Hacking Basics Course  

 

What are Hackers and How do they Steal Information

 

The Hacking Basics course offers the following:

  • ways that a hacker penetrates a web server, network or computer,
  • understanding of cyber criminal activities,
  • learn tools and methods used for cyber attacks, and
  • acquire preventive techniques to defend against cyber attacks.

The Hacking Basics course presents the various ways hackers can penetrate computer network systems and methods to confront such attacks. This course specifically presents the various ways that a cyber criminal or hacker attempts to penetrate and infect a computer network or personal handheld device in order to steal information, ask for ransom, disable, or control a device. Beyond learning the most common cyber attacks and techniques, the course also presents preventive measure and actions a person can take to protect and defend themselves from a cyber attacker.

The lessons learned through this course expose students to the do's and don'ts of daily computer use and ways to protect from cyber theft. These are lessons that protect students from identity theft, monetary theft, and information/data theft that serve a benefit for the long-term use of computers and the Internet.

The Hacking Basics course is a basic introductory course for students interested in learning the techniques of how a hacker penetrates a web server, network, or computer in order to provide a broad understanding on how to defend against these types of cyber attacks.

Note: The Hacking Basics Course requires additional materials. This includes the textbook, which is used in all three cybersecurity courses. This textbook is ordered separately and is not included as part of the course.

Start this course

Table of Contents


      History of Attacks

      Types of Hackers

      Types of Attacks

      History of Hacking

      Reconnaissance

      Stages of Reconnaissance

      Reconnaissance Tools

      Scanning

      Vulnerability Scanners

      Port Scanners

      Points of Entry

      Exploitation

      Exploitation Tools

      Common Exploitation Tools

      Password Cracking

      Medusa Tool

      Web Applications

      Pen Testing

      Web Exploitation

      Web Users

      Open Ports

      HTTP

      Web Vulnerabilities

      Quiz

Required Materials:

Cybersecurity Online Workbook: COW: Hacking Basics, $16.95 (required)
167 pages, ISBN-13: 979-8815897984 https://www.amazon.com/dp/B0B14RT6RY

Cyber Basics: An Introduction to Cybersecurity, $9.99 (required)
53 pages, ISBN-13: 979-8378057221 https://www.amazon.com/dp/B0BZ2R4YDR