Courses

We have merged with the Heorot.net training classes, and expanded our offerings to students! Access to over the 25 hours of videos, support material and live instruction. New students can enroll at any time, and once enrolled in the Hacking Dojo, students journey through the following skill levels (new students can “test out” and move onto the appropriate skill level… So there is no need to waste time by having to re-learn material you have already mastered):


(1R) Mukyu (Novice)

There have been many questions asked in the hacker community about how a person can become a professional penetration tester; like most advanced skill sets, it requires a solid foundation. For system and network penetration testers, that foundation involves an in-depth understanding of programming languages and operating systems.

To learn these skills, the Hacking Dojo has put together the Mukyu (novice) course to get their students familiar with these topics, so that they can begin their journey into professional penetration testing.

Skills and Knowledge Taught In This Class:

  • BASH Scripting Language
  • Education and Certifications
  • Linux Operating System
  • Virtual Machines and Labs



 

(1D) Shodan (Foundational)

Once a student has obtained a solid foundation in Programming Languages, Operating Systems and Virtual Machines and Labs, they are ready to begin their journey into the world of professional penetration testing. Students enrolled at Hacking Dojo who believe they are already comfortable with the concepts mentioned above, or who have achieved the rank of Mukyu (Novice) through HackingDojo.com, can begin their training in the Shodan (Foundational) level.

Skills and Knowledge Taught In This Class:

  • Penetration Test Methodology
  • Use and Selection of Hacker Tools
  • System Exploitation Fundamentals
  • Password Attacks (Remote and Local)
  • Enumerating Users
  • Network Sweeping and Tracing
  • OS and Version Detection
  • Port Scanning Fundamentals


(2D) Nidan (Intermediate)

Once a student has demonstrated the mastery of the skills taught in the Shodan (Foundational) class, they are ready to begin their training in the Nidan (Intermediate) level.

Skills and Knowledge Taught In This Class:

  • Risk Analysis and Security Metrics
  • Network Packet Crafting
  • Exploiting File System Security
  • Web Application Testing
  • Password Encryption and Cracking Methodologies
  • Advanced Techniques of Tools and Hacking Methods

Students who complete the (1D) Shodan (Foundational) course may purchase the (2D) Nidan (Intermediate) course – participation in the (2D) Nidan class is dependent upon successfully passing the (1D) Shodan exams.


(3D) Sandan (Database / Web Hacking)

The Sandan level training focuses on web-based attacks targeting both applications and databases. Students must have successfully completed the Nidan (Intermediate) level training before they can train in database and web hacking.

Skills and Knowledge Taught In This Class:

  • Introduction to Databases
  • Database Architectures
  • Understanding SQL
  • Common Attacks
  • SQL Injections
  • Remote Port Attacks
  • Host Attacks
  • Web Server Attacks
  • Application Attacks
  • SQL Injections
  • Authorization Bypass
  • Application Flaws
  • Cross Site Scripting

Students who complete the (2D) Nidan (Intermediate) course may purchase the (3D) Sandan (Database / Web Hacking) course – participation in the (3D) Sandan class is dependent upon successfully passing the (2D) Nidan exams.


(4D) Yondan (Network Hacking)

The ability to attack network protocols and devices can improve the chances of success during a professional penetration test. The Yondan training focuses on network attacks and how to evade network appliances, such as firewalls and intrusion detection systems. Students must have successfully completed the Sandan (Database / Web Hacking) training before they can attend the Yondan (Network Hacking) course

Skills and Knowledge Taught In This Class

  • Networking Protocols
  • Wireless Encryption Attacks
  • Shells / Reverse Shells
  • Protocol Tunneling
  • Protocol Hacking
  • Pivot Attacks
  • Evasion and Enumeration
  • Firewalls and Firewall Rules
  • Attacking Rulesets
  • Attacking Firewall OSes
  • Intrusion Detection Systems
  • Alert Signatures
  • IDS Avoidance Techniques
  • Attacking IDS application

Students who complete the (3D) Sandan (Database / Web Hacking) course may purchase the (4D) Yondan (Network Hacking) course – participation in the (4D) Yondan class is dependent upon successfully passing the (3D) Sandan exam.


(5D) Godan (Reverse Engineering)

The Godan training represents the pinnacle of professional penetration testing, and concentrates on dissecting and creating application exploits. Students must have successfully completed the Yondan (Network Hacking) training before they can train for Godan

Skills and Knowledge Taught In This Class

  • Malware Analysis Lab Configuration
  • Windows x86 Assembly Code Concepts
  • Reverse-Engineering Malware
  • Identify and Exploit Buffer OverflowsCircumvention of Access Restrictions

Students who complete the (4D) Yondan (Network Hacking) course may purchase the (5D) Godan (Reverse Engineering) – participation in the (5D) Godan course must successfully pass the (4D) Yondan class exam.