Hacking In Practice: Ethical Hacking Mega Course
651 Enrolled
23 Hours
$12.99$52.00
You save 75%
236 Lessons (23h)
- Introduction to cyber threatsIntroduction to Current Cyber Threats4:46IT Prehistory4:41Let’s look a few years back4:42Cyber crimes – an evolution not revolution4:25Current Cyber Threats – notes for the examination
- IT security popular mythsPopular myths about IT security – origins5:33Myths #1 – you’ll never be hacked5:55Myths #2 – you don’t need any protection software or hardware5:11Myths #3 – IT security is always a priority1:13Popular Myths About Computer System Security – notes for the examination
- IT security trendsTrends in IT Security3:44The birth of technology society3:16EXERCISE: How much info can you gather?3:59Fake identity5:03Online privacy6:14Analyzing sniffing software3:33Cyber War8:23Changing IT Security Trends – notes for the examination
- Data securityObjective #1 – Data security – Introduction6:58Confidentiality of data5:33EXERCISE: Finding confidential data with search engines6:05Integrity of data7:04Data security – notes for the examination
- Security policiesSecurity policies – introduction1:56What is security?3:53Information security4:13Information security – level up4:04Security issues4:50Why are security solutions fallible?5:42Security policy issues4:50Introduction to threat modelling and classification5:14Threat modelling – STRIDE4:06STRIDE: Spoofing identity5:03STRIDE: Tampering with data4:28STRIDE: Denial of Service3:51Threat Modelling and Classification – notes for the examination
- Risk managementIntroduction to Risk Management1:27Attack Methods6:42Local attacks2:56Target scanning and enumeration techniques #15:52Target scanning and enumeration techniques #23:30Passive scanning5:36Attack Methodologies – notes for the examinationIntroduction to risk assessment6:20DREAD: Risk assessment model4:50DREAD: Exploitability5:24EXERCISE: Risk Assessment7:17Risk Assessment – notes for the examinationIntroduction to Social Engineering and rogue software4:19Manipulation tactics9:01EXERCISE: Social Engineering attacks6:44SE with KALI / BackTrack7:06Rogue Software2:28Fraud tools #17:10Fraud tools #26:32Social Engineering and Rogue Software – notes for the examination
- Defence in depthIntroduction to Defence in depth1:32How to use Defence in depth model?5:45DiD: OS and LAN layers6:39DiD: Perimeter and Physical Access Layers6:06DiD: Demonstration2:48Automated attack targeting a service5:23Automated user-targeting attack4:31The Defence in Depth Model – notes for the examinationIntroduction to Immutable laws of security – Law #14:35Law #22:56Law #32:23Law #41:52Law #53:28Law #62:07Law #71:11Law #81:43Law #93:57Law #100:48Laws for administrators5:59Immutable Laws of Security – notes for the examination
- Disaster recoveryIntroduction to Disaster Recovery1:33How to reduce losses?5:24Ensuring continous availability4:08Threat discovery #14:28Threat discovery #23:40Audit users and keep control accounts5:18High risk users3:23Collecting and analysing evidence7:13Forensics example3:52CONFICKER: CASE STUDY7:11How to reduce losses – notes for the examination
- Computer network security - network protocolsNetwork security – introduction5:44OSI MODEL #1 – Physical layer5:45OSI MODEL #2 – Data link layer4:46Threats: MAC spoofing5:54Threats: ARP Poisoning6:38EXERCISE: Data Link Layer Attack7:32OSI MODEL #3 – Network layer6:58TCP Tunnelling over ICMP7:39Network Protocols – notes for the examination
- Transport protocolsOSI MODEL #4 – Transport Layer6:04Threats: Enumerating Remote Computers3:40EXERCISE: Transport Layer Attack using METASPLOIT – part 15:27EXERCISE: Transport Layer Attack using METASPLOIT – part 25:13OSI MODEL #5 – Session Layer3:33Transport Protocols – notes for the examination
- Application protocolsOSI MODEL #6 – Presentation Layer6:52OSI MODEL #7 – Application Layer3:48EXERCISE: Application Layer Attacks6:03KALI / Backtrack: Attack Demonstration3:34Man-in-the-Middle and Denial of Service Attacks2:49Modifying Transmitted Packets4:45Unencrypted protocols2:58Application Protocols – notes for the examination
- Designing secure computer networksDesigning Computer Networks – introduction2:18Subnetting IPv63:18Subnetting IPv47:01IPv6 address notation6:46DMZ: DeMilitarized Zone6:28Subnetting – notes for the examinationProtocols and services: IP SEC9:33IP SEC: Phase 17:27Network Address Translation12:18Network access control: RADIUS10:04Protocols and Services – notes for the examination
- Network administration and monitoringIntroduction to Monitoring Transmitted Data1:07Monitoring Transmitted Data – Basic information8:03Intrusion detection systems7:43Why are firewalls and NDIS not enough?5:41Wireshark – Introduction to network analysis6:29How to use Wireshark?8:27Analyzing captured data5:43How to analyze telnet protocol?8:09Intrusion detection7:48Scanning computers7:47Monitoring transmitted data – notes for the examination
