Join more than 70,000 students learning coding and hacking from Dr. Bryson Payne, and 12,000+ students in his top-rated, hands-on Ethical Hacking + Cybersecurity course.
Join more than 70,000 students learning coding and hacking from Dr. Bryson Payne, and 12,000+ students in his top-rated, hands-on Ethical Hacking + Cybersecurity course.
New and updated for VirtualBox 6.1 and Kali 2022 and later. Learn Ethical Hacking, one of the fastest-growing and highest-paying careers, with over 1 Million cybersecurity job openings available this year. Learn practical, useful cybersecurity step-by-step from Computer Science Professor Dr. Bryson Payne, a SANS|GIAC Certified Pen Tester (GPEN), Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP), and author of the Amazon #1 New Release and Top 10 Best Seller, Teach Your Kids to Code (2015, No Starch Press) and his latest book, Go H*ck Yourself (2022, No Starch Press). Dr. Payne is also the Coordinator for Cyber Program and the founding Director of the Center for Cyber Operations Education at the University of North Georgia and directs the UNG National Cyber Warrior Academy summer program. He served as a member of the Coaching staff for the US Cyber Team in the first-ever International Cybersecurity Competition in Athens, Greece in 2022 and continues to serve as a Senior Tech Mentor for Reverse Engineering for the 2022-2023 team.
Update 2022: Just added a new lesson in Section 5 on Social Engineering/Phishing, and...Order Dr. Payne's new book, "Go H*ck Yourself" on Amazon or at No Starch Press now.
Give Yourself a Huge Advantage in a High-Tech World
Quickly master new hands-on skills in Linux, Windows and Android hacking and cybersecurity.
Set up your own safe, FREE virtual network and VM (virtual machine) lab for Ethical Hacking on your PC, Mac, and Linux.
Protect yourself from viruses, phishing, ransomware, and other attacks by learning how the bad guys work, and how to stop them.
Includes Mobile Hacking on your own Android VM, plus Car Hacking using can-utils and ICSim on Kali Linux.
Great for beginners, or for capable computer users who want to learn both how and why to secure their data.
Learn to fix vulnerabilities, and how to stop 85% of attacks by doing just four things.
This is the security course everyone should take.
Packed with real-world, practical examples, real hacking techniques, and easy-to-follow plain English instruction, Real-World Ethical Hacking is the course for the new generation of cyber heroes, as they build one of the top job skills of the 21st century. With over S. this year alone, and over 6 Million openings expected worldwide over the next few years, now is the time to skill up in cyber.
I designed this course to be easily understood by beginners, with examples I use in my college information security courses and in high-school cyber summer camps. Whether you're retooling for a career change, adding skills to your resume for a raise, or just getting started, Real-World Ethical Hacking is the course for you.
Quick, 4- to 10-minute lessons will get you performing real ethical hacking exercises in minutes. Over 75 video lectures and more than 10hours of content will give you the practice you need to develop powerful new skills in cybersecurity and penetration testing. Protect your identity, your computer, your information, and your life - avoid social engineering, phishing, online attacks, ransomware and more. Plus, practical skills like:
Retrieve files from an old computer (Mac or PC, laptop or desktop), even if you've forgotten the password
Set up a virtual "sandbox" to safely open suspicious files without exposing your "real" computer
Learn command-line short-cuts and power tools that make you look like a computer wizard.
Understand how viruses and backdoors infect your computer AND phone, and how to stop them.
Everything you need to get started right away
Complete with all FREE online resources (VirtualBox, Kali Linux, and You'll also receive a Certificate of Completion upon finishing the course.
No Risk: Preview videos from Sections 1, 2, and 4 now for FREE, and enjoy a 30-day money-back guarantee when you enroll - zero risk, unlimited payoff. And, we've made this course easy to afford so anyone can get started now.
Sign up for this course and get started securing yourself, your family, and your business today.
New section on Car Hacking shows how to perform a Replay Attack on your car's Controller Area Network (CAN) using a $20-$70 cable and Kali Linux running CANsniffer and CANplayer.
Praise for Dr. Payne's courses on Udemy:
"Inspired" - ...An inspiring course taught by an inspired teacher. The examples are well-chosen demonstrating principles through engaging, colorful projects rather than by teaching abstract principles first... — Kent Osband, Udemy student
Clear examples... Bryson's delivery is well paced and good fun. — Sean Jon Darcy, Udemy student
"Dr. Bryson Payne is a computer scientist and professor of the highest caliber... he brings the power of computers within easy reach for learners young and old."—Dr. Antonio Sanz Montemayor, Informatics Professor, Universidad Rey Juan Carlos, Spain
Real-World Ethical Hacking is based on lessons taught in the National Cyber Warrior Academy, but this video course is not endorsed or sponsored by the University or by the NSA. All opinions expressed are the author's alone, and even ethical hacking carries some risk. Please use the tools and techniques in this course responsibly and ONLY on computers you own or have express, written permission to test.
Our first hands-on, real-world ethical hacking exercise: Hacking Windows, resetting a password and creating new admin users, using a boot disk.
The attack vector for this hack will be the Windows "Sticky Keys" app SETHC.EXE, triggered any time you press the SHIFT key 5 times in Windows.
Where to get a legal copy of Windows 10 Enterprise, and how to burn your own Windows 10 install/boot disc.
Just two reboots, two special keys, and four commands to PWN any Windows PC.
Second reboot, second key combo, and final two commands to add an admin/root/super user to any Windows box from Windows XP to Windows 10.1!
Stage 3: Gaining Access! Log in as root/super/admin user and recover your files!
Lessons Learned:
To protect against this hack:
Updated for VirtualBox 6.1 and newer - get started building your FREE ethical hacking virtual lab with Oracle VirtualBox on Mac, Windows, or Linux.
Updated for Kali Linux 2020.2 and newer versions!
Display output like a table (| column –t):
mount | column –t
cat /etc/passwd | column -t -s :
Go back to previous directory: cd -
Turn on aliases in your .bashrc alias ll=‘ls -l’; alias la=‘ls -a’
Run multiple commands: ; (in order) or && (if successful)
Reuse last argument: !$ Reuse last command: !! (e.g. sudo !!)
Reverse text (rev): echo hello | rev
Draw banner letters (figlet): figlet hello
clear [also ctrl+L]
cal [calendar] factor 24 [factors…] > filename [empty file]
head [top of file] tail [last few lines] grep [superfind]
2022 Update: If you're having trouble cloning a site in the previous lesson, try the Web Site Templates option in SET (press 1, 2, 3, 1, then choose any of the three pre-made web site templates, I chose Twitter). SET provides three usable templates to show how easy it is to trick users into filling in their username and password in a phishing site.
A quick review and bonus on cloning Twitter's login page, updated for Kali 2020.2 and later.
See how easily attackers can create malware to take over your computer - you'll never want to click on a suspicious file again!
In this lesson, you learn to run the Apache web server on Kali to share your virus as a downloadable file to Windows 10.
We'll add USB support, attach a WebCam to the Win10 VM, and temporarily turn off the Windows Firewall and Virus Protection to make it a little easier for our first virus to infect the Windows 10 VM.
2022 Updated step-by-step instructions for reverse-engineering each function in your car by interacting with the CAN bus, finding the CAN bus IDs of the system you're changing, then determining the data values for that function and resending them one-by-one using the cansend command. A full start-to-finish tour of car hacking in 30 minutes or less!
If you're having trouble running the CAN tools, ICSim, cansniffer, etc., it could be because of video scaling on larger monitors. Be sure to change your View>Virtual Screen 1>Scaling to 100% (unscaled output) to fix VirtualBox's performance issues on high-resolution monitors. Then, you should be able to resize text inside the VM, as well as use your Magnifier tool in Windows or Zoom accessibility tool in MacOS, to be able to view your VM well without the extreme lagging that Video Scaling causes in VirtualBox. Search "VirtualBox VM slowness" in Google to find the most up-to-date fixes. My performance was more than 4x faster after fixing the scaling issue!
Win7 isn't available from Microsoft anymore as a free VM, but I've included this lecture because you can still hack (and defend) a real Windows 7 computer, and there are millions of them still in use in businesses and homes - maybe even yours!
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.