Table of contents
Getting Started
31m 51s
Lock icon
About the Course | 7m 4s
Lock icon
About the Author | 1m 57s
Lock icon
Course Requirements | 4m 52s
Lock icon
How to Get Help | 6m 13s
Lock icon
About the Exam | 11m 45s
Overview of Information Security
1h 2m 59s
Lock icon
Chapter Introduction | 2m 28s
Lock icon
Common Terms (Hack Value, Vulnerability, Exploit, Payload) | 7m 20s
Lock icon
Zero Day Attack | 6m 36s
Lock icon
Daisy Chaining | 8m 13s
Lock icon
QUIZ SOLUTION: Overview of Information Security - Questions answered and explained | 8m 22s
Lock icon
QUIZ: Overview of Information Security QUIZ: Overview of Information Security | 30m
Overview of Information Security Threats and Attacks
1h 58m 44s
Lock icon
Chapter Introduction | 46s
Lock icon
Threats vs Attacks | 2m 34s
Lock icon
Motives and Reasons Behind Cyber Security Attacks | 3m
Lock icon
What Are the Means by Which Hackers Gain Access to Systems and Networks? | 2m 39s
Lock icon
Cloud Computing Threats | 6m 37s
Lock icon
Advanced Persistent Threats | 2m 10s
Lock icon
Viruses and Worms | 3m 19s
Lock icon
Ransomware | 5m 17s
Lock icon
Mobile Threats | 3m 47s
Lock icon
Modern Age Information Warfare | 4m 42s
Lock icon
Insider Attacks | 1m 50s
Lock icon
Phishing | 2m 26s
Lock icon
Web Application Threats | 2m 32s
Lock icon
Classification of Threats: Network Threats | 2m 53s
Lock icon
Clasification of Threats: Host Threats | 2m 29s
Lock icon
Clasification of Threats: Application Threats | 3m 58s
Lock icon
Classification of Attacks | 12m 25s
Lock icon
Botnets | 3m
Lock icon
Laws, Standards, and Regulations | 12m 39s
Lock icon
QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained | 9m 41s
Lock icon
QUIZ: Information Security Threats and AttacksQUIZ: Information Security Threats and Attacks | 30m
History of Hacking
1h 26m 22s
Lock icon
A Brief Look at the History of Hacking | 12m 44s
Lock icon
Types of Hackers | 10m 6s
Lock icon
What is Ethical Hacking? What is Its Purpose? | 3m 22s
Lock icon
Scope of Ethical Hacking | 3m 57s
Lock icon
Hacking Stages: Reconnaissance | 3m 5s
Lock icon
Hacking Stages: Scanning | 2m 8s
Lock icon
Hacking Stages: Gaining Access | 43s
Lock icon
Hacking Stages: Maintaining Access | 3m 49s
Lock icon
Hacking Stages: Clearing Tracks | 3m 30s
Lock icon
QUIZ SOLUTION: History of Hacking - Questions answered and explained | 12m 58s
Lock icon
QUIZ: The History of HackingQUIZ: The History of Hacking | 30m
Protecting Information
3h 51m 39s
Lock icon
Chapter Introduction | 5m 1s
Lock icon
Information Assurance | 12m 57s
Lock icon
EISA and Information security management program | 11m 46s
Lock icon
Network Zoning | 14m 21s
Lock icon
Defense in Depth | 12m 8s
Lock icon
What Sort of Things Do Policies Regulate? | 15m 3s
Lock icon
Workplace Security Policies and Examples | 12m 3s
Lock icon
Physical Security Controls and Risk | 11m 53s
Lock icon
Risk Management | 11m 45s
Lock icon
Threat Modeling and Incident Management | 20m 15s
Lock icon
UBA - User Behavior Analytics and Network Security Controls | 8m 22s
Lock icon
Access Controls | 8m 42s
Lock icon
Identification Authentication Authorization Accounting and IAM | 11m 39s
Lock icon
Data Leakage | 9m 44s
Lock icon
Data Backup | 21m 35s
Lock icon
Data Recovery | 2m 29s
Lock icon
QUIZ SOLUTION: Protecting Information - Questions answered and explained | 11m 56s
Lock icon
QUIZ: Protecting InformationQUIZ: Protecting Information | 30m
Penetration Testing
2h 13m
Lock icon
What Is Penetration Testing? | 3m 52s
Lock icon
What Does a Good Penetration Test Consist of? | 11m 47s
Lock icon
Why Do a Penetration Test | 11m 10s
Lock icon
Pre-Attack Phase: Contracts | 2m 45s
Lock icon
Audit vs Vulnerability Assessment vs Penetration Test | 2m 23s
Lock icon
