Module 1 Build Your Lab - In the Future We will offer an Online Solution
Unit 1 1. Create A VeraCrypt Container to Protect Your Laptop or Desktop  
Unit 2 2. Build a Manual Lab 01  
Unit 3 3. Lab Legalities  
Unit 4 4. Getting to Know Your Win2k VM  
Unit 5 5. Getting to Know Your XPAttacker VM  
Unit 6 6. Getting to Know You Win7 VM  
Unit 7 7. Getting to Know Your Win2k3-AD  
Unit 8 8. Getting to Know Your WebApp  
Unit 9 9. Putting Our Lab Together Step By Step  
Unit 10 10. Tying everything together in our Lab  
Module 2 Ethical Hacking Overview
Unit 1 1. Introduction to Pentesting and Ethical Hacking  
Unit 2 2. Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro  
Unit 3 3. Defintion of a Penetration Test  
Unit 4 4. The Evolving Threat  
Unit 5 5. The Vulnerabilty Lifecycle  
Unit 6 6. Map.Norsecorp.com  
Unit 7 7. Botnet Definition  
Unit 8 8. Defense in Depth  
Unit 9 9. MetaData  
Unit 10 10. Types of PenTests  
Unit 11 11. Types of Hackers  
Unit 12 12. Common Definitions  
Unit 13 13. Hacker vs. Penetration Tester  
Unit 14 14. Penetration Testing Terminology  
Unit 15 15. Essential Terminology  
Unit 16 16. OSSTMM Methodology  
Unit 17 17. Tools vs Technique  
Unit 18 18. Things are not always as they seem  
Unit 19 19. Calculating Risk & Formulas  
Unit 20 20. Analyzing Findings  
Unit 21 21. Calculating SLE, ARO, ALE  
Unit 22 22. Other Penetration Testing Methodologies  
Module 3 FootPrinting - Reconnaissance and Information Gathering
Unit 1 1. Introduction to Footprinting  
Unit 2 2. What Information is Gathered by the Hacker  
Unit 3 3. Methods of Obtaining Information And Physical Access  
Unit 4 4. Social Access  
Unit 5 5. Digital Access  
Unit 6 6. Passive vs Active Reconnaissance  
Unit 7 7. Footprinting Defined  
Unit 8 8. Exercise: Footprinting Tool: Maltego  
Unit 9 9. Most Powerful Hacking Tool on the Internet Today  
Unit 10 10. Instructor Demonstration - The Power of Google -A  
Unit 11 11. Instructor Demonstration - The Power of Google -B  
Unit 12 12. Instructor Demo: GoogleAlerts  
Unit 13 13. Removing Searchable Content  
Unit 14 14. Internet Archive: The WayBack Machine  
Unit 15 15. Domain Name Registration-WhoIs Information  
Unit 16 16. Instructor Demonstation - CentralOps  
Unit 17 17. DNS Databases  
Unit 18 18. Traceroute Operation  
Unit 19 19. InstructorDemonstration: Online Tools  
Unit 20 20. Spokeo - No Refuge for the Wealthy  
Unit 21 21. Netcraft, DoaminsbyProxy, Countermeasures  
Module 4 Linux Overview
Unit 1 1. Introduction to Linux  
Unit 2 2. Linux History - Linus + Minux = Linux  
Unit 3 3. Linux GUI Desktops  
Unit 4 4. Linux Shell Linux Bash Shell  
Unit 5 5. Passwd & Shadow File Formats  
Unit 6 6. InstructorDemo:User Account Management  
Unit 7 7. Tarballs & Zips & Installing VMware Tools  
Unit 8 8. Compiling Programs in Linux, Shell Shock, Poodle Vulnerability  
Unit 9 9. Most Popular Linux Security Distribution  
Module 5 Detecting Live Systems - Port Scanning
Unit 1 1. Introduction to Port Scanning  
Unit 2 2. Introduction to Port Scanning  
Unit 3 3. TCP/IP Stack  
Unit 4 4. TCP 3-Way HandShake  
Unit 5 5. NMap ServiceVersion Detection And Demo  
Unit 6 6. Instructor Demonstration-Engage, NmapScans  
Unit 7 7. Hping3, NMap -O  
Unit 8 8. Fuzzy Logic  
Unit 9 9. Countermeasures: Scanning  
Module 6 Enumernation - What Can We Get For Free?
