Get $1 credit for every $25 spent!

The 2022 Masters in Cyber Security Certification Bundle

Ending In:
Add to Cart - $39.99
Add to Cart ($39.99)
$1,800
97% off
wishlist
Courses
9
Lessons
681
Enrolled
425

What's Included

Product Details

Access
Lifetime
Content
13.0 hours
Lessons
78

Complete Ethical Hacking & Cyber Security Masterclass Course

A Comprehensive Guide to the Newest Techniques of PenTest & Ethical Hacking

By Joe Parys | in Online Courses

In this complete ethical hacking masterclass course, you will learn from scratch how to master ethical hacking and cybersecurity. This course offers more than 13+ hours of content, starting from a beginner and working your way up to some more advanced ethical hacking skills. The skills you learn in this course can help translate into the workplace and help you further your career as cybersecurity and honest hacking professional.

4.4/5 average rating: ★ ★ ★ ★

  • Access 78 lectures & 13 hours of content 24/7
  • Ethically hack a server using command injection vulnerability with Netcat
  • Bypass antivirus by changing the malware binary
  • Change the look of a page using HTML code injection
  • Learn the Kali Linux basics & discover everything you need to know about hacking OS
  • Discover vulnerabilities on target machines & servers
  • Use advance scanning to map the entire network

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Joe Parys | Top-Rated Instructor
4.4/5 Instructor Rating: ★ ★ ★ ★

Joe Parys is a certified life coach, professional motivational speaker, entrepreneur, licensed psychology teacher, and basketball coach. His main areas of expertise are teaching, coaching, public speaking, personal development, personal transformation, the human mind, maximizing human potential, motivation and goal setting.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Your First Program
  • Introduction & Setting Up Our Hacking Lab
    • Learn Ethical Hacking Skills & Cyber Security Skills With Us Today! - 1:45
    • Welcome To The Complete Ethical Hacking and Cyber Security Master Class - 0:19
    • Virtual Box 6.0 Installation - 5:27
    • Installing Kali Linux As Operating System For Hacking - 14:54
    • Going Full Screen On Kali Linux! - 5:51
  • Linux Basics
    • Linux Environment - 6:53
    • Terminal Commands - Part 1 - 11:13
    • Terminal Commands - Part 2 - 8:48
    • Configuring IP Address And Network Settings - 6:48
    • Cat, Echo, Apt-get ... - 11:49
  • Information Gathering & Footprinting
    • Five Phases Of A Penetration Test - 7:04
    • Active & Passive Footprinting Theory - 5:23
    • Finding Target Emails With Harvester - 12:19
    • Gathering Valuable Information With Dnsdumpster & OSINT - 8:38
    • Network Scanning Terminology And Theory - 14:40
    • Ping & Traceroute - 6:45
    • Bettercap & Netdiscover - 6:13
  • Evading Firewall & IDS & Honeypots Using Advance Scanning
    • Performing Default Nmap Scan - 4:36
    • What is IDS & IPS, Honeypot And Firewall? - 4:22
    • Evading Firewall with Nmap - 11:01
    • Bypassing IDS & IPS - 3:56
    • Creating Decoys during scan with Fragmented Packets - 12:18
    • Discovering Service Version on an Open Port - 16:55
  • Vulnerability Analysis
    • Searchsploit & Shodan - 16:49
  • Gaining Access To a Network - WPA2/WPA Cracking
    • Wireless Hacking Theory - 9:51
    • Putting Our Wireless Card Into Monitor Mode - 4:36
    • Sniffing Network Information In Monitor Mode - 7:15
    • Deauthenticating Everyone On The Network And Capturing 4 Way Handshake - 5:49
    • Cracking The Password Hash With Aircrack-ng - 9:44
    • Cracking The Password Faster Using Hashcat - 15:39
  • Gaining Access - Evil Twin Attack
    • Creating Fake Access Point With Airgedon - 14:51
    • Capturing Wireless Password With Fake Access Point - 7:48
  • Man In The Middle - Steal Everyones Data
    • Theory Of Arp Spoofing - 6:17
    • MITMf Full Installation - 4:39
    • Performing An ARP Spoof Attack - 9:08
    • Redirecting To A Fake Captive Portal - 15:54
    • Sniffing Passwords & Flipping Images On Targets Browser - 8:47
  • Gaining Access To A Machine - System Hacking
    • System Hacking Theory - 7:15
    • Metasploit Framework Structure - 15:39
    • Exploiting Windows With Eternalblue Attack - 12:42
    • Running Doublepulsar Attack - 16:31
    • Using Evasion Modules To Bypass Windows Defender - 7:31
    • Using Msfvenom To Generate A Trojan & Windows 10 Hacking - 17:35
    • Bypassing Antivirus Using Encoders And "Bad Bytes" - 10:55
    • Changing Executable Binary With Hexeditor - 10:31
    • Hack Any Machine Over Internet Using Port Forwarding - 9:40
  • Coding Project 1: Reverse Shell In Python
    • Creating Server & Payload - 18:44
    • Converting Python File To Exe - 8:41
  • Post Exploitation - Stealing Valuable Information
    • Meterpreter Commands - Part 1 - 15:52
    • Meterpreter Commands - Part 2 - 15:15
    • Creating Persistence On Target PC & Registry Edit - 11:14
    • Discovering Other Machines On A Target Network - 7:31
    • Bypassing UAC & Gaining Privileges - 7:38
    • Stealing Targets Chrome and WLAN Passwords After Exploit - 6:59
    • Embedding A Backdoor Into An Image - 4:58
  • Web Application Penetration Testing - Injections, Bruteforcers, Packet Sniffers
    • OWASP Installation - Vulnerable Web Application - 7:22
    • DIRB & Whatweb For Website Identification - 8:29
    • Hydra - Bruteforcing Any Login Page - 13:16
    • Burpsuite Introduction & Configuration - 11:53
    • Command Injection & Target Exploitation - 13:41
    • XSS Attack Theory - 5:20
    • Finding XSS Vulnerability On A Webpage - 5:45
    • Solving XSS Challenges On An Online Lab - 7:40
    • HTML Character Encoding To Exploit an XSS Vulnerability - 6:34
    • HTML Code Injection Vulnerability - 4:16
    • What is SQL & SQL Injection Theory - 13:22
    • Stealing Database Passwords With Advance Manual SQL Injection - 22:38
  • Coding Project 2: Making Bruteforcer In Python
    • Coding Login Form Bruteforcer Using Python - 15:53
  • Creating Undetectable Malware Using C Language
    • Describing What We Are Going To Code - 8:57
    • Using Struct sockaddr_in To Setup Socket Object - 12:47
    • Binding And Accepting Target Connection In a Server - 7:08
    • Sending Command To Target To Execute - 17:30
    • Starting With The Malware & Defining Bzero Function - 8:22
    • Creating APIENTRY Function And Hiding Program Console - 12:45
    • Executing Commands On Target System - 12:10
    • First Test Of Our Malware - 12:20
    • Making Our Malware Look Like An Error - 15:33
  • Social Media Hacking - Diffrent Ways To Gain Access To Online Accounts
    • Hacking Instagram - Way #1 - 6:14