Red vs Blue Team! | 2m 53s
Lock icon
Types of Penetration Testing | 7m 32s
Lock icon
Pre-Attack Phase: Rules of Engagement | 2m 24s
Lock icon
Pre-Attack Phase: Understanding your Client's requirements | 4m
Lock icon
Pre-Attack Phase: Scope of a Penetration Test | 6m 55s
Lock icon
Pre-Attack Phase: Information Gathering | 6m 17s
Lock icon
Pre-Attack Phase: Two Types of Information Gathering | 5m 28s
Lock icon
Attack Phase | 1m 36s
Lock icon
Attack Phase: Penetrating the Perimeter | 4m 28s
Lock icon
Attack Phase: Target Acquisition | 3m 4s
Lock icon
Attack Phase: Privilege Escalation | 3m 14s
Lock icon
Attack Phase: Execute, Implant, Retract | 3m 42s
Lock icon
Post-Attack Phase | 2m 9s
Lock icon
Security Testing Methodologies | 7m 8s
Lock icon
QUIZ SOLUTION: Penetration Testing - Questions answered and explained | 10m 13s
Lock icon
QUIZ: Penetration TestingQUIZ: Penetration Testing | 30m
Footprinting Process
3h 45m 14s
Lock icon
About Footprinting | 2m 58s
Lock icon
Hacker State of Mind | 5m 26s
Lock icon
Search Engine and Online Resources | 17m 56s
Lock icon
Whois GeoIpLocation and DNS Interogation | 14m 41s
Lock icon
Email Header Analysis | 16m 14s
Lock icon
Getting an IP Address from an Email and More | 16m 42s
Lock icon
Quick Look at a Website Certificate, Source Code and Traffic | 14m 59s
Lock icon
How to Clone a Website and Extract Metadata from Files | 18m 27s
Lock icon
Nmap and Traceroute | 19m 11s
Lock icon
QUIZ SOLUTION: Footprinting - Questions answered and explained | 8m 40s
Lock icon
QUIZ: FootprintingQUIZ: Footprinting | 30m
Lock icon
Extract Data from a FileExtract Data from a File | 30m
Lock icon
Phishing Emails and GeoIP LookupPhishing Emails and GeoIP Lookup | 30m
Reports and Countermeasures
54m 35s
Lock icon
Countermeasures and Best Practices | 11m 41s
Lock icon
What Goes into a Footprinting Report? | 5m 15s
Lock icon
QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained | 7m 39s
Lock icon
QUIZ: Reports and CountermeasuresQUIZ: Reports and Countermeasures | 30m
Network Scanning Techniques
1h 18m 41s
Lock icon
Banner Grabbing | 6m 30s
Lock icon
Drawing and Mapping Out Network Topologies | 9m 18s
Lock icon
Scanning for Vulnerabilities | 15m 15s
Lock icon
Enumeration | 8m 8s
Lock icon
QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained | 9m 30s
Lock icon
QUIZ: Network Scanning TechniquesQUIZ: Network Scanning Techniques | 30m
Password Cracking Techniques
2h 9m 15s
Lock icon
Password Cracking, Crunch, and Some Basics | 17m 7s
Lock icon
Using Hydra for online password cracking | 17m 23s
Lock icon
Hashcat: Environment Setup | 16m 59s
Lock icon
HashCat: Installation | 7m 52s
Lock icon
HashCat: Let Us Crack Some Passwords! | 17m 8s
Lock icon
HashCat: Results and Recap | 11m 37s
Lock icon
QUIZ SOLUTION: Password Cracking Techniques - Questions answered and explained | 11m 9s
Lock icon
QUIZ: Password Cracking Techniques QUIZ: Password Cracking Techniques | 30m
Techniques for Creating and Maintaining Access to the Remote System
1h 38m 9s
Lock icon
Reverse Shell and Remote Service Exploitation | 16m 17s
Lock icon
Keylogger Intro and Environment Setup | 11m
Lock icon
Keylogger Source Code Download and Import | 4m 43s
Lock icon
Keylogger Configuration | 7m 14s
Lock icon
Keylogger Demo | 12m 7s
Lock icon
Decrypting Keylogger Logs | 8m 41s
Lock icon
QUIZ SOLUTION: Persistent Remote Access - Questions Answered and Explained | 8m 7s
Lock icon
QUIZ: Persistent Remote AccessQUIZ: Persistent Remote Access | 30m
Hiding Malicious Programs
1h 46m 11s
Lock icon
SandBox | 15m 40s
Lock icon
How to Create a Safe Sandbox Environment | 13m 17s
Lock icon
Anti-Malware Software Overview | 10m 25s
Lock icon
Packing Malware | 11m 6s
Lock icon
Rootkits | 7m 27s
Lock icon
