Real-World Ethical Hacking: Hands-on Cybersecurity

Protect yourself, gain the hottest new job skills, and learn the tricks the bad guys use - with Kali Linux & Metasploit!

4.66 (2412 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
14,024
students
11 hours
content
Jul 2022
last update
$129.99
regular price

What you will learn

Secure your computer, your network, and your data from 99% of all attacks on the Internet.

Test for security vulnerabilities using the tricks the bad guys use.

Find and fix weaknesses and harden your computer's security.

Avoid phishing, viruses, ransomware, and online scams.

Keep yourself safe online, at home, at school, or at work.

Description

Join more than 70,000 students learning coding and hacking from Dr. Bryson Payne, and 12,000+ students in his top-rated, hands-on Ethical Hacking + Cybersecurity course! 

New and updated for VirtualBox 6.1 and Kali 2022 and later! Learn Ethical Hacking, one of the fastest-growing and highest-paying careers, with over 1 Million cybersecurity job openings available this year! Learn practical, useful cybersecurity step-by-step from Computer Science Professor Dr. Bryson Payne, a SANS|GIAC Certified Pen Tester (GPEN), Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP), and author of the Amazon #1 New Release and Top 10 Best Seller, Teach Your Kids to Code (2015, No Starch Press) and his latest book, Go H*ck Yourself  (2022, No Starch Press). Dr. Payne is also the Coordinator for Cyber Program and the founding Director of the Center for Cyber Operations Education at the University of North Georgia and directs the UNG National Cyber Warrior Academy summer program. He served as a member of the Coaching staff for the US Cyber Team in the first-ever International Cybersecurity Competition in Athens, Greece in 2022 and continues to serve as a Senior Tech Mentor for Reverse Engineering for the 2022-2023 team.

Update 2022: Just added a new lesson in Section 5 on Social Engineering/Phishing, and...
Order Dr. Payne's new book, "Go H*ck Yourself" on Amazon or at No Starch Press now!

Give Yourself a Huge Advantage in a High-Tech World

  • Quickly master new hands-on skills in Linux, Windows and Android hacking and cybersecurity.

  • Set up your own safe, FREE virtual network and VM (virtual machine) lab for Ethical Hacking on your PC, Mac, and Linux.

  • Protect yourself from viruses, phishing, ransomware, and other attacks by learning how the bad guys work, and how to stop them.

  • Includes Mobile Hacking on your own Android VM, plus Car Hacking using can-utils and ICSim on Kali Linux.

  • Great for beginners, or for capable computer users who want to learn both how and why to secure their data.

  • Learn to fix vulnerabilities, and how to stop 85% of attacks by doing just four things


This is the security course everyone should take!

Packed with real-world, practical examples, real hacking techniques, and easy-to-follow plain English instruction, Real-World Ethical Hacking is the course for the new generation of cyber heroes, as they build one of the top job skills of the 21st century! With over 1,000,000 cybersecurity jobs posted in the U.S. this year alone, and over 6 Million openings expected worldwide over the next few years, now is the time to skill up in cyber! 

I designed this course to be easily understood by beginners, with examples I use in my college information security courses and in high-school cyber summer camps. Whether you're retooling for a career change, adding skills to your resume for a raise, or just getting started, Real-World Ethical Hacking is the course for you!

Quick, 4- to 10-minute lessons will get you performing real ethical hacking exercises in minutes. Over 75 video lectures and more than 10hours of content will give you the practice you need to develop powerful new skills in cybersecurity and penetration testing! Protect your identity, your computer, your information, and your life - avoid social engineering, phishing, online attacks, ransomware and more! Plus, practical skills like:

  • Retrieve files from an old computer (Mac or PC, laptop or desktop), even if you've forgotten the password

  • Set up a virtual "sandbox" to safely open suspicious files without exposing your "real" computer

  • Learn command-line short-cuts and power tools that make you look like a computer wizard!

  • Understand how viruses and backdoors infect your computer AND phone, and how to stop them!

Everything you need to get started right away

Complete with all FREE online resources (VirtualBox, Kali Linux, and FREE, LEGAL copies of Windows 10 and Android virtual machines), combined with high-definition videos - you'll be able to work alongside a professor with almost 20 years' teaching experience at the University level. You'll also receive a Certificate of Completion upon finishing the course.

No Risk: Preview videos from Sections 1, 2, and 4 now for FREE, and enjoy a 30-day money-back guarantee when you enroll - zero risk, unlimited payoff! And, we've made this course easy to afford so anyone can get started now!

Sign up for this course and get started securing yourself, your family, and your business today!

***** New section on Car Hacking shows how to perform a Replay Attack on your car's Controller Area Network (CAN) using a $20-$70 cable and Kali Linux running CANsniffer and CANplayer*****

Praise for Dr. Payne's courses on Udemy:

"Inspired" - ...An inspiring course taught by an inspired teacher. The examples are well-chosen -- demonstrating principles through engaging, colorful projects rather than by teaching abstract principles first... — Kent Osband, Udemy student

Clear examples... Bryson's delivery is well paced and good fun. — Sean Jon Darcy, Udemy student

"Dr. Bryson Payne is a computer scientist and professor of the highest caliber... he brings the power of computers within easy reach for learners young and old."—Dr. Antonio Sanz Montemayor, Informatics Professor, Universidad Rey Juan Carlos, Spain


Content

Real-World Ethical Hacking 1: Hacking Windows!

Introduction
Overview: What is Ethical Hacking?
Hacking Windows
The Sticky Keys Hack
Burning a Legal Windows 10 Install Disc
The Hack: First Reboot and Exploit
The Hack (cont.): Second Reboot and Compromise
Hack Finale: Logging in as Administrator!
Review
BONUS: Mac Root Hack!

Create Your Own Virtual Hacking Lab!

VM Lab Introduction and Virtual Box Installation
Building a Kali Linux 2.0 Virtual Machine
Create a Windows 10 VM
Add a Windows 7 or 8 Virtual Machine
Create an Android Phone/Tablet VM for Mobile Hacking!
The Ultimately Hackable Metasploitable!

Important Linux and Windows Terminal Commands

Intro to Command-Line Linux and Windows
Basic Linux Commands
Command-Line Linux File Magic!
Advanced Linux Commands
Basic Command-Line Commands for Windows
Windows File Commands
Advanced Windows Command-Line Commands
Command-Line Review for Linux and Windows

Create a Virtual Network for Ethical Hacking!

Virtual Networking in VirtualBox
Creating the Private, Host-Only 10.0.3.x Network
Connecting Your VMs to the Host-Only Network
Creating and Using a Public NAT Network in VBox

Social Engineering: Capturing Usernames and Passwords via Phishing

Intro to Social Engineering
The Social Engineer's Toolkit in Kali Linux
Cloning Facebook and Harvesting User Passwords
Intro to Spear-Phishing
Advanced IP Address Masking: Hiding Your Real URL
Crafting the Perfect Spear-Phishing Email
Capturing the User's Login and Password in Kali
Review: Social Engineering Techniques
Stopping Phishing at Work and at Home

BONUS Section: Car Hacking in Kali Linux!

Intro to Car Hacking!
Installing the CAN-utils on Kali
Using git to Install ICSim Instrument Cluster Simulator
Running the ICSimulator
Capturing CAN Traffic with CanSniffer
The Replay Attack: Replaying CAN Packets with CANplayer
Car Hacking Review
BONUS: Hacking the Car Hacking Software, to 1000 mph!
Car Hacking LIVE on Dr. Payne's VW Jetta: Facebook Live Video from NCWA 2017

Hacking Windows 7 with Metasploit!

Intro to Metasploit
Setting up Guest Additions in VirtualBox
Creating an Exploit Payload with Metasploit
Sharing the Exploit over the Web
Running the Exploit to Hack Windows 7
Intro to Meterpreter: Your Remote Attack Shell!
Privilege Escalation: Gaining Root Access and Dumping Password Hashes
Metasploit & Meterpreter Review

Hacking Windows 10 with Metasploit and Meterpreter in Kali Linux

Hacking Windows 10 with Metasploit
Viewing and Downloading Files from a Victim Computer in Meterpreter
Grabbing Screenshots, Logging Keystrokes, and Shutting Down Windows 10 Remotely

Password Problems - Everybody's Got 'Em: Hacking, Cracking, Snacking & Hijacking

Six Problems with Passwords
Hijacking Stored Passwords from Chrome and Firefox
Sniffing the Network: Installing Wireshark
Sniffing Unencrypted Passwords with Wireshark
Cracking Passwords with Kali and Online Tools
Seven Things You Can Do for Safer Passwords

Web Hacking - Testing and Securing Web Applications

Intro to Web Hacking
Hands-on Cross-Site Scripting (XSS) Attacks That Work!
SQL (Structured Query Language) Injection: Messing with Databases
Advanced SQLi Attacks
Securing Web Applications from XSS, SQLi and More

Mobile Hacking on Android

Intro to Hacking Android with Metasploit
Creating the Meterpreter Payload for Android
Exploiting Android from Kali Linux using Meterpreter
Advanced Android Exploits: Accessing Storage, Downloading and Uploading Files

Bonus Videos: National Cyber Warrior Academy, Interviews and More

Bonus videos from the National Cyber Warrior Academy
NCWA 2016
NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming
WDUN Radio Interview July 2017 on Cybersecurity Jobs and NCWA
Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy

Screenshots

Real-World Ethical Hacking: Hands-on Cybersecurity - Screenshot_01Real-World Ethical Hacking: Hands-on Cybersecurity - Screenshot_02Real-World Ethical Hacking: Hands-on Cybersecurity - Screenshot_03Real-World Ethical Hacking: Hands-on Cybersecurity - Screenshot_04

Reviews

Omar
October 30, 2023
Great Course, still can improve it, with adding some videos digging in matullidae, and exploiting more the metasploitable 2. Also, no mentionning of how to improve payloads! payloads as they are generated with msfvenom are useless in the real world. Thank you for this wonderfull wourse Sir. Heecham
Marciano
May 21, 2023
I really love the way he teaches in simple and better way for any beginner to learn how to hack and protect others.
Scott
April 11, 2023
The course has been really good except for the fact it was made a few years ago so some of the details are no longer current. Having said that I am still able to follow along fairly well.
Ilan
January 27, 2023
the instructor is awesome, I really enjoyed lessening to him and the course over all wrapped very well. however i left questions 3 times and never got responded so that is why I'm giving only 3 1/2 stars.
Elger
December 28, 2022
So far all the information and teaching methods is amazing. Once I complete the course I will give my final assessment.
Dr.
November 28, 2022
Man merkt sofort, daß der Dozent Dr. Payne ein ausgewiesener Fachexperte mit der entsprechenden Lehrerfahrung im universitären Umfeld ist. Die erfolgreiche Übernahme von Studenten in die NSA und andere Security-Organisationen spricht zusätzlich für seine Qualifikation. Wenn man einige Jahre in den USA verbracht und dort in der High-Tech-Industrie gearbeitet hat, ist seine Art zudem sehr erfrischend und läßt Erinnerungen an alte Zeiten und tolle Projekte wieder aufleben.
Ezekiel
October 20, 2022
This is an excellent course. You won't regret buying it. The pace of the teaching is not too fast nor too slow.
Daryan
July 4, 2022
Course was good. Kali Linux was not running properly on my computer properly. Nonetheless I learned some cool stuff from this course.
Mahmud
July 3, 2022
Its amazing even like the instructor because, I have started seen his pdf on before joining his class online
Normand
May 26, 2022
Some of the techniques are dated. Like SANS and many other courses, too much emphasis is placed on hacks not using physical access. Modern medical devices, cars, etc. provide physical access so much more consideration is needed as to controls to limit that access and more sophisticated techniques required to penetrate those assets.
Ethel
May 23, 2022
Great Course makes everything clear. Information is not given in a hurry. Instructor is relaxed in giving information. Makes you relaxed and makes you pay attention.
Ade
May 12, 2022
What i really enjoyed about this course was the fact it was very grounded and that it covered some of the basic structures of ethical hacking. What i would like to see from Dr Payne in the future could be a course on Coding, Network security, Network tracing, Android hacking, website security, and the use of wireshark.
Pierre-Yves
February 15, 2022
Le cours semble intéressant, les sous-titres automatique sont très insatisfaisants et n'ont jamais dû être relus...
Peter
November 22, 2021
the lecturer repeatsq the same thing in every lesson, and the already brief “lessons”, could be replaced by bullet points,essentially
George
November 9, 2021
Course is outdated and Instructor does not answer the questions. I have noticed this with most of the users, and my question remains unanswered!

Charts

Price

Real-World Ethical Hacking: Hands-on Cybersecurity - Price chart

Rating

Real-World Ethical Hacking: Hands-on Cybersecurity - Ratings chart

Enrollment distribution

Real-World Ethical Hacking: Hands-on Cybersecurity - Distribution chart

Related Topics

1228390
udemy ID
5/24/2017
course created date
11/8/2019
course indexed date
Bot
course submited by