Table of contents
Course Overview
1m 45s
Lock icon
Course Overview | 1m 45s
Comparing Different Types of Social Engineering Techniques
48m 45s
Lock icon
Module Overview | 1m 37s
Lock icon
What Is Social Engineering? | 1m 47s
Lock icon
Phishing | 1m 54s
Lock icon
Types of Phishing | 3m 47s
Lock icon
Vishing | 2m 37s
Lock icon
SPAM | 3m
Lock icon
Dumpster Diving | 1m 12s
Lock icon
Shoulder Surfing | 2m 39s
Lock icon
Pharming | 2m 28s
Lock icon
Tailgating | 2m 21s
Lock icon
Hoaxes | 3m 11s
Lock icon
Prepending | 1m 45s
Lock icon
Impersonation | 1m 11s
Lock icon
Identity Fraud | 1m 13s
Lock icon
Invoice Scam | 1m 30s
Lock icon
Credential Harvesting | 2m 31s
Lock icon
Watering Hole Attack | 1m 50s
Lock icon
Typo Squatting/URL Hijacking | 2m 19s
Lock icon
Hybrid Warfare | 2m 53s
Lock icon
Social Media and Influence Campaigns | 1m 13s
Lock icon
Reasons for Effectiveness - Authority and Intimidation | 1m 52s
Lock icon
Consensus and Social Proof | 51s
Lock icon
Familiarity/Liking | 48s
Lock icon
Trust | 45s
Lock icon
Scarcity / Urgency | 33s
Lock icon
Module Review | 58s
Analyzing Malware and Other Attacks
49m 27s
Lock icon
Module Overview | 45s
Lock icon
Indicators of Compromise (IOC) | 2m 13s
Lock icon
Virus | 2m 53s
Lock icon
Crypto-malware / Ransomware | 2m 17s
Lock icon
Trojan | 3m 51s
Lock icon
Worms | 51s
Lock icon
Potentially Unwanted Programs (PUP) | 1m 42s
Lock icon
Fileless Virus | 2m 15s
Lock icon
Botnets | 2m 36s
Lock icon
Logic Bomb | 1m 14s
Lock icon
Spyware | 1m 42s
Lock icon
Keylogger | 59s
Lock icon
Rootkits | 1m 21s
Lock icon
Backdoors | 1m 28s
Lock icon
Spraying | 1m 19s
Lock icon
Brute Force and Dictionary Attacks | 2m 8s
Lock icon
Rainbow Tables | 1m 55s
Lock icon
Known Plain Text / Ciphertext | 53s
Lock icon
Birthday Attack | 2m 28s
Lock icon
Downgrade Attack | 57s
Lock icon
Physical Attacks, Malicious USB, and Skimming | 3m 57s
Lock icon
Adversarial Artificial Intelligence (AI) | 1m 58s
Lock icon
Supply Chain Attacks | 2m 15s
Lock icon
Supply Chain Attack Example | 1m 27s
Lock icon
Cloud-Based vs. On-prem Attacks | 3m 27s
Lock icon
Module Review | 36s
Recognizing Application Attacks
39m 38s
Lock icon
Module Overview | 42s
Lock icon
Privilege Escalation | 2m 19s
Lock icon
Cross Site Scripting (XSS) | 2m 55s
Lock icon
SQL Injection | 1m 17s
Lock icon
DLL Injection | 1m 58s
Lock icon
LDAP Injection | 44s
Lock icon
XML Injection | 1m 12s
Lock icon
Pointer Dereference | 1m 21s
Lock icon
Directory Traversal / Command Injection | 1m 39s
Lock icon
Buffer Overflow | 1m 6s
Lock icon
Race Conditions | 1m 38s
Lock icon
Time of Check | 1m 15s
Lock icon
Secure Coding Concepts, Error Handling, and Input Validation | 4m 28s
Lock icon
Replay Attacks | 1m 4s
Lock icon
Integer Overflow | 1m 8s
Lock icon
Cross Site Request Forgery (XSRF) | 2m 33s
Lock icon
API Attacks | 2m 4s
Lock icon
Resource Exhaustion | 1m 53s
Lock icon
Memory Leak | 1m 42s
Lock icon
SSL Stripping | 2m 7s
Lock icon
Shimming | 1m 6s
Lock icon
Refactoring | 1m
Lock icon
Pass the Hash | 1m 57s
Lock icon
Module Review | 30s
Identifying Network Attacks
37m 13s
Lock icon
Module Overview | 45s
Lock icon
Rogue Access Points and Evil Twin | 3m 22s
Lock icon
Bluejack and Bluesnarfing | 3m 17s
Lock icon
Dissociation | 1m 24s
Lock icon
Jamming | 1m 5s
Lock icon
RFID | 1m 9s
Lock icon
Near Field Communication (NFC) | 1m 29s
Lock icon
IV Attack | 3m 4s
Lock icon
On-path Attacks (Formerly MiTM) | 58s
Lock icon
On-path Attacks (Formerly MiTB) | 2m 31s
Lock icon
ARP Poisoning | 1m 25s
Lock icon
IP/MAC Spoofing | 52s
Lock icon
MAC Flooding | 2m 10s
Lock icon
MAC Cloning | 1m 56s
Lock icon
DNS Poisoning | 1m 4s
Lock icon
Typo Squatting / URL Hijacking | 2m 20s
Lock icon
Distributed Denial of Service (DDoS) | 2m 17s
Lock icon
Smurf Attack (Amplification) | 3m
Lock icon
DDoS Attack Vectors | 1m 6s
Lock icon
Malicious Code Execution | 1m 59s
