Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Emotional Intelligence CBT
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Data Science
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Computer and Network Hacking Mastery: Practical Techniques

Ethical Hacking Unleashed! How to Get to Know Proven Hacking Techniques... Fast
Rating: 4.3 out of 54.3 (182 ratings)
4,765 students
Created by Hacking School, IT Security Academy
Last updated 11/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • various ethical hacking techniques
  • IT security essentials
  • both *nix and MS Windows systems

Requirements

  • intermediate IT skills
  • *nix systems
  • basics of bash
  • open mind

Description

LAST UPDATED: 11/2020

Do you want to learn real-world hacking techniques but don’t know where to start? This is your chance. This course covers security loopholes and techniques to broaden your knowledge of security systems. Anyone who’s interested in ethical hacking or security systems can benefit from this welcoming hacking community and in-depth course. 

Learn To Implement Security Hacking Techniques from The Pros  

  • Intercept Information in a Network with SSL Encryption

  • Find the Vulnerable Spots of a Website or an Application

  • Secure Your Passwords

  • Recognize a Remote Operating System Using Fingerprinting Methods

IT Security Experts Teach You How to be an Ethical Hacker
Certified hackers are given free reign when it comes to identifying and getting rid of security threats. They are encouraged by clients to use all known malicious hacking techniques, so that the computer or computer network in question can be best protected against criminal hacking attempts. 

Content and Overview
 
In 11 hours of content, this course will cover the ins-and-outs of ethical hacking. To get the most out of this course, you should be familiar with programming and scripting language. 

Most videos are accompanied by documents, so you’ll walk away with a hacking textbook to accompany your studies. You’ll learn how to protect your network and system against major hacker threats: 

  • Recover lost passwords and intercept information.

  • Obstruct encrypted data and attack SSL sessions as well as how to hide files using kernel modules.

  • How to handle overflow attacks and recognize remote attacks.

  • Identify application attacks, like string attacks and overwriting.

  • Build network security and exploiting the ICMP protocol.

  • Identify the operating system, netfilter and security systems.

  • Secure your own system with scanners, detection and patches.

  • Prepare for attacks on operating systems: Entering via back door stealth attacks, kernel-level errors, and shellcodes.

After taking this course, you will have the required information, training materials and professional practice environment to implement proven hacking techniques. You’ll possess the tools necessary to test the security and vulnerability of your own computer or computer system, and you will have the required information, training materials, community, and professional practice environment to implement proven hacking techniques. 

If you are a beginner, don't worry. You will understand all the techniques during your training. 

Ready to join us? 

We heartily invite you to join our community. You are welcome here. We will teach you the proven hacking techniques and we will provide you with all the required information, training materials and professional practice environment. 

 We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the Hacking School training is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, we will give you full refund. No questions asked. Does it seem fair to you? 


We wish you the best,
Andrew Harper || Hacking School Team 

Who this course is for:

  • every student interested in hacking
  • app / web developers
  • IT security professionals
  • hackers and hacker wannabes

Course content

13 sections • 49 lectures • 11h 14m total length

  • Welcome to the course
    00:05
  • Table of contents
    7 pages
  • Who are hackers? Introduction to Hacking School training
    8 pages
  • Legal information
    6 pages

  • Get the Hacking School Training Operating System
    03:20

  • Recovering lost passwords
    10 pages

  • Interception of information
    13 pages
  • Preview09:45
  • Interception of encrypted data, attacks on SSL sessions
    6 pages
  • Preview08:07
  • Hiding files using kernel modules
    22 pages
  • Hiding files using kernel modules - Training Video
    05:16

  • Buffer overflow attacks
    26 pages
  • Buffer overflow attacks - Training Video
    08:11
  • Practical examples of remote attacks
    20 pages
  • Practical examples of remote attacks - Training Video
    15:24
  • Heap overflow attacks
    14 pages
  • Heap overflow attacks - Training Video
    07:26

  • Format string attacks
    26 pages
  • Format string attacks - Training Video
    17:51
  • Practical examples of format string attacks
    18 pages
  • Practical examples of format string attacks - Training Video
    10:08
  • File stream pointer overwrite attacks
    22 pages
  • File stream pointer overwrite attacks - Training Video
    08:35

  • Exploiting the ICMP protocol
    30 pages
  • Exploiting the ICMP protocol - Training Video
    09:07
  • Remote identification of the operating system
    20 pages
  • Remote identification of the operating system - Training Video
    13:44
  • Netfilter and system security services
    22 pages
  • Netfilter and system security services - Training Video
    12:22

  • Securing the system step by step
    12 pages
  • Securing the system step by step - Training Video
    08:24
  • Security scanners
    26 pages
  • Security scanners - Training Video
    20:31
  • Improving security with patches
    30 pages
  • Improving security with patches - Training Video
    15:32
  • Intrusion detection systems
    16 pages
  • Intrusion detection systems - Training Video
    07:10

  • Errors on the system kernel level
    26 pages
  • Errors on the system kernel level - Training Video
    08:12
  • Entering the system by the backdoor
    8 pages
  • Entering the system by the backdoor - Training Video
    05:31
  • Creating shellcodes in the Win32 environment
    34 pages

  • Attacking a web server
    22 pages
  • Attacking a web server - Training Video
    16:21

Instructors

Hacking School
IT Security Experts - We turn beginners into professionals.
Hacking School
  • 4.0 Instructor Rating
  • 8,969 Reviews
  • 173,100 Students
  • 17 Courses

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

IT Security Academy
IT Security Certified Professional
IT Security Academy
  • 4.0 Instructor Rating
  • 8,969 Reviews
  • 173,100 Students
  • 17 Courses

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.