Certified White
Hat Hacker
Get your certification as a
"Certified White Hat Hacker"
We read about it every day how companies such as Target, Home Depot, and organizations such as the Democratic National Convention (DNC) have been hacked. The reason why these companies and organizations like them keep getting hacked, is often because the "Computer Security Experts" they hire have likely never been taught to hack anything, except through a virtual server.
The purpose of this course is to give students of all backgrounds and experience levels, a well-researched and engaging introduction to the realm of becoming a real hacker. Starting with the first step of thinking like a hacker. With real-world examples that reflect today's most important and relevant security topics. This course addresses how and why people attack computers and networks, so students can be armed with the knowledge and techniques to successfully combat hackers.
Because the world of hacking changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts.
Many hands-on exercises are included that allow students to practice the skills they have learned in hacking into real networks and/or websites.
Unlike other PenTest or Ethical Hacker courses, Certified White Hat Hacker teaches you how to use hardware that requires very little knowledge to perform attacks, including attacks on cell phones.
This Course Includes Videos, Pdf's, Challenges, Labs And More
Support
Career In Cyber Security
Cyber Defense - Military Training for Cyber Warfare
What You Should Expect
Security Controls
What Is Hacking
Why Hacking?
Why Do We Hack?
Ethics
Methodology
Types Of Attacks
Skills Necessary And Skills To Be Learned
What Is Penetration Testing Scope
Chapter Quiz
Computer Security Dictionary
Linux Is A Must
How To Install Kali Linux As An App In Windows 10
Linux For Beginners
About Kali
Installing And Running Kali On Your Windows 10 Computer
Kali Linux Installation on Flash Drive
Kali Linux Installation in VirtualBox
100 Hacking Tools and Resources
What You Need to Know Before Starting
About Burp Suite For Web Applications
Download Burp Suite Mac OS
Download Burp Suite For Windows
Setting Up A Proxy
Ethics of Hacking and Cracking
Hacking Laws Examples
Example Of A Pen-Testing Agreement
Quiz - The Law
Learn the Basic Reconnaissance
Reconnaissance
Download Footprinting and Reconnaissance Tools
Web Data Extractor
Who Is
Google Hacking Database
Introduction To Skipfish
Using Skipfish Video Part 1
Using Skipfish Video Part 2
What is Banner Grabbing
Open Source Intelligence
Footprinting
The Way Back Machine
Using Your Resources
Whois Lookups
Using DNS To Extract Information
Finding Network Ranges
Google hacking
Mining For Information Using Google Hacking
Hacking Databases With Google
Download Wireshark
Capturing and Analyzing Data with Wireshark
History of TCPIP
How To Use Wireshark To Examine Packets
OSI And IP Models
Addressing
Learning UDP
Learning TCP
Services
Using Wireshark For Deep Analysis
DHCP
Using ARP
Quiz
History Of Cryptography
Types Of Cryptography
Public Key
Certificates
What Is A Hash
AES, DES And 3DES
SSH
Disk Encryption
Cryptographics
What Are The Types Of Cryptography
Learning Password Basics
Whats The Best Way For Cracking Passwords
Encryption and Password Cracking
Public Key Cryptography
Using Dictionary Password Cracker
Download Encryption, Cryptography and Password Cracking Tools
Download System Hacking
Understanding Password Storage
What Are Digital Certificates
How To Find Hidden Passwords
Introduction To Password Security
How To Use Tunneling and Pivoting
What Is SSL
Vulnerability And Scanning Tools Techniques
What Is Footprinting?
