4.6 out of 5
4.6
907 reviews on Udemy

Real-World Ethical Hacking: Hands-on Cybersecurity

Protect yourself, gain the hottest new job skills, and learn the tricks the bad guys use - with Kali Linux & Metasploit!
Instructor:
Bryson Payne
5,002 students enrolled
English [Auto-generated]
Secure your computer, your network, and your data from 99% of all attacks on the Internet.
Test for security vulnerabilities using the tricks the bad guys use.
Find and fix weaknesses and harden your computer's security.
Avoid phishing, viruses, ransomware, and online scams.
Keep yourself safe online, at home, at school, or at work.

★★★★★ Join over 5,000 students in this hands-on Ethical Hacking and Cybersecurity course! ★★★★★

Learn Ethical Hacking, one of the fastest-growing and highest-paying careers, with over 1 Million cybersecurity job openings available this year! Learn practical, useful cybersecurity step-by-step from Computer Science Professor Dr. Bryson Payne, a SANS|GIAC Certified Pen Tester (GPEN), Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP), and author of the Amazon #1 New Release and Top 10 Best Seller in Children’s Programming Books, Teach Your Kids to Code (2015, No Starch Press). Dr. Payne is also the Director of the Center for Cyber Operations Education at the University of North Georgia and directs the National Cyber Warrior Academy summer program.

Give Yourself a Huge Advantage in a High-Tech World

  • Quickly master new hands-on skills in Linux, Windows and Android hacking and cybersecurity.

  • Set up your own safe, FREE virtual network and VM (virtual machine) lab for Ethical Hacking on your PC, Mac, and Linux.

  • Protect yourself from viruses, phishing, ransomware, and other attacks by learning how the bad guys work, and how to stop them.

  • Includes Mobile Hacking on your own Android VM, plus Car Hacking using can-utils and ICSim on Kali Linux.

  • Great for beginners, or for capable computer users who want to learn both how and why to secure their data.

  • Learn to fix vulnerabilities, and how to stop 85% of attacks by doing just four things

This is the security course everyone should take

Packed with real-world, practical examples, real hacking techniques, and easy-to-follow plain English instruction, Real-World Ethical Hacking is the course for the new generation of cyber heroes, as they build one of the top job skills of the 21st century! With over 1,000,000 cybersecurity jobs posted in the U.S. this year alone, and over 6 Million openings expected worldwide over the next few years, now is the time to skill up in cyber! 

I designed this course to be easily understood by beginners, with examples I use in my college information security courses and in high-school cyber summer camps. Whether you’re retooling for a career change, adding skills to your resume for a raise, or just getting started, Real-World Ethical Hacking is the course for you!

Quick, 4- to 10-minute lessons will get you performing real ethical hacking exercises in minutes. Over 75 video lectures and more than 8 hours of content will give you the practice you need to develop powerful new skills in cybersecurity and penetration testing! Protect your identity, your computer, your information, and your life – avoid social engineering, phishing, online attacks, ransomware and more! Plus, practical skills like:

  • Retrieve files from an old computer (Mac or PC, laptop or desktop), even if you’ve forgotten the password

  • Set up a virtual “sandbox” to safely open suspicious files without exposing your “real” computer

  • Learn command-line short-cuts and power tools that make you look like a computer wizard!

  • Understand how viruses and backdoors infect your computer AND phone, and how to stop them!

Everything you need to get started right away

Complete with all FREE online resources (VirtualBox, Kali Linux, and FREE, LEGAL copies of Windows 10 and Android virtual machines), combined with high-definition videos – you’ll be able to work alongside a professor with almost 20 years’ teaching experience at the University level. You’ll also receive a Certificate of Completion upon finishing the course.

No Risk: Preview videos from Sections 1, 2, and 4 now for FREE, and enjoy a 30-day money-back guarantee when you enroll – zero risk, unlimited payoff! And, we’ve made this course easy to afford so anyone can get started now!

Sign up for this course and get started securing yourself, your family, and your business today!

***** Bonus section on Car Hacking shows how to perform a Replay Attack on your car’s Controller Area Network (CAN) using a $20 cable and Kali Linux running CANsniffer and CANplayer*****

Praise for Dr. Payne’s courses on Udemy:

★★★★★ “Inspired” – …An inspiring course taught by an inspired teacher. The examples are well-chosen — demonstrating principles through engaging, colorful projects rather than by teaching abstract principles first… — Kent Osband, Udemy student

★★★★★ Clear examples… Bryson’s delivery is well paced and good fun. — Sean Jon Darcy, Udemy student

★★★★★ “Dr. Bryson Payne is a computer scientist and professor of the highest caliber… he brings the power of computers within easy reach for learners young and old.”—Dr. Antonio Sanz Montemayor, Informatics Professor, Universidad Rey Juan Carlos, Spain

Real-World Ethical Hacking 1: Hacking Windows!

1
Introduction

Real-World Ethical Hacking is based on lessons taught in the National Cyber Warrior Academy, but this video course is not endorsed or sponsored by the University or by the NSA. All opinions expressed are the author's alone, and even ethical hacking carries some risk. Please use the tools and techniques in this course responsibly and ONLY on computers you own or have express, written permission to test.

2
Overview: What is Ethical Hacking?
3
Hacking Windows

Our first hands-on, real-world ethical hacking exercise: Hacking Windows, resetting a password and creating new admin users, using a boot disk.

4
The Sticky Keys Hack

The attack vector for this hack will be the Windows "Sticky Keys" app SETHC.EXE, triggered any time you press the SHIFT key 5 times in Windows.

