ethical hacking / penetration testing
  • Anybody who wants to learn how hackers would attack their computer systems
  • Anybody who wants to learn how to secure their systems from hacker
Students Who Viewed This Course Also Viewed
Curriculum For This Course
49 Lectures
01:49:38
+
INTRODUCTION TO HACKING AND SECURITY
11 Lectures 17:56

This lecture sets the expectation of this course.

Introduction
00:28

This lecture briefs about "Information" from a layman perspective.

What is Information
01:04

This lecture deals with classification of data and need for Information security.

What is Data
01:58

Having seen the need for information security from the previous lecture, this lecture details about "what information security is ?" and briefs about the co-relation between Threat and Vulnerability.

Why to Secure
01:53

This lecture deals with threat classification and its source.

What are Threats
02:51

This lecture gives an overview on classification of hacker and their types.

Types of Hackers
01:05

This lecture explains about the elements of information security such as Confidentiality,Integrity and Availability (CIA triad). This also includes Authentication and Non-repudiation.

What is a security breach
02:25

This lecture details about RISK and its classification. This lecture also detail with the list of available Information security Standards and Compliance.

What is Risk and Risk Assessment
02:25

This lecture is an introduction to Hacking and its phases.

What is Hacking
00:53

In short, this lecture is the blueprint of this course.

Overall Course Map
02:00

This lecture explains how countermeasures of hacking are dealt in this course.

Defending and countermeasures
00:54
+
Malwares
8 Lectures 11:17
Introduction to Malware
02:04

Objective and Outcome
00:39

Virus - Introduction
01:33

Life Cycle of Virus
02:02

Worms - Introduction
01:04

Trojan - Introduction
01:55

Backdoor - Introduction
00:55

Anti Virus
01:05
+
Information Gathering
7 Lectures 12:13
Objectives and Outcome
01:03

Introduction
01:03

Masking Identity
01:08

SSH Tunnelling
03:38

Social Profiling of Individual
03:02

Career Profiling
01:13

Email Address Harvesting
01:06
+
Network Hacking
7 Lectures 27:14
Objective and Outcome
00:43

Network Basics
16:20

Network Hacking - Introduction
01:52

MAC spoofing
00:56

MAC spoofing - Exercise
00:53

Caffee Latte attack
03:13

WPA Hacking - Protocol
03:17
+
System Hacking
8 Lectures 10:54
Objective and Outcome
00:33

Introduction
00:58

System Basics
00:29

Powering the system
01:49

Processor - Basics
02:24

Password Cracking
00:57

Steganography
02:44

Game Hacking
01:00
+
Web Hacking
5 Lectures 26:03
Objective and Outcome
00:28

Web Basics
10:24

Phishing - Localhost and Server
04:49

Exercise clip - Phishing - Local Host
03:36

SQL Basics
06:46
+
Advanced Web-Hacking
3 Lectures 04:01
Objective and Outcome
00:28

The method of sending fraudulent emails, probing people to disclose sensitive data such as user credentials, financial information etc., is called Phishing. This lecture explains how this can be done via the Full Screen API technique.

Phishing - Full Screen API
02:31

A step-by-step approach on how to perform Phishing via Full Screen API.

Exercise clip - Phishing - Full Screen API
01:02
About the Instructor
infySEC Global
4.3 Average rating
654 Reviews
8,741 Students
8 Courses
Head - Cyber Security Research

I head the academia and industry relations in  infySEC. I am also the director at infySEC .Early from the late 90's, I have been always passionate about computer, espically games which eventually had got interest to learn how computers work, such as application , debugging, disassembling, compiling,etc., with time, the same interest got towards networking, like how packets communicate, how data gets transferred,bandwidth , then got lil into wireless and eventually turning back prooved me i was not anywhere but a lovely apt domain called 'Security', i feel i have been travelling in a very interesting path from where i have started, i would certainly urge everyone of us to try it experience it, its not jus the knowledge but its fun, and yea for me i have miles to go myself.

After 14 years I have turned to focus my efforts on training how attackers hack systems and also started to help them understand how to secure ourselves against such attacks. I decided to teach all that i have learnt over the period of 15 years in form of few videos, which effectively means i teach all that 15 years to you in a week...  My instruction is very actionable with live demos and hands on, Also i share lab exercises which will enable you not just to read but impliment what you have learnt, I want students to take the knowledge they gain and start using it to make money or do what they choose to do with it (ofcourse only ethical ones). 

In 2013, I along with my team at infySEC, stuck the World Record for conducting the largest and longest ethical hacking Marathon with over 9000+ participants assembled in one location, check us on youtube for reference.

My expectations soon after my graduation about IT company's were shattered :D , afterall they say, you are what your company is.My fellow colleagues and team mates were working for money, i was desperate and searching for some like minded in computers, but again, its been 5 yrs i have been working for Multi national companies, and now i have got full time freelancing, afterall there is no one to question your time restriction of work, domain of work, etc..,You are master of your fate, and captain of your soul.... Live the life you have imagined :D

You will find my teaching style is well liked by my students and they are always looking for new and exciting courses from me.

Harry The Boss - Rating: 5 out of 5
I highly recommend infysec to everyone.I joined the training with absolutely no prior experience in ethical hacking....When I attended a training..It was revelation..The fluidity and crisp and clear understanding of trainer was showing...No jargons.  In fact he made a very complex phenomenon very simple to comprehend. I gained much more than expectations.... The trainer was master in his subject knowledge...With answers to any questions shooting at him....

Stacie Stalcup - Rating: 5 out of 5
I enjoy the animation. No matter what computer course Infysec offers, I will most likely take it because of how the subject matter is taught and presented. We aren't forced to look at someone reading powerpoints or watching someone talking into the camera which makes me sleepy and becomes boring. There is no dull PowerPoint here; Instead, InfySEC animates the techniques and after the lessons provide step by step exercises. I wish all Udemy classes were taught this way.

Dominik Koszkul - Rating: 5 out of 5
This course quickly shows what are dangers in web. Great for beginners to realize how to write the web applications and secure the servers against attackers

Raymundo Torres - Rating: 5 out of 5
This instruction video was great. Just stuck to the material and explained it thoroughly with visual images and examples. This video inspired me to start a smalll training program for my fellow colleagues. Thanks!

Diana Carolina Gómez  - Rating: 5 out of 5
Because the explanations have simple examples and close to reality. This helps to recognize and understand the content of the course easier.

Miteshkumar Joshi -  Rating: 5 out of 5
Having some knowledge on HTTP, this course is suitable for me and clearly defines some areas where I was findling it diffculty.

Come , lets togather make the world a secure place to live in !