C# 101 for Hackers

Learn the fundamentals of C# and .NET to enhance your hacking skills.

Training for a team or organization? Contact us about group access.

C# 101

Inside the Course

Scroll down to explore the skills you’ll build, the techniques you’ll master, and the requirements to get started.

Start Learning This Course Today

The All-Access Membership gives you unlimited access to this course, hands-on labs, and a complete library of cybersecurity training. Everything you need to build real-world skills is included.

Questions?

If you need clarification on the course or its requirements, simply use the chat button below and our team will assist you.

  • Difficulty: Beginner
  • Duration: 4h
  • Access: Included in Membership

Overview

Welcome to C# 101 for Hackers. This course introduces students to C# and the .NET framework. Students will learn to install and configure C# and .NET for development and concentrate on learning the language by writing C# console applications. Topics covered include the basic structure and syntax of C#, an introduction to the many core and fundamental statements and practices within C#, and leverage what’s discussed with examples that students can implement, re-use, and learn from further.

Key Topics

  • Learn how to set up and configure C# and .NET on Kali Linux.
  • Learn the syntax and structure of C#, and understand the basics of what .NET offers.
  • Review and use various code flow statements and techniques.
  • Learn various coding techniques and patterns that can be reused to build practical ethical hacking tools using C#.
  • Understand the differences between asynchronous and parallel programming and their implementations.
  • Learn to step through and debug your code.
  • Apply learned concepts through hands-on exercises and real-world scenarios to build practical and functional applications.

Objectives

Learn Programming Fundamentals:

  • Gain a foundation in programming fundamentals.

Write C# Code:

  • Write code utilizing basic logic, conditional statements, loops, and more.

Develop Applications Using C#:

  • Develop applications and understand how to troubleshoot them.

System Requirements

Students need a PC that runs Windows, Mac OSX, or Linux. No specific memory or space requirements exist for this course.

Prerequisites

Students should be familiar with basic scripting languages and techniques but do not need to have any prior knowledge of C# and .NET.

Recommended For

This course is intended for ethical hackers already working with Python and Bash scripting for ad-hoc needs. It is designed to introduce C# / .NET and give students an additional set of skills that can be leveraged to build out internal test tools and begin the journey of software development.

Course Curriculum

  • Welcome
    • Welcome to the Course!
  • Introduction
    • Learning C#
    • Python vs. C#
    • History of .NET and C#
  • Polyglot Notebooks & Project Downloads
    • Course Resources
  • Environment Setup
    • Why Kali Linux?
    • Setting up our Dev Environment
    • VS Code Extensions
    • Writing Hello World Part 1
    • Writing Hello World Part 2
    • Writing Hello World Part 3
    • Polyglot Notebooks
  • C# Basics
    • Introduction
    • .NET CLI
    • C# Structure & Syntax Part 1
    • C# Structure & Syntax Part 2
  • Working with Data
    • Working with Data
    • Variables
    • Strings
    • Casting & Converting Data
    • Value vs Reference Types
    • Console Input & Output
  • Programming Logic
    • Operators & Assignments
    • Flow Conditions – Part 1
    • Flow Conditions – Part 2
    • Flow Conditions – Part 3
    • Flow Conditions – Part 4
    • Flow Conditions – Part 5
    • Loops
    • Debugging Your Code
  • Data Handling: File I/O, Collections, and Web Interactions
    • File I/O
    • Collections
    • Building a Deck of Cards
    • Working with the Internet
  • Asynchronous & Parallel Programming Concepts
    • Async / Await & Parallel Programming
    • Building a Port Scanner
  • Capstone Project – Brute-Force Password Cracker
    • Capstone Overview & Requirements
    • Capstone Solution – Part 1
    • Capstone Solution – Part 2
  • Wrap Up
    • Recap
    • Thank you & Dedication

This Course Is Included in Your All-Access Membership

One membership gives you ongoing access to C# 101 for Hackers, every other paid Academy course, and an active community of learners and mentors in Discord.

INSTRUCTORS

Meet Your Instructor

Learn from industry experts with real-world cybersecurity experience.

Instructor Alex Tushinsky

Alex Tushinsky

Alex has over three decades of expertise in software development, application architecture, cybersecurity, and technical education. As a lifelong learner, he holds more than twenty active IT certifications and is a Microsoft and CompTIA Certified Trainer. Alex’s passion for sharing his knowledge has led him to teach at numerous institutions including authoring numerous online courses on platforms such as Pluralsight, and TCM Academy.


In the cybersecurity field, Alex has worked as a Chief Information Security Officer and is a consultant to several small and mid-sized organizations, where he educated and provided guidance on the importance and proper use of information security. Currently, he is the Chief Technology Officer at TCM Security.


When not working, Alex spends his time with his wife and many pets, including two cats and three Boston Terrier dogs. He is an active runner and cyclist and is an ethical and health-conscious vegan.

FAQS

Common Questions

Here are a couple of our most commonly asked questions, contact us if you don’t find an answer!

Can I get a refund if I'm unhappy with my purchase?
2
3

Yes. All courses come with a 24-hour money-back guarantee.

Will I receive a certificate of completion when I finish a course?
2
3

Yes. All courses come with a certificate of completion.

Do the courses count as Continuing Education Units (CEUs)?
2
3

Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.

What is the All-Access Membership?
2
3

As of July 1st, 2023 TCM Academy transitioned to a monthly subscription model, where you now receive full access to all of the courses on our platform for as long as your subscription remains active.

What if you already own courses on TCM Academy?
2
3

If you already own a course on our platform, you will continue to own that course. Previously owned courses will not be affected by this change.

I can see the course, but it won’t load or play. What should I do?
2
3

We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at support@tcm-sec.com and we will help you out.

This course is included in our All-Access Membership, starting at $29.99/month.

Get full access to this course and our full course catalog when you enroll in our All-Access Membership.

Ready to level up your Cybersecurity Career?

Get unlimited access to every TCM Security Academy course, hands-on lab, and certification pathway with an All-Access Membership. Learn at your own pace, build real-world skills, and take the next step toward a career in cybersecurity.

PWPA