View Full Curriculum


Access
Lifetime
Content
7.0 hours
Lessons
22

Real Penetration Testing with Kali Linux

Learn How a Penetration Testing is Conducted in Phases in Real World Experience

By Atul Tiwari | in Online Courses

Kali Linux is the most used distribution by penetration testers in the real world. Hence I get the chance to do hands-on with the Kali Linux penetration testing using only the tools available in the box. This course is the way to learn how penetration testing can be conducted using only the Kali Linux. from the pre-engagement, information gathering, vulnerability scanning analysis, exploitation, post-exploitation, and finally at reporting everything. That makes this course more informational and highly practical. every lesson is made from assuming zero knowledge about the topics and working in environments for the students.

4.8/5 average rating: ★ ★ ★ ★

  • Access 22 lectures & 7 hours of content 24/7
  • Learn how a penetration testing should be conducted using only the Kali Linux
  • Set up a self-hosterd lab
  • Learn the rules of engagement
  • Understand the penetration testing execution standard
  • Learn web application vulnerability scanning

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Atul Tiwari | Ethical hacker | Security Evangelist | Penetration Tester
4.3/5 Instructor Rating: ★ ★ ★ ★

Atul Tiwari has more than 7 years of working experience in the information security field. He has trained more than 3,000 students in information security and penetration testing. With his expertise in web application penetration testing, Atul has performed penetration tests, security audits, and security analysis for private enterprise, governments, and security agencies to assist with cyber threats.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction to the course
    • Introduction to the course - 4:36
  • Self hosted Lab setup
    • Penetration testing lab setup - 18:13
  • Pre-engagement phase
    • Rules of engagement - 21:58
    • Penetration Testing Execution Standard - 6:47
  • Information gathering
    • DNS Analysis - 17:54
    • DNS Analysis - Enumerating subdomains - 3:53
    • Route Analysis - 15:11
    • Network and Port scanning - 53:12
    • SMB Analysis - 21:47
    • OSINT Analysis - Part 1 - 35:42
    • OSINT nalysis - Part 2 - 31:15
  • Vulnerability Analysis
    • Vulnerability Analysis - Nmap NSE and Nikto - 33:46
    • Vulnerability Analysis - Legion and unix-privesc-check - 35:33
    • Firewall and IDS Evasion with Nmap - 19:34
  • Web application vulnerability scanning
    • CMS and framework identification - 6:32
    • Forced browsing DIRs and Files using ZAP - 12:22
    • Web vulnerability scanning - Nikto - 23:24
    • Web crawling and directory listing - 10:27
    • Web vulnerability scanning - Burp suite pro and OWASP ZAP - 35:42
  • Exploitation and Post-exploitation
    • Exploiting SQL injection - 8:33
    • Blind SQL Injection attack in-action - 9:44
    • Outdated web application to server takeover - 7:35

View Full Curriculum


Access
Lifetime
Content
1.0 hours
Lessons
22

IT Interview Training Course

By eduOlc | in Online Courses

IT interview is the process to get a job in any organization, for which we have to be very well prepared because in IT we have to go through various rounds of interviews in order to get the job. We should be very well prepared for the interview before going for it’s not only based on our technical skills rather they try to test all the skills by a different round of interviews. The aim of this course is to direct you through the entire recruitment process step-by-step. The IT Interview course requires years of study and expertise in the execution of interviews with the largest tech firms. It will save you time watching this course and help you avoid all the mistakes you might make and miss a work offer.

4.5/5 average rating: ★ ★ ★ ★

  • Access 22 lectures & 1 hour of content 24/7
  • See the important part aspects of Technical Interview
  • Learn the multi-stage process for recruiting new hires
  • Collect basic information on how the priorities, abilities, & credentials of an individual will support the needs of an organization is a preliminary interview
  • See various tips for conducting interviews
  • Know the do's & don'ts of technical interviews

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

EduOlc Team
4.0/5 Instructor Rating: ★ ★ ★ ★

Every course in EduOlc is taught by top institutors in the industry. We provide video tutorials and a customized learning platform that empowers learners to train at their own pace. Besides our vast collection of online tutorials, EduOlc offers a continuous stream of authentic content.

Every course comprises a series of learning materials created in high-quality videos. EduOlc is committed to building the best learning experience to bring world-class training content and best learning practices delivering to students and professionals.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • Introduction - 4:52
  • Objectives of Technical Interview
    • Objectives of Technical Interview - 4:04
  • Defined Scale for Interview
    • Defined Scale for Interview - 2:00
  • Comprehensive Feedback
    • Comprehensive Feedback - 5:18
  • Typical Interview Process
    • Typical Interview Process - 3:17
  • Role Detail
    • Role Detail - 3:48
  • Posting a Job
    • Posting a Job - 3:17
  • Scheduling Interviews
    • Scheduling Interviews - 4:53
  • Evaluating Candidates
    • Evaluating Candidates - 4:50
  • Preliminary Interviews
    • Preliminary Interviews - 4:25
  • Tips for Conducting Interview
    • Tips for Conducting Interview - 3:32
  • Explaining the Interview Agenda
    • Explaining the Interview Agenda - 3:13
  • Interview Conversations
    • Interview Conversations - 7:11
  • Structure of Technical Interview
    • Structure of Technical Interview - 4:10
  • Conducting the Interview
    • Conducting the Interview - 7:17
  • In Person Interview
    • In Person Interview - 4:22
  • Guidelines for Online Interview
    • Guidelines for Online Interview - 3:07
  • Post Interview Phase
    • Post Interview Phase - 7:09
  • Sample Feedback Form
    • Sample Feedback Form - 2:55
  • Importance of Candidate Experience
    • Importance of Candidate Experience - 6:37
  • Do’s and Don’t’s of Technical Interview
    • Do’s and Don’t’s of Technical Interview - 4:51
  • Conclusion
    • Conclusion - 6:00

