Curriculum For This Course
Video tutorials list
-
Build Your Lab - In the Future We will offer an Online Solution
Video Name Time 1. Create A VeraCrypt Container to Protect Your Laptop or Desktop 10:48 2. Build a Manual Lab 01 3:47 3. Lab Legalities 2:44 4. Getting to Know Your Win2k VM 5:25 5. Getting to Know Your XPAttacker VM 3:04 6. Getting to Know You Win7 VM 3:56 7. Getting to Know Your Win2k3-AD 1:27 8. Getting to Know Your WebApp 1:31 9. Putting Our Lab Together Step By Step 12:45 10. Tying everying together in our Lab 5:44 -
Ethical Hacking Overview
Video Name Time 1. Introduction to Pentesting and Ethical Hacking 0:31 2. Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro 4:58 3. Defintion of a Penetration Test 1:46 4. The Evolving Threat 1:49 5. The Vulnerabilty Lifecycle 2:15 6. Map.Norsecorp.com 1:56 7. Botnet Definition 5:12 8. Defense in Depth 4:47 9. MetaData 3:29 10. Types of PenTests 4:47 11. Types of Hackers 1:31 12. Common Definitions 1:43 13. Hacker vs. Penetration Tester 5:27 14. Penetration Testing Terminology 3:10 15. Essential Terminology 3:51 16. OSSTMM Methodology 8:42 17. Tools vs Technique 4:45 18. Things are not always as they seem 1:13 19. Calculating Risk & Formulas 2:48 20. Analyzing Findings 0:44 21. Calculating SLE, ARO, ALE 1:06 22. Other Penetration Testing Methodologies 3:14 -
FootPrinting - Reconnaissance and Information Gathering
Video Name Time 1. Introduction to Footprinting 0:43 2. What Information is Gathered by the Hacker 5:37 3. Methods of Obtaining Information And Physical Access 1:24 4. Social Access 4:27 5. Digital Access 3:02 6. Passive vs Active Reconnaissance 2:14 7. Footprinting Defined 1:32 8. Exercise: Footprinting Tool: Maltego 2:03 9. Most Powerful Hacking Tool on the Internet Today 4:15 10. Instructor Demonstration - The Power of Google -A 5:44 11. Instructor Demonstration - The Power of Google -B 10:15 12. Instructor Demo: GoogleAlerts 4:24 13. Removing Searchable Content 4:55 14. Internet Archive: The WayBack Machine 6:43 15. Domain Name Registration-WhoIs Information 1:19 16. Instructor Demonstation - CentralOps 6:14 17. DNS Databases 3:20 18. Traceroute Operation 5:30 19. InstructorDemonstration: Online Tools 4:19 20. Spokeo - No Refuge for the Wealthy 4:59 21. Netcraft, DoaminsbyProxy, Countermeasures 8:43 -
Linux Overview
Video Name Time 1. Introduction to Linux 0:24 2. Linux History - Linus + Minux = Linux 2:29 3. Linux GUI Desktops 2:09 4. Linux Shell Linux Bash Shell 2:31 5. Passwd & Shadow File Formats 1:52 6. InstructorDemo:User Account Management 6:20 7. Tarballs & Zips & Installing VMware Tools 5:30 8. Compiling Programs in Linux, Shell Shock, Poodle Vulnerability 2:44 9. Most Popular Linux Security Distribution 1:58 -
Detecting Live Systems - Port Scanning
Video Name Time 1. Introduction to Port Scanning 0:15 2. Introduction to Port Scanning 2:31 3. TCP/IP Stack 6:22 4. TCP 3-Way HandShake 5:03 5. NMap ServiceVersion Detection And Demo 1:44 6. Instructor Demonstration-Engage, NmapScans 8:02 7. Hping3, NMap -O 1:32 8. Fuzzy Logic 1:30 9. Countermeasures: Scanning 2:20 -
Enumernation - What Can We Get For Free?
