fbpx

Hacking in Practice: Certified Ethical Hacking MEGA Course 2022/2023

The best and the most extensive Ethical Hacking Training Program on the market. Covers CISS, CompTIA and CISSP. Prepare for the examination and become CISS with IT Security Academy.

32748 STUDENTS ENROLLED
  • Profile photo of Johan
  • Profile photo of Marcel
  • Profile photo of Lionel
  • Profile photo of Lodewyk
  • Profile photo of Vernon
  • Profile photo of 404 Error

BONUS: Finishing this course, you will get a free voucher for ISA CISS Examination!

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.

IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You’re welcome to join us and start your training now.

Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.

This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing.

Warning: While this comprehensive training includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these techniques to infiltrate networks or IT systems without permission and consent.

Become CISS – Certified IT Security Specialist by covering the following topics:

  • Security and Hacking Myths Debunked
  • Beginner to Advanced IT Security
  • Microsoft Windows Threats and WiFi Weaknesses
  • Current Black-Hat Threats and Trends
  • Designing More Secure Networks
  • Encrypted Data, Identify Spoofing, and Windows Authorization
  • IT Security Academy Exam Preparation

Boost Network Security and Identify Weaknesses

Certified hackers identify network security threats to prevent criminal hacking attempts. The best way to do this, is to understand how cyber criminals evaluate and test your network for vulnerabilities.

Contents and Overview

This course is designed for anyone seeking a career in IT security, as well as programmers and technology enthusiasts who want to develop hacking and prevention skills. A basic understanding of IT and infrastructure is recommended but not required.

With 239 lectures and over 32+ hours of content, you will start with the basics of IT security and progress to the advanced curriculum in a matter of days.

What are the requirements?

  • General IT knowledge
  • No advanced programming skills needed

What am I going to get from this course?

  • IT security trends.
  • Security myths.
  • Learn about Wi-Fi network standards and protection.
  • Get to know about Wi-Fi threats.
  • Improve your grasp on Windows security.
  • Understand what security boundaries are.
  • Find out how to fight malware.
  • Discover secret tips on access control in Windows.
  • Learn how Windows authentication works.
  • Prevent identity spoofing.
  • Find out the mechanisms of Windows authorisation.
  • Learn about Windows 7 security mechanisms.
  • Get to know how to encrypt data in Windows.
  • Wi-Fi network standards and protection.
  • Wi-Fi network threats.
  • How to prevent identity spoofing.
  • Application attacks and how to prevent them.
  • Application security assessment.
  • Global management of user software.
  • Cryptography and cryptanalysis.
  • Symmetric and asymmetric encryption.
  • Public key infrastructure management.
  • Modelling and classifying threats.
  • Managing risk.
  • Attack methodologies.
  • How to use and deal with social engineering and rogue software.
  • Defence-in-depth.
  • Immutable security laws.

What is the target audience?

  • Future IT Sec Professionals
  • IT Students
  • Programmers
  • IT enthusiasts
  • Pentesters
  • Network and Enterprise OS Administrators
  • Everyone interested in ethical hacking

Course Curriculum

Introduction to cyber threats
Introduction to Current Cyber Threats FREE 00:04:46
IT Prehistory 00:04:41
Let’s look a few years back 00:04:42
Cyber crimes – an evolution not revolution 00:04:25
Current Cyber Threats – notes for the examination 00:18:00
IT security popular myths
Popular myths about IT security – origins 00:05:33
Myths #1 – you’ll never be hacked 00:05:55
Myths #2 – you don’t need any protection software or hardware 00:05:11
Myths #3 – IT security is always a priority 00:01:13
Popular Myths About Computer System Security – notes for the examination 00:09:00
IT security trends
Trends in IT Security 00:03:44
The birth of technology society 00:03:16
EXERCISE: How much info can you gather? 00:03:59
Fake identity 00:05:03
Online privacy 00:06:14
Analyzing sniffing software 00:03:33
Cyber War 00:08:23
Changing IT Security Trends – notes for the examination 00:32:00
Data security
Objective #1 – Data security – Introduction 00:06:59
Confidentiality of data 00:05:33
EXERCISE: Finding confidential data with search engines 00:06:05
Integrity of data 00:07:04
Data security – notes for the examination 00:22:00
Security policies
Security policies – introduction 00:01:56
What is security? 00:03:53
Information security 00:04:13
Information security – level up 00:04:04
Security issues 00:04:50
Why are security solutions fallible? 00:05:42
Security policy issues 00:04:50
Introduction to threat modelling and classification 00:05:14
Threat modelling – STRIDE 00:04:06
STRIDE: Spoofing identity 00:05:03
STRIDE: Tampering with data 00:04:28
STRIDE: Denial of Service 00:03:51
Threat Modelling and Classification – notes for the examination 00:19:00
Risk management
Introduction to Risk Management 00:01:27
Attack Methods 00:06:42
Local attacks 00:02:56
Target scanning and enumeration techniques #1 00:05:52
Target scanning and enumeration techniques #2 00:03:30
Passive scanning 00:02:06
Attack Methodologies – notes for the examination 00:25:00
Introduction to risk assessment 00:06:20
DREAD: Risk assessment model 00:04:50
DREAD: Exploitability 00:05:24
EXERCISE: Risk Assessment 00:07:17
Risk Assessment – notes for the examination 00:27:00
Introduction to Social Engineering and rogue software 00:04:19
Manipulation tactics 00:09:01
EXERCISE: Social Engineering attacks 00:06:44
SE with KALI / BackTrack 00:07:06
Rogue Software 00:02:28
Fraud tools #1 00:07:10
Fraud tools #2 00:06:32
Social Engineering and Rogue Software – notes for the examination 00:28:00
Defence in depth
Introduction to Defence in depth 00:01:32
How to use Defence in depth model? 00:05:45
DiD: OS and LAN layers 00:06:39
DiD: Perimeter and Physical Access Layers 00:06:06
DiD: Demonstration 00:02:48
Automated attack targeting a service 00:05:23
Automated user-targeting attack 00:04:31
The Defence in Depth Model – notes for the examination 00:25:00
Introduction to Immutable laws of security – Law #1 00:04:35
Law #2 00:02:56
Law #3 00:02:23
Law #4 00:01:52
Law #5 00:03:28
Law #6 00:02:07
Law #7 00:01:11
Law #8 00:01:43
Law #9 00:03:57
Law #10 00:00:48
Laws for administrators 00:05:59
Immutable Laws of Security – notes for the examination 00:21:00
Disaster recovery
Introduction to Disaster Recovery 00:01:33
How to reduce losses? 00:05:24
Ensuring continous availability 00:04:08
Threat discovery #1 00:04:28
Threat discovery #2 00:03:40
Audit users and keep control accounts 00:05:18
High risk users 00:03:23
Collecting and analysing evidence 00:07:13
Forensics example 00:03:52
CONFICKER: CASE STUDY 00:07:12
How to reduce losses – notes for the examination 00:31:00
Computer network security - network protocols
Network security – introduction 00:05:44
OSI MODEL #1 – Physical layer 00:05:45
OSI MODEL #2 – Data link layer 00:04:46
Threats: MAC spoofing 00:05:54
Threats: ARP Poisoning 00:06:38
EXERCISE: Data Link Layer Attack 00:07:32
OSI MODEL #3 – Network layer 00:06:58
TCP Tunnelling over ICMP 00:07:39
Network Protocols – notes for the examination 00:26:00
Transport protocols
OSI MODEL #4 – Transport Layer 00:06:04
Threats: Enumerating Remote Computers 00:03:40
EXERCISE: Transport Layer Attack using METASPLOIT – part 1 00:05:27
EXERCISE: Transport Layer Attack using METASPLOIT – part 2 00:05:13
OSI MODEL #5 – Session Layer 00:03:33
Transport Protocols – notes for the examination 00:10:00
Application protocols
OSI MODEL #6 – Presentation Layer 00:06:52
OSI MODEL #7 – Application Layer 00:03:48
EXERCISE: Application Layer Attacks 00:06:03
KALI / Backtrack: Attack Demonstration 00:03:34
Man-in-the-Middle and Denial of Service Attacks 00:02:49
Modifying Transmitted Packets 00:04:45
Unencrypted protocols 00:02:58
Application Protocols – notes for the examination 00:21:00
Designing secure computer networks
Designing Computer Networks – introduction 00:02:18
Subnetting IPv4 00:07:01
Subnetting IPv6 00:03:18
IPv6 address notation 00:06:46
DMZ: DeMilitarized Zone 00:06:28
Subnetting – notes for the examination 00:20:00
Protocols and services: IP SEC 00:09:34
IP SEC: Phase 1 00:07:27
Network Address Translation 00:12:19