View Full Curriculum


Access
Lifetime
Content
9.0 hours
Lessons
73

Cyber Security Analyst & Enterprise Architecture

Prevent, Detect, & Combat Cybersecurity Threats and Improve Overall State of IT Security

By Integrity Training | in Online Courses

As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioral analytics skills covered by CSA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. This course prepares you for CompTIA CSA+ and validates the critical knowledge and skills required to prevent, detect and combat cybersecurity threats.

4.2/5 average rating: ★ ★ ★ ★

  • Access 73 lectures & 9 hours of content 24/7
  • Configure & use threat detection tools.
  • Perform data analysis.
  • Interpret the results to identify vulnerabilities, threats, & risks to an organization.
  • Pass the CompTIA CSA+ on your first attempt

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Integrity Training
4.2/5 Instructor Rating: ★ ★ ★ ★

Integrity Training provides the corporate, government, and education sectors with proven on-demand training for employees. With 20 years in the business, over 600 online training courses, and over 1.2 M students taking the courses, Integrity Training is a name you can trust in workforce training.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Course Introduction
    • Welcome Aboard - 4:03
    • Cyber Security Analyst - 9:12
    • Cyber Security Analyst Domain - 6:18
    • Cybersecurity Analyst Bootcamp Overview - 15:21
  • CySA Job Role
    • Cybersecurity Analysts Part 1 - 17:52
    • Cybersecurity Analysts Part 2 - 19:06
  • Reconnaissance Techniques
    • Reconnaissance Techniques part 1 - 16:14
    • Reconnaissance Techniques part 2 - 17:45
    • Reconnaissance Techniques part 3 - 19:48
    • Reconnaissance Techniques part 4 - 6:33
    • Social Engineering Toolset - 3:02
    • Netcraft - 2:18
    • Htrack - 2:44
    • Fireye - 2:56
    • NMAP - 2:23
    • Sysinternals - 1:58
    • Enhanced Migration Tool - 3:16
  • Security Appliances
    • Security Appliances Part 1 - 19:19
    • Security Appliances Part 2 - 8:18
    • Palo Alto Networks - 6:36
    • Fortinet - 4:46
  • Logging and Access
    • Logging and Analyst Part 1 - 19:39
    • Logging and Analyst Part 2 - 11:51
  • Managing Vulnerabilities
    • Managing Vulnerabilities Part 1 - 18:29
    • Managing Vulnerabilities Part 2 - 14:36
    • Microsoft Security Baseline - 0:57
    • Metasploit - 1:19
    • NIST SCAP - 1:47
    • Computer Security Resource Center - 1:06
  • Remediating Vulnerabilities
    • Remediating Vulnerabilities part 1 - 19:11
    • Remediating Vulnerabilities part 2 - 9:44
    • SANS Institute - 1:43
  • Secure Software Development
    • Software Development Security part 1 - 18:16
    • Software Development Security Part 2 - 14:37
    • Owasp - 0:38
    • Incident Response - 13:43
    • Computer Emergency Response team - 2:12
  • Computer Forensics
    • Forensics Tools Part 1 - 19:35
    • Forensics Tools Part 2 - 10:23
    • Guidance Encase - 1:08
  • Analyzing Analysis and Recovery
    • Incident Analysis And Recovery Part 1 - 19:15
    • Incident Analysis And Recovery Part 2 - 12:55
  • Secure Network Design
    • Secure Network Design - 15:39
    • Toms IT Pro - 2:12
  • Identity and Access Management (IAM)
    • Managing Identities and Access Part 1 - 19:16
    • Managing Identities and Access Part 2 - 12:43
    • Tripwire - 2:03
  • IT Security Frameworks
    • Security Frameworks and Policies Part 1 - 19:30
    • Security Frameworks and Policies Part 2 - 13:58
    • NIST Cybersecurity Framework - 1:34
  • Cloud Computing Security Tools
    • Top 10 Security Tools - 1:49
    • O365 Cloud Security - 2:17
    • MS Cloud Security Tools - 4:59
    • Okta - 1:34
    • Sophos - 2:01
    • Sophos Lab - 1:01
  • Department of Defense Requirements (DOD)
    • Dept of Defense Workforce - 1:35
    • Dept of Defense Workforce Directive (8570) - 2:02
    • Dept of Defence Security Technical Implementation Guides (STIG) - 3:03
    • Fedramp - 1:21
  • Taking the CySA Exam
    • CompTIA Certifications - 7:28
    • CompTIA Exam Preparations - 1:06
    • CompTIA Cybersecurity Roadmap - 3:39
  • CompTIA Continuing Education
    • CompTIA Certmetrics - 2:42
    • CompTIA Certifcation Renewal - 9:58
    • CompTIA Cybersecurity Hub - 1:25
  • Job Search Tips
    • Linked In Job Search - 5:59
    • Cleared Connections - 1:18
    • Dice - 1:28
    • Intelligence Careers - 2:48
  • Course Closeout
    • CSA Exam Registration - 8:49
    • Become a CompTIA Subject Matter Expert - 5:15
    • CYSA Practice Exams - 0:31

View Full Curriculum


Access
Lifetime
Content
20.0 hours
Lessons
237

Hacking in Practice: Certified Ethical Hacking Mega Course

Explore Today's Cyber Threats & Shut Them Down with 20+ Hours of Practical Training

By IT Security Academy | in Online Courses

With a few lines of code, cybercriminals can access protected networks, view encrypted files, and even steal identities online—if there's not an ethical hacker standing in their way. This extensive course contains over 20 hours of practical training designed to help you thwart these criminals as a certified professional. You'll start with an introduction to cyber threats and IT security myths. Then you'll move on to security policies, risk management, disaster recovery, and even get a free voucher for the ISA CISS examination when you complete the course, setting you up to validate your skills right away.