Unit 1 1. Intro to Enumeration  
Unit 2 2. Grabbing Banners  
Unit 3 3. Shodan  
Unit 4 4. ZoneTransfers  
Unit 5 5. DNS Enumeration  
Unit 6 6. SNMP Countermeasures, AD and AD Countermeasures  
Unit 7 7. Null Sessions  
Module 7 Cryptography
Unit 1 1. Intro Into Cryptography  
Unit 2 2. Beginings of Cryptography  
Unit 3 3. Implementation, Stream Cipher, Block Cipher and the Enigima  
Unit 4 4. Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange  
Unit 5 5. Hashing, Hashing Collisions, Common Hash Algorithms  
Unit 6 6. Ransomware  
Unit 7 7. IPSec and SSH  
Unit 8 8. PKI Applications, Quantum Crypto and VeraCrypt  
Module 8 Malware - Sofware Goes Undercover
Unit 1 1. Introduction to Malware and How The Internet Makes Money  
Unit 2 2. Things that make the World Go Around - Well as far as the Internet is concerned  
Unit 3 3. Trojans and Back Doors  
Unit 4 4. Defining Malware: Viruses and Worms  
Unit 5 5. Defining Malware: Spyware  
Unit 6 6. Data Loss Prevention (DLP) and other Creepy things  
Unit 7 7. Distributing Malware  
Unit 8 8. Malware Capabilities  
Unit 9 9. Auto Starting Malware  
Unit 10 10. Tool: Netcat  
Unit 11 11. Demo: NetCat Procedure  
Unit 12 12. Executable Wrappers  
Unit 13 13. Instructor Demo: Executeable Wrappers 1  
Unit 14 14. Instructor Demo: Executeable Wrappers 2  
Unit 15 15. Malware Avoiding Detection  
Unit 16 16. Malware Countermeasures 1  
Unit 17 17. Malware Countermeasures 2  
Module 9 System Hacking
Unit 1 1. Introduction to System Hacking Introduction  
Unit 2 2. Types of Password Attacks, Keystroke Loggers  
Unit 3 3. Password Guessing Online  
Unit 4 4. Cracking Windows Passwords - A  
Unit 5 5. Cracking Windows Passwords - B  
Unit 6 6. Cracking Windows Passwords - C  
Unit 7 7. Cracking Windows Passwords - D  
Unit 8 8. Cracking Windows Passwords - E  
Unit 9 9. Countermeasures: Stealing the Passwords, Syskey, Salting  
Unit 10 10. Cloud Cracking Techniques  
Unit 11 11. Generating Rainbow Tables, Free Rainbow Tables  
Unit 12 12. Password Hash Insertion Attack  
Unit 13 13. Demonstration MimiKatz  
Unit 14 14. Privilege Escalation, Countermeasures  
Unit 15 15. Covering Tracks, Disable Auditing, Clearing the Event Log  
Unit 16 16. Alternate Data Streams Demonstration - A  
Unit 17 17. Alternate Data Streams Demonstration - B  
Unit 18 18. Alternate Data Streams Demonstration - C  
Unit 19 19. Anonymizers - JAP  
Unit 20 20. Steganography  
Unit 21 21. Virtually Complete Secrecy, TOR  
Unit 22 22. RootKits - Overview  
Unit 23 23. RootKits - Frightening Demo  
Unit 24 24. Root Kit Countermeasures, Tokens and Smart Cards  
Module 10 Advanced Hacking and Explotiation Techniques
Unit 1 1. Introduction to Advanced System Exploitation  
Unit 2 2. How do Exploits Work?  
Unit 3 3. Buffer Over Flows Introduction I do when Speaking at a Conference  
Unit 4 4. Processors and Stacks  
Unit 5 5. Basic Types of Buffer Overflows And Demo 01  
Unit 6 6. Basic Types of Buffer Overflows And Demo 02  
Unit 7 7. Basic Types of Buffer Overflows And Demo 03  
Unit 8 8. Stages of Exploit Development  
Unit 9 9. Buffer Overflow Prevention  
Unit 10 10. The Metasploit Project  
Unit 11 11. Core Impact Overview  
Module 11 Attacking Databases
Unit 1 1. Introduction to Database Management Systems  
Unit 2 2. Overview of Databases, Types of Databases, Relations of Databases  
Unit 3 3. View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties  
Unit 4 4. SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info  
Unit 5 5. Hardening SQL Server  
Unit 6 6. SQL Injection Demo 1  
Unit 7 7. SQL Injection Demo 2  
Unit 8 8. SQL Injection Demo 3  
Module 12 Attacking Wireless Networks and Mobile Phones
Unit 1 1. Introduction to WiFi and Mobile Hacking  
Unit 2 2. WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n - MIMO, 802.11ac,  
Unit 3 3. 802.11n - MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets  
Unit 4 4. XOR Basics, WEP Weaknesses  
Unit 5 5. TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption  
Unit 6 6. Kismet, Aircrack-ng, Aireplay  
Unit 7 7. EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network  
Unit 8 8. Exercise/Assignment; Cracking WPA/WPA2 Password Preparation  
Unit 9 9. Exercise/Assignment; Cracking WPA/WPA2 Password - Solution  
Module 13 Networks - Sniffing, ARP Poisioning, and Breaking SSL
Unit 1 1. Introduction to Sniffing  
Unit 2 2. Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer  
Unit 3 3. TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing  
Unit 4 4. Active Sniffing & Methods, Switch Table Flooding  
Unit 5 5. Arp Cache Posioning  
Unit 6 6. Arp Cache Posioning Tools and Countermeasures  
Unit 7 7. Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M  
Unit 8 8. Exercise/Assignment Breaking SSL - Preparation  
Unit 9 9. Exercise/Assignment Breaking SSL - Solution  
Module 14 Firewalls, IDS and IPS and some New Age Protection
Unit 1 1. Introduction tp Firewalls, IDS and IPS WAF  
Unit 2 2. Firewall - Your First Line of Defense  
Unit 3 3. IDS Your Second Line of Defense  
Unit 4 4. Web Application Firewall and Evasion Techniques'  
Unit 5 5. Behavioural Firewalls and IPS Systems  
Module 15 Attacking Web Technologies
Unit 1 1. Introduction to Web Application  
Unit 2 2. Common Security Threats, Need for Monitoring, SANS Seven MGT Errors  
Unit 3 3. Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets  
Unit 4 4. Logs Cancanolization and Other Attacks  
Unit 5 5. Web App Scanner, HTTrack,HTTPrint, Proxies  
Unit 6 6. Directory Traversal & Other Common Vulnerabilties  
Unit 7 7. XSS Demo and Countermeasures  
Unit 8 8. Common Ways to Attack Web Technologies, Cross Site Scripting (XSS)  
Unit 9 9. Cross Site Request Forgery  
Unit 10 10. Cookies and Session Management  
Unit 11 11. OWASP Top 10  
Module 16 So Your Ready To Take Your Test
Unit 1 1. So your Ready To Take Your Test 1?  
Module 17 Bonus Section
Unit 1 1. Backing Up our Veracrypt Storage Enclosure for Saftey  
Powered By WP Courseware