Download Sanning Network Tools
Download Nessus
Using Nessus
Using WordPressScan, Part 1
Using WordPressScan, Part 2
Types Of Scans
Using Nmap
Using Hping And Its Uses
War Dialing
IDS Evasion
Banner Grabbing
Vulnerability Scanning
Using Nessus
Enumeration Techniques
SNMP
LDAP
Using Proxies
Tor And Anonymizers
Tunneling
Breaking Download the 5 Phases of Hacking
The Scope Of Penetration Testing
5 Stages To Computer Hacking Broken Down
Pent Testing Work Flow
The Goals Of A Pen-Testing
Password Cracking And Complexity
Password Attacks
Password Storage Tehniques
Escalating Privileges
Spyware, Rootkits And Key Loggers
Spyware, Rootkits And Key Loggers
Metasploit Basics
Auditing And Logging
Metasploit Attack Basics
Network Security Tutorial - Introduction
Network Security Tutorial - Basic Overview
Network Security Tutorial - Using Tools and Exploits
Network Security Tutorial - FTP Login
Network Security Tutorial - Setting Up Metasploitable
Network Security Tutorial - Payloads and Backdoors
Metasploit Scripts
Scanning for access with smb_login
VNC Authentication
Hacking Databases
TFTP Fuzzer
Simple IMAP Fuzzer
Web Application Hacking
Web Application Hacking - Part 2
Web Application Hacking - Part 3
Mapping A Website Using Sitemap
Web Application Hacking - Part 5
Web Application Hacking - Part 6
Web Application Hacking - Part 7
Web Application Hacking - Part 8
Web Application Hacking - Part 9
Web Application Hacking - Part 10
Web Application Vulnerabilities
Quiz
Wireless Networking Overview
WEP, WPA, WPA2 Encryption
Finding Hotspots
Breaking WEP Encryption
Rogue Access Points And Attacks
Wireless Sniffing
Protecting Wireless Networks
Steganography
What Is Evasion And Why Do We Use It
The Most Dangerous Viruses Of All Time
Definitions And History
Trojan Horses
Detection Of Malware
Anti-Virus Evasion
Types Of Viruses
Deploying Of Malware
Analyze Malware
Windows ADS And Hiding Malware
Debugging
Packing And Automated Anti-Virus Maker Tools
More Malware Analysis
Download Malware Tools
How To Make A Worm - Student Taught
Virus Maker - Student Taught
Programming Exploits
Memor Layout - Stacks And Heaps
Buffer Overflows
Protecting Buffer Overflow Attacks
Format String
De-Compilation
Reverse Engineering
Download Session Hijacking
In's and Out's of Session Hijacking
Session Hijacking
Understanding And Using Sniffers
Now That Your In....
Windows Hacking
What Is Computer Networking
What Is LDAP
How Can I Use A Browser To Hack
Which Web Browser Is Best For Security
Browser History, Bookmark, and Cache
Important Browsers Files
Cookie Files
What Is PHF
Using The "Test" Hack
How To Use "~" Character
The JJ.c Problem
The Deal With Forms
What It Looks Like In The Log
How To View Passwords In A Browser
Hacking Network Devices
Hacking Hardware 2
Windows ADS ( Alternate Data Stream)
Using log files for Hacking
Introduction to SNMP
How To Turn On The Camera On Mac OS, To Spy.
How to Hack Unix and Linux
Buffer Overflows Technique
How To Exploit A Buffer Overflow
Denial Of Service Attacks
Download Denial of Service Tools
What Is A Dos And DDoS Attack
Dos Attacks
Cyber Crime
Botnets
Attack Countermeasures
Mail Vulnerabilities
How To Perform A Phishing Attack
Download Password Hacking Tools
How To Perform A Phishing Attack
Incident Handling
Leave No Trace Behind
Final Exam Project
Challenge labs are goal oriented, short-duration, scenario-based hands-on exercises. Ideal for cloud technologies, they provide skills development and assessments across multiple platforms and technologies.
Add challenges labs to your organization’s existing offerings to set yourself apart from your competition and drive true value for your customers. They are useful before, during and/or after training.
Students will receive digital badges upon the completion of certain challenge labs or challenge lab collection.
Each Challenge badge image contains personalized metadata which tie the badge to your personal certification achievement hosted on Credly’s Acclaim platform.
Your Challenges badge can be used to highlight your achievements across multiple media and all major social networks, like LinkedIn, Facebook and Twitter. Sharing your Challenges badge is a great way to develop your professional brand and let everyone know that you’ve completed a hands-on lab learning experience in your technical area. You can begin sharing from Credly’s Acclaim platform once your badge is accepted and your account is created.