Network access control: RADIUS 00:10:05
Protocols and Services – notes for the examination 00:20:00
Network administration and monitoring
Introduction to Monitoring Transmitted Data 00:01:07
Monitoring Transmitted Data – Basic information 00:08:04
Intrusion detection systems 00:07:43
Why are firewalls and NDIS not enough? 00:05:41
Wireshark – Introduction to network analysis 00:06:30
How to use Wireshark? 00:08:27
Analyzing captured data 00:05:43
How to analyze telnet protocol? 00:08:10
Intrusion detection 00:07:48
Scanning computers 00:07:48
Monitoring transmitted data – notes for the examination 00:28:00
Wireless networks security
Wireless Networks 00:01:17
WIFI security solutions – introduction 00:05:44
WIFI – working principles 00:05:49
Other wireless technologies 00:02:57
Threats and risks 00:04:38
Ineffective solutions 00:04:11
Authentication methods 00:08:32
802.11 WEP 00:07:07
802.11 WPA 00:06:24
Standards and Security Solutions – notes for the examination 00:29:00
Threats of WIFI networks 00:05:59
Client Attacks: Launching a rogue access point 00:07:04
Client Attacks: Evil twin 00:04:52
Client Attacks: Denial of service 00:09:17
EXERCISE: WPA attack 00:03:24
Wi-Fi Security Threats – notes for the examination 00:19:00
Operating systems security
Operating systems security – introduction 00:09:10
Security boundaries 00:04:48
Three core 00:07:15
EXERCISE: OS boundaries 00:07:55
Process isolation 00:06:30
Kernel Mode Code Signing 00:06:25
Java Virtual Machine and code access security 00:04:17
OS Security Boundaries – notes for the examination 00:28:00
Malware 00:12:10
EXERCISE: Vulnerability attacks 00:10:27
EXERCISE: Identifying suspicious processes 00:06:54
Demonstration: Process Explorer 00:09:14
EXERCISE: Removing malware 00:08:39
Rootkits 00:06:15
EXERCISE: Detecting rootkits 00:11:07
EXERCISE: Security evaluation 00:06:01
Malware – notes for the examination 00:18:00
Access control
Authentication and authorisation – Introduction 00:01:58
Authentication users 00:06:57
How secure is your password? 00:05:03
Authentication protocols and services 00:08:26
LM Hash 00:07:02
Cached Credentials 00:04:29
KERBEROS 00:11:31
Authentication – notes for the examination 00:26:00
Identity Theft 00:09:14
EXERCISE: Offline attacks 00:12:23
Using online cracking services 00:08:42
Identity Theft – notes for the examination 00:13:00
Windows security
Windows Security – what you’ll learn 00:01:18
User Account Control 00:06:23
UAC configuration 00:08:03
Additional Security Features – ASLR and DEP 00:11:40
PatchGuard 00:01:35
Techniques and Methods – notes for the examination 00:18:00
Encryption – key protection 00:09:32
Drive encryption 00:08:26
BitLocker 00:07:57
BitLocker To Go Reader 00:04:48
File and folder encryption – EFS 00:07:31
EXERCISE: EFS 00:05:36
Encryption – notes for the examination 00:23:00
Application security
Introduction to Application Security 00:08:19
Attacks on applications 00:10:18
SQL Injection 00:08:10
EXERCISE: Analyze the application 00:13:31
Blind SQL Injection 00:09:33
Automated SQL Injection 00:11:44
Cross-site scripting – XSS 00:10:10
Application Attacks – notes for the examination 00:29:00
Program security assessment 00:05:10
Unsafe applications 00:10:11
Program Security Assessment – notes for the examination 00:10:00
Application security - Configuration and management
Here’s what you’ll learn in this module 00:01:05
Managing applications 00:08:26
Software updates 00:02:39
MS Update 00:06:53
System Center Configuration Manager 00:02:46
Blocking applications 00:07:35
Software restrictions policies 00:05:57
EXERCISE: Application control rules 00:12:12
Isolating applications 00:06:30
How to protect users without interrupting their work – notes for the examination 00:25:00
Cryptography
Introduction to cryptography 00:09:42
History of ciphers 00:10:57
Symmetric and asymmetric ciphers 00:06:13
Symmetric-key algorithms 00:05:49
Block ciphers 00:06:01
Data encryption standard 00:06:51
DES-X 00:07:35
Advanced encryption standards 00:05:28
Block cipher modes 00:07:16
Stream Ciphers – RC4 00:03:41
Asymmetric-key algorithms 00:08:11
RSA 00:05:33
ELGAMAL 00:02:05
HASH functions 00:05:56
Digital signature 00:05:56
Hybrid Schemes 00:06:24
Symmetric and Asymmetric Ciphers – notes for the examination 00:57:00
Public Key Infrastructure
Introduction to cryptology 00:02:12
Public key infrastructure 00:06:10
Implementing public key infrastructure 00:05:39
What will PKI allow you? 00:06:29
EXERCISE: Certificates 00:08:37
Certificate life cycle 00:06:24
Planning the PKI 00:08:33
PKI Administration 00:07:29
Public Key Infrastructure – Trust but verify – notes for the examination 00:37:00
Prepare for the examination
BONUS
BONUS: Examination – your voucher 00:01:00
Certificate – see how it looks like 00:01:00

Course Reviews

4.7

2696 ratings
  • 1 stars0
  • 2 stars0
  • 3 stars0
  • 4 stars0
  • 5 stars0

No Reviews found for this course.

TAKE THIS COURSE
  • $127.00
  • UNLIMITED ACCESS
  • Course Badge
  • Course Certificate
  • 239 Lectures
  • 32 hours, 21 minutes
  • VIDEOs + PDFs
  • MONEY BACK GUARANTEE