- Wireless networks securityWireless Networks1:16WIFI security solutions – introduction5:44WIFI – working principles5:48Other wireless technologies2:56Threats and risks4:38Ineffective solutions4:11Authentication methods8:31802.11 WEP7:06802.11 WPA6:24Standards and Security Solutions – notes for the examinationThreats of WIFI networks5:58Client Attacks: Launching a rogue access point7:03Client Attacks: Evil twin4:51Client Attacks: Denial of service9:17EXERCISE: WPA attack3:24Wi-Fi Security Threats – notes for the examination
- Operating systems securityOperating systems security – introduction9:10Security boundaries4:44Three core7:15EXERCISE: OS boundaries7:54Process isolation6:30Kernel Mode Code Signing6:24Java Virtual Machine and code access security4:17OS Security Boundaries – notes for the examinationMalware12:09EXERCISE: Vulnerability attacks10:26EXERCISE: Identifying suspicious processes6:54Demonstration: Process Explorer9:13EXERCISE: Removing malware8:38Rootkits6:14EXERCISE: Detecting rootkits11:07EXERCISE: Security evaluation6:00Malware – notes for the examination
- Access controlAuthentication and authorisation – Introduction1:57Authentication - users6:56How secure is your password?5:03Authentication protocols and services8:25LM Hash7:02Cached Credentials4:29KERBEROS11:30Authentication – notes for the examinationIdentity Theft9:13EXERCISE: Offline attacks12:22Using online cracking services8:41Identity Theft – notes for the examination
- Windows securityWindows Security – what you’ll learn1:17User Account Control6:22UAC configuration8:02Additional Security Features – ASLR and DEP11:39PatchGuard1:34Techniques and Methods – notes for the examinationEncryption – key protection9:31Drive encryption8:25BitLocker7:57BitLocker To Go Reader4:43File and folder encryption – EFS7:30EXERCISE: EFS5:36Encryption – notes for the examination
- Application securityIntroduction to Application Security8:18Attacks on applications10:18SQL Injection8:10EXERCISE: Analyze the application13:31Blind SQL Injection9:33Automated SQL Injection11:44Cross-site scripting – XSS10:10Program security assessment5:10Unsafe applications10:11Application Attacks – notes for the examinationProgram Security Assessment – notes for the examination
- Application security - Configuration and managementHere’s what you’ll learn in this module1:05Software updates2:39MS Update6:53System Center Configuration Manager2:46Managing applications8:26Blocking applications7:35Software restrictions policies5:57EXERCISE: Application control rules12:11Isolating applications6:30How to protect users without interrupting their work – notes for the examination
- CryptographyIntroduction to cryptography9:42History of ciphers10:57Symmetric and asymmetric ciphers6:13Symmetric-key algorithms5:49Block ciphers6:01Data encryption standard6:51DES-X7:35Advanced encryption standards5:28Block cipher modes7:16Stream Ciphers – RC43:40Asymmetric-key algorithms8:11RSA5:33ELGAMAL2:05HASH functions5:56Digital signature5:56Hybrid Schemes6:24Symmetric and Asymmetric Ciphers – notes for the examination
- Public Key InfrastructureIntroduction to cryptology2:12Public key infrastructure6:10Implementing public key infrastructure5:39What will PKI allow you?6:29EXERCISE: Certificates8:37Certificate life cycle6:24Planning the PKI8:33PKI Administration7:29Public Key Infrastructure – Trust but verify – notes for the examination
Explore Today's Cyber Threats & Shut Them Down with 20+ Hours of Practical Training
IS
IT Security AcademyInstructor
IT Security Academy is a company that associates IT Security Professionals. Now it's proud to share its knowledge online. Certified experts have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.Description
With a few lines of code, cybercriminals can access protected networks, view encrypted files, and even steal identities online—if there's not an ethical hacker standing in their way. This extensive course contains over 20 hours of practical training designed to help you thwart these criminals as a certified professional. You'll start with an introduction to cyber threats and IT security myths. Then you'll move on to security policies, risk management, disaster recovery, and even get a free voucher for the ISA CISS examination when you complete the course, setting you up to validate your skills right away.
- Access 236 lectures & 23 hours of content 24/7
- Follow step-by-step instructions for advanced hacking techniques
- Familiarize yourself w/ current cyber threats & hacking trends
- Explore designing more secure networks
- Dive into encrypted data, identify spoofing, and windows authorization
- Get a free voucher for the ISA CISS examination upon completion
Specs
Important Details
- Length of time users can access this course: lifetime
- Access options: web and mobile streaming
- Certification of completion included
- Redemption deadline: redeem your code within 30 days of purchase
- Experience level required: beginner
- A basic understanding of IT and infrastructure is recommended but not required
- Note: While this comprehensive hacking training includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. It is not recommended to use these techniques to infiltrate networks or IT systems without permission and consent
Terms
- Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...