As Of April 24th, 2020 There Are 77 Challenges Available.
Name | Description | Time |
Backup and Restore Data in Linux [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Backup and Restore Data in Windows [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Can You Add Server Access for a Group? [Advanced] | In this challenge, you will configure shared access to a server. First, you will add three user accounts. Next, you will create a new group, and then you will add the user accounts to the new group. Finally, you will verify that the new users can access the server via SSH.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 45 Min. |
Can You Backup and Restore Data in Windows and Linux? [Advanced] | This challenge is currently in development. Details will be published soon. | 45 Min. |
Can You Configure Alerts and Archiving for Log Files in Linux? [Advanced] | In this challenge, you will use Logwatch and Logrotate to manage Linux log files.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 45 Min. |
Can You Configure Drive Encryption by Using LUKS and BitLocker? [Advanced] | In this challenge you will implement LUKS drive encryption on a Linux system and BitLocker drive encryption on a Windows system. NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 45 Min. |
Can You Configure Patch Management in Linux and Windows? [Advanced] | This challenge is currently in development. Details will be published soon. | 45 Min. |
Can You Configure Remote Administration Using Putty and SSH? [Expert] | In this challenge you will use PuTTY and SSH on Windows and Linux to provide secure remote administration. NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 60 Min. |
Can You Configure Standard Linux and Windows Permissions? [Advanced] | This challenge is currently in development. Details will be published soon. | 45 Min. |
Can You Configure the Firewall in Linux and Windows? [Advanced] | This challenge is currently in development. Details will be published soon. | 45 Min. |
Can You Deploy a Certificate Authority and Issue Certificates? [Advanced] | In this challenge, you will install the Window Server Certification Authority role and configure an Enterprise root CA. Next, you will customize a certificate template and use it to automatically issue code signing certificates to Active Directory users.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 45 Min. |
Can You Discover Network Services by Using Nmap? [Expert] | In this challenge, you will use Nmap to gather information about network services.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 60 Min. |
Can You Enumerate Network Services by Using Port Scanning in Linux? [Advanced] | In this challenge you conduct network scanning to discover MAC addresses, IP addresses, and listening ports on a target server.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 45 Min. |
Can You Harden a Linux Web Server? [Expert] | In this challenge, you will secure SSH access to a server. First, you will create a new group, and then you will create two new users and add the users to the new group. Next, you will configure passwordless authentication, and then you will prevent the root user from logging in via SSH. Finally, you will restrict SSH access to users from a specified network, and then you will configure SSH to run on a non-standard port.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 60 Min. |
Can You Harden a Server By Restricting Access Per Protocol? [Advanced] | In this challenge, you will add blacklisted IP addresses to your web server, and you need to allow access to the server from a specific network only. First, you will allow access to a web server for everyone. Next, you will add blacklisted IP addresses to the web server, and then you will test access to the web server from a blacklisted IP address. Finally, you will allow access to a server from a specified network.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 45 Min. |
Can You Harden SSH on a Linux Server? [Advanced] | In this challenge, you will improve the security posture of your organization. First, you will determine which services are actively responding to network requests. Next, you will configure the service to run on a non-standard port by modifying the service configuration file for the running service. Finally, you will ensure that the root account is not allowed to log in by using a remote connection.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 45 Min. |
Can You Harden Windows Hosts? [Expert] | In this challenge, you configure Windows firewall rules, Group Policy security settings, IPSec and a PPTP VPN server.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 60 Min. |
Can You Manage Access in Linux and Windows? [Expert] | This challenge is currently in development. Details will be published soon. | 60 Min. |
Can You Manage Password Requirements in Windows and Linux? [Advanced] | This challenge is currently in development. Details will be published soon. | 45 Min. |
Can You Manage Users and Groups Windows and Linux? [Advanced] | This challenge is currently in development. Details will be published soon. | 45 Min. |
Can You Manage Windows and Linux Systems? [Expert] | This challenge is currently in development. Details will be published soon. | 60 Min. |
Can You Secure a Website with an SSL/TLS Certificate? [Advanced] | In this challenge, you will enable HTTPS for a web site and require trusted client PKI certificates.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 45 Min. |
Can You Secure DNS Resource Records and Windows NTFS Volume File Objects? [Advanced] | In this challenge, you will enable DNSSEC on clients and server and protect data at rest using Microsoft Encrypting File System.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 45 Min. |