Hiding Files and Steganography | 12m 48s
Lock icon
QUIZ SOLUTION: Hiding Malicious Programs - Questions Answered and Explained | 5m 28s
Lock icon
QUIZ: Hiding Malicious ProgramsQUIZ: Hiding Malicious Programs | 30m
Covering Tracks and Destroying Evidence
1h 25m 33s
Lock icon
Log Files: Covering Your Tracks | 15m 50s
Lock icon
QUIZ SOLUTION: Covering Tracks and Destroying Evidence - Questions Answered and Explained | 9m 43s
Lock icon
QUIZ: Covering Tracks and Destroying Evidence QUIZ: Covering Tracks and Destroying Evidence | 30m
Lock icon
Examine Log Files and Remove Traces of Your PresenceExamine Log Files and Remove Traces of Your Presence | 30m
Spoofing Techniques
1h 20m 44s
Lock icon
ARP Spoofing | 16m 38s
Lock icon
MAC Address Spoofing | 12m 27s
Lock icon
DHCP Starvation | 6m 24s
Lock icon
QUIZ SOLUTION: Sniffing Techniques - Questions Answered and Explained | 15m 15s
Lock icon
QUIZ: Sniffing TechniquesQUIZ: Sniffing Techniques | 30m
Attacking and Exploiting Wireless Networks
1h 12m 30s
Lock icon
Capturing the WPA2 Handshake | 15m 41s
Lock icon
Cracking WPA2 Passkey | 15m 53s
Lock icon
QUIZ SOLUTION: Wireless Networks - Questions Answered and Explained | 10m 56s
Lock icon
QUIZ: Wireless NetworksQUIZ: Wireless Networks | 30m
Tip, Tricks and Real Life Scenarios
1h 8m 5s
Lock icon
Social Engineering | 17m 21s
Lock icon
Well Known Social Engineering Attacks: A Retrospective | 11m 44s
Lock icon
QUIZ SOLUTION: Social Engineering - Questions Answered and Explained | 9m
Lock icon
QUIZ: Social Engineering QUIZ: Social Engineering | 30m
Firewalls
1h 14m 32s
Lock icon
What Is a Firewall? How Does It Work? | 8m 38s
Lock icon
Firewall Usage, Logging, and Configuration | 10m 29s
Lock icon
Evading Firewall GeoIpBock | 17m 22s
Lock icon
QUIZ SOLUTION: Firewalls - Questions answered and explained | 8m 3s
Lock icon
QUIZ: FirewallsQUIZ: Firewalls | 30m
Honeypots
1h 5m 32s
Lock icon
How to Set Up a Honeypot | 13m 56s
Lock icon
How to grab traffic from a Honeypot | 14m 14s
Lock icon
QUIZ SOLUTION: Honeypots - Questions Answered and Explained | 7m 22s
Lock icon
QUIZ: HoneypotsQUIZ: Honeypots | 30m
Let's Attack Web Servers and Web Applications!
1h 10m 33s
Lock icon
OWASP - Open Web Application Security Project | 4m 46s
Lock icon
XSS Cross Site Scripting | 12m 21s
Lock icon
SQL Injections | 15m 54s
Lock icon
QUIZ SOLUTION: Attacking Web Servers and Web Applications - Questions Answered and Explained | 7m 32s
Lock icon
QUIZ: Attacking Web Servers and Web ApplicationsQUIZ: Attacking Web Servers and Web Applications | 30m
About Cryptography
25m 54s
Lock icon
Cryptography Basics | 8m 40s
Lock icon
Cryptography Common Algorithms and Message Digest | 9m 19s
Lock icon
PKI Public Key Infrastructure | 7m 55s
Encryption, Decryption, Cryptanalysis and Attack Vectors
1h 58m 25s
Lock icon
Cryptanalysis and Attack Vectors | 11m 3s
Lock icon
Checksum and File Encryption | 12m 50s
Lock icon
SSH RSA Demo | 13m 49s
Lock icon
Storage Medium Encryption | 12m 32s
Lock icon
QUIZ SOLUTION: Cryptography - Questions Answered and Explained | 8m 11s
Lock icon
QUIZ: Cryptography QUIZ: Cryptography | 30m
Lock icon
Encrypting Storage DevicesEncrypting Storage Devices | 30m
Final
2h 5m 14s
Lock icon
Final Practice Exam | 5m 14s
Lock icon
Certified Ethical Hacker (CEH) Practice ExamCertified Ethical Hacker (CEH) Practice Exam | 2h 0m
Final SOLUTIONS
1h 11m 50s
Lock icon
Final Practice Exam Question and Answer overview part 1 | 21m 4s
Lock icon
Final Practice exam Question and Answer overview part 2 | 12m 37s
Lock icon
Final Practice exam Question and Answer overview part 3 | 19m 49s
Lock icon
Final Practice exam Question and Answer overview part 4 | 18m 20s
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon