Hacking in Practice: Certified Ethical Hacking MEGA Course 2022/2023
Instructors
Hacking in Practice: Certified Ethical Hacking MEGA Course 2022/2023
The best and the most extensive Ethical Hacking Training Program on the market. Covers CISS, CompTIA and CISSP. Prepare for the examination and become CISS with IT Security Academy.
BONUS: Finishing this course, you will get a free voucher for ISA CISS Examination!
Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.
IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You’re welcome to join us and start your training now.
Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.
This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing.
Warning: While this comprehensive training includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these techniques to infiltrate networks or IT systems without permission and consent.
Become CISS – Certified IT Security Specialist by covering the following topics:
- Security and Hacking Myths Debunked
- Beginner to Advanced IT Security
- Microsoft Windows Threats and WiFi Weaknesses
- Current Black-Hat Threats and Trends
- Designing More Secure Networks
- Encrypted Data, Identify Spoofing, and Windows Authorization
- IT Security Academy Exam Preparation
Boost Network Security and Identify Weaknesses
Certified hackers identify network security threats to prevent criminal hacking attempts. The best way to do this, is to understand how cyber criminals evaluate and test your network for vulnerabilities.
Contents and Overview
This course is designed for anyone seeking a career in IT security, as well as programmers and technology enthusiasts who want to develop hacking and prevention skills. A basic understanding of IT and infrastructure is recommended but not required.
With 239 lectures and over 32+ hours of content, you will start with the basics of IT security and progress to the advanced curriculum in a matter of days.
What are the requirements?
- General IT knowledge
- No advanced programming skills needed
What am I going to get from this course?
- IT security trends.
- Security myths.
- Learn about Wi-Fi network standards and protection.
- Get to know about Wi-Fi threats.
- Improve your grasp on Windows security.
- Understand what security boundaries are.
- Find out how to fight malware.
- Discover secret tips on access control in Windows.
- Learn how Windows authentication works.
- Prevent identity spoofing.
- Find out the mechanisms of Windows authorisation.
- Learn about Windows 7 security mechanisms.
- Get to know how to encrypt data in Windows.
- Wi-Fi network standards and protection.
- Wi-Fi network threats.
- How to prevent identity spoofing.
- Application attacks and how to prevent them.
- Application security assessment.
- Global management of user software.
- Cryptography and cryptanalysis.
- Symmetric and asymmetric encryption.
- Public key infrastructure management.
- Modelling and classifying threats.
- Managing risk.
- Attack methodologies.
- How to use and deal with social engineering and rogue software.
- Defence-in-depth.
- Immutable security laws.
What is the target audience?
- Future IT Sec Professionals
- IT Students
- Programmers
- IT enthusiasts
- Pentesters
- Network and Enterprise OS Administrators
- Everyone interested in ethical hacking
Course Curriculum
Introduction to cyber threats | |||
Introduction to Current Cyber Threats | FREE | 00:04:46 | |
IT Prehistory | 00:04:41 | ||
Let’s look a few years back | 00:04:42 | ||
Cyber crimes – an evolution not revolution | 00:04:25 | ||
Current Cyber Threats – notes for the examination | 00:18:00 | ||
IT security popular myths | |||
Popular myths about IT security – origins | 00:05:33 | ||
Myths #1 – you’ll never be hacked | 00:05:55 | ||
Myths #2 – you don’t need any protection software or hardware | 00:05:11 | ||
Myths #3 – IT security is always a priority | 00:01:13 | ||
Popular Myths About Computer System Security – notes for the examination | 00:09:00 | ||
IT security trends | |||
Trends in IT Security | 00:03:44 | ||
The birth of technology society | 00:03:16 | ||
EXERCISE: How much info can you gather? | 00:03:59 | ||
Fake identity | 00:05:03 | ||
Online privacy | 00:06:14 | ||
Analyzing sniffing software | 00:03:33 | ||
Cyber War | 00:08:23 | ||
Changing IT Security Trends – notes for the examination | 00:32:00 | ||
Data security | |||
Objective #1 – Data security – Introduction | 00:06:59 | ||
Confidentiality of data | 00:05:33 | ||
EXERCISE: Finding confidential data with search engines | 00:06:05 | ||
Integrity of data | 00:07:04 | ||
Data security – notes for the examination | 00:22:00 | ||
Security policies | |||
Security policies – introduction | 00:01:56 | ||
What is security? | 00:03:53 | ||
Information security | 00:04:13 | ||
Information security – level up | 00:04:04 | ||
Security issues | 00:04:50 | ||
Why are security solutions fallible? | 00:05:42 | ||
Security policy issues | 00:04:50 | ||
Introduction to threat modelling and classification | 00:05:14 | ||
Threat modelling – STRIDE | 00:04:06 | ||
STRIDE: Spoofing identity | 00:05:03 | ||
STRIDE: Tampering with data | 00:04:28 | ||
STRIDE: Denial of Service | 00:03:51 | ||
Threat Modelling and Classification – notes for the examination | 00:19:00 | ||
Risk management | |||
Introduction to Risk Management | 00:01:27 | ||
Attack Methods | 00:06:42 | ||
Local attacks | 00:02:56 | ||
Target scanning and enumeration techniques #1 | 00:05:52 | ||
Target scanning and enumeration techniques #2 | 00:03:30 | ||
Passive scanning | 00:02:06 | ||
Attack Methodologies – notes for the examination | 00:25:00 | ||
Introduction to risk assessment | 00:06:20 | ||
DREAD: Risk assessment model | 00:04:50 | ||
DREAD: Exploitability | 00:05:24 | ||
EXERCISE: Risk Assessment | 00:07:17 | ||
Risk Assessment – notes for the examination | 00:27:00 | ||
Introduction to Social Engineering and rogue software | 00:04:19 | ||
Manipulation tactics | 00:09:01 | ||
EXERCISE: Social Engineering attacks | 00:06:44 | ||
SE with KALI / BackTrack | 00:07:06 | ||
Rogue Software | 00:02:28 | ||
Fraud tools #1 | 00:07:10 | ||
Fraud tools #2 | 00:06:32 | ||
Social Engineering and Rogue Software – notes for the examination | 00:28:00 | ||
Defence in depth | |||
Introduction to Defence in depth | 00:01:32 | ||
How to use Defence in depth model? | 00:05:45 | ||
DiD: OS and LAN layers | 00:06:39 | ||
DiD: Perimeter and Physical Access Layers | 00:06:06 | ||
DiD: Demonstration | 00:02:48 | ||
Automated attack targeting a service | 00:05:23 | ||
Automated user-targeting attack | 00:04:31 | ||
The Defence in Depth Model – notes for the examination | 00:25:00 | ||
Introduction to Immutable laws of security – Law #1 | 00:04:35 | ||
Law #2 | 00:02:56 | ||
Law #3 | 00:02:23 | ||
Law #4 | 00:01:52 | ||
Law #5 | 00:03:28 | ||
Law #6 | 00:02:07 | ||
Law #7 | 00:01:11 | ||
Law #8 | 00:01:43 | ||
Law #9 | 00:03:57 | ||
Law #10 | 00:00:48 | ||
Laws for administrators | 00:05:59 | ||
Immutable Laws of Security – notes for the examination | 00:21:00 | ||
Disaster recovery | |||
Introduction to Disaster Recovery | 00:01:33 | ||
How to reduce losses? | 00:05:24 | ||
Ensuring continous availability | 00:04:08 | ||
Threat discovery #1 | 00:04:28 | ||
Threat discovery #2 | 00:03:40 | ||
Audit users and keep control accounts | 00:05:18 | ||
High risk users | 00:03:23 | ||
Collecting and analysing evidence | 00:07:13 | ||
Forensics example | 00:03:52 | ||
CONFICKER: CASE STUDY | 00:07:12 | ||
