Module 1 | Build Your Lab - In the Future We will offer an Online Solution | |
---|---|---|
Unit 1 | 1. Create A VeraCrypt Container to Protect Your Laptop or Desktop | |
Unit 2 | 2. Build a Manual Lab 01 | |
Unit 3 | 3. Lab Legalities | |
Unit 4 | 4. Getting to Know Your Win2k VM | |
Unit 5 | 5. Getting to Know Your XPAttacker VM | |
Unit 6 | 6. Getting to Know You Win7 VM | |
Unit 7 | 7. Getting to Know Your Win2k3-AD | |
Unit 8 | 8. Getting to Know Your WebApp | |
Unit 9 | 9. Putting Our Lab Together Step By Step | |
Unit 10 | 10. Tying everything together in our Lab | |
Module 2 | Ethical Hacking Overview | |
Unit 1 | 1. Introduction to Pentesting and Ethical Hacking | |
Unit 2 | 2. Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro | |
Unit 3 | 3. Defintion of a Penetration Test | |
Unit 4 | 4. The Evolving Threat | |
Unit 5 | 5. The Vulnerabilty Lifecycle | |
Unit 6 | 6. Map.Norsecorp.com | |
Unit 7 | 7. Botnet Definition | |
Unit 8 | 8. Defense in Depth | |
Unit 9 | 9. MetaData | |
Unit 10 | 10. Types of PenTests | |
Unit 11 | 11. Types of Hackers | |
Unit 12 | 12. Common Definitions | |
Unit 13 | 13. Hacker vs. Penetration Tester | |
Unit 14 | 14. Penetration Testing Terminology | |
Unit 15 | 15. Essential Terminology | |
Unit 16 | 16. OSSTMM Methodology | |
Unit 17 | 17. Tools vs Technique | |
Unit 18 | 18. Things are not always as they seem | |
Unit 19 | 19. Calculating Risk & Formulas | |
Unit 20 | 20. Analyzing Findings | |
Unit 21 | 21. Calculating SLE, ARO, ALE | |
Unit 22 | 22. Other Penetration Testing Methodologies | |
Module 3 | FootPrinting - Reconnaissance and Information Gathering | |
Unit 1 | 1. Introduction to Footprinting | |
Unit 2 | 2. What Information is Gathered by the Hacker | |
Unit 3 | 3. Methods of Obtaining Information And Physical Access | |
Unit 4 | 4. Social Access | |
Unit 5 | 5. Digital Access | |
Unit 6 | 6. Passive vs Active Reconnaissance | |
Unit 7 | 7. Footprinting Defined | |
Unit 8 | 8. Exercise: Footprinting Tool: Maltego | |
Unit 9 | 9. Most Powerful Hacking Tool on the Internet Today | |
Unit 10 | 10. Instructor Demonstration - The Power of Google -A | |
Unit 11 | 11. Instructor Demonstration - The Power of Google -B | |
Unit 12 | 12. Instructor Demo: GoogleAlerts | |
Unit 13 | 13. Removing Searchable Content | |
Unit 14 | 14. Internet Archive: The WayBack Machine | |
Unit 15 | 15. Domain Name Registration-WhoIs Information | |
Unit 16 | 16. Instructor Demonstation - CentralOps | |
Unit 17 | 17. DNS Databases | |
Unit 18 | 18. Traceroute Operation | |
Unit 19 | 19. InstructorDemonstration: Online Tools | |
Unit 20 | 20. Spokeo - No Refuge for the Wealthy | |
Unit 21 | 21. Netcraft, DoaminsbyProxy, Countermeasures | |
Module 4 | Linux Overview | |
Unit 1 | 1. Introduction to Linux | |
Unit 2 | 2. Linux History - Linus + Minux = Linux | |
Unit 3 | 3. Linux GUI Desktops | |
Unit 4 | 4. Linux Shell Linux Bash Shell | |
Unit 5 | 5. Passwd & Shadow File Formats | |
Unit 6 | 6. InstructorDemo:User Account Management | |
Unit 7 | 7. Tarballs & Zips & Installing VMware Tools | |
Unit 8 | 8. Compiling Programs in Linux, Shell Shock, Poodle Vulnerability | |
Unit 9 | 9. Most Popular Linux Security Distribution | |
Module 5 | Detecting Live Systems - Port Scanning | |
Unit 1 | 1. Introduction to Port Scanning | |
Unit 2 | 2. Introduction to Port Scanning | |
Unit 3 | 3. TCP/IP Stack | |
