Real-World Ethical Hacking: Hands-on Cybersecurity
4.6 (1,312 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
7,534 students enrolled

Real-World Ethical Hacking: Hands-on Cybersecurity

Protect yourself, gain the hottest new job skills, and learn the tricks the bad guys use - with Kali Linux & Metasploit!
4.6 (1,312 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
7,531 students enrolled
Created by Bryson Payne
Last updated 5/2020
English [Auto-generated]
Current price: $34.99 Original price: $49.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 8.5 hours on-demand video
  • 1 article
  • 5 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Secure your computer, your network, and your data from 99% of all attacks on the Internet.
  • Test for security vulnerabilities using the tricks the bad guys use.
  • Find and fix weaknesses and harden your computer's security.
  • Avoid phishing, viruses, ransomware, and online scams.
  • Keep yourself safe online, at home, at school, or at work.
  • You should feel comfortable installing new software.
  • Some experience entering commands in the Linux, Mac, or Windows command-line terminal is helpful.
  • A PC, Mac, or Linux computer with up to 100 GB of free disk space to set up your FREE virtual lab.
  • No programming experience required.

★★★★★ Join over 7,500 students in the top hands-on Ethical Hacking and Cybersecurity course! ★★★★★

New and updated for VirtualBox 6.1 and Kali 2020.2 and later! Learn Ethical Hacking, one of the fastest-growing and highest-paying careers, with over 1 Million cybersecurity job openings available this year! Learn practical, useful cybersecurity step-by-step from Computer Science Professor Dr. Bryson Payne, a SANS|GIAC Certified Pen Tester (GPEN), Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP), and author of the Amazon #1 New Release and Top 10 Best Seller in Children's Programming Books, Teach Your Kids to Code (2015, No Starch Press) and his latest book, Hacking for Kids (2020, No Starch Press). Dr. Payne is also the Director of the Center for Cyber Operations Education at the University of North Georgia and directs the National Cyber Warrior Academy summer program.

Update 2020: Pre-order Dr. Payne's new book, "Hacking for Kids" on Amazon now!

Give Yourself a Huge Advantage in a High-Tech World

  • Quickly master new hands-on skills in Linux, Windows and Android hacking and cybersecurity.

  • Set up your own safe, FREE virtual network and VM (virtual machine) lab for Ethical Hacking on your PC, Mac, and Linux.

  • Protect yourself from viruses, phishing, ransomware, and other attacks by learning how the bad guys work, and how to stop them.

  • Includes Mobile Hacking on your own Android VM, plus Car Hacking using can-utils and ICSim on Kali Linux.

  • Great for beginners, or for capable computer users who want to learn both how and why to secure their data.

  • Learn to fix vulnerabilities, and how to stop 85% of attacks by doing just four things

This is the security course everyone should take!

Packed with real-world, practical examples, real hacking techniques, and easy-to-follow plain English instruction, Real-World Ethical Hacking is the course for the new generation of cyber heroes, as they build one of the top job skills of the 21st century! With over 1,000,000 cybersecurity jobs posted in the U.S. this year alone, and over 6 Million openings expected worldwide over the next few years, now is the time to skill up in cyber! 

I designed this course to be easily understood by beginners, with examples I use in my college information security courses and in high-school cyber summer camps. Whether you're retooling for a career change, adding skills to your resume for a raise, or just getting started, Real-World Ethical Hacking is the course for you!

Quick, 4- to 10-minute lessons will get you performing real ethical hacking exercises in minutes. Over 75 video lectures and more than 8 hours of content will give you the practice you need to develop powerful new skills in cybersecurity and penetration testing! Protect your identity, your computer, your information, and your life - avoid social engineering, phishing, online attacks, ransomware and more! Plus, practical skills like:

  • Retrieve files from an old computer (Mac or PC, laptop or desktop), even if you've forgotten the password

  • Set up a virtual "sandbox" to safely open suspicious files without exposing your "real" computer

  • Learn command-line short-cuts and power tools that make you look like a computer wizard!

  • Understand how viruses and backdoors infect your computer AND phone, and how to stop them!

Everything you need to get started right away

Complete with all FREE online resources (VirtualBox, Kali Linux, and FREE, LEGAL copies of Windows 10 and Android virtual machines), combined with high-definition videos - you'll be able to work alongside a professor with almost 20 years' teaching experience at the University level. You'll also receive a Certificate of Completion upon finishing the course.

No Risk: Preview videos from Sections 1, 2, and 4 now for FREE, and enjoy a 30-day money-back guarantee when you enroll - zero risk, unlimited payoff! And, we've made this course easy to afford so anyone can get started now!

Sign up for this course and get started securing yourself, your family, and your business today!

