English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 20.5 Hours | 2.37 GB
Practical Ethical Hacking Techniques. The most extensive ethical hacking on-line course. Over 27+ HOURS OF VIDEO
Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.
This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing.
Warning: While this comprehensive hacking training includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these techniques to infiltrate networks or IT systems without permission and consent.
Become CISS – Certified IT Security Specialist by covering the following topics:
- Security and Hacking Myths Debunked
- Beginner to Advanced IT Security
- Microsoft Windows Threats and WiFi Weaknesses
- Current Black-Hat Threats and Trends
- Designing More Secure Networks
- Encrypted Data, Identify Spoofing, and Windows Authorization
- IT Security Academy Exam Preparation
Boost Network Security and Identify Weaknesses
Certified hackers identify network security threats to prevent criminal hacking attempts. The best way to do this, is to understand how cyber criminals evaluate and test your network for vulnerabilities.
Contents and Overview
This course is designed for anyone seeking a career in IT security / Ethical Hacking, as well as programmers and technology enthusiasts who want to develop hacking and prevention skills. A basic understanding of IT and infrastructure is recommended but not required.
What you’ll learn
- Ethical hacking skills.
- Hacking theory and practice.
- IT security trends.
- Security myths.
- Learn about Wi-Fi network standards and protection.
- Get to know about Wi-Fi threats.
- Improve your grasp on Windows security.
- Understand what security boundaries are.
- Find out how to fight malware.
- Discover secret tips on access control in Windows.
- Learn how Windows authentication works.
- Prevent identity spoofing.
- Find out the mechanisms of Windows authorisation.
- Learn about Windows 7 security mechanisms.
- Get to know how to encrypt data in Windows.
- Wi-Fi network standards and protection.
- Wi-Fi network threats.
- How to prevent identity spoofing.
Table of Contents
IT Security Trends
1 Introduction to Current Cyber Threats
2 IT Prehistory
3 Let’s look a few years back
4 Cyber crimes – an evolution not revolution
5 Current Cyber Threats – notes for the examination
6 Popular myths about IT security – origins
7 Myths #1 – you’ll never be hacked
8 Myths #2 – you don’t need any protection software or hardware
9 Myths #3 – IT security is always a priority
10 Popular Myths About Computer System Security – notes for the examination
11 Trends in IT Security
12 The birth of technology society
13 EXERCISE: How much info can you gather?
14 Fake identity
15 Online privacy
16 Analyzing sniffing software
17 Cyber War
18 Changing IT Security Trends – notes for the examination
19 Objective #1 – Data security – Introduction
20 Confidentiality of data
21 EXERCISE: Finding confidential data with search engines
22 Integrity of data
23 Data security – notes for the examination
Computer Network Security
24 Network security – introduction
25 OSI MODEL #1 – Physical layer
26 OSI MODEL #2 – Data link layer
27 Threats: MAC spoofing
28 Threats: ARP Poisoning
29 EXERCISE: Data Link Layer Attack
30 OSI MODEL #3 – Network layer
31 TCP Tunnelling over ICMP
32 Network Protocols – notes for the examination
33 OSI MODEL #4 – Transport Layer
34 Threats: Enumerating Remote Computers
35 EXERCISE: Transport Layer Attack using METASPLOIT part 1
36 EXERCISE: Transport Layer Attack using METASPLOIT part 2
37 OSI MODEL #5 – Session Layer
38 Transport Protocols – notes for the examination
39 OSI MODEL #6 – Presentation Layer
40 OSI MODEL #7 – Application Layer
41 EXERCISE: Application Layer Attacks
42 Backtrack: Attack Demonstration
43 Man-in-the-Middle and Denial of Service Attacks
44 Modifying Transmitted Packets
45 Unencrypted protocols
46 Application Protocols – notes for the examination
Designing Secure Computer Networks
47 Designing Computer Networks – introduction
48 Subnetting IPv4
49 Subnetting IPv6
50 Subnetting – notes for the examination
51 IPv6 address notation
52 DMZ: demilitarized Zone
53 Protocols and services: IP SEC
54 IP SEC: Phase 1
55 Network Address translation
56 Network access control: RADIUS
57 Protocols and Services – notes for the examination
Network administration
58 Introduction to Monitoring Transmitted Data
59 Monitoring Transmitted Data – Basic informations
60 Intrusion detection systems
61 Why are firewalls and NDIS not enough?
62 Wireshark – Introduction to network analysis
63 How to use Wireshark?
64 Analyzing Captured data
65 How to analyze telnet protocol?
66 Intrusion detection
67 Scanning computers
68 Monitoring transmitted data – notes for the examination
Wireless Networks Security
69 Wireless Networks
70 WIFI security solutions – introduction
71 WIFI – working principles
72 Other wireless technologies
73 Threats and risks
74 Ineffective solutions
75 Authentication methods
76 Standards and Security Solutions – notes for the examination
77 Threats of WIFI networks
78 Client Attacks: Launching a rogue access point
79 Client Attacks: Evil twin
80 Client Attacks: Denial of service
81 EXERCISE: WPA attack
82 Wi-Fi Security Threats – notes for the examination
Operating Systems Security
83 Operating systems security – introduction
84 Security boundaries
85 Three core
86 EXERCISE: OS boundaries
87 Process isolation
88 Kernel Mode Code Signing
89 Java Virtual Machine and code access security
90 OS Security Boundaries – notes for the examination
91 Malware
92 EXERCISE: Vulnerability attacks
93 EXERCISE: Identifying suspicious processes
94 Demonstration: Process Explorer
95 EXERCISE: Removing malware
96 Rootkits
97 EXERCISE: Detecting rootkits
98 EXERCISE: Security evaluation
99 Malware – notes for the examination
Access Control
100 Authentication and authorisation – Introduction
101 Authentication users
102 How secure is your password?
103 Authentication protocols and services
104 Authentication – notes for the examination
105 LM Hash
106 Cached Credentials
107 KERBEROS
108 Identity Theft
109 EXERCISE: Offline attacks
110 Using online cracking services
111 Identity Theft – notes for the examination
Windows Security
112 Windows Security – what you’ll learn
113 User Account Control
114 UAC configuration
115 Additional Security Features – ASLR and DEP
116 PatchGuard
117 Techniques and Methods – notes for the examination
118 Encryption – key protection
119 Drive encryption
120 BitLocker
121 BitLocker To Go Reader
122 File and folder encryption – EFS
123 EXERCISE: EFS
124 Encryption – notes for the examination
Security Policies
125 Security policies introduction
126 What is security?
127 Information security
128 Information security – level up
129 Security issues
130 Why are security solutions fallible?
131 Security policy issues
132 Introduction to threat modelling and classification
133 Threat modelling – STRIDE
134 STRIDE: Spoofing identity
135 STRIDE: Tampering with Data
136 STRIDE: Denial of Service
Risk Management
137 Introduction to Risk Management
138 Attack methods
139 Local attacks
140 Target scanning and enumeration techniques #1
141 Target scanning and enumeration techniques #2
142 Passive scanning
143 Attack Methodologies – notes for the examination
144 Introduction to risk assessment
145 DREAD: Risk assessment model
146 DREAD: Exploitability
147 EXERCISE: Risk Assessment
148 Risk Assessment – notes for the examination
149 Introduction to Social Engineering and rogue software
150 Manipulation tactics
151 EXERCISE: Social Engineering attacks
152 SE with KALI / BackTrack
153 Rogue Software
154 Fraud tools #1
155 Fraud tools #2
156 Social Engineering and Rogue Software – notes for the examination
Defence in Depth
157 Introduction to Defence in Depth
158 How to use Defence in Depth model?
159 DiD: OS and LAN Layers
160 DiD: Perimeter and Physical Access Layers
161 DiD: Demonstration
162 Automated attack targeting a service
163 Automated user-targeting attack
164 The Defence in Depth Model – notes for the examination
165 Introduction to Immutable laws of security – Law #1
166 Law #2
167 Law #3
168 Law #4
169 Law #5
170 Law #6
171 Law #7
172 Law #8
173 Law #9
174 Law #10
175 Laws for administrators
176 Immutable Laws of Security – notes for the examination
Disaster Recovery
177 Introduction to Disaster Recovery
178 How to reduce losses?
179 Ensuring continous availability
180 Threat discovery #1
181 Threat discovery #2
182 Audit users and keep control accounts
183 High risk users
184 Collecting and analysing evidence
185 Forensics example
186 CONFICKER: CASE STUDY
187 How to reduce losses – notes for the examination
Application Security
188 Introduction to Application Security
189 Attacks on applications
190 SQL Injection
191 EXERCISE: Analyze the application
192 Blind SQL Injection
193 Automated SQL Injection
194 Cross-site scripting – XSS
195 Application Attacks – notes for the examination
196 Program security assessment
197 Unsafe applications
198 Program Security Assessment – notes for the examination
199 Check your knowledge and get ready for the exam
Application Security – Configuration and Management
200 Here’s what you’ll learn in this module
201 Managing applications
202 Software updates
203 MS Update
204 System Center Configuration Manager
205 Blocking applications
206 Software restrictions policies
207 EXERCISE: Application control rules
208 Isolating applications
209 How to protect users without interrupting their work – notes for the examination
Cryptography
210 Introduction to cryptography
211 History of ciphers
212 Symmetric and asymmetric ciphers
213 Symmetric-key algorithms
214 Block ciphers
215 Data encryption standard
216 DES-X
217 Advanced encryption standards
218 Block cipher modes
219 Stream Ciphers – RC4
220 Asymmetric-key algorithms
221 RSA
222 ELGAMAL
223 HASH functions
224 Digital signature
225 Hybrid Schemes
226 Symmetric and Asymmetric Ciphers – notes for the examination
Public Key Infrastructure
227 Introduction to cryptology
228 Public key infrastructure
229 Implementing public key infrastructure
230 What will PKI allow you?
231 EXERCISE: Certificates
232 Planning the PKI
233 Certificate life cycle
234 PKI Administration
235 Threat Modelling and Classification – notes for the examination
236 Public Key Infrastructure – Trust but verify – notes for the examination
Prepare for the examination
237 Answer sample questions which you can find during the examination
Certificate
238 The Certificate – see how it looks like
BONUS section – get your coupon code here
239 BONUS: Examination – your voucher
240 BONUS LECTURE: Learn more and get to know our other courses
241 Thanks for joining
Resolve the captcha to access the links!