Hacking In Practice Intensive Ethical Hacking Mega

2021 Edition! Practical Ethical Hacking Techniques. The most intensive ethical hacking course. Over 27+ HOURS OF VIDEO.

Last updated 2022-01-10 | 4.2

- Ethical hacking skills.
- Hacking theory and practice.
- IT security trends.

What you'll learn

Ethical hacking skills.
Hacking theory and practice.
IT security trends.
Security myths.
Learn about Wi-Fi network standards and protection.
Get to know about Wi-Fi threats.
Improve your grasp on Windows security.
Understand what security boundaries are.
Find out how to fight malware.
Discover secret tips on access control in Windows.
Learn how Windows authentication works.
Prevent identity spoofing.
Find out the mechanisms of Windows authorisation.
Learn about Windows 7 security mechanisms.
Get to know how to encrypt data in Windows.
Wi-Fi network standards and protection.
Wi-Fi network threats.
How to prevent identity spoofing.

* Requirements

* General IT knowledge
* No programming skills needed on IT Sec Beginner course

Description

  • Ethical hacking skills.
  • Hacking theory and practice.
  • IT security trends.
  • Security myths.
  • Learn about Wi-Fi network standards and protection.
  • Get to know about Wi-Fi threats.
  • Improve your grasp on Windows security.
  • Understand what security boundaries are.
  • Find out how to fight malware.
  • Discover secret tips on access control in Windows.
  • Learn how Windows authentication works.
  • Prevent identity spoofing.
  • Find out the mechanisms of Windows authorisation.
  • Learn about Windows 7 security mechanisms.
  • Get to know how to encrypt data in Windows.
  • Wi-Fi network standards and protection.
  • Wi-Fi network threats.
  • How to prevent identity spoofing.

Course content

24 sections • 248 lectures

Welcome to the course Preview 00:05

Foreword & FAQ Preview 01:31

Course preview: 15 min. long demo lecture. The whole training is 27 hours long. Preview 14:08

Why is this section here? Preview 00:08

Introduction to Application Security Preview 08:19

Attacks on applications Preview 10:18

SQL Injection Preview 08:10

EXERCISE: Analyze the application Preview 13:31

Blind SQL Injection Preview 09:33

Automated SQL Injection Preview 11:44

Cross-site scripting - XSS Preview 10:10

Application Attacks - notes for the examination Preview 00:00

Program security assessment Preview 05:10

Unsafe applications Preview 10:11

Program Security Assessment - notes for the examination Preview 00:00

Check your knowledge and get ready for the exam

Check your knowledge and get ready for the exam

Introduction to Current Cyber Threats Preview 04:46

IT Prehistory Preview 04:41

Let’s look a few years back Preview 04:42

Cyber crimes - an evolution not revolution Preview 04:25

Current Cyber Threats - notes for the examination Preview 18 pages

Popular myths about IT security - origins Preview 05:33

Myths #1 - you’ll never be hacked Preview 05:55

Myths #2 - you don’t need any protection software or hardware Preview 05:11

Myths #3 - IT security is always a priority Preview 01:13

Popular Myths About Computer System Security - notes for the examination Preview 9 pages

