Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Course Curriculum

  • 1

    Welcome to "The Anatomy of a Cyber Attack"

    • Introduction (...and now the moment you've all been waiting for!)

    • Creating Our Lab Environment (...our own special little place to hack)

    • Installing Kali Linux (...our attack platform)

    • An Important Course Message

    • Installing Windows (…our first victim)

    • Installing Metasploitable (...another victim for our amusement)

  • 2

    Security (...and the threats to it)

    • The CIA Triad (...we aren't talking about intelligence)

    • Hackers, Crackers, and Attackers (...Oh My!)

  • 3

    The Hacker Methodology (...a malicious mindset)

    • The Hacker's Methodology (...a malicious mindset)

    • Ethical Hackers (...isn't that an oxymoron?)

  • 4

    Step 1: Reconnaissance (...I can see you but you can't see me)

    • Reconnaissance (...I can see you but you can't see me)

    • Lab (...Getting Creepy)

    • Lab (...OSINT with CentralOps)

  • 5

    Step 2: Scanning and Enumeration (...poke, poke, poke)

    • Scanning and Enumeration (...poke, poke, poke)

    • Lab Introduction and Setup (...you've got to find the hole)

    • Lab (...you've got to find the hole)

  • 6

    Step 3: Gaining Access (...finding my foothold)

    • Gaining Access (...finding a foothold)

    • Buffer Overflows (...dissecting the exploit)

    • Lab: Buffer Overflows (...dissecting the exploit)

    • Introduction to Shellcode (...finding my foothold)

About the instructor

What others have been saying about this course:

Use your Call To Action description to encourage students to sign up for your course

You may also be interested in...