European Union

Classes for students who have completed the Introduction to Programming course.

The first semester of the course is an introduction to hacking and internet security. In addition to basic concepts such as pentesting, hacking, scripts and hacking programs we try to learn about various types of attacks.

  • 14 meetings (once a week)

  • 2 x 45 min (every meeting)

  • Maximum number of students (10)


for the course £0.00


Do you have any questions?

Intro

In this course, the student learns the secrets of hacking (keyloggers, attacks, password capture) in order to know how to protect themselves from it. He also learns techniques for building modern websites and creating interactive elements (HTML, CSS, JavaScript). He also shows CMS content management systems. Students create and publish their own website. Our online classes are NOT a webinar or a course like on Youtube! During our online classes each student will see the teacher's screen, hear what he or she is saying, and the teacher will have an insight into what the student is doing and saying (he or she will see each student's screen). Each student will be able to ask a question by voice, the teacher will be able to answer every question and indicate exactly where the error is and how to fix it.

Plan of the course

An introduction to the world of security, the capabilities of the computer and the operating system thanks to which we can do more than play and browse the Internet, understanding how the operating system works.
Social Engineering is an interesting topic, with a minimum of technical skills, we are able to break into places and computers by politely asking for it. The master of social engineering in the field of hacking is Kevin Mitnick, we will learn "how did he make people give him their passwords themselves"
A good virus is one that is hidden and hard to find, so it's harder to get rid of. We will discuss the so-called invisible mode in the operating system so that it is not visible at all that our application is running! In addition, we will present the Folder and File Flooding attack.
Discussion of DoS and DDoS network attacks - from the basics to the consequences of network attacks. During the lesson, we will learn in practice how to perform such attacks and ways to defend against DDoS.
Phishing is a very dangerous attack on the user to steal data. What data is intercepted by the burglar? This is what the student will learn during the lesson about Phishing and why it is so dangerous. The students will also prepare a desktop application imitating a phishing attack.
This lesson introduces the HTML language that is used to create web pages. During the course, we will look at creating websites from the point of view of a person dealing with security and will use HTML to create a dangerous website. The lesson is two-part and in the first stage we will focus on HTML, then we will add Javascript and CSS
Javascript and CSS are an inseparable partner of HTML presented in lesson 6. Today's lesson will be divided into 2 parts - a shorter one related to CSS where we will try to make copies of the student's panel and a longer one related to Javascript and its capabilities, the knowledge of which is very useful in the world of cybersecurity.
Students will use the knowledge from previous lessons to create a clone page of a selected website (e.g. Discord) enriched not only with the visual layer (the so-called frontend) but also with the application logic to attack the unaware user.
A technical lesson on networking topics and how it can be done more consciously and safely, and an introduction to alternative networks that are hidden.
Cryptography and Cryptanalysis. Ciphers and hashes. Security of passwords and ways of breaking them. Quiz.
Virtual Box. Installation of Kali Linux and getting to know the Linux commands, Information Gathering - getting to know the tools used to perform reconnaissance.
Kali Linux - Password Cracking - tools for password cracking.
Kali Linux - DDOS attacks carried out with the help of tools provided by Kali Linux (Ettercap, Slowloris).
Creating Keylogger. Quiz.