Trends in IT Security Preview 03:44

The birth of technology society Preview 03:16

EXERCISE: How much info can you gather? Preview 03:59

Fake identity Preview 05:03

Online privacy Preview 06:14

Analyzing sniffing software Preview 03:33

Cyber War Preview 08:23

Changing IT Security Trends - notes for the examination Preview 32 pages

Objective #1 - Data security - Introduction Preview 06:58

Integrity of data Preview 07:04

Data security - notes for the examination Preview 22 pages

Confidentiality of data Preview 05:33

EXERCISE: Finding confidential data with search engines Preview 06:05

Network security - introduction Preview 05:44

OSI MODEL #1 - Physical layer Preview 05:45

OSI MODEL #2 - Data link layer Preview 04:46

Threats: MAC spoofing Preview 05:54

Threats: ARP Poisoning Preview 06:38

EXERCISE: Data Link Layer Attack Preview 07:32

OSI MODEL #3 - Network layer Preview 06:58

TCP Tunnelling over ICMP Preview 07:39

Network Protocols - notes for the examination Preview 26 pages

OSI MODEL #4 - Transport Layer Preview 06:04

Threats: Enumerating Remote Computers Preview 03:40

EXERCISE: Transport Layer Attack using METASPLOIT part 1 Preview 05:27

EXERCISE: Transport Layer Attack using METASPLOIT part 2 Preview 05:13

OSI MODEL #5 - Session Layer Preview 03:33

Transport Protocols - notes for the examination Preview 10 pages

OSI MODEL #6 - Presentation Layer Preview 06:52

OSI MODEL #7 - Application Layer Preview 03:48

EXERCISE: Application Layer Attacks Preview 06:03

Backtrack: Attack Demonstration Preview 03:34

Man-in-the-Middle and Denial of Service Attacks Preview 02:49

Modifying Transmitted Packets Preview 04:45

Unencrypted protocols Preview 02:58

Application Protocols - notes for the examination Preview 21 pages

Designing Computer Networks - introduction Preview 02:18

Subnetting IPv4 Preview 07:01

Subnetting IPv6 Preview 03:18

Subnetting - notes for the examination Preview 20 pages

IPv6 address notation Preview 06:46

DMZ: demilitarized Zone Preview 06:28

Protocols and services: IP SEC Preview 09:33

IP SEC: Phase 1 Preview 07:27

Network Address translation Preview 12:18

Network access control: RADIUS Preview 10:04

Protocols and Services - notes for the examination Preview 20 pages

Introduction to Monitoring Transmitted Data Preview 01:06

Monitoring Transmitted Data - Basic informations Preview 08:03

Intrusion detection systems Preview 07:43

Why are firewalls and NDIS not enough? Preview 05:41

Wireshark - Introduction to network analysis Preview 06:29

How to use Wireshark? Preview 08:27

Analyzing Captured data Preview 05:43

How to analyze telnet protocol? Preview 08:09

Intrusion detection Preview 07:48

Scanning computers Preview 07:47

Monitoring transmitted data - notes for the examination Preview 28 pages

Wireless Networks Preview 01:16

WIFI security solutions - introduction Preview 05:44

WIFI - working principles Preview 05:48

Other wireless technologies Preview 02:56

Threats and risks Preview 04:38

Ineffective solutions Preview 04:11

Authentication methods Preview 08:31

802.11 WEP Preview 07:06

802.11I WPA Preview 06:24

Standards and Security Solutions - notes for the examination Preview 29 pages

Threats of WIFI networks Preview 05:58

Client Attacks: Launching a rogue access point Preview 07:03

Client Attacks: Evil twin Preview 04:51

Client Attacks: Denial of service Preview 09:17

EXERCISE: WPA attack Preview 03:24

Wi-Fi Security Threats - notes for the examination Preview 19 pages

Operating systems security - introduction Preview 09:10

Security boundaries Preview 04:44

Three core Preview 07:15

EXERCISE: OS boundaries Preview 07:54

Process isolation Preview 06:30

Kernel Mode Code Signing Preview 06:24

Java Virtual Machine and code access security Preview 04:17

OS Security Boundaries - notes for the examination Preview 28 pages

Malware Preview 12:09

EXERCISE: Vulnerability attacks Preview 10:26

EXERCISE: Identifying suspicious processes Preview 06:54

Demonstration: Process Explorer Preview 09:13

EXERCISE: Removing malware Preview 08:38

Rootkits Preview 06:14

EXERCISE: Detecting rootkits Preview 11:07

EXERCISE: Security evaluation Preview 06:00

Malware - notes for the examination Preview 18 pages

Authentication and authorisation - Introduction Preview 01:57

Authentication users Preview 06:56

How secure is your password? Preview 05:03

Authentication protocols and services Preview 08:25

Authentication - notes for the examination Preview 26 pages

LM Hash Preview 07:02

Cached Credentials Preview 04:29

KERBEROS Preview 11:30

Identity Theft Preview 09:13

EXERCISE: Offline attacks Preview 12:22

Using online cracking services Preview 08:41

Identity Theft - notes for the examination Preview 13 pages

Windows Security - what you’ll learn Preview 01:17

User Account Control Preview 06:22

UAC configuration Preview 08:02

Additional Security Features - ASLR and DEP Preview 11:39

PatchGuard Preview 01:34

Techniques and Methods - notes for the examination Preview 18 pages

Encryption - key protection Preview 09:31

