[ How to Teach Hacker Highschool: Section 1 ]

This entry is part 1 of 3 in the series How to Teach Hacker Highschool

We’re getting started with this course for teachers, which brings together a lot of material I generated while working as Project Manager for the Hacker Highschool v2 Rewrite Project, 2012-2016. This session discusses some of the issues you may deal with in proposing and setting up a Hacker Highschool class.

So here’s the video of Session 1, with the links it mentions below. Tell us what you think in the Comments, and thanks for taking a look.

POWERPOINT: http://gnorman.org/HHS/Teacher_Training_Unit_1_GN_2017-09-09.pdf

Uncut Lessons: http://gnorman.org/2017/05/16/hacker-highschool-download-uncut-lessons/School for Hackers: https://schoolforhackers.com for Hacker Nightschool and Hacking 101

ISECOM: http://isecom.org

Hacker Highschool: http://hackerhighschool.org

Hacker Highschool (http://www.hackerhighschool.org/) is a free, open curriculum from ISECOM (http://www.isecom.org/). Uncut lessons are available at http://gnorman.org/2017/05/16/hacker-highschool-download-uncut-lessons/.

[ Certified Ethical Hacker Training: Course 1 ] :: [ Syllabus ]

School for Hackers :: Red Glasses Girl
This entry is part 2 of 11 in the series [ Certified Ethical Hacker Training ]

 SYLLABUS

Text:

CEHv10 Study Guide, by Sean-Philip Oriyano (provided by UNM)

The Hacker Playbook 3, by Peter Kim (optional and student-bought, but encouraged)

Past texts:

# Certified Ethical Hacker Exam Guide, Third Edition, by Matt Walker

# CEH v9: Certified Ethical Hacker Version 9 Study Guide 3rd Edition, by Sean-Philip Oriyano

Learning Objectives

Gaining a thorough familiarity with hacking tools and techniques.

Successful preparation to pass the EC-Council Certified Ethical Hacker exam.

About This Course

This course is the first of two. Together these two courses cover the vocabulary, tools, topics and current events that are covered in the C|EH version 10 (henceforth CEH).

The CEH covers a huge area of topics, and textbooks struggle to keep up with EC-Council’s own materials. The short books are forced to assume that you already know quite a lot, and the long books are … huge, but cover things a lot more deeply.

This time around, we’re going to use a big book, a large-format 600-page behemoth that display’s author Oriano’s broad understanding of the CEH test. He’s been writing about it for a long time, and knows his stuff, but his books tend to be thick with typographical errors, and this one is no exception. We’ll generally refer to this as they Study Guide, and cover the first 300 pages in this course, the rest in the second course.

We’ll also use The Hacker Playbook 3, which comes at the same subject from a much more hackerly perspective. It’s a short, clear book that will give us some good exercise for our hacking muscles. We’ll refer to this book as THP3.

Day 1

Hacking in Theory and Practice

Stage 1 of a hack: Footprinting

Google Hacking and Google Dorking

Open Source Intelligence: OSINT

Day 2

Stage 2 of a hack: Scanning and Enumerating

ping, hping3, nmap

Scan types and their results: SYN, TCP, ACK, FIN etc.

Maltego and other delights

Day 3

Stage 3 of a hack: Enumeration

Day 4

Stage 4 of a hack: System Hacking

Day 5

Day 6

Day 7

Day 8

 

 

 

[ Certified Ethical Hacker Training: Course 1 ] :: [ TOC ]

School for Hackers :: Red Glasses Girl
This entry is part 1 of 11 in the series [ Certified Ethical Hacker Training ]

Table of Contents

[[ This course requires registration. Use the Register link above. We do not share ANY information with ANYBODY. ]]