System hacking and Security:Basic to Intermedia level course
4.4 (40 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
299 students enrolled
Wishlisted Wishlist

Please confirm that you want to add System hacking and Security:Basic to Intermedia level course to your Wishlist.

Add to Wishlist

System hacking and Security:Basic to Intermedia level course

Basic to advance level course for IT Security aspirants
4.4 (40 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
299 students enrolled
Created by infySEC Global
Last updated 4/2016
English
Price: $50
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion

Training 5 or more people?

Get your team access to Udemy's top 2,000 courses anytime, anywhere.

Try Udemy for Business
What Will I Learn?
  • Understand how computer works?
  • Understand different types of password cracking.
  • Understand how game hacks are performed?
  • Understand real time application of cryptography.
  • Understand how steganography is performed in real time?
  • Understand how reverse engineering attacks are performed?
  • Understand how privilege escalation attacks are performed?
  • The methods used to crack System Security that target the Operating System’s • Memory Management • Process Management and • File Management
  • The intricacies involved in the operation of a computer.
  • Understand various attack methods via which a system security can be cracked.
  • Learn possible countermeasures to defend against these attacks.
  • Acquire an expertise on system security.
View Curriculum
Requirements
  • This course includes all the material required either as video or as a downloadable link hence there is no pre required materials or softwares for this course.
  • No prior training is required to take this course as we will start with the basics.
  • We welcome anyone with a thirst for learning
Description

Hi, welcome to our system hacking and security course.

In this course, we will teach you how cryptography , steganography, Password cracking, Game hacking, reverse engineering and privilege escalation based attacks are performed in a simulated/test environment in an ethical way. This course helps the system security professional to mitigate these attacks using the recommended solution at the end of relevant module.

We have designed this course to enable those aspiring to enter the information security field to learn core concepts on system hacking in order to safeguard a system security. By the end of this course, you will be familiar with how various types of system hacks are performed and you will be fully equipped to test and safeguard a system security against various real-time attack vectors.

This course has been specifically designed by a team of information security researchers who are acknowledged experts in their field.

This course has been designed to accelerate your learning process through the use of creative animations and easy to understand voice over narratives. Complex hacking concepts have been broken down into easy to understand modules.

Together, our team will walk you through the entire learning process step by step.

This course is perfect for anybody who is passionate about developing their skills in the field of internet security. No prior training is required to take this course as we will start with the basics. We welcome anyone with a thirst for learning.

We look forward to having you join us. In the meantime, please feel free to take a look at our demo tutorial and exercise before you purchase the full course.

Who is the target audience?
  • The course covers ground basics about systems, hence student with no prior knowledge on systems can opt for this course.
  • This course is perfect for existing system administrators as well as anybody who is passionate about developing their skills in the field of information security.
  • We have designed this course to enable those aspiring to enter the information security field to learn core concepts on system based hacking
  • Very rarely this course consist of software codes, however those codes are explained in a detailed manner. Hence one shouldn't bother about prior coding knowledge.
  • By the end of this course you will be familiar with how various types of system based hacks are performed and you will be fully equipped to test system based infrastructure against various real time attack vectors.
Compare to Other Ethical Hacking Courses
Curriculum For This Course
50 Lectures
01:45:26
+
Introduction
11 Lectures 18:47

This part provides an overview of the entire course structure.

Preview 00:33

This gives an overall view of the attacks pertaining to the system, ranging from password cracking to privilege escalation.

Preview 00:57

This module deals with the entire working of a computer and its peripherals starting from the moment that the power is turned on until it is shut down. It also provides a detailed explanation of each component in comparison with the corresponding system in humans.

Preview 00:29



System Basics - Memory
01:46

System Basics - Boot Loader
02:15

System Basics - Operating System
02:13

System Basics - File Management Unit Explained
02:29

System Basics - Security Management Unit Explained
02:26

System Basics - Switching off the System
01:26

System Basics
10 questions
+
Password Cracking
8 Lectures 14:10

Password, a secret string of characters, is the first layer of security mechanism incorporated to secure data.

What are Passwords? How are they used?
02:27

This module shows the various methods adopted in password guessing that cover online as well as offline password cracking. The first method, online password cracking, can be done either actively or passively.

Preview 00:57

Password Cracking
2 questions

This method of capturing the keystrokes of the victim to grab sensitive information is called keylogging. This module provides a demo on how keylogging can be done.

Keylogging - Password Cracking
01:38

Keylogging
2 questions

This module deals with introducing the dictionary based or bruteforce mechanism that can be adopted to guess user passwords.

Password Guessing
01:12

Password Guessing
1 question

When an attacker puts himself between two users to grab juicy information it is known as a "Man in the Middle" attack. This module deals with extracting user passwords by performing a man in the middle attack.