4.5/5 average rating: ★ ★ ★ ★

  • Access 237 lectures & 20 hours of content 24/7
  • Follow step-by-step instructions for advanced hacking techniques
  • Familiarize yourself with current cyber threats & hacking trends
  • Explore designing more secure networks
  • Dive into encrypted data, identify spoofing, & windows authorization

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

IT Security Academy
4.1/5 Instructor Rating: ★ ★ ★ ★

IT Security Academy is a company that associates IT Security Professionals. Now it's proud to share its knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction to cyber threats
    • Introduction to Current Cyber Threats - 4:46
    • IT Prehistory - 4:41
    • Let’s look a few years back - 4:42
    • Cyber crimes – an evolution not revolution - 4:25
    • Current Cyber Threats – notes for the examination
  • IT security popular myths
    • Popular myths about IT security – origins - 5:33
    • Myths #1 – you’ll never be hacked - 5:55
    • Myths #2 – you don’t need any protection software or hardware - 5:11
    • Myths #3 – IT security is always a priority - 1:13
    • Popular Myths About Computer System Security – notes for the examination
  • IT security trends
    • Trends in IT Security - 3:44
    • The birth of technology society - 3:16
    • EXERCISE: How much info can you gather? - 3:59
    • Fake identity - 5:03
    • Online privacy - 6:14
    • Analyzing sniffing software - 3:33
    • Cyber War - 8:23
    • Changing IT Security Trends – notes for the examination
  • Data security
    • Objective #1 – Data security – Introduction - 6:58
    • Confidentiality of data - 5:33
    • EXERCISE: Finding confidential data with search engines - 6:05
    • Integrity of data - 7:04
    • Data security – notes for the examination
  • Security policies
    • Security policies – introduction - 1:56
    • What is security? - 3:53
    • Information security - 4:13
    • Information security – level up - 4:04
    • Security issues - 4:50
    • Why are security solutions fallible? - 5:42
    • Security policy issues - 4:50
    • Introduction to threat modelling and classification - 5:14
    • Threat modelling – STRIDE - 4:06
    • STRIDE: Spoofing identity - 5:03
    • STRIDE: Tampering with data - 4:28
    • STRIDE: Denial of Service - 3:51
    • Threat Modelling and Classification – notes for the examination
  • Risk management
    • Introduction to Risk Management - 1:27
    • Attack Methods - 6:42
    • Local attacks - 2:56
    • Target scanning and enumeration techniques #1 - 5:52
    • Target scanning and enumeration techniques #2 - 3:30
    • Passive scanning - 5:36
    • Attack Methodologies – notes for the examination
    • Introduction to risk assessment - 6:20
    • DREAD: Risk assessment model - 4:50
    • DREAD: Exploitability - 5:24
    • EXERCISE: Risk Assessment - 7:17
    • Risk Assessment – notes for the examination
    • Introduction to Social Engineering and rogue software - 4:19
    • Manipulation tactics - 9:01
    • EXERCISE: Social Engineering attacks - 6:44
    • SE with KALI / BackTrack - 7:06
    • Rogue Software - 2:28
    • Fraud tools #1 - 7:10
    • Fraud tools #2 - 6:32
    • Social Engineering and Rogue Software – notes for the examination
  • Defence in depth
    • Introduction to Defence in depth - 1:32
    • How to use Defence in depth model? - 5:45
    • DiD: OS and LAN layers - 6:39
    • DiD: Perimeter and Physical Access Layers - 6:06
    • DiD: Demonstration - 2:48
    • Automated attack targeting a service - 5:23
    • Automated user-targeting attack - 4:31
    • The Defence in Depth Model – notes for the examination
    • Introduction to Immutable laws of security – Law #1 - 4:35
    • Law #2 - 2:56
    • Law #3 - 2:23
    • Law #4 - 1:52
    • Law #5 - 3:28
    • Law #6 - 2:07
    • Law #7 - 1:11
    • Law #8 - 1:43
    • Law #9 - 3:57
    • Law #10 - 0:48
    • Laws for administrators - 5:59
    • Immutable Laws of Security – notes for the examination
  • Disaster recovery
    • Introduction to Disaster Recovery - 1:33
    • How to reduce losses? - 5:24
    • Ensuring continous availability - 4:08
    • Threat discovery #1 - 4:28
    • Threat discovery #2 - 3:40
    • Audit users and keep control accounts - 5:18
    • High risk users - 3:23
    • Collecting and analysing evidence - 7:13
    • Forensics example - 3:52
    • CONFICKER: CASE STUDY - 7:11
    • How to reduce losses – notes for the examination
  • Computer network security - network protocols
    • Network security – introduction - 5:44
    • OSI MODEL #1 – Physical layer - 5:45
    • OSI MODEL #2 – Data link layer - 4:46
    • Threats: MAC spoofing - 5:54
    • Threats: ARP Poisoning - 6:38
    • EXERCISE: Data Link Layer Attack - 7:32
    • OSI MODEL #3 – Network layer - 6:58
    • TCP Tunnelling over ICMP - 7:39
    • Network Protocols – notes for the examination
  • Transport protocols
    • OSI MODEL #4 – Transport Layer - 6:04
    • Threats: Enumerating Remote Computers - 3:40
    • EXERCISE: Transport Layer Attack using METASPLOIT – part 1 - 5:27
    • EXERCISE: Transport Layer Attack using METASPLOIT – part 2 - 5:13
    • OSI MODEL #5 – Session Layer - 3:33
    • Transport Protocols – notes for the examination
  • Application protocols
    • OSI MODEL #6 – Presentation Layer - 6:52
    • OSI MODEL #7 – Application Layer - 3:48
    • EXERCISE: Application Layer Attacks - 6:03
    • KALI / Backtrack: Attack Demonstration - 3:34
    • Man-in-the-Middle and Denial of Service Attacks - 2:49
    • Modifying Transmitted Packets - 4:45