How to reduce losses – notes for the examination | 00:31:00 | ||
Computer network security - network protocols | |||
Network security – introduction | 00:05:44 | ||
OSI MODEL #1 – Physical layer | 00:05:45 | ||
OSI MODEL #2 – Data link layer | 00:04:46 | ||
Threats: MAC spoofing | 00:05:54 | ||
Threats: ARP Poisoning | 00:06:38 | ||
EXERCISE: Data Link Layer Attack | 00:07:32 | ||
OSI MODEL #3 – Network layer | 00:06:58 | ||
TCP Tunnelling over ICMP | 00:07:39 | ||
Network Protocols – notes for the examination | 00:26:00 | ||
Transport protocols | |||
OSI MODEL #4 – Transport Layer | 00:06:04 | ||
Threats: Enumerating Remote Computers | 00:03:40 | ||
EXERCISE: Transport Layer Attack using METASPLOIT – part 1 | 00:05:27 | ||
EXERCISE: Transport Layer Attack using METASPLOIT – part 2 | 00:05:13 | ||
OSI MODEL #5 – Session Layer | 00:03:33 | ||
Transport Protocols – notes for the examination | 00:10:00 | ||
Application protocols | |||
OSI MODEL #6 – Presentation Layer | 00:06:52 | ||
OSI MODEL #7 – Application Layer | 00:03:48 | ||
EXERCISE: Application Layer Attacks | 00:06:03 | ||
KALI / Backtrack: Attack Demonstration | 00:03:34 | ||
Man-in-the-Middle and Denial of Service Attacks | 00:02:49 | ||
Modifying Transmitted Packets | 00:04:45 | ||
Unencrypted protocols | 00:02:58 | ||
Application Protocols – notes for the examination | 00:21:00 | ||
Designing secure computer networks | |||
Designing Computer Networks – introduction | 00:02:18 | ||
Subnetting IPv4 | 00:07:01 | ||
Subnetting IPv6 | 00:03:18 | ||
IPv6 address notation | 00:06:46 | ||
DMZ: DeMilitarized Zone | 00:06:28 | ||
Subnetting – notes for the examination | 00:20:00 | ||
Protocols and services: IP SEC | 00:09:34 | ||
IP SEC: Phase 1 | 00:07:27 | ||
Network Address Translation | 00:12:19 | ||
Network access control: RADIUS | 00:10:05 | ||
Protocols and Services – notes for the examination | 00:20:00 | ||
Network administration and monitoring | |||
Introduction to Monitoring Transmitted Data | 00:01:07 | ||
Monitoring Transmitted Data – Basic information | 00:08:04 | ||
Intrusion detection systems | 00:07:43 | ||
Why are firewalls and NDIS not enough? | 00:05:41 | ||
Wireshark – Introduction to network analysis | 00:06:30 | ||
How to use Wireshark? | 00:08:27 | ||
Analyzing captured data | 00:05:43 | ||
How to analyze telnet protocol? | 00:08:10 | ||
Intrusion detection | 00:07:48 | ||
Scanning computers | 00:07:48 | ||
Monitoring transmitted data – notes for the examination | 00:28:00 | ||
Wireless networks security | |||
Wireless Networks | 00:01:17 | ||
WIFI security solutions – introduction | 00:05:44 | ||
WIFI – working principles | 00:05:49 | ||
Other wireless technologies | 00:02:57 | ||
Threats and risks | 00:04:38 | ||
Ineffective solutions | 00:04:11 | ||
Authentication methods | 00:08:32 | ||
802.11 WEP | 00:07:07 | ||
802.11 WPA | 00:06:24 | ||
Standards and Security Solutions – notes for the examination | 00:29:00 | ||
Threats of WIFI networks | 00:05:59 | ||
Client Attacks: Launching a rogue access point | 00:07:04 | ||
Client Attacks: Evil twin | 00:04:52 | ||
Client Attacks: Denial of service | 00:09:17 | ||
EXERCISE: WPA attack | 00:03:24 | ||
Wi-Fi Security Threats – notes for the examination | 00:19:00 | ||
Operating systems security | |||
Operating systems security – introduction | 00:09:10 | ||
Security boundaries | 00:04:48 | ||
Three core | 00:07:15 | ||
EXERCISE: OS boundaries | 00:07:55 | ||
Process isolation | 00:06:30 | ||
Kernel Mode Code Signing | 00:06:25 | ||
Java Virtual Machine and code access security | 00:04:17 | ||
OS Security Boundaries – notes for the examination | 00:28:00 | ||
Malware | 00:12:10 | ||
EXERCISE: Vulnerability attacks | 00:10:27 | ||
EXERCISE: Identifying suspicious processes | 00:06:54 | ||
Demonstration: Process Explorer | 00:09:14 | ||
EXERCISE: Removing malware | 00:08:39 | ||
Rootkits | 00:06:15 | ||
EXERCISE: Detecting rootkits | 00:11:07 | ||
EXERCISE: Security evaluation | 00:06:01 | ||
Malware – notes for the examination | 00:18:00 | ||
Access control | |||
Authentication and authorisation – Introduction | 00:01:58 | ||
Authentication users | 00:06:57 | ||
How secure is your password? | 00:05:03 | ||
Authentication protocols and services | 00:08:26 | ||
LM Hash | 00:07:02 | ||
Cached Credentials | 00:04:29 | ||
KERBEROS | 00:11:31 | ||
Authentication – notes for the examination | 00:26:00 | ||
Identity Theft | 00:09:14 | ||
EXERCISE: Offline attacks | 00:12:23 | ||
Using online cracking services | 00:08:42 | ||
Identity Theft – notes for the examination | 00:13:00 | ||
Windows security | |||
Windows Security – what you’ll learn | 00:01:18 | ||
User Account Control | 00:06:23 | ||
UAC configuration | 00:08:03 | ||
Additional Security Features – ASLR and DEP | 00:11:40 | ||
PatchGuard | 00:01:35 | ||
Techniques and Methods – notes for the examination | 00:18:00 | ||
Encryption – key protection | 00:09:32 | ||
Drive encryption | 00:08:26 | ||
BitLocker | 00:07:57 | ||
BitLocker To Go Reader | 00:04:48 | ||
File and folder encryption – EFS | 00:07:31 | ||
EXERCISE: EFS | 00:05:36 | ||
Encryption – notes for the examination | 00:23:00 | ||
Application security | |||
Introduction to Application Security | 00:08:19 | ||
Attacks on applications | 00:10:18 | ||
SQL Injection | 00:08:10 | ||
EXERCISE: Analyze the application | 00:13:31 | ||
Blind SQL Injection | 00:09:33 | ||
Automated SQL Injection | 00:11:44 | ||
Cross-site scripting – XSS | 00:10:10 | ||
Application Attacks – notes for the examination | 00:29:00 | ||
Program security assessment | 00:05:10 | ||
Unsafe applications | 00:10:11 | ||
Program Security Assessment – notes for the examination | 00:10:00 | ||
Application security - Configuration and management | |||
Here’s what you’ll learn in this module | 00:01:05 | ||
Managing applications | 00:08:26 | ||
Software updates | 00:02:39 | ||
MS Update | 00:06:53 | ||
System Center Configuration Manager | 00:02:46 | ||
Blocking applications | 00:07:35 | ||
Software restrictions policies | 00:05:57 | ||
EXERCISE: Application control rules | 00:12:12 | ||
Isolating applications | 00:06:30 | ||
How to protect users without interrupting their work – notes for the examination | 00:25:00 | ||
Cryptography | |||
Introduction to cryptography | 00:09:42 | ||
History of ciphers | 00:10:57 | ||
Symmetric and asymmetric ciphers | 00:06:13 | ||
Symmetric-key algorithms | 00:05:49 | ||
Block ciphers | 00:06:01 | ||
Data encryption standard | 00:06:51 | ||
DES-X | 00:07:35 | ||
Advanced encryption standards | 00:05:28 | ||
Block cipher modes | 00:07:16 | ||
Stream Ciphers – RC4 | 00:03:41 | ||
Asymmetric-key algorithms | 00:08:11 | ||
RSA | 00:05:33 | ||
ELGAMAL | 00:02:05 | ||
HASH functions | 00:05:56 | ||
Digital signature | 00:05:56 | ||
Hybrid Schemes | 00:06:24 | ||
Symmetric and Asymmetric Ciphers – notes for the examination | 00:57:00 | ||
Public Key Infrastructure | |||
Introduction to cryptology | 00:02:12 | ||
Public key infrastructure | 00:06:10 | ||
Implementing public key infrastructure | 00:05:39 | ||
What will PKI allow you? | 00:06:29 | ||
EXERCISE: Certificates | 00:08:37 | ||
Certificate life cycle | 00:06:24 | ||
Planning the PKI | 00:08:33 | ||
PKI Administration | 00:07:29 | ||
Public Key Infrastructure – Trust but verify – notes for the examination | 00:37:00 | ||
Prepare for the examination | |||
BONUS | |||
BONUS: Examination – your voucher | 00:01:00 | ||
Certificate – see how it looks like | 00:01:00 |
Course Reviews
No Reviews found for this course.