Distinguishing Threat Actors, Vectors, and Intelligence Sources
40m 38s
Lock icon
Module Review | 1m 8s
Lock icon
Script Kiddies | 1m
Lock icon
Hacktivists | 1m
Lock icon
Organized Crime | 1m 13s
Lock icon
Nation States / APT | 1m 19s
Lock icon
Insiders | 1m 27s
Lock icon
Competitors | 1m 26s
Lock icon
Threat Actor Attributes | 39s
Lock icon
Attack Vectors | 7m 34s
Lock icon
Use of Open Source Intelligence | 2m 33s
Lock icon
Closed / Proprietary Intelligence | 45s
Lock icon
Vulnerability Databases | 1m 31s
Lock icon
Public and Private Information Sharing | 1m 17s
Lock icon
Dark Web | 2m 22s
Lock icon
Indicators of Compromise (IOC) | 1m 43s
Lock icon
Automate Indicator Sharing (AIS) | 1m 5s
Lock icon
TAXII Layout | 1m 2s
Lock icon
MITRE | 2m 27s
Lock icon
Gathering and Correlating Information | 1m 58s
Lock icon
Predictive Analysis | 1m 7s
Lock icon
Threat Maps | 44s
Lock icon
Live Cyber Threat Map | 42s
Lock icon
File / Code Repositories | 1m 30s
Lock icon
Research Sources | 3m 6s
Understanding Vulnerabilities and Security Risks
34m 29s
Lock icon
Module Overview | 54s
Lock icon
Cloud-based vs. On-premises | 2m 44s
Lock icon
New Threats / Zero Days | 2m 1s
Lock icon
Mis-configuration / Weak Configuration | 1m 14s
Lock icon
Shared Accounts (Improperly Configured) | 1m 16s
Lock icon
Weak Configuration Considerations | 2m 37s
Lock icon
Weak Cipher Suites and Implementations | 1m 57s
Lock icon
Improper Certificate and Key Management | 1m 23s
Lock icon
Secure Protocols | 3m 7s
Lock icon
Default Configurations | 1m 19s
Lock icon
Third-party Risks | 2m 36s
Lock icon
Vendor Management | 1m 56s
Lock icon
Vulnerable Business Processes | 2m 28s
Lock icon
Outsourced Code Management | 1m 6s
Lock icon
Improper or Weak Patch Management | 2m 25s
Lock icon
Legacy Platforms | 1m 44s
Lock icon
Impact Areas | 1m 49s
Lock icon
Effects of Impacts | 1m 53s
Defining Security Assessment Techniques
35m 58s
Lock icon
Module Overview | 59s
Lock icon
Specific Types of Threats | 49s
Lock icon
What Is Cyber Threat Intelligence? | 1m 28s
Lock icon
Importance of Cyber Threat Intelligence | 53s
Lock icon
Threat Intelligence Classification | 1m 45s
Lock icon
Strategic, Operational, and Tactical Intelligence | 1m 18s
Lock icon
Gathering and Correlating Information | 2m 7s
Lock icon
Stages of Risk Management | 2m 58s
Lock icon
Risk Management Data Sources | 2m 28s
Lock icon
Vulnerability Scanning | 47s
Lock icon
False Positive | 52s
Lock icon
False Positive Audits | 38s
Lock icon
False Negatives | 43s
Lock icon
Intrusive vs. Non-intrusive | 32s
Lock icon
Passively Test Security Controls | 40s
Lock icon
Credentialed vs. Non-credentialed | 2m 22s
Lock icon
Identify Vulnerabilities and Lack of Security Controls | 1m 41s
Lock icon
Identify Common Misconfigurations | 1m 47s
Lock icon
Things to Remember | 2m 25s
Lock icon
Common Vulnerabilities and Exposures (CVE) | 3m 6s
Lock icon
CVSS | 1m 45s
Lock icon
Security Information and Event Management (SEIM) | 1m 58s
Lock icon
Security Orchestration, Automation, and Response | 1m 57s
Defining Penetration Testing
24m 3s
Lock icon
Module Intro | 35s
Lock icon
Penetration Testing | 1m 5s
Lock icon
Penetration Testing Steps | 2m 28s
Lock icon
Known, Unknown, and Partially Known Environments | 55s
Lock icon
Rules of Engagement | 1m 43s
Lock icon
Lateral Movement | 1m 17s
Lock icon
Escalation of Privilege | 40s
Lock icon
Methods of Privilege Escalation | 1m 32s
Lock icon
Persistence | 37s
Lock icon
Cleanup | 1m 16s
Lock icon
Bug Bounty | 1m 27s
Lock icon
Pivoting | 2m 6s
Lock icon
Types of Reconnaissance | 2m 32s
Lock icon
War Flying | 1m 16s
Lock icon
War Driving | 1m 19s
Lock icon
Red, Blue, Purple, and White Security Teams | 2m 9s
Lock icon
Module Review | 1m 6s
About the author
Christopher Rees
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
More Courses by Christopher R.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon