Curriculum For This Course
Video tutorials list
-
Build Your Lab - In the Future We will offer an Online Solution
Video Name Time 1. Create A VeraCrypt Container to Protect Your Laptop or Desktop 10:48 2. Build a Manual Lab 01 03:48 3. Lab Legalities 02:44 4. Getting to Know Your Win2k VM 05:25 5. Getting to Know Your XPAttacker VM 03:04 6. Getting to Know You Win7 VM 03:57 7. Getting to Know Your Win2k3-AD 01:27 8. Getting to Know Your WebApp 01:31 9. Putting Our Lab Together Step By Step 12:30 10. Tying everying together in our Lab 05:44 -
Ethical Hacking Overview
Video Name Time 1. Introduction to Pentesting and Ethical Hacking 00:31 2. Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro 04:58 3. Defintion of a Penetration Test 01:46 4. The Evolving Threat 01:49 5. The Vulnerabilty Lifecycle 02:16 6. Map.Norsecorp.com 01:56 7. Botnet Definition 05:12 8. Defense in Depth 04:47 9. MetaData 03:30 10. Types of PenTests 04:47 11. Types of Hackers 01:32 12. Common Definitions 01:43 13. Hacker vs. Penetration Tester 05:27 14. Penetration Testing Terminology 03:10 15. Essential Terminology 03:51 16. OSSTMM Methodology 08:43 17. Tools vs Technique 04:45 18. Things are not always as they seem 01:13 19. Calculating Risk & Formulas 02:48 20. Analyzing Findings 00:45 21. Calculating SLE, ARO, ALE 01:06 22. Other Penetration Testing Methodologies 03:15 -
FootPrinting - Reconnaissance and Information Gathering
Video Name Time 1. Introduction to Footprinting 00:43 2. What Information is Gathered by the Hacker 05:37 3. Methods of Obtaining Information And Physical Access 01:24 4. Social Access 04:27 5. Digital Access 03:02 6. Passive vs Active Reconnaissance 02:14 7. Footprinting Defined 01:32 8. Exercise: Footprinting Tool: Maltego 02:03 9. Most Powerful Hacking Tool on the Internet Today 04:16 10. Instructor Demonstration - The Power of Google -A 05:44 11. Instructor Demonstration - The Power of Google -B 10:16 12. Instructor Demo: GoogleAlerts 04:24 13. Removing Searchable Content 04:55 14. Internet Archive: The WayBack Machine 06:44 15. Domain Name Registration-WhoIs Information 01:20 16. Instructor Demonstation - CentralOps 06:14 17. DNS Databases 03:21 18. Traceroute Operation 05:30 19. InstructorDemonstration: Online Tools 04:19 20. Spokeo - No Refuge for the Wealthy 04:59 21. Netcraft, DoaminsbyProxy, Countermeasures 08:43 -
Linux Overview
Video Name Time 1. Introduction to Linux 00:24 2. Linux History - Linus + Minux = Linux 02:29 3. Linux GUI Desktops 02:09 4. Linux Shell Linux Bash Shell 02:31 5. Passwd & Shadow File Formats 01:52 6. InstructorDemo:User Account Management 06:20 7. Tarballs & Zips & Installing VMware Tools 05:30 8. Compiling Programs in Linux, Shell Shock, Poodle Vulnerability 02:44 9. Most Popular Linux Security Distribution 01:58 -
Detecting Live Systems - Port Scanning
Video Name Time 1. Introduction to Port Scanning 00:15 2. Introduction to Port Scanning 02:32 3. TCP/IP Stack 06:22 4. TCP 3-Way HandShake 07:00 5. NMap ServiceVersion Detection And Demo 01:44 6. Instructor Demonstration-Engage, NmapScans 01:24 7. Hping3, NMap -O 01:32 8. Fuzzy Logic 01:30 9. Countermeasures: Scanning 02:21 -
Enumernation - What Can We Get For Free?
