4.21 out of 5
4.21
8970 reviews on Udemy

Fundamentals of Computer Hacking

Everyone can become a hacker provided they learn it from the basics and build a solid foundation. Start with this course
Instructor:
infySEC Global
145,285 students enrolled
English [Auto]
At the end of your course, students will understand the logic and basics of computer hacking

This Course is the fundamental course on Ethical Hacking which delivers knowledge of real time attack vectors and defensive methods. This course has been designed by group of globally recognized Information Security Professionals to meet the participant and organization expectations. For easy understanding for the participants , LIVE practical demonstration on the appropriate full fledged courses.

This course delivers comprehensive deep understanding of how attacker’s works in dark and methodology they follow to deface a network. In other hand, how the Information Security Professionals working in an organization identifies these methodologies and deface attackers.

This course will give a idea to know how our other full courses will be like.

INTRODUCTION TO HACKING AND SECURITY

1
Introduction

This lecture sets the expectation of this course.

2
What is Information

This lecture briefs about "Information" from a layman perspective.

3
What is Data

This lecture deals with classification of data and need for Information security.

4
Why to Secure

Having seen the need for information security from the previous lecture, this lecture details about "what information security is ?" and briefs about the co-relation between Threat and Vulnerability.

5
What are Threats

This lecture deals with threat classification and its source.

6
Types of Hackers

This lecture gives an overview on classification of hacker and their types.

7
What is a security breach

This lecture explains about the elements of information security such as Confidentiality,Integrity and Availability (CIA triad). This also includes Authentication and Non-repudiation.

8
What is Risk and Risk Assessment

This lecture details about RISK and its classification. This lecture also detail with the list of available Information security Standards and Compliance.

9
What is Hacking

This lecture is an introduction to Hacking and its phases.

10
Overall Course Map

In short, this lecture is the blueprint of this course.

11
Defending and countermeasures

This lecture explains how countermeasures of hacking are dealt in this course.

Malwares

1
Introduction to Malware
2
Objective and Outcome
3
Virus - Introduction
4
Life Cycle of Virus
5
Worms - Introduction
6
Trojan - Introduction
7
Backdoor - Introduction
8
Anti Virus

Information Gathering

1
Objectives and Outcome
2
Introduction
3
Masking Identity
4
SSH Tunnelling
5
Social Profiling of Individual
6
Career Profiling
7
Email Address Harvesting

Network Hacking

1
Objective and Outcome
2
Network Basics
3
Network Hacking - Introduction
4
MAC spoofing
5
MAC spoofing - Exercise
6
Caffee Latte attack
7
WPA Hacking - Protocol

System Hacking

1
Objective and Outcome
2
Introduction
3
System Basics
4
Powering the system
5
Processor - Basics
6
Password Cracking
7
Steganography
8
Game Hacking

Web Hacking

1
Objective and Outcome
2
Web Basics
3
Phishing - Localhost and Server
4
Exercise clip - Phishing - Local Host
5
SQL Basics

Advanced Web-Hacking

1
Objective and Outcome
2
Phishing - Full Screen API

The method of sending fraudulent emails, probing people to disclose sensitive data such as user credentials, financial information etc., is called Phishing. This lecture explains how this can be done via the Full Screen API technique.

3
Exercise clip - Phishing - Full Screen API

A step-by-step approach on how to perform Phishing via Full Screen API.

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.2
4.2 out of 5
8970 Ratings

Detailed Rating

Stars 5
3704
Stars 4
3112
Stars 3
1652
Stars 2
291
Stars 1
211
ea192ada1157f92e31e2488f6573fefa
30-Day Money-Back Guarantee

Includes

2 hours on-demand video
Full lifetime access
Access on mobile and TV
This website uses cookies and asks your personal data to enhance your browsing experience.