Hack Your Way to Security

Hack Your Way to Security

You can become a hacker, legally and ethically. This course will teach you to think like a hacker as you master the use of hacking tools and techniques to better secure your network and keep your private information private.
6 weeks / 24 Course Hrs
SHARE
  • Details
  • Syllabus
  • Requirements
  • Instructor
  • Reviews

Details

When is hacking legal? When you use it to secure your own network. This course will teach you readily available hacking tools and techniques to audit your network so you can locate and close security holes. You will discover how to better protect your system against those who wish to gain unauthorized access.

In this course, you will discover the complex method of electronic breaking and entering. You'll learn the terms and programming behind the interaction between hardware and software when communicating through a network. Following packets of data from one point to another through an entire network, you will discover where the flaws exist for data loss and security breaches. You'll learn about the seven layers of the OSI model, and the dependencies of hardware and software interaction through packet transmission. Along the way, you will see how private data can quickly become public knowledge. Let this course establish the foundation of your network security. Learn how hackers think so you can harden your defenses against them!

Enrollment Options:
Instructor-Led
6 weeks Access Course Code: hck
Start Dates*Nov 13 | Dec 11 | Jan 15 | Feb 12
*Choose start date in cart
$109.00

Syllabus

If you've ever wondered about the different types of hackers, what motivates them, and when hacking is considered ethical, this lesson answers these questions and more! You'll learn about the white-, black-, and gray-hat hackers, why they hack, the methods they use, and the ethics of computing and hacking. You'll also get your feet wet by learning how to conduct a security audit on your network by trying to penetrate it just as a hacker would!

This is the lesson where you'll learn about people hacking! Social engineering is the official term for the physical and psychological methods hackers use to gain entry to your system. Intrigued? Good. Get ready to learn the insider techniques of how hackers gain information about your networks through preying on the weakest link in any organization—its employees!

If you've ever used the Google search engine to find information on the Internet, you know how powerful it is. Hackers know this too, and they have found a way to use the built-in power of Google to gather information about your network! By learning how the search engine works, you'll see why and how Google stores so much public and private information. Then, you'll learn how hackers extract this wealth of information and how they use it against you.

In this lesson, you'll learn advanced Google hacking techniques so that you can perform a Google hack for your security audit. Get a full list of advanced hacking operators and discover—in depth—the advanced method of querying Google. Through a step-by-step example, you'll see how a search query is performed and what results look like. And of course, you'll learn how to incorporate this hacking method into your own security audit!

Have you ever wondered what really goes on within your network? The OSI 7 Layer Network Model is the standard on which networks are built, so in order to fully understand how networks are hacked, you need to understand this model. But have no fear! You'll learn the purpose, function, and communication methods of each layer within the model

Have you ever wanted to see what kind of information your network is sending out into cyberspace? Well, it's all in the packets. Once you understand the OSI 7 Layer Network Model, you can now understand packets that travel across a network. It's in those packets that hackers can gain the most information about your network. You'll learn how communication between two networks takes place—from the initial handshake to the termination of the connection—and how you can capture packets from your network just as a hacker would.

Now that you've learned how a hacker scouts out your network and gains information, it would be nice to know from what direction they'll attack you from, won't it? Learn how to look for signs that your network has been exposed or penetrated. By understanding the levels of security, from vulnerability through exposure, you'll view a hack through the eyes of a real hacker.

You probably know that common ports connect printers, USB devices, and the like. But, did you know that there are also ports hidden inside your computer? And more importantly, do you know how these hidden ports can endanger you if they are left exposed on your network? In this lesson, you'll look at a PC from the inside out. This lavishly illustrated lesson will help you understand what ports are, where they are located, and what they do. Then, it's a short step to understanding how leaving these ports open can result in a hacker learning the services and software running on your network.

While the term necessary evil is a cliché, there are a few necessary evils in the computing world. In order to make networks function, sometimes you'll need to run programs that might not be good for your network's security. You'll need to learn to manage the risk involved with running these services by understanding what they do, how they operate, and what you can do to keep them from exposing your network core.

Get ready to learn about rootkits in this information-packed lesson! A hacker's best friend, these malicious programs run undetected in the background of your system, launching malicious attacks, sometimes even without your knowledge. It's both hard to find and hard to get rid of rootkits, so for the sake of your PC's security, get ready to apply this lesson today!

Have you ever analyzed your risk? In this lesson, you'll learn how to conduct a risk analysis in order to determine the most vulnerable points within your network. Hand in hand with the analysis is your audit plan, where you can probe your computer or network for the weakest links. And then, you'll learn about what to do once you've found them.

If you like forensics television shows like CSI, this lesson is for you. No PC security course could be complete without an introduction to computer forensics, which is a precise science used to contain security breaches and minimize loss in the event of an attack. Learn how to become a computer investigator so that you'll be prepared if a hacker ever violates your system.

Requirements

  • Adobe Flash Player. Click here to download the Flash Player.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Email capabilities and access to a personal email account.

Requirements:

Hardware Requirements:

  • This course can be taken on either a PC or Mac device. 
  • In addition your primary computer, you will need access to one or more networked computers that do not contain any data you consider sensitive, due to performing security exercises and testing throughout the course.

Software Requirements:

  • PC: Windows XP or later.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Flash Player. Click here to download the Flash Player.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other: Email capabilities and access to a personal email account.

Prerequisites:

  • Completion of the online Introduction to PC Security course (or equivalent experience), or completion of Introduction to Networking course (or equivalent experience).
  • You must be familiar with PC and networking terminology and have at least a basic knowledge of how networks function.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment and will be available online.

Instructor

Debbie Mahler has worked for 15 years in the computer repair industry and runs her own IT business. She teaches on a wide range of business-related topics at the university level and has written six books on the business. She also contributes to several publications. Mahler holds a Bachelor of Art in Applied Behavioral Psychology and the title of Symantec Software Partner and Security Specialist.

Reviews

As with Introduction to PC Security, Debbie Mahler has written another marvelous course in Advanced PC Security. She writes beautifully and the use of analogies is wonderful and makes tough stuff easy to understand. This is a comprehensive and challenging course and very worthwhile; but made easier because of Debbie's great style and manner.

Debbie Mahler is a great instructor. Her courses are the most informative courses I have taken online. The information covered in the course continues to help me long after the courses are completed.

Excellent course and perfect follow-up to the introductory PC security course.

Excellent course. I am still digesting the information. Very informative. Thank you for an excellent course.

Excellent presentation of the material. There were some tough lessons, but the instructor did an outstanding job in making it understandable. I learned lots of very valuable information from this course.

Great course - I would recommend this course to anyone who has an interest in implementing stronger security measures. Highly recommended for small business. Thanks.

Ms Mahler's classes are among the best I've taken. She explains a complicated subject in an understandable concise manner.

I want to commend you on this class, the way you structured and covered your material, and explained the procedure on how to perform the utility and access the data…great class!

You are a great teacher. I have never read a lecture, lesson, or notes that were so enjoyable. I can tell you love what you do because it shows and comes alive in your words. I felt like I was sitting in a actual classroom with you teaching. I think that is pretty remarkable…Thank you so much for being there every time I had a question or problem. Please keep doing what you are doing. It is very refreshing to an adult student who is middle aged and has many obligations. Once again, thank you.

This was the most fun schooling I've had in a long time. Thanks for making it so interesting. I actually looked forward to doing the lessons, and I can't wait to continue practicing what I've learned here.