Buy Now
Or preview some of the content.
82 Minutes of Personalized Content
18 Lectures
3 Attachments
Certificate of Completion
Lifetime Access to Course & Updates
Satisfaction Guarantee

Training 5+ people?
Contact us for offers and discounts.

How Do Hackers Hack

From Buffer Overflows to APTs

( 64 ratings) 199 students enrolled
Created by ZDResearch Training Last updated 5/2018



What is the extent of hackers' power? Can they really take control of traffic lights and our entire world? Are hackers superheroes? Someone told me he would hack me online, should I be afraid?

These are all good questions asked by people whom are not very familiar with cybersecurity. In this concise course, we will explain how hackers hack. Once you know how they hack, you will know its limits, and you can protect yourself against it knowingly.

This course will take you on a quick journey to understand exactly how hacking works, and what skills, tools and techniques hackers use to compromise computer systems. It will debunk some hacker myths, while confirming others, it will show you hands-on demos of hacking systems, it will explain the difficulties involved in hacking, it will teach you how to defend yourself against hackers, and finally it tells you how you can become a hacker.

We have taught the same subject matter in countless workshops, seminars, conferences and symposiums, and we can assure you are going to enjoy it as well.

If you feel like a hacker, try to guess coupons for this course to get it for only $9.99!


  • Understand How Hacking Works
  • Be Cybersecurity Literate
  • Know What to Expect From Hackers
  • Learn How to Defend Yourself in the Cyberspace
  • Understand the Path to Becoming a Hacker


  • Human Brain
  • And Nothing Else!

Target Audience

  • Everyone
Expand All 18 items01:22:45


1 Introduction
1 1. Lecture 1 - Introduction In this lecture, you will be introduced to hacking.
2 Different Types of Hackers
2 2. Lecture 1 - Different Types of Hackers
3 How Do Hackers Hack?
4 Different Types of Hacking
5 Busting The Hacker Myths
13 9. Lecture 1 - The Black & Green Terminal
14 10. Lecture 2 - One-man Army
15 11. Lecture 3 - The Hooded Anonymous
16 12. Lecture 4 - From Website to Datacenter
17 13. Lecture 5 - One Virus to Rule Them All
18 14. Lecture 6 - Getting Past Their Firewall
19 15. Lecture 7 - Linux For The Win
20 16. Lecture 8 - A Million Zerodays A Day
6 How To Protect Yourself
11 17. Lecture 1 - How To Protect Yourself
7 How To Become A Hacker
12 18. Lecture 1 - How To Become Hacker


2020-02-14 13:15
Mohammad Hassan Pezeshkian
Good course
2019-08-01 16:28
Chang Liu
Winning! :-) Now, I will Google "How to become a Hacker" and enter CTFs.
2018-09-26 15:12
Abdalaziz Mohammed Mohammed
Thank you so much . I loved this information
2018-04-26 12:31
Ivan Yosifov
Interesting course with nice little demos. I found it informative and well explained.
2018-04-26 12:05
Mayl Meto
Course is excellent to know how the hacking system works. learned a lot. Thanks to the Instructor!
2018-04-24 17:17
Muhammad Arsalan
Short Course but overall great...
2018-04-13 02:08
It's amazing course man
Thanks for this wonderful content
2018-04-01 23:57
2018-03-14 23:53
William HernĂ¡ndez
I had a great experience learning this course. The instructor did a good job building up this course. Very clear explanations and quite knowledgeable.

Looking forward to see more courses from the instructor.
2018-03-14 16:53
Shivam Parashar
its good
2018-03-11 15:11
Riley Savage
Very good course. Tells you about everything, really good for beginners.
(Edit: They asked a suggestion on how to make me rate it 5 stars so
Personally I would enjoy a little more examples of real world use. As a lot of those were just examples that would only be existent in a test environment.)
2018-03-01 19:20
Such a great course knowledge about hackers..
2018-02-28 05:44
Hari Kishan
Instructor here gave a good working demos to make understand how hacker analyze security holes