| 
 (Hac-King-Do){ Level-1 Training Certification } 
 
			
				| Section 0. Legal 
				Disclaimer |  
	Legal Disclaimer
		As a condition of your use of this Web 
		site, you warrant to Computer Security Student, 
		LLC that you will not use 
		this Web site for any purpose that is unlawful or 
		that is prohibited by these terms, conditions, and notices.In accordance with UCC § 2-316, this 
		product is provided with "no warranties, either express or implied." The 
		information contained is provided "as-is", with "no guarantee of 
		merchantability."In addition, this is a teaching website 
		that does not condone malicious behavior of 
		any kind.You are on notice, that continuing 
		and/or using this lab outside your "own" test environment
		is considered malicious and is against the law.© 2015 No content replication of any 
		kind is allowed without express written permission.   
	What is Hac-King-Do?
		Computer Security Student, 
		LLC is pleased 
		to offer a unique training certification in "Hac-King-Do (HKD)", which 
		is a "Cyber Security Martial Arts Framework."As you might know, becoming a Cyber 
		Security Professional does not happen over night.  There is a 
		Karate Kid "Wax On / Wax Off" approach that not only needs to occur from 
		the ground up to create a strong foundation, but also requires daily 
		practice to acquire discipline. 
		
	Hands-On Philosophy
		Hac-King-Do bridges the gap between theory 
		and actual hands-on experience.   Computer Security Student, 
		LLC 
		offers hundreds of technical labs in the following subjects:
		Building, Installing and/or Securing Operating 
		Systems: Fedora, Ubuntu, CentOS, BackTrack 5R1, Kali, Windows XP, Windows 7, Windows 2K8, and more.Installing and Securing Applications: SSH, 
		Apache, Samba, NFS, Mail, DNS and more.Performing Penetration Testing against both 
		Operating Systems and Applications.Performing Vulnerability Assessment against 
		both Operating Systems and Applications.Illustrating the following exploitation 
		techniques: Password attacks, Trojan Horse Creation, Social Engineering, 
		Buffer Overflows, Backdoors, Rootkits, Zero-Day Vulnerabilities, Web Injections, 
		Man-in-the-Middle Attacks, and much 
		more.   Performing Web injection techniques against the 
		following capture the flag web applications: DVWA, Mutillidae, and bWAPP.Performing Forensic Analysis and 
		Assessments against the above Operating Systems and Applications.
		
		Go To Curriculum
Become the Expert
		Instead of just reading about a new 
		exploit, would it not be great to prove the concept?  Instead of 
		just letting a scanner tell you if you are vulnerable, would it not be 
		great to actually know why or why not a computer device is actually 
		vulnerable?  In addition to the previous questions, would it not be 
		great to be your departments go-to resident expert that provides a 
		business impact analysis to the executive chain when ever a 
		vulnerability is discovered? 
		
			I hope your answers are yes to the 
			above rhetorical questions. If your answers are yes, please review 
			Section 4, which outlines our Level 1 Cyber Security Martial Arts 
			Framework.   
			
				| Section 2. What is 
				the Battleground? |  
	What is the Battleground?
		Undisturbed, the internet is a digital 
		symphony of 0s and 1s lawfully participating in various communication 
		protocols using the Open System Interconnect (OSI) Model.
			The enemy manipulates these 0s and 1s 
			and/or protocols to achieve an adverse result that usually deviates 
			for the original design implementation.The results are numerous: Denial of 
			Service, Information Stealing, Webpage Graffiti, 
			Computer/Application Damage via virus/worm, Webbots, rootkits, and 
			much more. 
			
 
Who is Sun Tzu?
		Sun Tzu was an ancient Chinese military 
		general, strategist and philosopher who authored the Art of War, an 
		influential ancient Chinese book on military strategy.In the same way you prepare from physical 
		warfare, you can also use his teachings to prepare for Cyber warfare.
			Famous Quotes
			Before the battle is fought, you should 
			make estimations through calculations of the battleground.  In 
			our case, the battleground is the OSI model and everything that 
			communicates on it. Whoever is first in the field and 
			awaits the coming of the enemy will be fresh for the fight.  
			This is accomplished by practicing layered security throughout the OSI model.   
How does Hac-King-Do Apply?
		Hac-King-Do spends a lot of time 
		illustrating various attacks in the following layers:  Physical, 
		Network, Transport, Session and Application.  Knowing the theory 
		and having the hands-on experience is a powerful combination to help protect 
		various 
		resources.Below is our Cyber Security Martial Arts 
		Framework Curriculum that will outline the journey a student will take 
		moving from belt to belt.    
			
				| Section 3. Hac-King-Do: 
				Access, Request Help & Lesson Completion |  
	How To Access the Hac-King-Do Curriculum
		The following link illustrates how the 
		student/user will access the Hac-King-Do Curriculum upon the completion 
		of their registration membership.
		 
How To Request Help
			The following link illustrates how the 
			student/user can Create a CSS Help Ticket if they face an issue that 
			they cannot resolve.
			 
How To Complete Each Lesson
				In order to complete a lesson, the 
				student/user must Create a CSS Proof of Lab Submission Ticket.  
				The administrator will review the student/user's Submission and 
				either (1) approve the submission -or- (2) request additional 
				information.The following link illustrates how 
				the student/user can Create a CSS Proof of Lab Submission Ticket 
				after all steps of the Proof of Lab Section have been completed.
				 
