Mike H's Enrolled Lessons
-
16 minComputer Science lesson9 CQ
Hacker. You've heard the term, and maybe even used it, but what does a hacker really do, and how does hacking work? Learn this and more in this tech lesson!
Hacker. You've heard the term, and maybe even used it, but what does a hacker really do, and how does hacking work? Learn this and more in this tech lesson!
-
6 minComputer Science lesson4 CQ
In this theory-based lesson on hacking, walk through the 6-step hacker methodology, and discover how hackers gain unauthorized access to systems and networks.
In this theory-based lesson on hacking, walk through the 6-step hacker methodology, and discover how hackers gain unauthorized access to systems and networks.
-
7 minComputer Science lesson4 CQ
Now that you're comfortable with the basics of hacking, it's time to try a hacking exercise! Start by configuring a hack plan, and set up a virtual machine.
Now that you're comfortable with the basics of hacking, it's time to try a hacking exercise! Start by configuring a hack plan, and set up a virtual machine.
-
7 minComputer Science lesson4 CQ
Before trying a hacking exercise, you need to install virtual machine software and Kali Linux. Go through each step of the install, and update the OS.
Before trying a hacking exercise, you need to install virtual machine software and Kali Linux. Go through each step of the install, and update the OS.
-
5 minComputer Science lesson3 CQ
It's time to meet your best friend when learning how to hack: WebGoat! This hacking server developed by OWASP is a great way to learn basic hacking principles.
It's time to meet your best friend when learning how to hack: WebGoat! This hacking server developed by OWASP is a great way to learn basic hacking principles.
-
15 minComputer Science lesson8 CQ
In this SQL lesson learn to install WordPress on a Kali Linux distribution. Once finished, you'll have a working WordPress server with users you can hack later!
In this SQL lesson learn to install WordPress on a Kali Linux distribution. Once finished, you'll have a working WordPress server with users you can hack later!
-
10 minComputer Science lesson6 CQ
In this hacking lesson get a quick introduction to Nmap, a network mapping tool that lets you learn about operating systems, applications, and open ports.
In this hacking lesson get a quick introduction to Nmap, a network mapping tool that lets you learn about operating systems, applications, and open ports.
-
12 minComputer Science lesson7 CQ
Using the virtual machine you've already built—and by employing the hacker methodology—learn about a very popular attack, called an SQL injection.
Using the virtual machine you've already built—and by employing the hacker methodology—learn about a very popular attack, called an SQL injection.
-
7 minComputer Science lesson4 CQ
Learn all about cross-site scripting (XSS) in this lesson, including why a hacker would want to use an XSS attack, and what it takes to perform an XSS attack.
Learn all about cross-site scripting (XSS) in this lesson, including why a hacker would want to use an XSS attack, and what it takes to perform an XSS attack.
-
10 minComputer Science lesson6 CQ
In this essential cyber security lesson, discover how to use WPScan to execute brute force and dictionary-based attacks to obtain user passwords.
In this essential cyber security lesson, discover how to use WPScan to execute brute force and dictionary-based attacks to obtain user passwords.