Unit 4 | 4. TCP 3-Way HandShake | |
Unit 5 | 5. NMap ServiceVersion Detection And Demo | |
Unit 6 | 6. Instructor Demonstration-Engage, NmapScans | |
Unit 7 | 7. Hping3, NMap -O | |
Unit 8 | 8. Fuzzy Logic | |
Unit 9 | 9. Countermeasures: Scanning | |
Module 6 | Enumernation - What Can We Get For Free? | |
Unit 1 | 1. Intro to Enumeration | |
Unit 2 | 2. Grabbing Banners | |
Unit 3 | 3. Shodan | |
Unit 4 | 4. ZoneTransfers | |
Unit 5 | 5. DNS Enumeration | |
Unit 6 | 6. SNMP Countermeasures, AD and AD Countermeasures | |
Unit 7 | 7. Null Sessions | |
Module 7 | Cryptography | |
Unit 1 | 1. Intro Into Cryptography | |
Unit 2 | 2. Beginings of Cryptography | |
Unit 3 | 3. Implementation, Stream Cipher, Block Cipher and the Enigima | |
Unit 4 | 4. Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange | |
Unit 5 | 5. Hashing, Hashing Collisions, Common Hash Algorithms | |
Unit 6 | 6. Ransomware | |
Unit 7 | 7. IPSec and SSH | |
Unit 8 | 8. PKI Applications, Quantum Crypto and VeraCrypt | |
Module 8 | Malware - Sofware Goes Undercover | |
Unit 1 | 1. Introduction to Malware and How The Internet Makes Money | |
Unit 2 | 2. Things that make the World Go Around - Well as far as the Internet is concerned | |
Unit 3 | 3. Trojans and Back Doors | |
Unit 4 | 4. Defining Malware: Viruses and Worms | |
Unit 5 | 5. Defining Malware: Spyware | |
Unit 6 | 6. Data Loss Prevention (DLP) and other Creepy things | |
Unit 7 | 7. Distributing Malware | |
Unit 8 | 8. Malware Capabilities | |
Unit 9 | 9. Auto Starting Malware | |
Unit 10 | 10. Tool: Netcat | |
Unit 11 | 11. Demo: NetCat Procedure | |
Unit 12 | 12. Executable Wrappers | |
Unit 13 | 13. Instructor Demo: Executeable Wrappers 1 | |
Unit 14 | 14. Instructor Demo: Executeable Wrappers 2 | |
Unit 15 | 15. Malware Avoiding Detection | |
Unit 16 | 16. Malware Countermeasures 1 | |
Unit 17 | 17. Malware Countermeasures 2 | |
Module 9 | System Hacking | |
Unit 1 | 1. Introduction to System Hacking Introduction | |
Unit 2 | 2. Types of Password Attacks, Keystroke Loggers | |
Unit 3 | 3. Password Guessing Online | |
Unit 4 | 4. Cracking Windows Passwords - A | |
Unit 5 | 5. Cracking Windows Passwords - B | |
Unit 6 | 6. Cracking Windows Passwords - C | |
Unit 7 | 7. Cracking Windows Passwords - D | |
Unit 8 | 8. Cracking Windows Passwords - E | |
Unit 9 | 9. Countermeasures: Stealing the Passwords, Syskey, Salting | |
Unit 10 | 10. Cloud Cracking Techniques | |
Unit 11 | 11. Generating Rainbow Tables, Free Rainbow Tables | |
Unit 12 | 12. Password Hash Insertion Attack | |
Unit 13 | 13. Demonstration MimiKatz | |
Unit 14 | 14. Privilege Escalation, Countermeasures | |
Unit 15 | 15. Covering Tracks, Disable Auditing, Clearing the Event Log | |
Unit 16 | 16. Alternate Data Streams Demonstration - A | |
Unit 17 | 17. Alternate Data Streams Demonstration - B | |
Unit 18 | 18. Alternate Data Streams Demonstration - C | |
Unit 19 | 19. Anonymizers - JAP | |
Unit 20 | 20. Steganography | |
Unit 21 | 21. Virtually Complete Secrecy, TOR | |
Unit 22 | 22. RootKits - Overview | |
Unit 23 | 23. RootKits - Frightening Demo | |
Unit 24 | 24. Root Kit Countermeasures, Tokens and Smart Cards | |
Module 10 | Advanced Hacking and Explotiation Techniques | |
Unit 1 | 1. Introduction to Advanced System Exploitation | |
Unit 2 | 2. How do Exploits Work? | |
Unit 3 | 3. Buffer Over Flows Introduction I do when Speaking at a Conference | |