Drive encryption Preview 08:25

BitLocker Preview 07:57

BitLocker To Go Reader Preview 04:43

File and folder encryption - EFS Preview 07:30

EXERCISE: EFS Preview 05:36

Encryption - notes for the examination Preview 23 pages

Security policies – introduction Preview 01:56

What is security? Preview 03:53

Information security Preview 04:13

Information security - level up Preview 04:04

Security issues Preview 04:50

Why are security solutions fallible? Preview 05:42

Security policy issues Preview 04:50

Introduction to threat modelling and classification Preview 05:14

Threat modelling - STRIDE Preview 04:06

STRIDE: Spoofing identity Preview 05:03

STRIDE: Tampering with Data Preview 04:28

STRIDE: Denial of Service Preview 03:51

Introduction to Risk Management Preview 01:27

Attack methods Preview 06:42

Local attacks Preview 02:56

Target scanning and enumeration techniques #1 Preview 05:52

Target scanning and enumeration techniques #2 Preview 03:30

Passive scanning Preview 02:06

Attack Methodologies - notes for the examination Preview 00:00

Introduction to risk assessment Preview 06:20

DREAD: Risk assessment model Preview 04:50

DREAD: Exploitability Preview 05:24

EXERCISE: Risk Assessment Preview 07:17

Risk Assessment - notes for the examination Preview 00:00

Introduction to Social Engineering and rogue software Preview 04:19

Manipulation tactics Preview 09:01

EXERCISE: Social Engineering attacks Preview 06:44

SE with KALI / BackTrack Preview 07:06

Rogue Software Preview 02:28

Fraud tools #1 Preview 07:10

Fraud tools #2 Preview 06:32

Social Engineering and Rogue Software - notes for the examination Preview 00:00

Introduction to Defence in Depth Preview 01:32

How to use Defence in Depth model? Preview 05:45

DiD: OS and LAN Layers Preview 06:39

DiD: Perimeter and Physical Access Layers Preview 06:06

DiD: Demonstration Preview 02:48

Automated attack targeting a service Preview 05:23

Automated user-targeting attack Preview 04:31

The Defence in Depth Model - notes for the examination Preview 00:00

Introduction to Immutable laws of security - Law #1 Preview 04:35

Law #2 Preview 02:56

Law #3 Preview 02:23

Law #4 Preview 01:52

Law #5 Preview 03:28

Law #6 Preview 02:07

Law #7 Preview 01:11

Law #8 Preview 01:43

Law #9 Preview 03:57

Law #10 Preview 00:48

Laws for administrators Preview 05:59

Immutable Laws of Security - notes for the examination Preview 00:00

Introduction to Disaster Recovery Preview 01:33

How to reduce losses? Preview 05:24

Ensuring continous availability Preview 04:08

Threat discovery #1 Preview 04:28

Threat discovery #2 Preview 03:40

Audit users and keep control accounts Preview 05:18

High risk users Preview 03:23

Collecting and analysing evidence Preview 07:13

Forensics example Preview 03:52

CONFICKER: CASE STUDY Preview 07:12

How to reduce losses - notes for the examination Preview 00:00

Here’s what you’ll learn in this module Preview 01:05

Managing applications Preview 08:26

Software updates Preview 02:39

MS Update Preview 06:53

System Center Configuration Manager Preview 02:46

Blocking applications Preview 07:35

Software restrictions policies Preview 05:57

EXERCISE: Application control rules Preview 12:12

Isolating applications Preview 06:30

How to protect users without interrupting their work - notes for the examination Preview 00:00

Introduction to cryptography Preview 09:42

History of ciphers Preview 10:57

Symmetric and asymmetric ciphers Preview 06:13

Symmetric-key algorithms Preview 05:49

Block ciphers Preview 06:01

Data encryption standard Preview 06:51

DES-X Preview 07:35

Advanced encryption standards Preview 05:28

Block cipher modes Preview 07:16

Stream Ciphers - RC4 Preview 03:41

Asymmetric-key algorithms Preview 08:11

RSA Preview 05:33

ELGAMAL Preview 02:05

HASH functions Preview 05:56

Digital signature Preview 05:56

Hybrid Schemes Preview 06:24

Symmetric and Asymmetric Ciphers - notes for the examination Preview 00:00

Introduction to cryptology Preview 02:12

Public key infrastructure Preview 06:10

Implementing public key infrastructure Preview 05:39

What will PKI allow you? Preview 06:29

EXERCISE: Certificates Preview 08:37

Planning the PKI Preview 08:33

Certificate life cycle Preview 06:24

PKI Administration Preview 07:29

Threat Modelling and Classification - notes for the examination Preview 00:00

Public Key Infrastructure - Trust but verify - notes for the examination Preview 00:00

Answer sample questions which you can find during the examination

Here are sample questions which you can find during the examination. These are only 5 questions from our question base which contains hundreds of tasks, so prepare yourself well.

Good luck!

Robert,

IT Security Academy

The Certificate - see how it looks like Preview 1 page

Wiriting a Shellcode Preview 17:35

This module comes from Rootkits and Stealth Apps: Creating and Revealing v2.0 course.

BONUS: Examination - your voucher Preview 1 page

BONUS LECTURE: Learn more and get to know our other courses Preview 00:37

Thanks for joining Preview 00:06