    • Unencrypted protocols - 2:58
    • Application Protocols – notes for the examination
  • Designing secure computer networks
    • Designing Computer Networks – introduction - 2:18
    • Subnetting IPv6 - 3:18
    • Subnetting IPv4 - 7:01
    • IPv6 address notation - 6:46
    • DMZ: DeMilitarized Zone - 6:28
    • Subnetting – notes for the examination
    • Protocols and services: IP SEC - 9:33
    • IP SEC: Phase 1 - 7:27
    • Network Address Translation - 12:18
    • Network access control: RADIUS - 10:04
    • Protocols and Services – notes for the examination
  • Network administration and monitoring
    • Introduction to Monitoring Transmitted Data - 1:07
    • Monitoring Transmitted Data – Basic information - 8:03
    • Intrusion detection systems - 7:43
    • Why are firewalls and NDIS not enough? - 5:41
    • Wireshark – Introduction to network analysis - 6:29
    • How to use Wireshark? - 8:27
    • Analyzing captured data - 5:43
    • How to analyze telnet protocol? - 8:09
    • Intrusion detection - 7:48
    • Scanning computers - 7:47
    • Monitoring transmitted data – notes for the examination
  • Wireless networks security
    • Wireless Networks - 1:16
    • WIFI security solutions – introduction - 5:44
    • WIFI – working principles - 5:48
    • Other wireless technologies - 2:56
    • Threats and risks - 4:38
    • Ineffective solutions - 4:11
    • Authentication methods - 8:31
    • 802.11 WEP - 7:06
    • 802.11 WPA - 6:24
    • Standards and Security Solutions – notes for the examination
    • Threats of WIFI networks - 5:58
    • Client Attacks: Launching a rogue access point - 7:03
    • Client Attacks: Evil twin - 4:51
    • Client Attacks: Denial of service - 9:17
    • EXERCISE: WPA attack - 3:24
    • Wi-Fi Security Threats – notes for the examination
  • Operating systems security
    • Operating systems security – introduction - 9:10
    • Security boundaries - 4:44
    • Three core - 7:15
    • EXERCISE: OS boundaries - 7:54
    • Process isolation - 6:30
    • Kernel Mode Code Signing - 6:24
    • Java Virtual Machine and code access security - 4:17
    • OS Security Boundaries – notes for the examination
    • Malware - 12:09
    • EXERCISE: Vulnerability attacks - 10:26
    • EXERCISE: Identifying suspicious processes - 6:54
    • Demonstration: Process Explorer - 9:13
    • EXERCISE: Removing malware - 8:38
    • Rootkits - 6:14
    • EXERCISE: Detecting rootkits - 11:07
    • EXERCISE: Security evaluation - 6:00
    • Malware – notes for the examination
  • Access control
    • Authentication and authorisation – Introduction - 1:57
    • Authentication - users - 6:56
    • How secure is your password? - 5:03
    • Authentication protocols and services - 8:25
    • LM Hash - 7:02
    • Cached Credentials - 4:29
    • KERBEROS - 11:30
    • Authentication – notes for the examination
    • Identity Theft - 9:13
    • EXERCISE: Offline attacks - 12:22
    • Using online cracking services - 8:41
    • Identity Theft – notes for the examination
  • Windows security
    • Windows Security – what you’ll learn - 1:17
    • User Account Control - 6:22
    • UAC configuration - 8:02
    • Additional Security Features – ASLR and DEP - 11:39
    • PatchGuard - 1:34
    • Techniques and Methods – notes for the examination
    • Encryption – key protection - 9:31
    • Drive encryption - 8:25
    • BitLocker - 7:57
    • BitLocker To Go Reader - 4:43
    • File and folder encryption – EFS - 7:30
    • EXERCISE: EFS - 5:36
    • Encryption – notes for the examination
  • Application security
    • Introduction to Application Security - 8:18
    • Attacks on applications - 10:18
    • SQL Injection - 8:10
    • EXERCISE: Analyze the application - 13:31
    • Blind SQL Injection - 9:33
    • Automated SQL Injection - 11:44
    • Cross-site scripting – XSS - 10:10
    • Program security assessment - 5:10
    • Unsafe applications - 10:11
    • Application Attacks – notes for the examination
    • Program Security Assessment – notes for the examination
  • Application security - Configuration and management
    • Here’s what you’ll learn in this module - 1:05
    • Software updates - 2:39
    • MS Update - 6:53
    • System Center Configuration Manager - 2:46
    • Managing applications - 8:26
    • Blocking applications - 7:35
    • Software restrictions policies - 5:57
    • EXERCISE: Application control rules - 12:11
    • Isolating applications - 6:30
    • How to protect users without interrupting their work – notes for the examination
  • Cryptography
    • Introduction to cryptography - 9:42
    • History of ciphers - 10:57
    • Symmetric and asymmetric ciphers - 6:13
    • Symmetric-key algorithms - 5:49
    • Block ciphers - 6:01
    • Data encryption standard - 6:51
    • DES-X - 7:35
    • Advanced encryption standards - 5:28
    • Block cipher modes - 7:16
    • Stream Ciphers – RC4 - 3:40
    • Asymmetric-key algorithms - 8:11
    • RSA - 5:33
    • ELGAMAL - 2:05
    • HASH functions - 5:56
    • Digital signature - 5:56
    • Hybrid Schemes - 6:24
    • Symmetric and Asymmetric Ciphers – notes for the examination
  • Public Key Infrastructure
    • Introduction to cryptology - 2:12
    • Public key infrastructure - 6:10
    • Implementing public key infrastructure - 5:39
    • What will PKI allow you? - 6:29
    • EXERCISE: Certificates - 8:37
    • Certificate life cycle - 6:24
    • Planning the PKI - 8:33
    • PKI Administration - 7:29
    • Public Key Infrastructure – Trust but verify – notes for the examination