Unit 4 | 4. Processors and Stacks | |
Unit 5 | 5. Basic Types of Buffer Overflows And Demo 01 | |
Unit 6 | 6. Basic Types of Buffer Overflows And Demo 02 | |
Unit 7 | 7. Basic Types of Buffer Overflows And Demo 03 | |
Unit 8 | 8. Stages of Exploit Development | |
Unit 9 | 9. Buffer Overflow Prevention | |
Unit 10 | 10. The Metasploit Project | |
Unit 11 | 11. Core Impact Overview | |
Module 11 | Attacking Databases | |
Unit 1 | 1. Introduction to Database Management Systems | |
Unit 2 | 2. Overview of Databases, Types of Databases, Relations of Databases | |
Unit 3 | 3. View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties | |
Unit 4 | 4. SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info | |
Unit 5 | 5. Hardening SQL Server | |
Unit 6 | 6. SQL Injection Demo 1 | |
Unit 7 | 7. SQL Injection Demo 2 | |
Unit 8 | 8. SQL Injection Demo 3 | |
Module 12 | Attacking Wireless Networks and Mobile Phones | |
Unit 1 | 1. Introduction to WiFi and Mobile Hacking | |
Unit 2 | 2. WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n - MIMO, 802.11ac, | |
Unit 3 | 3. 802.11n - MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets | |
Unit 4 | 4. XOR Basics, WEP Weaknesses | |
Unit 5 | 5. TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption | |
Unit 6 | 6. Kismet, Aircrack-ng, Aireplay | |
Unit 7 | 7. EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network | |
Unit 8 | 8. Exercise/Assignment; Cracking WPA/WPA2 Password Preparation | |
Unit 9 | 9. Exercise/Assignment; Cracking WPA/WPA2 Password - Solution | |
Module 13 | Networks - Sniffing, ARP Poisioning, and Breaking SSL | |
Unit 1 | 1. Introduction to Sniffing | |
Unit 2 | 2. Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer | |
Unit 3 | 3. TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing | |
Unit 4 | 4. Active Sniffing & Methods, Switch Table Flooding | |
Unit 5 | 5. Arp Cache Posioning | |
Unit 6 | 6. Arp Cache Posioning Tools and Countermeasures | |
Unit 7 | 7. Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M | |
Unit 8 | 8. Exercise/Assignment Breaking SSL - Preparation | |
Unit 9 | 9. Exercise/Assignment Breaking SSL - Solution | |
Module 14 | Firewalls, IDS and IPS and some New Age Protection | |
Unit 1 | 1. Introduction tp Firewalls, IDS and IPS WAF | |
Unit 2 | 2. Firewall - Your First Line of Defense | |
Unit 3 | 3. IDS Your Second Line of Defense | |
Unit 4 | 4. Web Application Firewall and Evasion Techniques' | |
Unit 5 | 5. Behavioural Firewalls and IPS Systems | |
Module 15 | Attacking Web Technologies | |
Unit 1 | 1. Introduction to Web Application | |
Unit 2 | 2. Common Security Threats, Need for Monitoring, SANS Seven MGT Errors | |
Unit 3 | 3. Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets | |
Unit 4 | 4. Logs Cancanolization and Other Attacks | |
Unit 5 | 5. Web App Scanner, HTTrack,HTTPrint, Proxies | |
Unit 6 | 6. Directory Traversal & Other Common Vulnerabilties | |
Unit 7 | 7. XSS Demo and Countermeasures | |
Unit 8 | 8. Common Ways to Attack Web Technologies, Cross Site Scripting (XSS) | |
Unit 9 | 9. Cross Site Request Forgery | |
Unit 10 | 10. Cookies and Session Management | |
Unit 11 | 11. OWASP Top 10 | |
Module 16 | So Your Ready To Take Your Test | |
Unit 1 | 1. So your Ready To Take Your Test 1? | |
Module 17 | Bonus Section | |
Unit 1 | 1. Backing Up our Veracrypt Storage Enclosure for Saftey |
Powered By WP Courseware