Pay What You Want: White Hat Hacker A to Z Bundle

2 Reviews
7 Courses
-

Pay What You Want: White Hat Hacker A to Z Bundle

2 Reviews
7 Courses
-

How It Works

Beat the Leader's price and get featured on the Leaderboard!

Beat the average price and you'll take home the entire bundle.

If what you pay is less than the average, you'll still take home something great.

Price locked in for: 15:00
Beat the average price$17.14
Pay what you want

What's Included In This Bundle ($765.00) Value

Cross Site Scripting (XSS) Attacks for Pentesters
$65.00 ValueCross Site Scripting (XSS) Attacks for Pentesters
Node.js Security: Pentesting & Exploitation
$65.00 ValueNode.js Security: Pentesting & Exploitation
Ultimate Wi-Fi Hacking & Security Series
$69.00 ValueUltimate Wi-Fi Hacking & Security Series
Intensive Ethical Hacking Series
$69.00 ValueIntensive Ethical Hacking Series
Windows Exploit Development Megaprimer
$99.00 ValueWindows Exploit Development Megaprimer
Learn Wi-Fi Hacking/Penetration Testing From Scratch
$199.00 ValueLearn Wi-Fi Hacking/Penetration Testing From Scratch
The Complete Hacking Course: Go from Beginner to Advanced!
$199.00 ValueThe Complete Hacking Course: Go from Beginner to Advanced!
ZM

Zia Masroor

$211.50

Leaderboard Champion

Rank
User
Paid
2
S
Swift Coder
$234.00
3
M
Mohammed AD
$233.00
4
J
Jamal Mashal
$208.80
5
J
John Moore
$207.90
6
J
James Purnell
$226.00
7
A
Alan Bunyan
$225.00
8
S
Shawn Watson
$211.00
9
L
Lance Younce
$210.00
10
K
Khalid A
$209.00

Product Details

The Complete Hacking Course: Go from Beginner to Advanced!
  • Experience level required: All levels
  • Access 108 lectures & 25 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