Video Name Time 1. Intro to Enumeration 00:17 2. Grabbing Banners 04:25 3. Shodan 05:20 4. ZoneTransfers 05:01 5. DNS Enumeration 04:26 6. SNMP Countermeasures, AD and AD Countermeasures 04:13 7. Null Sessions 08:40 -
Cryptography
Video Name Time 1. Intro Into Cryptography 00:31 2. Beginings of Cryptography 04:36 3. Implementation, Stream Cipher, Block Cipher and the Enigima 08:54 4. Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange 05:07 5. Hashing, Hashing Collisions, Common Hash Algorithms 09:38 6. Ransomware 03:07 7. IPSec and SSH 03:46 8. PKI Applications, Quantum Crypto and VeraCrypt 03:27 -
Malware - Sofware Goes Undercover
Video Name Time 1. Introduction to Malware and How The Internet Makes Money 00:23 2. Things that make the World Go Around - Well as far as the Internet is concerned 09:10 3. Trojans and Back Doors 06:17 4. Defining Malware: Viruses and Worms 07:14 5. Defining Malware: Spyware 05:35 6. Data Loss Prevention (DLP) and other Creepy things 10:31 7. Distributing Malware 06:19 8. Malware Capabilities 05:27 9. Auto Starting Malware 01:44 10. Tool: Netcat 03:41 11. Demo: NetCat Procedure 10:28 12. Executable Wrappers 04:22 13. Instructor Demo: Executeable Wrappers 1 08:51 14. Instructor Demo: Executeable Wrappers 2 01:53 15. Malware Avoiding Detection 04:33 16. Malware Countermeasures 1 08:10 17. Malware Countermeasures 2 06:39 -
System Hacking
Video Name Time 1. Introduction to System Hacking Introduction 01:00 2. Types of Password Attacks, Keystroke Loggers 05:44 3. Password Guessing Online 07:44 4. Cracking Windows Passwords - A 03:25 5. Cracking Windows Passwords - B 08:32 6. Cracking Windows Passwords - C 07:00 7. Cracking Windows Passwords - D 08:00 8. Cracking Windows Passwords - E 08:25 9. Countermeasures: Stealing the Passwords, Syskey, Salting 08:41 10. Cloud Cracking Techniques 01:55 11. Generating Rainbow Tables, Free Rainbow Tables 03:17 12. Password Hash Insertion Attack 09:21 13. Demonstration MimiKatz 10:59 14. Privilege Escalation, Countermeasures 05:37 15. Covering Tracks, Disable Auditing, Clearing the Event Log 03:04 16. Alternate Data Streams Demonstration - A 08:07 17. Alternate Data Streams Demonstration - B 11:55 18. Alternate Data Streams Demonstration - C 10:39 19. Anonymizers - JAP 03:42 20. Steganography 11:41 21. Virtually Complete Secrecy, TOR 11:02 22. RootKits - Overview 08:39 23. RootKits - Frightening Demo 13:22 24. Root Kit Countermeasures, Tokens and Smart Cards 11:19 -
Advanced Hacking and Explotiation Techniques
Video Name Time 1. Introduction to Advanced System Explotation 01:00 2. How do Exploits Work? 05:08 3. Buffer Over Flows Introduction I do when Speaking at a Conference 05:59 4. Processors and Stacks 10:23 5. Basic Types of Buffer Overflows And Demo 01 11:12 6. Basic Types of Buffer Overflows And Demo 02 09:27 7. Basic Types of Buffer Overflows And Demo 03 01:37 8. Stages of Exploit Development 07:54 9. Buffer Overflow Prevention 05:08 10. The Metasploit Project 05:10 11. Core Impact Overview 12:54 -
Attacking Databases
Video Name Time 1. Introduction to Database Management Systems 00:23 2. Overview of Databases, Types of Databases, Relations of Databases 07:16 3. View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties 06:40 4. SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info 09:21 5. Hardening SQL Server 09:21 6. SQL Injection Demo 1 09:54 7. SQL Injection Demo 2 06:10 8. SQL Injection Demo 3 04:03 -
Attacking Wireless Networks and Mobile Phones
Video Name Time 1. Introduction to WiFi and Mobile Hacking 00:26 2. WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n - MIMO, 802.11ac, 04:09 3. 802.11n - MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets 05:44 4. XOR Basics, WEP Weaknesses 03:26 5. TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption 03:26 6. Kismet, Aircrack-ng, Aireplay 02:54 7. EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network 02:47 8. Exercise/Assignment; Cracking WPA/WPA2 Password Preparation 12:45 9. Exercise/Assignment; Cracking WPA/WPA2 Password - Solution 05:19 -
Networks - Sniffing, ARP Poisioning, and Breaking SSL
Video Name Time 1. Introduction to Sniffing 00:17 2. Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer 07:34 3. TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing 04:16 4. Active Sniffing & Methods, Switch Table Flooding 04:22 5. Arp Cache Posioning 06:00 6. Arp Cache Posioning Tools and Countermeasures 05:35 7. Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M 06:18 8. Exercise/Assignment Breaking SSL - Preparation 09:03 9. Exercise/Assignment Breaking SSL - Solution 05:19 -
Firewalls, IDS and IPS and some New Age Protection
Video Name Time 1. Introduction tp Firewalls, IDS and IPS WAF 00:08 2. Firewall - Your First Line of Defense 06:35 3. IDS Your Second Line of Defense 04:55 4. Web Application Firewall and Evasion Techniques' 07:45 5. Behavioural Firewalls and IPS Systems 03:35 -
Attacking Web Technologies
Video Name Time 1. Introduction to Web Application 00:42 2. Common Security Threats, Need for Monitoring, SANS Seven MGT Errors 06:35 3. Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets 05:12 4. Logs Cancanolization and Other Attacks 03:36 5. Web App Scanner, HTTrack,HTTPrint, Proxies 07:07 6. Directory Traversal & Other Common Vulnerabilties 09:44 7. XSS Demo and Countermeasures 08:50 8. Common Ways to Attack Web Technologies, Cross Site Scripting (XSS) 08:50 9. Cross Site Request Forgery 06:03 10. Cookies and Session Management 05:19 11. OWASP Top 10 07:05 -
So Your Ready To Take Your Test
Video Name Time 1. So your Ready To Take Your Test 1? 07:16 -
Bonus Section
Video Name Time 1. Backing Up our Veracrypt Storage Enclosure for Saftey 05:14
Add Comment