Hackers about hacking techniques in our IT Security Magazine

Advanced Offensive Computer Security Training

This advanced hacking course is designed for the pentester, security professional, or hacker who is looking for an advanced course in system/network penetration. It is designed to be a hands-on, lab-oriented course using Kali Linux as a base operating system, but also using additional tools that we will add as needed. What makes this especially compelling is the section on mobile hacking, rootkits and exploit development, seldom found in basic to mid-level courses.

Offensive Security’s Advanced Hacking Course
Duration: 10 Monthly Parts

Keith DeBus is a former professor of computer science with over 20 years of IT experience. He is now the President of IT Securitas(www.itsecuritas.net), a leading IT security and pentesting firm. He has published numerous articles on cyber security, penetration testing, digital forensics and cyber warfare. DeBus has trained personnel from every branch of the U.S. military (Army, Air Force, Navy) and personnel from the NSA, CIA, FBI and NCIS in cyber warfare tactics. DeBus is a internationally recognized expert on cyber warfare, network “hacking” and network intrusion detection systems (NIDS). Mr. DeBus holds or has held the following IT certifications; Sec+, CEH, CPT, ECSA/LPT, CHFI, CISA, CISM and CISSP

I. Getting Started with Kali
II.  Information Gathering Techniques
III. Port Scanning
IV.  ARP Spoofing and MitM
V. Buffer Overflow Exploitation
VI.  Working with Exploits
VII. Transferring Files
VIII. Metasploit
IX.  Client Side Attacks
X.  Exfiltrating Data
XI. Password Attacks
XII. Web Application Attacks
XIII. Trojan Horses
XIV. Rootkits
XV. Wireless Attacks
XVI. Scripting for Vulnerabilities and Exploits
XVII. Exploit Development
XVIII. Mobile Exploit

Participants in the following industries will benefit mostly:
• Information security engineers
• Penetration Testers
• Those engaged in cyber warfare or espionage activities

Students are required to know:
Basic Linux
Understanding of Microsoft Windows
Exploitation Concepts
Information Security Concepts
An Open mind
A computer with Kali Linux installed (VM is acceptable)
Enthusiasm for Information Security

Snort IDS Blast Course (W26)

In this course, we will use the Security Onion operating system. Security Onion is based on Ubuntu Linux distro. It contains the Snort IDS, Suricata, Bro, OSSEC, Sguil, Squert, ELSA, Xplico, NetworkMiner, and many other security tools. We will use the Snort IDS application for the majority of this blast course. The target learning objective for this course is to introduce the student with to the Snort IDS. We will learn how to setup IP and Port variables for ease of management followed by being acquainted with basic Snort rules. We will then move to define our own custom rules. Finally, we will advance our learning by crafting complex Snort rules to enhance our network IDS capabilities and streamline process powers. This course is streamlined for advanced users who wish to add to their knowledge about IDS capabilities using Snort.

The course session will last for three weeks, but the course is self-paced – you can learn when you want!
Course Starting Date: November 18th 2015

Ray holds a bachelor’s degree in computer information systems and a master’s degree in organizational leadership. His current certifications are CISSP, CEH, CCNA, N+ and the PMP. Ray freelances as an online IT instructor that includes CISSP, CEH and CCNA courses. He has also taught for various organizations on hacking with the Metasploit framework, scripting with Python and Ruby as well as other tools used for hacking. He occasionally provides IT security consultancy for various organizations. Ray resides in Augusta, Georgia USA. He has over 15 years of military and civilian IT security and project management experience.

Module 1: Getting acquainted with Snort IDS

In this module, we will cover the basics of Snort and what it provides to network administrators. A general overview will be provided to the students on Snort’s capabilities and functions. For this course, it is recommended that the student is familiar with the functions of an IDS and IP access control lists.  There will be three tasks to complete for this module.

  • Task 1: Setup IP variables with the internal and external network.
  • Task 2: Setup Port variables with internal and external network.
  • Task 3: Setup log messages to output to a destination file for record.  

Module 2: Setting up basic Snort rules

This module will cover on dissecting snort rule configurations which compose of the Rule Header and the Rule Body. The Rule Header consists of an action, a Source IP and Port, direction indicator, destination IP and Port. The Rule Body consists of the security identifier. This module will consist of three tasks to complete.

  • Task 1: Setup a Snort incoming packet rule to alert the network administrator.
  • Task 2: Setup a Snort rule to drop an outgoing packet.
  • Task 3: Setup a Snort rule to alert for outbound web site request that is prohibited.
  • Task 4: Setup a Snort rule to to inspect contents of a packet in both binary and ASCII format.

Module 3: Configure Detect Offset (DOE) End Pointer (EP) and Byte Offset

In this module, we will conclude our course by setting up Snort to dissect packets by using the Detect Offset End Pointer and by inspecting packets using Byte Offset. These two functions allow the Snort IDS to discriminate with precision for known threats. This allows the IDS to process packets much faster than the previous Snort Rules because of its precision capability.

  • Task 1: Dissecting an incoming packet using DOE EP with a content match.
  • Task 2: Creating Snort rule using DOE EP with distance modifier.
  • Task 3: Setup Snort Rule DOE EP with relative offset with the ending position after another DOE advancement.

What should you know before you join?

The student needs to understand how to compute in hexadecimal format, ASCII format and binary calculations. The student also needs to be familiar with IP subnetting (both classful and classless).

What will you need:

Latest Courses

Why choose us?

Flexitime & Flexplace Studies

Hakin9 comes with yearly unlimited access to all online materials. Hakin9 offers the online IT security courses and provides you the skills needed to learn how to become the Ethical Hacker. All courses are available online and in PDF version. You decide when you will work and where you will work.

Interaction & Ability to Concentrate

Hakin9 Online Courses offer the opportunity to participate in class discussions, forum or chats with more ease than face-to-face class sessions. You won't be distracted by other participants anymore.

Become a Certified Hacker

Hakin9 offers Hakin9 Certificates. When you complete the Hakin9 courses, you will obtain the certification that will prove your practical skills. Hakin9 Certificate is the most practical and professionally oriented certification.

Hakin9 Online Course is for ...

Cyber Fraud Investigator, Security Consultant, IT Security Manager, Systems Engineer, Network Engineer, Security Engineer, Security Professional, Security Architecture and Threat and Security Incident Manager, Network Admin, System Admin, System Architect for Gov't systems, CISSP and QEH Professional, Information Assurance/Network Defense Expert, Malware Researcher ... .

Variety of Courses

No matter what age you are and where you are. If you wish to become an IT security expert, you will join our online courses when you are ready and you need to expand your skill set. Hakin9 offers the new online courses every month so that you will have the opportunity to explore areas of hacking by attending various courses designed for this purpose.

Comfortable Learning Environment

All courses and other materials are available online via private, secure account created by you. The materials can be read online or can be downloaded by you in user-friendly PDF versions. There is no need to fight traffic, find parking spaces, leave work early to go to class, or miss important family time.

Popular Issues


photodune-8522811-speaker-at-business-conference-and-presentation-mWANTED: Talented ​Instructors/​Trainers

​Hakin9 Magazine is constantly seeking for excellent​ instructors to develop new courses and explore new possibilities. Our courses need to be practical and real-life oriented, we want them challenging, instructive, engaging, and fun.

If you think you've got what it takes, let us know - contact our training coordinator Marta at [email protected] and tell us all about your ideas for a course!

Recent Posts


Partners with