108 Lessons (25h)

  • Ethical hacking and penetration testing. What is it and how can you use it?
    Introduction to Ethical Hacking. What is it in detail?
    What can you do to get the most out of this course?
    How to get help, ask questions, and solve problems in the course!
  • Prerequisites for getting started with this course.
    Prerequisites success tips for getting the most out of this course.
  • Basic hacking terms you will want to know getting started.
    Basic terminology such as white hat, grey hat, and black hat hacking.
    Basic terminology including SQL injections, VPN , proxy, VPS, and key loggers.
  • Build your hacking environment!
    Installing VirtualBox with rpm plus why use a virtual machine.
    Installing VirtualBox using the default package manager from repositories.
    Creating the virtual environment.
    Installing VirtualBox in a Windows 8.1 environment.
    Kali Linux installation within a virtual environment.
    Kali Linux installation after it is running and getting starting using it.
    Installing VirtualBox Guest Additions
  • Set up instructions for Mac users ONLY
    Installing VirtualBox on a Mac
    Setting up Kali Linux with VirtualBox part 1
    Setting up Kali Linux with VirtualBox part 2
    How to set up a USB passthrough on a Mac part 1
    How to set up a USB passthrough on a Mac part 2
    Kali Linux Live USB on a MacBook Pro part 1 ( OPTIONAL )
    Kali Linux Live USB on a MacBook Pro part 2 ( OPTIONAL )
    Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL )
  • How to create a bootable USB of Kali Linux ( optional )
    How to create a bootable USB of Kali with persistent storage > 4 GB part 1
    How to create a bootable USB of Kali with persistent storage > 4 GB part 2
    How to create a bootable USB of Kali with persistent storage > 4 GB part 3
    How to create a bootable USB of Kali with persistent storage > 4 GB part 4
  • Updates: How to install VirtualBox on Fedora 22 + Kali Sana VM ( OPTIONAL )
    Fedroa 22 VirtualBox set up
    Kali Sana virtual machine installation
    How to install VBox GuestAdditions in Kali Sana
  • Linux Terminal including basic functionalities and CLI.
    Introduction to the Linux terminal.
    Linux Command-Line Interface (CLI) basics.
    The Linux CLI explained in greater detail to give you a good understanding.
  • What is Tor? How can you use it to protect your anonymity online?
    Tor part 1.
    Tor part 2.
  • ProxyChains for using proxy servers, hiding your ip, and obtaining access.
    Proxychains part 1.
    Proxychains part 2.
    Proxychains part 3.
  • What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN?
    VPN part 1.
    VPN part 2.
  • What is a macchanger? How can you use it to change your mac address?
    Macchanger part 1 (updated)
    Macchanger part 2 (updated)
  • Footprinting with Nmap and external resources.
    Nmap part 1.
    Nmap part 2.
    External resources using public listings of known vulnerabilities.
  • Attacking wireless networks. Overview of the tools.
    Intro to wifi hacker cracking WPA⁄WPA2.
    Aircrack and reaver installation.
    Installing aircrack-ng on Windows + crunch on Linux.
    For Windows Users. How To Set Up USB wireless Adapter with Virtualbox Part 1.
    For Windows Users. How To Set Up USB wireless Adapter with VirtualBox part 2.
  • Breaking WPA/WPA2 encryption. Wifi hacking and wifi hacker training.
    Aircrack-ng _ crunch usage example_1
    Aircrack-ng _ crunch usage example_2
    Aircrack-ng _ crunch usage example_3
    Cracking WPS pins with reaver part 1.
    Cracking WPS pins with reaver part 2.
    Cracking WPS pins with reaver part 3.
  • Signal jamming and denial of service.
    Performing denial of service on wireless networks part 1.
    Performing denial of service on wireless networks part 2.
  • SLL strips.
    SSL strip part 1.
    SSL strip part 2.
    SSL strip part 3.
  • Let's have a bit of fun!
    Funny things part 1
    Funny things part 2.
    Funny things part 3.
  • Evil twin method! Clone wireless access points to steal data.
    Evil twin part 1.
    Evil twin part 2
    Evil twin part 3.
  • Attacking routers to give you free reign over the entire network!
    Using known vulnerabilities part 1.
    Using known vulnerabilities part 2.
    Using known vulnerabilities part 3.
  • DNS setting hacking to redirect users with post authentication exploitation.
    Post authentication exploitation ( DNS ) part 1.
    Post authentication exploitation ( DNS ) part 2.
    Post authentication exploitation ( DNS ) part 3.
  • Website attacks with SQL injections.
    sql-injection-part-1
    sql-injection-part-2
    sql-injection-part-3
    sql-injection-part-4
    sql-injection-part-5
  • Brute-forcing methods for cracking passwords.
    cracking-hashes
    cracking-linux-password-with-john-the-ripper-part-1
    cracking-linux-password-with-john-the-ripper-part-2
    cracking-windows-password-with-john-the-ripper
    hydra-usage-part-1
    hydra-usage-part-2
  • Denial of Service (DoS) attacks demonstrated and explained.
    DoS attack demonstration part 1. Introduction to Denial of Service attacks.
    DoS attack demonstration part 2. Combine slowloris.pl with nmap.
    DoS attack demonstration part 3 featuring ha.ckers.org.
  • Reverse shells. Gain remote control of any device!
    Intro to Metasploit and reverse shells. What are reverse shells and why use them
    Metasploit ( reverse shell ) part 2 starting from a two terminal setup.
    Making reverse shells persistent on another system and escalating privileges.
    Creating a persistent reverse shell with Metasploit.
    Using NetCat to make any kind of connection you might need.
    How to upload a reverse shell onto a web server.
  • Make your own Keylogger in C++
    General stuff
    Setting up the Environment part 1
    Setting up the Environment part 2
    Programming basics part 1
    Programming basics part 2
    Programming basics part 3
    Programming basics part 4
    Programming basics part 5
    Basic Keylogger part 1
    Basic Keylogger part 2
    Upper and lowercase letters
    Encompassing other characters part 1
    Encompassing other characters part 2
    Encompassing other characters part 3
    Hide keylogger console window
  • Bonus lectures.
    Thank you for being a student here! What next?
    Bonus lecture with $9 coupons to all the rest of our courses!

The Complete Hacking Course: Go from Beginner to Advanced!

JB
Jerry Banfield

Jerry Banfield has been an online entrepreneur since 2011, having served hundreds of clients in over 20 countries and managed billions of Facebook ads. He has learned how to drive large amounts of organic Google and YouTube traffic to his website, and teaches online courses sharing his experience with students worldwide. A member of the MENSA society, Jerry holds degrees from the University of South Carolina and the University of South Florida. For more details on the course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Description

This course is your introduction to white hat hacking, or testing methodologies designed to safeguard against security threats on a system. You'll learn to think and act like a malicious hacker, preemptively launching attacks they may perpetuate in order to prevent them. By mastering penetration testing techniques like attacking routers and cracking passwords, you'll not only learn how to identify security vulnerabilities--you'll learn a skill set coveted by many employers.
  • Master penetration testing & ethical hacking w/ over 25 hours of training and 108 lectures
  • Gain a valuable skill set to help companies test & enhance network security
  • Penetrate networks, exploit systems, break into computers & compromise routers
  • Understand key hacking concepts like white hat, gray hat & black hat hacking
  • Build your hacking environment by installing VirtualBox, setting up Kali Linux, etc.
  • Easily navigate the Linux terminal
  • Use Tor, ProxyChains & VPNs to stay anonymous and keep your activities covert
  • Steal data, attack routers, use SQL injections, etc.
  • Crack passwords, execute DoS attacks, gain remote control of devices & more

Specs

Details & Requirements

  • Length of time users can access this course: lifetime access
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
  • This item is excluded from coupons.
Your cart is empty. Continue Shopping!
Processing order...