5
Burning a Legal Windows 10 Install Disc

Where to get a legal copy of Windows 10 Enterprise, and how to burn your own Windows 10 install/boot disc.


6
The Hack: First Reboot and Exploit

Just two reboots, two special keys, and four commands to PWN any Windows PC. 

7
The Hack (cont.): Second Reboot and Compromise

Second reboot, second key combo, and final two commands to add an admin/root/super user to any Windows box from Windows XP to Windows 10.1!

8
Hack Finale: Logging in as Administrator!

Stage 3: Gaining Access! Log in as root/super/admin user and recover your files!

9
Review

Lessons Learned:

  • Physical access is total access
  • Never leave your laptop/desktop unattended
  • Ethical Hacking is practical and useful!

To protect against this hack: 

  1. Change your BIOS settings to require a password to change the boot order or boot device
  2. Encrypt your files to make them unreadable without your ORIGINAL password
10
BONUS: Mac Root Hack!

Create Your Own Virtual Hacking Lab!

1
VM Lab Introduction and Virtual Box Installation
2
Building a Kali Linux 2.0 Virtual Machine
3
Create a Windows 10 VM
4
Add a Windows 7 or 8 Virtual Machine
5
Create an Android Phone/Tablet VM for Mobile Hacking!
6
The Ultimately Hackable Metasploitable!

Important Linux and Windows Terminal Commands

1
Intro to Command-Line Linux and Windows
2
Basic Linux Commands
3
Command-Line Linux File Magic!
4
Advanced Linux Commands
5
Basic Command-Line Commands for Windows
6
Windows File Commands
7
Advanced Windows Command-Line Commands
8
Command-Line Review for Linux and Windows

Create a Virtual Network for Ethical Hacking!

1
Virtual Networking in VirtualBox
2
Creating the Private, Host-Only 10.0.3.x Network
3
Connecting Your VMs to the Host-Only Network
4
Creating and Using a Public NAT Network in VBox

Social Engineering: Capturing Usernames and Passwords via Phishing

1
Intro to Social Engineering
2
The Social Engineer's Toolkit in Kali Linux
3
Cloning Facebook and Harvesting User Passwords
4
Intro to Spear-Phishing
5
Advanced IP Address Masking: Hiding Your Real URL
6
Crafting the Perfect Spear-Phishing Email
7
Capturing the User's Login and Password in Kali
8
Review: Social Engineering Techniques
9
Stopping Phishing at Work and at Home

BONUS Section: Car Hacking in Kali Linux!

1
Intro to Car Hacking!
2
Installing the CAN-utils on Kali
3
Using git to Install ICSim Instrument Cluster Simulator
4
Running the ICSimulator
5
Capturing CAN Traffic with CanSniffer
6
The Replay Attack: Replaying CAN Packets with CANplayer
7
Car Hacking Review
8
BONUS: Hacking the Car Hacking Software, to 1000 mph!
9
Car Hacking LIVE on Dr. Payne's VW Jetta: Facebook Live Video from NCWA 2017

Hacking Windows 7 with Metasploit!

1
Intro to Metasploit
2
Setting up Guest Additions in VirtualBox
3
Creating an Exploit Payload with Metasploit
4
Sharing the Exploit over the Web
5
Running the Exploit to Hack Windows 7
6
Intro to Meterpreter: Your Remote Attack Shell!
7
Privilege Escalation: Gaining Root Access and Dumping Password Hashes
8
Metasploit & Meterpreter Review

Hacking Windows 10 with Metasploit and Meterpreter in Kali Linux

1
Hacking Windows 10 with Metasploit
2
Viewing and Downloading Files from a Victim Computer in Meterpreter
3
Grabbing Screenshots, Logging Keystrokes, and Shutting Down Windows 10 Remotely

Password Problems - Everybody's Got 'Em: Hacking, Cracking, Snacking & Hijacking

1
Six Problems with Passwords
2
Hijacking Stored Passwords from Chrome and Firefox
3
Sniffing the Network: Installing Wireshark
4
Sniffing Unencrypted Passwords with Wireshark
5
Cracking Passwords with Kali and Online Tools
6
Seven Things You Can Do for Safer Passwords

Web Hacking - Testing and Securing Web Applications

1
Intro to Web Hacking
2
Hands-on Cross-Site Scripting (XSS) Attacks That Work!
3
SQL (Structured Query Language) Injection: Messing with Databases
4
Advanced SQLi Attacks
5
Securing Web Applications from XSS, SQLi and More

Mobile Hacking on Android

1
Intro to Hacking Android with Metasploit
2
Creating the Meterpreter Payload for Android
3
Exploiting Android from Kali Linux using Meterpreter
4
Advanced Android Exploits: Accessing Storage, Downloading and Uploading Files

Bonus Videos: National Cyber Warrior Academy, Interviews and More

1
Bonus videos from the National Cyber Warrior Academy
2
NCWA 2016
3
NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming
4
WDUN Radio Interview July 2017 on Cybersecurity Jobs and NCWA
5
Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy

Dr. Payne's 2018 TEDx Talk on Coding and Cyber as the New Literacy (15 min)

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.6
4.6 out of 5
907 Ratings

Detailed Rating

Stars 5
604
Stars 4
227
Stars 3
61
Stars 2
9
Stars 1
4
647a4a549975bb7f446d3bb593ecb785
30-Day Money-Back Guarantee

Includes

8 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion