강의

멘토링

로드맵

BEST

/

Complete mastery of mock hacking to become a white hacker

We will set up a hands-on practice environment using VirtualBox and Kali Linux, and briefly explain the core of the entire mock hacking process, including information gathering, scanning, server attacks, client-side attacks, password cracking, and obtaining root privileges.

(4.7) 43 reviews

521 learners

  • secuacademy0298
Penetration Testing

Reviews from Early Learners

Essential security course for white hat hackers and good hackers: Master the core of simulated hacking!

The "Mock Hacking for Becoming a White Hat Hacker" course, part of the White Hat Hacker lecture series, covers the entirety of mock hacking. Using VirtualBox and Kali Linux, you'll set up a hands-on practice environment and cover the core of the entire mock hacking process, including information gathering, scanning, server attacks, client-side attacks, password cracking, and root access acquisition.

This course is designed to be easy to follow. Those who have taken the "8 Web Hacking Techniques to Become a White Hat Hacker" course will find this course helpful in understanding the "Web Attacks" section. However, we've structured the content so that it doesn't overlap with the other courses except for essential sections, so you can take both courses simultaneously. After taking this course to gain a general understanding of mock hacking, you can then study the "8 Web Hacking Techniques to Become a White Hat Hacker" course for additional web hacking expertise.

If you have any questions during the course, you can ask them through the cafe to become a white hacker and study with other students.

Learning Objectives

  • Learn how to install and use Kali Linux
  • Understanding Metasploit and various mock hacking programs
  • Learn how to practice for CTF/hacking competitions
  • Learn various practical hacking techniques (reconnaissance, exploits, password cracking, root access acquisition, etc.)

Helpful people

  • Those who are considering a career as a white hacker
  • Anyone working in security who is interested in aggressive/active security
  • Anyone interested in the actual hacking process and information security
  • Anyone who wants to study with the lecture '8 Web Hacking Techniques to Become a White Hacker'

Requirements

  • You need to have the mindset that you want to use hacking only for good purposes.
  • This is a hands-on course, so you'll need a PC (6GB or more of RAM recommended).
  • If you have experience using Linux, you will find it easier to learn.

Introducing the knowledge sharer

Bong-Hwan Choi, Information Security/Linux Expert (CISSP, OSCP, RHCSA, RHCE)
Starting out as a developer of information security software and firmware, including intrusion detection systems and web firewalls, I am now a white hat hacker (information security expert) with 20 years of experience working at a global open-source Linux company, primarily engaged in simulated hacking, bug hunting, vulnerability analysis system development, and security training. I was the first Korean to obtain the OSCP, recognized internationally as the most prestigious simulated hacking certification, and also hold CISSP, RHCSA, and RHCE certifications. I have reported numerous CVE vulnerabilities in various fields, including web, middleware, and cloud computing, and my name is listed in the KISA (Korea Internet & Security Agency) Hall of Fame for reporting security vulnerabilities in domestic software. Drawing on my diverse work experience both domestically and internationally, I strive to impart practical simulated hacking and bug hunting skills to students, system operators, and developers interested in information security.

Major career:
* Author of the book "Web Hacking Techniques for White Hat Hackers"
* Lecture by the International Joint Research Center for Software Security (with participation from Korea University, Oxford University, and Carnegie Mellon University)
* Korea's first OSCP (Kali Linux sponsored Offensive Security Certified Simulated Hacking Specialist)
* CISSP International Certified Information Systems Security Professional
* Discover and report numerous security vulnerabilities, including CVSS 10/10 (highest risk) CVE vulnerabilities.
* Listed in KISA Hall of Fame
* IDS/IPS, web firewall development
* Graduated from KAIST

Hello
This is

7,348

Learners

193

Reviews

121

Answers

4.9

Rating

1

Course

Curriculum

All

77 lectures ∙ (6hr 11min)

Published: 
Last updated: 

Reviews

All

43 reviews

4.7

43 reviews

  • alstjq0104071979님의 프로필 이미지
    alstjq0104071979

    Reviews 25

    Average Rating 4.8

    5

    39% enrolled

    This is a practice-oriented lecture. I recommend that you familiarize yourself with the basic theory before watching it.

    • yji09030350님의 프로필 이미지
      yji09030350

      Reviews 87

      Average Rating 4.5

      5

      100% enrolled

      It was great to be able to learn hacking theory in detail.

      • wooseong님의 프로필 이미지
        wooseong

        Reviews 5

        Average Rating 4.4

        5

        100% enrolled

        I am a security major student! I think this lecture was more useful and better than what I learned in school. I hope you prosper!

        • mons님의 프로필 이미지
          mons

          Reviews 27

          Average Rating 5.0

          5

          100% enrolled

          It's a good lecture.

          • jaeyeon4169님의 프로필 이미지
            jaeyeon4169

            Reviews 1

            Average Rating 5.0

            5

            100% enrolled

            It's a good class.

            Access is restricted to non-public courses.
            Private Course

            secuacademy0298's other courses

            Check out other courses by the instructor!