Man-In-The-Middle
01:36

Man – in - the – Middle
2 questions

This module gives an insight into how network packet sniffing can be used to analyse and land on sensitive information such as user passwords.

Password Sniffing - Passive Password Sniffing
01:10

Passive MITM
2 questions

In this module, offline mode, with the help of hashes and rainbow tables, the attacker launches a bruteforce attack to crack the passwords. This module demonstrates how to crack a user password via a dictionary based attack method, on obtaining the SAM and SYSTEM file of a victim.

Offline Password Cracking - Using Dictionary Method
04:00

Offline Password Cracking – Dictionary attack
2 questions

This module demonstrates how to crack a user password via a rainbow tables based attack method, on obtaining the SAM and SYSTEM file of a victim.

Offline Password Cracking - Using Rainbow Tables Method
01:10

Offline Password Cracking – Rainbow Tables
1 question
+
Cryptography
5 Lectures 13:59

The method of converting a clear text that is in human readable form to a cipher text that is not human readable is called cryptography.

What is Cryptography?
03:23

Cryptography
7 questions

This module provides an insight into the types of cryptography techniques.

Types of Cryptography
02:26

This module helps you understand how hashing helps in the real world.

Hashing - Real-time usage
02:20

In this module, the role played by the public keys, private keys and the issuing authorities for a secure digital communication is depicted.

Role of Keys in Cryptography
02:46

This part of the course lets you know how SSL connection gets established.

Working mechanism of the SSL
03:04
+
Steganography
13 Lectures 31:44

This is a method of hiding the message within another message in such a way that even when intercepted nothing gets revealed. This module discusses about the various types involved and its working.

Preview 02:44

Steganography
4 questions

This is a technique of hiding text within an image. Here, the creation and extraction of the hidden message is explained with a tool.

Image steganography
02:37

This is a technique of hiding text within an image. Here, the creation and extraction of the hidden message is explained with a tool.

Image Steganography - How it works?
03:32

This is a technique of hiding text within an image. Here, the creation and extraction of the hidden message is explained with a tool.

Image Steganography - Getting the hidden message
01:19

Image Steganography
1 question

This module demonstrates the method involved in hiding a file behind an audio file using a simple tool.

Audio steganography
02:52

Audio Steganography
1 question

The concept of hiding one or more text files behind a single text file is known as steganography and this is demonstrated in this module.

Text steganography
04:44

Text steganography
2 questions

The art of hiding messages in the form of whitespaces known as Whitespace Steganography is briefed in this module.

Whitespace steganography
03:09

Whitespace Steganography
2 questions

This module will teach you about the concept of hiding messages in email content, called Email Steganography.

Email Steganography
01:38

Email Steganography
1 question

The method of hiding one file behind another file, called Document Steganography, is demonstrated in this module.

Document Steganography
02:20

Document Steganography
1 question

This module helps in understanding and performing File Merging and Mangling which is a method of integrating two dissimilar files into a single file.

File merging and mangling
03:22

This module helps in explaining how a RAR file consisting of the secret message can be hidden behind an image.

Hiding a RAR file behind an image
01:22

In this module the method of hiding a text file behind an image file is detailed.

Hiding text behind an image
01:09

File Merging and File Mangling
1 question

In this section of the course, we will cover how you can reverse a steg-file to obtain its hidden contents, a process known as steg-analysis

Steganalysis
00:56

Steganalysis and Hiding files behind RAR and text file
1 question
+
Process and Memory hack using Cheat Engine
5 Lectures 09:46

This module discusses the means by which you can tamper with score values in both offline and online games by altering the game’s score to a greater value by altering the memory addresses holding that value.

Game Hacks - An introduction
01:00

This module discusses the means by which you can tamper with score values in both offline and online games by altering the game’s score to a greater value by altering the memory addresses holding that value.

Preview 01:57

This module discusses the means by which you can tamper with score values in both offline and online games by altering the game’s score to a greater value by altering the memory addresses holding that value.

Game Hacks - Offline Games
03:48

This module discusses the means by which you can tamper with score values in both offline and online games by altering the game’s score to a greater value by altering the memory addresses holding that value.

Game Hacks - Online Games
02:23

This module discusses the means by which you can tamper with score values in both offline and online games by altering the game’s score to a greater value by altering the memory addresses holding that value.

Game Hacks - Dynamic Score changing
00:38

Process Hacks
1 question
+
Reverse Engineering
6 Lectures 09:31
Reverse Engineering - An Introduction.
01:56

This module of the course deals with the study of the file that has to be reverse engineered.

Reverse Engineering - Study of the File
01:10

This module of the course deals with opening up the Vault using Ollydbg for the study of its working.