Video Name Time 1. Intro to Enumeration 0:17 2. Grabbing Banners 4:25 3. Shodan 5:20 4. ZoneTransfers 5:00 5. DNS Enumeration 4:26 6. SNMP Countermeasures, AD and AD Countermeasures 4:13 7. Null Sessions 8:39 -
Cryptography
Video Name Time 1. Intro Into Cryptography 0:30 2. Beginings of Cryptography 4:36 3. Implementation, Stream Cipher, Block Cipher and the Enigima 8:54 4. Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange 5:07 5. Hashing, Hashing Collisions, Common Hash Algorithms 9:38 6. Ransomware 3:07 7. IPSec and SSH 3:46 8. PKI Applications, Quantum Crypto and VeraCrypt 3:27 -
Malware - Sofware Goes Undercover
Video Name Time 1. Introduction to Malware and How The Internet Makes Money 1:00 2. Things that make the World Go Around - Well as far as the Internet is concerned 9:10 3. Trojans and Back Doors 6:17 4. Defining Malware: Viruses and Worms 7:13 5. Defining Malware: Spyware 5:35 6. Data Loss Prevention (DLP) and other Creepy things 10:31 7. Distributing Malware 6:19 8. Malware Capabilities 5:27 9. Auto Starting Malware 1:44 10. Tool: Netcat 3:41 11. Demo: NetCat Procedure 10:28 12. Executable Wrappers 4:22 13. Instructor Demo: Executeable Wrappers 1 8:51 14. Instructor Demo: Executeable Wrappers 2 1:53 15. Malware Avoiding Detection 4:33 16. Malware Countermeasures 1 8:10 17. Malware Countermeasures 2 6:39 -
System Hacking
Video Name Time 1. Introduction to System Hacking Introduction 1:00 2. Types of Password Attacks, Keystroke Loggers 5:44 3. Password Guessing Online 7:44 4. Cracking Windows Passwords - A 3:25 5. Cracking Windows Passwords - B 8:32 6. Cracking Windows Passwords - C 7:00 7. Cracking Windows Passwords - D 8:00 8. Cracking Windows Passwords - E 8:25 9. Countermeasures: Stealing the Passwords, Syskey, Salting 8:41 10. Cloud Cracking Techniques 1:55 11. Generating Rainbow Tables, Free Rainbow Tables 3:17 12. Password Hash Insertion Attack 9:20 13. Demonstration MimiKatz 10:59 14. Privilege Escalation, Countermeasures 5:37 15. Covering Tracks, Disable Auditing, Clearing the Event Log 3:04 16. Alternate Data Streams Demonstration - A 8:07 17. Alternate Data Streams Demonstration - B 11:55 18. Alternate Data Streams Demonstration - C 10:38 19. Anonymizers - JAP 3:42 20. Steganography 11:41 21. Virtually Complete Secrecy, TOR 11:02 22. RootKits - Overview 8:39 23. RootKits - Frightening Demo 13:22 24. Root Kit Countermeasures, Tokens and Smart Cards 11:19 -
Advanced Hacking and Explotiation Techniques
Video Name Time 1. Introduction to Advanced System Explotation 1:00 2. How do Exploits Work? 5:08 3. Buffer Over Flows Introduction I do when Speaking at a Conference 5:59 4. Processors and Stacks 10:22 5. Basic Types of Buffer Overflows And Demo 01 10:53 6. Basic Types of Buffer Overflows And Demo 02 11:12 7. Basic Types of Buffer Overflows And Demo 03 9:27 8. Stages of Exploit Development 1:37 9. Buffer Overflow Prevention 7:54 10. The Metasploit Project 5:08 11. Core Impact Overview 5:09 -
Attacking Databases
Video Name Time 1. Introduction to Database Management Systems 0:23 2. Overview of Databases, Types of Databases, Relations of Databases 7:15 3. View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties 6:39 4. SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info 9:21 5. Hardening SQL Server 9:21 6. SQL Injection Demo 1 9:54 7. SQL Injection Demo 2 6:10 8. SQL Injection Demo 3 4:03 -
Attacking Wireless Networks and Mobile Phones
Video Name Time 1. Introduction to WiFi and Mobile Hacking 0:25 2. WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n - MIMO, 802.11ac, 4:08 3. 802.11n - MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets 5:44 4. XOR Basics, WEP Weaknesses 3:26 5. TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption 7:11 6. Kismet, Aircrack-ng, Aireplay 2:53 7. EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network 2:47 8. Exercise/Assignment; Cracking WPA/WPA2 Password Preparation 12:44 9. Exercise/Assignment; Cracking WPA/WPA2 Password - Solution 5:19 -
Networks - Sniffing, ARP Poisioning, and Breaking SSL
Video Name Time 1. Introduction to Sniffing 0:17 2. Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer 7:33 3. TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing 4:16 4. Active Sniffing & Methods, Switch Table Flooding 4:22 5. Arp Cache Posioning 6:00 6. Arp Cache Posioning Tools and Countermeasures 5:35 7. Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M 6:18 8. Exercise/Assignment Breaking SSL - Preparation 9:03 9. Exercise/Assignment Breaking SSL - Solution 5:19 -
Firewalls, IDS and IPS and some New Age Protection
Video Name Time 1. Introduction tp Firewalls, IDS and IPS WAF 0:07 2. Firewall - Your First Line of Defense 6:35 3. IDS Your Second Line of Defense 4:55 4. Web Application Firewall and Evasion Techniques' 7:45 5. Behavioural Firewalls and IPS Systems 3:35 -
Attacking Web Technologies
Video Name Time 1. Introduction to Web Application 0:41 2. Common Security Threats, Need for Monitoring, SANS Seven MGT Errors 6:34 3. Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets 5:12 4. Logs Cancanolization and Other Attacks 3:36 5. Web App Scanner, HTTrack,HTTPrint, Proxies 7:07 6. Directory Traversal & Other Common Vulnerabilties 9:44 7. XSS Demo and Countermeasures 8:46 8. Common Ways to Attack Web Technologies, Cross Site Scripting (XSS) 8:50 9. Cross Site Request Forgery 6:03 10. Cookies and Session Management 5:19 11. OWASP Top 10 7:05 -
So Your Ready To Take Your Test
Video Name Time 1. So your Ready To Take Your Test 1? 7:16 -
Bonus Section
Video Name Time 1. Backing Up our Veracrypt Storage Enclosure for Saftey 5:14
Add Comment