Can You Secure Host Settings through Firewall Settings and Group Policy? [Advanced] | In this challenge, you will configure the Windows firewall, configure Group Policy password and file system auditing settings.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 45 Min. |
Can You Secure Network Access? [Advanced] | In this challenge, you enable IPSec to secure LAN traffic, and you configure a PPTP VPN server and client.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 45 Min. |
Can You Use PowerShell to Gather Computer Information in Windows? [Advanced] | In this challenge you will gather system information by creating simple PowerShell scripts.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 45 Min. |
Can You Use the Sysinternals Suite to Review Permissions on a Windows System? [Advanced] | In this challenge you will use the Sysinternals AccessChk and AccessEnum tools to verify permissions, as well as the Icacles tool to set and verify permissions.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 45 Min. |
Can You Use Wireshark to Intercept Network Traffic? [Advanced] | In this challenge, you will use Wireshark to intercept and read network traffic.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 45 Min. |
Configure a Local Security Policy on Windows Server 2016 [Guided] | In this challenge you will use the Windows Server Local Security Policy to configure local password requirements, auditing, and additional security settings. NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Configure a Windows PPTP VPN [Guided] | In this challenge, you configure a Microsoft Windows Server PPTP VPN with static VPN client IP addressing.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Configure and Test the Firewall in Linux [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Configure and Test the Firewall in Windows [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Configure Custom Certificate Templates and Deployment Options [Guided] | In this challenge, you will configure a custom PKI certificate template; then you will configure certificate auto-enrollment using Microsoft Group Policy.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Configure IPSec [Guided] | In this challenge, you will secure LAN traffic using IPSec.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Configure Linux Firewall ACL Rules [Guided] | In this challenge, you will configure Linux firewall rules using uncomplicated firewall (ufw).NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Configure Password Management in Linux [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Configure Password Management in Windows [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Configure Patch Management in Linux [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Configure Patch Management in Windows [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Configure Security Settings Using Microsoft Group Policy [Guided] | In this challenge, you configure password policy and general security settings through Group Policy.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Configure SSH to Connect Without Passwords [Guided] | In this lab, the user will set up a connection to an SSH server to use a key pair and disable the ability to log in using passwords.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Configure Standard Linux Permissions [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Configure Standard Windows Permissions [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Configure Windows Defender on a Windows System [Guided] | In this challenge you will use Windows Defender to manage potentially malicious software.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Configure Windows Firewall ACL Rules [Guided] | In this challenge, you will configure Windows firewall settings using the GUI and PowerShell.4Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Deploy a Private Certificate Authority [Guided] | In this challenge, you will install and configure an Enterprise Root Certification Authority.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Enable Client SSL/TLS [Guided] | In this challenge, you will configure an IIS web site to allow access only to trusted client devices.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Enable DNSSEC [Guided] | In this challenge, you will configure DNSSEC to harden DNS client and server interactions.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Escalate Privileges in Linux [Guided] | During this challenge you will exploit the misconfiguration of the find and the Vim commands, and then elevate your privileges to those of the administrator.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Examine Log Files to Block Bad Actors [Guided] | In this challenge, you will log files containing forensic evidence of events that occur on a Linux system, see failed login attempts on your servers in system log files, and protect your server by adding blocks for the originating IP addresses.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Force Users to Change Password Upon First Sign In [Guided] | In this challenge, you will create a new user account and set their password to expire upon first login so that they are forced to create their own password.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Getting Started with Cybersecurity Defensive Tools [Getting Started] | In this lab, you will manage log files in Windows Server and Linux. You will configure security tools and audit permissions. You will confirm file integrity. Finally, you will manage secure remote administration. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Getting Started with Cybersecurity Offensive Tools [Getting Started] | In this lab, you will capture network traffic, identify network services,and gather system information. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Getting Started with Managing Access in Linux and Windows [Getting Started] | This challenge is currently in development. Details will be published soon. | 60 Min. |