View Full Curriculum


Access
Lifetime
Content
1.0 hours
Lessons
8

Cyber Security Certifications Practice Questions 2022: CISSP, CISA, CISM, CEH

The Latest Exam Practice Questions to Pass the Most Valuable Cyber Security Certification Exams

By Mohamed Atef | in Online Courses

Put your newly gained & refreshed expertise to test with the latest exams practices questions that you need to pass the most valuable Cyber Security Certification CISSP, CISA, CISM, and Ethical Hacker Exams in 2022. This course gives you updated questions to provide more accuracy and familiarity with the cyber security certification exams. You'll get online exam simulators, all inquiries with explanations.

4.3/5 average rating: ★ ★ ★ ★

  • CISSP. 15 online exam simulators (1,200 questions with explanation)
  • Ethical Hacker Exams. 4 online exam simulators (600 questions with explanation)
  • CISM. 4 online exam simulators (620 questions with explanation)
  • CISA. 7 online exam simulators (800 questions with explanation)

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Mohammed Atef
4.6/5 Instructor Rating: ★ ★ ★ ★

Mohamed Atef is an ICT consultant, senior penetrating testing specialist and certified instructor with more than 20 years of experience deliver professional and academic courses and 2 books published.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Certified Information System Security Professional - CISSP 2020
    • Student Feedback - 1:04
    • Latest CISSP Practice Questions
  • Certified Information System Auditor - CISA 2020
    • Student Feedback - 1:00
    • Latest CISA Practice Questions
  • Certified Information Security Manager - CISM 2020
    • Student Feedback - 0:52
    • Latest CISM Practice Questions
  • Ethical Hacker Exams
    • Student Feedback - 1:02
    • Latest Ethical Hacker Exams Questions

View Full Curriculum


Access
Lifetime
Content
4.0 hours
Lessons
59

Ethical Hacking: Network Scan by Nmap & Nessus

Discover Networks & Check Devices with Vulnerabilities by Using Nmap

By Oak Academy | in Online Courses

To perform successful penetration testing or ethical hacking. First, you have to know all the secrets of your targets. You should find all your target network's systems and network devices before proceeding with an ethical hacking operation. In this course, you`ll discover the secrets of ethical hacking and network discovery using Nmap. You’ll learn all the Nmap details, the most known and de facto network scanning tool. Then in other lessons, you’ll scan the vulnerabilities of the network you discovered by using Nessus. Nessus is the most known vulnerability scanner and is in the third place of the most prevalent cybersecurity tools.

4.5/5 average rating: ★ ★ ★ ★

  • Access 59 lectures & 4 hours of content 24/7
  • Understand the main terminology of Network Scanning & Finding Vulnerabilities in devices in a network
  • Use Nmap with full knowledge & experience
  • Scan a network for scripts
  • Learn about networking scan types
  • Learn how to use Hping

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • 1 - Introduction - 0:42
    • 2 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 3 - Lab's Architecture Diagram - 1:29
    • 4 - Using VirtualBox vs VMware
    • 5 - Install & Run Oracle VM VirtualBox - 5:02
    • 6 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 7 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 8 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 9 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 10 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 11 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 12 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 13 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 14 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 15 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 16 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 17 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 18 - Free Windows Operating Systems on VMware Fusion - 5:54
    • 19 - Free Windows Operating Systems on Oracle VM VirtualBox - 2:55
    • 20 - Windows Systems as Victim - 0:59
    • 21 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
  • Scan Types
    • 22 - Scan Types Definitions: Active Scan & Passive Scan - 2:50
    • 23 - Passive Scan - Wireshark - 6:37
    • 24 - Passive Scan - ARP Tables - 6:20
    • 25 - Active Scan - 8:30
  • Nmap Introduction & Basics
    • 26 - Nmap Introduction - 4:14
    • 27 - TCP/IP Basics - Layers and Protocols - 9:26
    • 28 - TCP/IP Basics - An Example: DNS Query - 5:19
    • 29 - TCP/UDP Basics - 7:11
  • Nmap in Action - 1 : Scan Types
    • 30 - Ping Scan - 4:59
    • 31 - SYN Scan - 7:31
    • 32 - Port Scan - 8:15
    • 33 - TCP Scan - 7:11
    • 34 - UDP Scan - 4:11
  • Nmap in Action - 2 : Detection & Management
    • 35 - Version Detection - 7:10
    • 36 - Operating System Detection - 5:58
    • 37 - Input-Output Management - 8:28
    • 38 - Lab Exercise - 1 - 0:49
  • Nmap in Action - 3 : Script Scanning
    • 39 - Introduction - 3:40
    • 40 - First Script Example - 7:43
    • 41 - Second Script Example - 2:21
    • 42 - Third Script Example - 2:48
    • 43 - Nmap Aggressive Scan
  • Nmap in Action - 4 : Timing and IPS/IVS Evasion
    • 44 - Bypassing IPS/IDS Devices - 6:07
    • 45 - Timing - 5:45
  • Nmap in Action - 5 : Some Other Scans
    • 46 - NULL, FIN, XMAS and ACK Scan - 2:55
    • 47 - Idle Scan - 7:44
  • Vulnerability Scan and Introduction to Nessus
    • 48 - Introduction to Vulnerability Scan - 9:29
    • 49 - Nessus® Home vs Nessus® Essentials
    • 50 - Introduction to Nessus - 1:57
    • 51 - Downloading Nessus - 1:40
    • 52 - Installing Nessus - 3:41
  • Nessus in Action
    • 53 - Creating Policy - 5:39
    • 54 - Scanning - 7:06
    • 55 - Reporting - 2:20
    • 56 - Lab Exercise - 2 - 2:47
    • 57 - An Aggressive Scan with Nessus: Start - 4:23
    • 58 - An Aggressive Scan with Nessus: Results - 7:17
    • 59 - An Aggressive Scan with Nessus: Results with Windows Targets - 2:45

View Full Curriculum


Access
Lifetime
Content
5.0 hours
Lessons
86

Ethical Hacking with Metasploit: Exploit & Post Exploit

Learn Ethical Hacking from Scratch with Metasploit, Exploit Vulnerabilities & Become a White Hat Hacker

By Oak Academy | in Online Courses

This monster course covers hacking's fundamental building blocks, penetration testing (Kali Linux), gaining control using Metasploit, and application development. You don't need to have previous knowledge about all. This course will take you from a beginner to a more advanced level. You will learn how to install the tools, terminology, and how devices communicate with each other. You'll also learn how to scan vulnerabilities with Nessus and gain full access to computer systems via discovering the weaknesses and vulnerabilities.

New tools are released every day, and it's crucial to stay on top of the latest knowledge for being a better security specialist. You will always have up-to-date content for this course at no extra charge.

4.8/5 average rating: ★ ★ ★ ★

  • Access 86 lectures & 5 hours of content 24/7
  • Become an expert in using Metasploit for ethical hacking & network security
  • Set up a lab environment to practice hacking
  • Install Kali Linux, a penetration testing operating system
  • Install Windows & vulnerable operating systems as virtual machines for testing
  • Learn Linux commands & how to interact with the terminal
  • Gain control over computer systems using server side attacks
  • Gather password hashes, cracking passwords, taking screenshots, logging keystrokes & more
  • Use backdoors to persist on the victim machine

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • 1 - Course Introduction & Overview - 0:59
  • Setting Up The Laboratory - Windows & Mac
    • 2 - Virtualisation Platforms - 1:29
    • 3 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 4 - Lab's Architecture Diagram - 1:25
    • 5 - Using VirtualBox vs VMware
    • 6 - Install & Run Oracle VM VirtualBox - 5:02
    • 7 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 8 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 9 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 10 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 11 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 12 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 13 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 14 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 15 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 16 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 17 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 18 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 19 - Installing Metasploitable - 4:11
    • 20 - Free Windows Operating Systems on VMware Fusion - 5:54
    • 21 - Free Windows Operating Systems on Oracle VM VirtualBox - 2:55
    • 22 - Windows Systems as Victim - 0:59
    • 23 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
    • 24 - Checking Lab Network Connectivity - 2:58
  • Vulnerability Scanning
    • 25 - Introduction to Vulnerability Scanning - 2:10
    • 26 - Nessus® Home vs Nessus® Essentials
    • 27 - Downloading Nessus - 1:40
    • 28 - Installing Nessus - 3:41
    • 29 - Aggressive Scan with Nessus: Start - 4:24
    • 30 - Aggressive Scan with Nessus: Results - 7:17
    • 31 - Aggressive Scan with Nessus: Results with Windows Targets - 2:45
  • Exploitation
    • 32 - Concept and The Terminology - 6:13
    • 33 - Exploit Databases - 1:56
    • 34 - Manuel Exploitation - 5:50
    • 35 - Exploitation Frameworks - 3:36
  • Exploitation with Metasploit
    • 36 - Introduction to MSF - 1:22
    • 37 - Metasploit Framework - 5:01
    • 38 - Msfconsole - 2:13
    • 39 - Msfconsole Initialisation - 2:16
    • 40 - Msfconsole Exploit Search & Ranking - 3:37
    • 41 - Running Msfconsole - 8:14
    • 42 - Meterpreter - 0:54
    • 43 - Running Meterpreter - 2:12
    • 44 - Meterpreter on a Linux System - Basics - 8:36
    • 45 - Meterpreter on a Windows System - Basics - 5:51
  • Hacking Using No Vulnerability:Pass the Hash
    • 46 - Pass the Hash - 4:00
    • 47 - Pass the Hash: Metasploit PsExec - 3:49
    • 48 - Exploit A Machine and Gather Password Hashes - 2:15
    • 49 - Pass The Hash: Try Hashes on The Other Systems - 10:25
  • Post-Exploitation & Persistence
    • 50 - Post-Exploitation - 3:28
    • 51 - What is “Persistence” - 1:28
    • 52 - Meterpreter’s Persistence module - 8:55
    • 53 - Removing the Backdoor - 5:00
    • 54 - Running Meterpreter’s Persistence Module on Windows 8 - 2:56
    • 55 - Next Generation Persistence: Step 1 - 4:41
    • 56 - Next Generation Persistence: Step 2 - 4:32
  • Post Modules and Extensions: Part 1
    • 57 - Meterpreter for Post - Exploitation - 1:37
    • 58 - Meterpreter Core Commands - 1:45
    • 59 - Meterpreter Core Extension - Session Command - 2:31
    • 60 - Meterpreter Core Extension - Migrate Command - 3:34
    • 61 - Meterpreter Core Extension - Channel Command - 2:43
    • 62 - Meterpreter Stdapi Extension - 1:05
    • 63 - Meterpreter Stdapi Extension - File System Commands - 5:19
    • 64 - Meterpreter Stdapi Extension - System Commands - 4:13
    • 65 - Meterpreter Stdapi Extension - User Interface & Webcam Commands - 4:08
  • Post Modules and Extensions: Part 2
    • 66 - Meterpreter Incognito Extension - 3:26
    • 67 - Meterpreter Mimikatz Extension - 3:53
    • 68 - Metasploit Post-Exploitation Modules - 2:01
    • 69 - Gathering Modules - 1:21
    • 70 - Managing Modules - 6:51
  • Password Cracking: Introduction
    • 71 - Password Cracking - 3:06
    • 72 - Password Hash Examples: Windows Hashes - 3:30
    • 73 - Linux Hashes - 2:33
    • 74 - Password Cracking Classification - 2:11
  • Password Cracking: Tools in Action
    • 75 - Password Cracking Tools - 0:08
    • 76 - Online Cracking With HYDRA - 10:01
    • 77 - Cain & Abel - Introduction - 1:01
    • 78 - Cain & Abel - Step 1: Install & First Run - 2:39
    • 79 - Cain & Abel - Step 2: Gathering Hash Dumps - 4:40
    • 80 - Cain & Abel - Step 3: Importing Hash Files - 4:31
    • 81 - Cain & Abel - Step 4: Dictionary Attack - 4:19
    • 82 - Cain & Abel - Step 5: Brute Force Attack - 3:32
    • 83 - Cracking Tool: John The Ripper - 7:28
  • Collecting Sensitive Data
    • 84 - File Shares and End User Computers - 7:27
    • 85 - Real World Examples - 1:40
    • 86 - Summary - 1:48

View Full Curriculum


Access
Lifetime
Content
6.0 hours
Lessons
96

Ethical Hacking: Network Fundamentals & Network Layer Attacks

Learn Ethical Hacking with Network Security, Sniffing, Subnetting, ARP Spoof, Password Cracking & Implement MitM Attack

By Oak Academy | in Online Courses

This is a fun, efficient course where you get to look at data going on the networks, like how to sniff the network and gather information from the web. You're going to use some tools such as TCP Dump and Wireshark. You'll also be doing a deep dive into the Subnetting, ARP Spoofing and MitM attacks, and Password Cracking. It will introduce you to the fundamental concepts of data networking operation, including IP addressing and subnetting, ethernet operation, ports and protocols, and the OSI model. You'll then move forward with hands-on topics to practice penetration testing on your own.