Curriculum Outline
					Please continue to Section 
					4. Hac-King-Do: Cyber Security Martial Arts Framework (Level 
					1) to view the Hac-King-Do Curriculum in detail.   
	
		| White Belt |  |  
		|  | 
			White Belt (Building VMs, Vulnerable 
			Apps & Password Resets Techniques)  
				Meaning
					White signifies a birth, or 
					beginning, of a seed (ie., student). A white belt student is 
					beginning their learning life cycle and is is starting their 
					Cyber Security Journey in Hac-King-Do. 
Lesson Exercises
		BackTrack 5R1
		Installing and Building a Virtual MachineRoot Password Reset Techniques
		Damn Vulnerable WXP-SP2
		Installing and Building a Virtual MachineFull Patch Removal via WinBatch ScriptAdmin Password Reset Techniques
		Installing Vulnerable ApplicationsIllustrating Basic Exploits with Metasploit 
Example Lessons
					
					BackTrack: Lesson 1: Installing BackTrack 5 R1
					Hiren's: Boot CD: Offline NT/2000/XP/Vista/7 Password 
					Changer
					
					See More |  
		| Yellow Belt |  |  
		|  | 
			Yellow Belt (Advanced Metasploit 
			Vulnerability Assessment)
			 |  
		| Orange Belt |  |  
		|  | 
			Orange Belt (Fedora 14 Basic System 
			Administration)
				Meaning
					Orange represents the growing power of the sun as it 
					warms the earth to prepare for new growth in the spring. 
					 The orange belt student is starting to feel their mind 
					open and develop new technical paradigms. 
Lesson Exercises
					Illustrating root password 
					reset techniques (4) Installing, Configure and 
					Securing common applicationsInstalling and Configuring 
					Security LayersTesting Security Layers against 
					an attack 
Example Lessons
					
					
					Fedora: Lesson 1: Installing Fedora 14
					
					Fedora: Lesson 19: Testing denyhosts and brutessh.py
					
					See More |  
		| Green Belt |  |  
		|  | 
			Green Belt (Damn Vulnerable Web App)
			 |  
		| Blue Belt |  |  
		|  | 
			Blue Belt (Metasploitable)
			 |  
		| Brown Belt |  |  
		|  | 
			Brown Belt (Ubuntu 12.04 Basic System 
			Administration)
			 |  
		| Red Belt |  |  
		|  | 
			Red Belt (Mutillidae)
				Meaning
					Red signifies the red-hot heat 
					of the Sun as the plant continues growing toward it. 
					As a red belt student acquires 
					more detailed knowledge, just as the plant grows slowly 
					toward the Sun, so the red belt student learns to be more 
					cautious with his knowledge and physical abilities. 
					Red is a sign of danger, and 
					the red belt is beginning to become dangerous with their 
					knowledge and abilities. 
Lesson Exercises
					Installing and Configuring 
					MutillidaeBasic and Advanced Command 
					InjectionsBasic and Advanced Cross Site 
					Scripting (XSS) InjectionsBasic and Advanced SQL 
					InjectionsMan-in-the-Middle AttacksBackdoor TechniquesBrute Force Password Techniques 
Example Lessons
					
					
					Mutillidae: Lesson 1: How to Install Mutillidae on Fedora 14
					
					Mutillidae: Lesson 6: SQL Injection, Burpsuite, cURL, 
					Man-In-The-Middle
					
					See More |  
		| Red Belt 
		Black 
		Stripe |  |  
		|  | 
			Red Belt Black Stripe (Mutillidae)
			 |  
		| Black Belt |  |  
		|  | 
			Black Belt (Forensic Techniques)
				Meaning
					Black signifies the darkness beyond the Sun. A black 
					belt seeks new, more profound knowledge of the Hac-King-Do. 
					 As the student 
					begins to teach others, he/she plants new seeds and helps them 
					grow and mature.  His/Her students, many whom will form roots 
					deep into Hac-King-Do, blossom and grow through the ranks in a 
					never-ending process of self-growth, knowledge, and 
					enlightenment.   
Lesson Exercises
					Window's Data Recovery (FTK, 
					Foremost, Hiren's)Linux Data Recovery (Autopsy, 
					Foremost, Hiren's)Windows Memory Acquisition 
					(Helix)Linux Memory Acquisition (Lime)Memory Analysis (Volatility)Data Hiding Techniques (bmap)Web History AnalysisSteganography 
Example Lessons
					
					
					Volatility: Lesson 3: Analyzing A Metasploit Memory Capture 
					from Windows XP SP2
					
					Autopsy: Lesson 1: Analyzing Deleted JPEGs
					
					See More |  
		| Black Belt 
		Gold 
		Stripe |  |  
		|  | 
			Black Belt Gold Stripe (Forensic Techniques)
				Meaning
					Black signifies the darkness beyond the Sun.The Gold Stripe signifies the 
					creation of eternal light from darkness.  The Hac-King-Do student starts 
					down the road of reverse engineering and creating attack 
					vectors.   
Lesson Exercises
					Learn how to Fuzz.Learn how to determine how many 
					bytes it takes to crash software.Learn how to determine the 
					OFFSET to override the EIP.Learn how to extract a JMP ESP 
					static memory location from SHELL32.dll.Learn how to established 
					control of the EIP.Learn how to test the 
					hexadecimal sequence list for bad characters.Learn how to create a payload.Learn how to encode the payload 
					in perl output.Learn how to successfully 
					overflow the buffer and place the payload into memory thus 
					allowing us to connect remotely with netcat. 
Example Lessons
					
					
					Buffer Overflow: Lesson 1: PCMan's FTP Server 2.0.7 Buffer 
					Overflow Explained
					
					Buffer Overflow: Lesson 2: Create PCMan Metasploit Module, 
					Attack, and Capture Memory
					
					See More |  
		|  |  |  
		| 
		  
		
		 ($10.00 USD/Month)
 
		  |    |  
		
		
		 |