Getting Started with Managing Linux and Windows Systems [Getting Started] | This challenge is currently in development. Details will be published soon. | 60 Min. |
Getting Started with PKI Essentials [Getting Started] | This challenge is currently in development. Details will be published soon. | 60 Min. |
Getting Started with Security Concepts in Windows and Linux Environments [Getting Started] | In this lab, you will configure fundamental computer security settings in Windows and Linux environments. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 60 Min. |
Getting Started with Security+1 [Getting Started] | In this lab, you will configure security and permissions in an Ubuntu Linux environment, perform a port scan of a Linux server, edit the /etc/ssh/sshd_config file to secure SSH access, create an administrative user, create additional groups and add users to the groups, edit the /etc/hosts.allow and the /etc/hosts.deny files to increase security on the Linux server, and use Nmap to verify that the TCP port has been successfully changed. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 60 Min. |
Harden a Server by Limiting Access to a Single Subnet [Guided] | In this challenge, you will limit access to a system to a single subnet by editing the /etc/hosts.deny file and denying all traffic to this system, editing the /etc/hosts.allow file and allowing SSH traffic to this system from a single subnet, demonstrating that access has been limited, and allowing your subnet access to the system and test connectivity.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Identify Attack Types [Guided] | In this challenge you will identify attack types in a scenario-based format. These attack types represent many of the hands-on challenges in this series.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Identify Non-Secure and Secure Network Traffic [Guided] | In this challenge, you will capture and analyze HTTP and FTP network traffic.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Identify Standard Security Practices [Guided] | In this challenge you will identify standard security practices in scenario-based questions.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Identify Tools and Practices for Security Configurations [Guided] | In this challenge you will identify log file management tools, antimalware concepts, encryption concepts, remote administrations practices, and baseline configurations.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Identify Use Case for Asymmetric and Symmetric Encryption and Hash Cryptography [Guided] | In this challenge you will identify general encryption concepts, symmetric encryption attributes, asymmetric encryption attributes, and hash cryptography.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Manage Log Files on a Windows Server [Guided] | During this challenge you will view and manage log files by using Event Viewer in Windows.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Manage Users and Groups in Linux [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Manage Users and Groups in Windows [Guided] | This challenge is currently in development. Details will be published soon. | 30 Min. |
Manually Request a PKI Certificate [Guided] | In this lab, you will use the CertMgr MMC tool to request a computer certificate; then, you will export the certificate and private key for backup purposes.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Remove a User Account from a System [Guided] | In this challenge, you will remove a user account from a system. First, you will disable the user account, copy the user's file to a secure location, and then remove the user's account from the system.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Run a Network Scan Using Nmap [Guided] | In this challenge, you will scan network hosts for open ports and OS information using nmap.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Test and Mitigate Default Port Vulnerabilities in Linux [Guided] | In this challenge, you will verify what services are exposed to your external connection and learn how you can change your default ports to secure your services.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Use a Password Cracking Utility in Linux [Guided] | In this challenge you will use John the Ripper to audit passwords. NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Use Banner Grabbing Techniques to Enumerate Services on a Linux Server [Guided] | In this challenge, you will use telnet, ftp, curl, ssh and Firefox to gather system information by using banner grabbing.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Use EFS to Encrypt Files on NTFS Volumes [Guided] | In this challenge, you will protect data at rest using Windows Encrypting File System.Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
Use Encryption to Secure Information [Guided] | In this challenge you will create an asymmetric key pair for the SSH service, view a web certificate, and verify file integrity by using MD5 hashes.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Use Tcpdump to Intercept Network Traffic [Guided] | In this challenge you will use tcpdump to intercept and read network traffic.NOTE: Before you begin, please ensure you have set aside enough time to complete this challenge as you will not be able to pause, save, or return to your progress. | 30 Min. |
Web Site SSL/TLS Enablement [Guided] | In this challenge, you will configure a web site with a PKI certificate to enable HTTPS connectivity. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start. | 30 Min. |
After registration, you will have 1 year access to all course material.
$99.95
Pay Monthly