4.4/5 average rating: ★ ★ ★ ★

  • Access 96 lectures & 6 hours of content 24/7
  • Be familiar with fundamental concepts of data networking operation
  • Understand the relationship between IP & MAC addresses, as well as the difference between a router and a switch
  • Set up a lab & install needed software to practice penetration testing on your own machine
  • Use some tools such as TCP dump & Wireshark
  • See some attacks & techniques to expand the sniffing surface

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Network Fundamentals
    • 1 - Course Introduction and What the Course is? - 1:15
  • Reference Models
    • 2 - What is “Protocol” - 5:36
    • 3 - Reference Models - 0:24
    • 4 - OSI Reference Model - 13:43
    • 5 - OSI vs TCP/IP - 2:32
    • 6 - Demonstration using Wireshark - 7:59
  • Data Link Layer ( Layer 2 )
    • 7 - Standards & Protocols - 3:50
    • 8 - Ethernet: Principles, Frame & Headers - 4:06
    • 9 - ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets - 6:10
    • 10 - ARP Hand-On Practices - 3:14
    • 11 - VLANs – Virtual Local Area Networks - 4:03
    • 12 - WLANs – Wireless Local Area Networks - 7:01
  • Network Layer ( Layer 3 )
    • 13 - Introduction to Network Layer - 1:36
    • 14 - Internet Protocol - IP - 2:49
    • 15 - IPv4 Adressing System - 1:56
    • 16 - IPv4 Packet Header - 2:56
    • 17 - IPv4 Subnetting: Classful Networks - 2:35
    • 18 - IPv4 Subnetting: Subnet Mask - 2:59
    • 19 - IPv4 Subnetting: Understanding - 3:09
    • 20 - IPv4 Shortage - 1:41
    • 21 - Private Networks - 3:59
    • 22 - Private Networks - Demonstration - 3:01
    • 23 - NAT – Network Address Translation - 4:30
    • 24 - IPv6, Packet Header & Addressing - 8:30
    • 25 - DHCP - How the Mechanism Works - 9:23
    • 26 - ICMP – Internet Control Message Protocol - 2:02
    • 27 - Traceroute - 9:50
  • Transport Layer ( Layer 4 )
    • 28 - Introduction to Transport Layer - 2:39
    • 29 - TCP – Transmission Control Protocol - 6:59
    • 30 - TCP Header - 2:27
    • 31 - UDP – User Datagram Protocol - 3:56
  • Application Layer (Layer 5-7)
    • 32 - Introduction to Application Layer - 0:55
    • 33 - DNS – Domain Name System - 5:56
    • 34 - HTTP ( Hyper Text Transfer Protocol ) - 3:09
    • 35 - HTTPS - 1:56
    • 36 - Checklist - What We Have Learned - 1:26
  • Network & Data Link Layer (Layer 2) Attacks
    • 37 - What is Covered? - 1:15
  • Setting Up the Laboratory
    • 38 - Laboratory and Virtual Platforms - 1:29
    • 39 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 40 - Lab's Architecture Diagram - 1:28
    • 41 - Using VirtualBox vs VMware
    • 42 - Install & Run Oracle VM VirtualBox - 5:02
    • 43 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 44 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 45 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 46 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 47 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 48 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 49 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 50 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 51 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 52 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 53 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 54 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 55 - Download & Install OWASPBWA - 4:34
    • 56 - Free MS Windows Virtual Machines in VMware Fusion - 5:54
    • 57 - Free MS Windows Virtual Machines in Oracle VM VirtualBox - 2:55
    • 58 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
  • Using GNS3 and Creating a GNS3 Networks
    • 59 - Download & Install - 3:30
    • 60 - Setting Up the First Project - 7:57
    • 61 - GNS3 Environment - 2:56
    • 62 - Building GNS3 Network - 15:45
    • 63 - Attach Kali (or another VM) to the GNS3 Network - 6:31
    • 64 - Configuring Switch & Router (Cisco) and creating VLANs - 5:14
  • Network Sniffing: The “Man in the Middle” (MitM)
    • 65 - MitM: Listening to the traffic - 1:45
    • 66 - Sniffing - 1:03
    • 67 - TCPDump - 5:23
    • 68 - Wireshark: Capturing the Traffic - 8:34
    • 69 - Wireshark: Following Stream - 2:40
    • 70 - Wireshark: Summarise Network - 6:19
  • Active Network Devices
    • 71 - Router, Switch, Hub - 4:44
  • Expanding Sniffing Space
    • 72 - How to Expand Sniffing Space? - 5:13
    • 73 - MAC Flood: Switching - 3:55
    • 74 - MAC Flood: Using Macof Tool - 7:09
    • 75 - MacFlood - Countermeasures - 1:13
    • 76 - ARP Spoof - 3:40
    • 77 - ARP Cache Poisoning using Ettercap - 10:35
    • 78 - DHCP Starvation & DHCP Spoofing - 3:36
    • 79 - DHCP Mechanism - 6:15
    • 80 - DHCP Starvation - Scenario - 3:59
    • 81 - DHCP Starvation Demonstration with Yersinia - 8:33
    • 82 - VLAN Hopping - 2:04
    • 83 - VLAN Hopping: Switch Spoofing - 1:39
    • 84 - VLAN Hopping: Double Tagging - 3:17
  • Penetration Testing of Network Devices
    • 85 - Reconnaissance: Finding Open Ports & Services Using NMAP - 5:15
    • 86 - Password Cracking - 2:06
    • 87 - Online SSH Password Cracking Using Hydra - 7:58
    • 88 - Compromising SNMP: What is SNMP ? - 5:44
    • 89 - Compromising SNMP: Finding Community Names Using NMAP Scripts - 3:06
    • 90 - Compromising SNMP: Write Access Check Using SNMP-Check Tool - 2:18
    • 91 - Compromising SNMP: Grabbing SNMP Configuration Using Metasploit - 5:53
    • 92 - Weaknesses of network devices - 3:15
  • Auditing Network Devices
    • 93 - Password Creation Methods of Cisco Routers - 7:49
    • 94 - Identity Management - 0:52
    • 95 - ACL – Access Control Lists - 5:12
    • 96 - SNMP Security - 4:15

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.