European Union

Classes for students who have completed the first semester of Hacking and Cybersecurity course.

The second semester is focused on learning about advanced hacking techniques that can be found on the Internet. We will learn how to protect our websites and applications against random threats and cybercrime activities.

  • 14 classes (once a week)

  • 2 x 45 min (every class)

  • Maximum number of students (10)


5 installments $40.00


Do you have any questions?

Intro

During this course, students will learn the secrets of hacking (keyloggers, attacks, password capture) in order to know how to protect themselves from them. We will also learn techniques for building modern websites and creating interactive elements (HTML, CSS, JavaScript). We will also show you CMS content management systems. Students create and publish their own website.

Plan of the course

During the lesson we will discuss the technical aspects of hiding applications in other applications, how it works in general and how such software is written. During the lesson we will write an application that will be hidden e.g. in a popular PDF reader.
The purpose of this lesson is to discuss the purpose of code obfuscation and how to implement it. At first glance, the topic seems very complicated. It is one of the methods of optimization and acceleration of code written by programmers, but also unfortunately used by criminals to make it difficult to analyze the virus code and make it unreadable (obfuscated) for antivirus software.
Ransomware is one of the most dangerous threats in IT security. In the lesson we will present why it is so dangerous and try to write a mechanism that is hidden in every ransomeware.
The Internet is the largest computer network ever created and is constantly growing. During the course, you will learn how it happens that after entering the website www.giganciprogramowania.edu.pl you find the appropriate page. You will learn all the way your request to display a page takes and how it happens that criminals try to modify and attack various elements of this process.
This website uses cookies ... In this lesson we will discuss why almost every website informs us that it uses cookies, why we receive such a message and whether cookies are actually so dangerous. Ps. Cookies are safe ... unless someone knows how to steal them and knows what to do with them. This will be shown during the lesson.
"Very vulnerable web application" - Presentation of an application for practicing (safe!) attacks on web applications. Applying knowledge to practice and discussing various vulnerabilities that can be detected in websites and web applications.
Every programmer makes mistakes sometimes, some are costly, such as XSS. The student will exploit a bug in the software.
Advanced websites use databases to store content and programmers make mistakes. These mistakes allow access to the database directly and thus to things that should remain hidden from the ordinary user.
In web applications, the above vulnerability is 10 out of 10 on the "problematic" scale. Remote code execution is the worst error that can be found in the application - students will practice how it works and why.
Can you come up with a secure password that is easy to remember? Which password is safer - DifficultPasswordToRemember or maybe P@ssw0rd1! @ #? In this lesson you will learn and understand how passwords are broken by various methods and thus how to safely use and manage passwords.
The aim of the lesson is to learn the method of DNS Spoofing hacking attack
Wireless is an interesting example of the development of technology and the method of Internet delivery. It also gives opportunities for attacks and eavesdropping. During the course, the methods of securing the network will be discussed in detail. We will also learn how to make the unauthorized access difficult. We will present a bug in the implementation of a certain function that allows you to access the network in maximum 10 minutes.