Reverse Engineering - "The Vault"
02:17

Ollydbg helps in cracking the static password stored on the executable. A demonstration of how it gets done is dealt in this module.

Reverse Engineering - Cracking "The Vault"
02:21

Having seen how a static password stored on "The Vault" can be cracked using reverse engineering methodology, its time to demonstrate how to study an executable that generates passwords dynamically. This module address it.

Reverse Engineering - " Tantanos Keygenme"
01:00

This module demonstrates how the dynamic password generation mechanism works and generates the password in the file "Tantanos Keygenme"

Reverse Engineering - Cracking "Tantanos Keygenme"
00:47

Reverse Engineering
4 questions
+
Privilege Escalation
2 Lectures 07:29

The process of escalating privileges in a system by exploiting a weakness to gain access to its resources is called privilege escalation. This module gives an insight into the different levels of privileges, how to gain admin privileges on a windows 7, windows 8 machines and the post compromise activity that can be carried out.

Privilege Escalation - Windows 7 & 8 machines - Post compromise
05:29

The process of escalating privileges in a system by exploiting a weakness to gain access to its resources is called privilege escalation. This module gives an insight into how privilege escalation can be carried out when physical access to a system is gained.

Privilege Escalation - Using Konboot
02:00

Privilege Escalation
4 questions
About the Instructor
infySEC Global
4.3 Average rating
888 Reviews
12,695 Students
8 Courses
Head - Cyber Security Research

I head the academia and industry relations in  infySEC. I am also the director at infySEC .Early from the late 90's, I have been always passionate about computer, espically games which eventually had got interest to learn how computers work, such as application , debugging, disassembling, compiling,etc., with time, the same interest got towards networking, like how packets communicate, how data gets transferred,bandwidth , then got lil into wireless and eventually turning back prooved me i was not anywhere but a lovely apt domain called 'Security', i feel i have been travelling in a very interesting path from where i have started, i would certainly urge everyone of us to try it experience it, its not jus the knowledge but its fun, and yea for me i have miles to go myself.

After 14 years I have turned to focus my efforts on training how attackers hack systems and also started to help them understand how to secure ourselves against such attacks. I decided to teach all that i have learnt over the period of 15 years in form of few videos, which effectively means i teach all that 15 years to you in a week...  My instruction is very actionable with live demos and hands on, Also i share lab exercises which will enable you not just to read but impliment what you have learnt, I want students to take the knowledge they gain and start using it to make money or do what they choose to do with it (ofcourse only ethical ones). 

In 2013, I along with my team at infySEC, stuck the World Record for conducting the largest and longest ethical hacking Marathon with over 9000+ participants assembled in one location, check us on youtube for reference.

My expectations soon after my graduation about IT company's were shattered :D , afterall they say, you are what your company is.My fellow colleagues and team mates were working for money, i was desperate and searching for some like minded in computers, but again, its been 5 yrs i have been working for Multi national companies, and now i have got full time freelancing, afterall there is no one to question your time restriction of work, domain of work, etc..,You are master of your fate, and captain of your soul.... Live the life you have imagined :D

You will find my teaching style is well liked by my students and they are always looking for new and exciting courses from me.

Harry The Boss - Rating: 5 out of 5
I highly recommend infysec to everyone.I joined the training with absolutely no prior experience in ethical hacking....When I attended a training..It was revelation..The fluidity and crisp and clear understanding of trainer was showing...No jargons.  In fact he made a very complex phenomenon very simple to comprehend. I gained much more than expectations.... The trainer was master in his subject knowledge...With answers to any questions shooting at him....

Stacie Stalcup - Rating: 5 out of 5
I enjoy the animation. No matter what computer course Infysec offers, I will most likely take it because of how the subject matter is taught and presented. We aren't forced to look at someone reading powerpoints or watching someone talking into the camera which makes me sleepy and becomes boring. There is no dull PowerPoint here; Instead, InfySEC animates the techniques and after the lessons provide step by step exercises. I wish all Udemy classes were taught this way.

Dominik Koszkul - Rating: 5 out of 5
This course quickly shows what are dangers in web. Great for beginners to realize how to write the web applications and secure the servers against attackers

Raymundo Torres - Rating: 5 out of 5
This instruction video was great. Just stuck to the material and explained it thoroughly with visual images and examples. This video inspired me to start a smalll training program for my fellow colleagues. Thanks!

Diana Carolina Gómez  - Rating: 5 out of 5
Because the explanations have simple examples and close to reality. This helps to recognize and understand the content of the course easier.

Miteshkumar Joshi -  Rating: 5 out of 5
Having some knowledge on HTTP, this course is suitable for me and clearly defines some areas where I was findling it diffculty.

Come , lets togather make the world a secure place to live in !