How to Learn Hacking Part 2: Intermediate Course
Advance your hacking skills with this intermediate course focused on wireless, web app, and network attacks. Practice privilege escalation, reverse shells, and post-exploitation through hands-on labs. Build in-depth knowledge for CEH certification and OSCP, ethical hacking jobs, and defending computer systems in real-world cyber security scenarios.

What Youβll Learn
This How to Learn Ethical Hacking Part 2: Intermediate Course will teach you:
- Web application attacks:
Exploit common web vulnerabilities using tools like Burp Suite and Commix. - Wireless network attacks:
Launch deauthentication, PMKID, and client-less Wi-Fi attacks. - Python scripting for pentesters:
Automate tasks and transfer files with quick custom scripts. - Privilege escalation:
Use UAC bypass and persistent services on compromised systems.
- PowerShell Empire:
Perform post-exploitation and Active Directory enumeration. - Reverse shells:
Create multiple types of shell payloads and upgrade terminals. - Wireshark fundamentals:
Capture TCP handshakes and analyze network traffic. - CTF walkthroughs:
Apply techniques in SQL injection-to-shell and web app CTF labs.
Included in the How to Learn Hacking
Suitable for the Following Careers
Course Content
Section 1: Course Overview
Section 2: Building Your Virtual Lab Environment Using VirtualBox
Section 3: Troubleshooting VirtualBox
Section 4: NMap
Section 5: Enumerating a Windows 10 Target
Section 6: Reverse Shells, Privilege Escalation and Persistent Backdoors
Section 7: Powershell Empire
Section 8: Post Exploitation of Microsoft Windows
Section 9: Program Scripting
Section 10: Practical Pentesting Labs
Section 11: Auditing Wireless Networks
Section 12: Wireshark
Section 13: Web APP Penetration Testing
Section 14: Anonymity - Remaining Anonymous While Pentesting
Section 15: CTF - SQL Injection to Shell Walkthrough
Audio Version of Training
OPEN FULL CURRICULUM
Requirements
Description of How to Learn Ethical Hacking Part 2: Intermediate Course Training
This course is designed for learners who already have foundational hacking knowledge and want to sharpen their technical edge. It helps build a strong foundation while offering real practical experience through immersive, step-by-step labs. By mastering intermediate techniques in web apps, wireless networks, and system exploits, youβll unlock new career opportunities in ethical hacking and cyber security.
Youβll build a multi-target lab, practice red team techniques, and gain hands-on experience with tools like Nmap, Burp Suite, Empire, Wireshark, and Netcat. From privilege escalation and persistent backdoors to advanced recon and CTFs, this course mirrors what professionals use in real penetration tests.
- Exploit SQL injection, OS command injection, and command upload vulnerabilities
- Use PowerShell Empire for post-exploitation and domain control
- Perform wireless attacks using Bettercap and deauthentication techniques
- Enumerate and brute force Windows environments using WinPEAS and SMB tools
- Write and run Python scripts for pentesting operations
- Audit networks with Wireshark and WebMap dashboards
- Maintain anonymity using Whonix and attack over WAN with NGROK
You'll walk away with practical skills gained through a fully interactive hacking lab, where youβll explore real-world scenarios like cross-site scripting, privilege escalation, and shell injection. Whether you're aiming to boost your computer security skills or grow into a senior software engineer, this course equips you to operate confidently in advanced pentesting environments.
Who Is This Course For
This course is for aspiring ethical hackers and junior pentesters ready to move beyond beginner techniques. Ideal for those looking to solidify intermediate hacking skills, build lab confidence, and prepare for real-world security assessments.
Course Instructor
Prof. K is a seasoned technology expert with a Master of Science in Cyber Security from UMUC (2015) and a Master of Science in Information Technology from Capella University (2007). Since 1998, he has held various roles, including Microsoft Support Technician, Microsoft Certified Trainer, Technology Support Specialist, Senior Network Technology Consultant, IT Auditor, and currently, owner and operator of CLK Technology Solutions in Tucson, Arizona.
His expertise is designing, building, and supporting network infrastructures and security. Prof. K has taught online since 2008 and works with several online universities and colleges.
He holds multiple certifications, including MCTS in Windows Server 2008 Active Directory, Applications Infrastructure, and Network Infrastructure Configuration, as well as A+, Network+, Security+, CompTIA Secure Infrastructure Specialist (CSIS), and CompTIA IT Operations Specialist (CIOS). Prof. K's extensive experience and credentials make him a highly skilled and knowledgeable instructor in the field of technology.
Read More
Read Less
Testimonials
John H.
Professor K.'s courses are fantastic. I love that Cliff keeps it simple and still conveys a wealth of knowledge about pentesting/ctf. He makes it look easy and I always learn something new!
Terrence A.
Great way to build on top of knowledge learned from part 1 of this series. Overall good course to learn how to find flags the manual way.
Kevin S.
Prof K is an amazing teacher. I highly recommend his courses to anyone interested in Ethical Hacking. He explains the practical aspects of offensive security clearly and guides you through exploiting vulnerabilities with hands-on practice. As long as you have an internet connection and a wireless adapter that supports monitor mode, youβre all set to dive in.
Show More
Show Less