***** Bonus section on Car Hacking shows how to perform a Replay Attack on your car's Controller Area Network (CAN) using a $20-$70 cable and Kali Linux running CANsniffer and CANplayer*****

Praise for Dr. Payne's courses on Udemy:

★★★★★ "Inspired" - ...An inspiring course taught by an inspired teacher. The examples are well-chosen -- demonstrating principles through engaging, colorful projects rather than by teaching abstract principles first... — Kent Osband, Udemy student

★★★★★ Clear examples... Bryson's delivery is well paced and good fun. — Sean Jon Darcy, Udemy student

★★★★★ “Dr. Bryson Payne is a computer scientist and professor of the highest caliber... he brings the power of computers within easy reach for learners young and old."—Dr. Antonio Sanz Montemayor, Informatics Professor, Universidad Rey Juan Carlos, Spain

Who this course is for:
  • Anyone who wants to protect their information, their family, their business, or their country from online attacks.
  • If you want to learn useful, real-world ethical hacking skills, this is the course for you.
  • This is NOT a certification course, but most skills will transfer to CEH, OSCP, and other hands-on certifications.
  • Perfect for beginners, or for competent computer users who want to learn how and why to protect themselves online.
Course content
Expand all 77 lectures 08:23:16
+ Real-World Ethical Hacking 1: Hacking Windows!
10 lectures 52:59

Real-World Ethical Hacking is based on lessons taught in the National Cyber Warrior Academy, but this video course is not endorsed or sponsored by the University or by the NSA. All opinions expressed are the author's alone, and even ethical hacking carries some risk. Please use the tools and techniques in this course responsibly and ONLY on computers you own or have express, written permission to test.

Preview 01:05

Our first hands-on, real-world ethical hacking exercise: Hacking Windows, resetting a password and creating new admin users, using a boot disk.

Preview 02:15

The attack vector for this hack will be the Windows "Sticky Keys" app SETHC.EXE, triggered any time you press the SHIFT key 5 times in Windows.

Preview 02:38

Where to get a legal copy of Windows 10 Enterprise, and how to burn your own Windows 10 install/boot disc.

Preview 04:01

Just two reboots, two special keys, and four commands to PWN any Windows PC. 

Preview 07:13

Second reboot, second key combo, and final two commands to add an admin/root/super user to any Windows box from Windows XP to Windows 10.1!

Preview 04:36

Stage 3: Gaining Access! Log in as root/super/admin user and recover your files!

Preview 06:55

Lessons Learned:

  • Physical access is total access
  • Never leave your laptop/desktop unattended
  • Ethical Hacking is practical and useful!

To protect against this hack: 

  1. Change your BIOS settings to require a password to change the boot order or boot device
  2. Encrypt your files to make them unreadable without your ORIGINAL password
Preview 04:16
BONUS: Mac Root Hack!
+ Create Your Own Virtual Hacking Lab!
6 lectures 39:26

Updated for VirtualBox 6.1 and newer - get started building your FREE ethical hacking virtual lab with Oracle VirtualBox on Mac, Windows, or Linux.

Preview 05:13

Updated for Kali Linux 2020.2 and newer versions!

Preview 06:37
The Ultimately Hackable Metasploitable!
Troubleshooting VirtualBox on Mac/Windows (Updated 6/2020 for VirtualBox 6.1)
+ Important Linux and Windows Terminal Commands
8 lectures 42:51
Intro to Command-Line Linux and Windows
Basic Linux Commands
Command-Line Linux File Magic!
More Helpful Linux Commands
Basic Command-Line Commands for Windows
Windows File Commands
Advanced Windows Command-Line Commands
Command-Line Review for Linux and Windows
+ Social Engineering: Capturing Usernames and Passwords via Phishing
9 lectures 01:09:21
Intro to Social Engineering
The Social Engineer's Toolkit in Kali Linux
Cloning Facebook and Harvesting User Passwords
Intro to Spear-Phishing
Advanced IP Address Masking: Hiding Your Real URL
Crafting the Perfect Spear-Phishing Email
Capturing the User's Login and Password in Kali
Review: Social Engineering Techniques
Stopping Phishing at Work and at Home
+ BONUS Section: Car Hacking in Kali Linux!
9 lectures 01:10:31
Installing the CAN-utils on Kali
Using git to Install ICSim Instrument Cluster Simulator
Running the ICSimulator
Capturing CAN Traffic with CanSniffer
The Replay Attack: Replaying CAN Packets with CANplayer
Car Hacking Review
BONUS: Hacking the Car Hacking Software, to 1000 mph!
Car Hacking LIVE on Dr. Payne's VW Jetta: Facebook Live Video from NCWA 2017
+ Hacking Windows 7 with Metasploit!
8 lectures 42:57
Intro to Metasploit
Setting up Guest Additions in VirtualBox
Creating an Exploit Payload with Metasploit
Sharing the Exploit over the Web
Running the Exploit to Hack Windows 7
Intro to Meterpreter: Your Remote Attack Shell!
Privilege Escalation: Gaining Root Access and Dumping Password Hashes
Metasploit & Meterpreter Review
+ Hacking Windows 10 with Metasploit and Meterpreter in Kali Linux
3 lectures 17:50
Hacking Windows 10 with Metasploit
Viewing and Downloading Files from a Victim Computer in Meterpreter
Grabbing Screenshots, Logging Keystrokes, and Shutting Down Windows 10 Remotely
+ Password Problems - Everybody's Got 'Em: Hacking, Cracking, Snacking & Hijacking
6 lectures 45:41
Six Problems with Passwords
Hijacking Stored Passwords from Chrome and Firefox
Sniffing the Network: Installing Wireshark
Sniffing Unencrypted Passwords with Wireshark
Cracking Passwords with Kali and Online Tools
Seven Things You Can Do for Safer Passwords
+ Web Hacking - Testing and Securing Web Applications
5 lectures 28:17
Intro to Web Hacking
Hands-on Cross-Site Scripting (XSS) Attacks That Work!
SQL (Structured Query Language) Injection: Messing with Databases
Advanced SQLi Attacks
Securing Web Applications from XSS, SQLi and More