BENEFITS
Best Seller
Online Courses
24/7 Support
Lifetime Access
Get Certificate
Offer Curriculum
1. Real-World Ethical Hacking 1 Hacking Windows!
Available in
days
days
after you enroll
- 1. Introduction (1:05)
- 2. Overview What is Ethical Hacking (11:21)
- 3. Hacking Windows (2:15)
- 4. The Sticky Keys Hack (2:38)
- 5. Burning a Legal Windows 10 Install Disc (4:01)
- 6. The Sticky Keys Hack First Reboot and Exploit (7:14)
- 7. The Hack (cont.) Second Reboot and Compromise (4:36)
- 8. Hack Finale Logging in as Administrator! (6:55)
- 9. Review (4:17)
- 10. BONUS Mac Root Hack! (8:40)
- Mac-Hack
- Windows-Sticky-Keys-Hack
2. Create Your Own Virtual Hacking Lab!
Available in
days
days
after you enroll
3. Important Linux and Windows Terminal Commands
Available in
days
days
after you enroll
- 1. Intro to Command-Line Linux and Windows (1:34)
- 2. Basic Linux Commands (7:43)
- 3. Command-Line Linux File Magic! (6:10)
- 4. More Helpful Linux Commands (7:06)
- 5. BONUS Fun Linux Terminal Commands (Optional) (11:30)
- 6. Basic Command-Line Commands for Windows (5:04)
- 7. Windows File Commands (5:05)
- 8. Advanced Windows Command-Line Commands (5:04)
- 9. Command-Line Review for Linux and Windows (5:07)
- Real-World-Linux-and-Windows-Commands
4. Create a Virtual Network for Ethical Hacking!
Available in
days
days
after you enroll
5. Social Engineering Capturing Usernames and Passwords via Phishing
Available in
days
days
after you enroll
- 1. Intro to Social Engineering (7:57)
- 2. The Social Engineer's Toolkit in Kali Linux (4:37)
- 3. Cloning Facebook and Harvesting User Passwords (9:58)
- 4. Intro to Spear-Phishing (6:20)
- 5. Advanced IP Address Masking Hiding Your Real URL (8:21)
- 6. Crafting the Perfect Spear-Phishing Email (7:54)
- 7. Capturing the User's Login and Password in Kali (7:51)
- 8. BONUS Cloning Twitter - Easy as 1-2-3-2! (3:22)
- 9. Review Social Engineering Techniques (7:26)
- 10. Stopping Phishing at Work and at Home (8:59)
6. Recon Information Gathering, Scanning and Enumeration
Available in
days
days
after you enroll
- 1. Information Gathering Passive vs. Active Reconnaissance (3:44)
- 2. OSINT (Open-Source INTelligence) Framework Domain Dossier (4:59)
- 3. theHarvester How hackers find users and email information for phishing (10:24)
- 4. Recon-ng Enumeration of servershosts with Recon-ng (5:59)
- 5. nmap Active Scanning with nmap (10:09)
- 6. Legion Active network and vulnerability scanning with LEGION GUI (10:20)
7. Remote Hacking Win10 Attack Phase
Available in
days
days
after you enroll
- 2. Intro to Metasploit The Hacker's Swiss Army Knife (3:55)
- 1. Hacking Win10 The Attack Phase (4:02)
- 3. Creating Your Own Virus with Metasploit (7:20)
- 4. Sharing the Malware over the Web (4:16)
- 5. Prep Win10 for Hacking USB, WebCam, Firewall and Antivirus (6:28)
- 6. Infecting Your Windows 10 VM with the Virus (8:09)
8. Hacking Win10 Command & Control Phase
Available in
days
days
after you enroll
- 1. Attack Phase RecapReconnecting in Meterpreter (7:10)
- 2. Intro to Meterpreter Your Remote Attack Shell! (5:43)
- 3. Viewing, Downloading and Uploading Files with Meterpreter (5:19)
- 4. Stealing Screenshots, Keystrokes, and ,Webcams (10:23)
- 5. How Attackers Steal Windows 10 Passwords Privilege Escalation (13:26)
- 6. Defending Yourself from Malware Attacks (8:31)
9. BONUS Section Car Hacking in Kali Linux!
Available in
days
days
after you enroll
- 2. Update Installing can-utils and ICSim on Kali 2020 and newer (7:51)
- 1. Intro to Car Hacking! (4:41)
- 3. Running the Car Dashboard Simulator ICSim (8:02)
- 4. Capturing CAN Traffic with CanSniffer (5:56)
- 5. The Replay Attack Replaying CAN Packets with CANplayer (7:19)
- 6. Car Hacking Review (7:52)
- 7. BONUS Reverse Engineering the CAN Bus (13:52)
- 8. BONUS Hacking the Car Hacking Software, to 1000 mph! (11:34)
- 9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017 (9:44)
10. BONUS Hacking Windows 7 with Metasploit!
Available in
days
days
after you enroll
- 1. Intro to Hacking a Real Win7 Box (4:16)
- 2. Intro to Metasploit (4:01)
- 3. Setting up Guest Additions in VirtualBox (6:46)
- 4. Creating an Exploit Payload with Metasploit (6:15)
- 5. Sharing the Exploit over the Web (4:42)
- 6. Running the Exploit to Hack Windows 7 (4:34)
- 7. Intro to Meterpreter Your Remote Attack Shell! (3:06)
- 8. Privilege Escalation Gaining Root Access and Dumping Password Hashes (9:05)
- 9. Metasploit & Meterpreter Review (4:30)
11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking
Available in
days
days
after you enroll
- 2. Hijacking Stored Passwords from Chrome and Firefox (8:15)
- 1. Six Problems with Passwords (4:31)
- 3. Sniffing the Network Installing Wireshark (6:53)
- 4. Sniffing Unencrypted Passwords with Wireshark (7:58)
- 5. Cracking Passwords with Kali and Online Tools (9:08)
- 6. Seven Things You Can Do for Safer Passwords (8:58)
12. Web Hacking - Testing and Securing Web Applications
Available in
days
days
after you enroll
13. Mobile Hacking on Android
Available in
days
days
after you enroll
14. Bonus Videos National Cyber Warrior Academy, Interviews and More
Available in
days
days
after you enroll
- 2. NCWA 2016 (1:21)
- 1. Bonus videos from the National Cyber Warrior Academy (1:08)
- 3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming (19:53)
- 4. WDUN Radio Interview July 2017 on Cybersecurity Jobs and NCWA (7:57)
- 5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy (15:17)
Special Offer