Table of contents
Getting Started
31m 48s
Lock icon
About the Course | 7m 3s
Lock icon
About the Author | 1m 56s
Lock icon
Course Requirements | 4m 52s
Lock icon
How to Get Help | 6m 12s
Lock icon
About the Exam | 11m 45s
Overview of Information Security
32m 55s
Lock icon
Chapter Introduction | 2m 27s
Lock icon
Common Terms (Hack Value, Vulnerability, Exploit, Payload) | 7m 19s
Lock icon
Zero Day Attack | 6m 36s
Lock icon
Daisy Chaining | 8m 12s
Lock icon
QUIZ SOLUTION: Overview of Information Security - Questions answered and explained | 8m 21s
Lock icon
QUIZ: Overview of Information Security
Overview of Information Security Threats and Attacks
1h 28m 30s
Lock icon
Chapter Introduction | 45s
Lock icon
Threats vs Attacks | 2m 33s
Lock icon
Motives and Reasons Behind Cyber Security Attacks | 3m
Lock icon
What Are the Means by Which Hackers Gain Access to Systems and Networks? | 2m 38s
Lock icon
Cloud Computing Threats | 6m 37s
Lock icon
Advanced Persistent Threats | 2m 9s
Lock icon
Viruses and Worms | 3m 19s
Lock icon
Ransomware | 5m 17s
Lock icon
Mobile Threats | 3m 46s
Lock icon
Modern Age Information Warfare | 4m 41s
Lock icon
Insider Attacks | 1m 49s
Lock icon
Phishing | 2m 25s
Lock icon
Web Application Threats | 2m 31s
Lock icon
Classification of Threats: Network Threats | 2m 53s
Lock icon
Clasification of Threats: Host Threats | 2m 28s
Lock icon
Clasification of Threats: Application Threats | 3m 57s
Lock icon
Classification of Attacks | 12m 24s
Lock icon
Botnets | 3m
Lock icon
Laws, Standards, and Regulations | 12m 38s
Lock icon
QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained | 9m 40s
Lock icon
QUIZ: Information Security Threats and Attacks
History of Hacking
56m 16s
Lock icon
A Brief Look at the History of Hacking | 12m 43s
Lock icon
Types of Hackers | 10m 6s
Lock icon
What is Ethical Hacking? What is Its Purpose? | 3m 21s
Lock icon
Scope of Ethical Hacking | 3m 56s
Lock icon
Hacking Stages: Reconnaissance | 3m 5s
Lock icon
Hacking Stages: Scanning | 2m 7s
Lock icon
Hacking Stages: Gaining Access | 42s
Lock icon
Hacking Stages: Maintaining Access | 3m 48s
Lock icon
Hacking Stages: Clearing Tracks | 3m 30s
Lock icon
QUIZ SOLUTION: History of Hacking - Questions answered and explained | 12m 58s
Lock icon
QUIZ: The History of Hacking
Protecting Information
3h 21m 32s
Lock icon
Chapter Introduction | 5m
Lock icon
Information Assurance | 12m 57s
Lock icon
EISA and Information security management program | 11m 45s
Lock icon
Network Zoning | 14m 21s
Lock icon
Defense in Depth | 12m 7s
Lock icon
What Sort of Things Do Policies Regulate? | 15m 3s
Lock icon
Workplace Security Policies and Examples | 12m 3s
Lock icon
Physical Security Controls and Risk | 11m 52s
Lock icon
Risk Management | 11m 44s
Lock icon
Threat Modeling and Incident Management | 20m 15s
Lock icon
UBA - User Behavior Analytics and Network Security Controls | 8m 22s
Lock icon
Access Controls | 8m 41s
Lock icon
Identification Authentication Authorization Accounting and IAM | 11m 39s
Lock icon
Data Leakage | 9m 44s
Lock icon
Data Backup | 21m 34s
Lock icon
Data Recovery | 2m 29s
Lock icon
QUIZ SOLUTION: Protecting Information - Questions answered and explained | 11m 56s
Lock icon
QUIZ: Protecting Information
Penetration Testing
1h 42m 49s
Lock icon
What Is Penetration Testing? | 3m 51s
Lock icon
What Does a Good Penetration Test Consist of? | 11m 46s
Lock icon
Why Do a Penetration Test | 11m 9s
Lock icon
Pre-Attack Phase: Contracts | 2m 45s
Lock icon
Audit vs Vulnerability Assessment vs Penetration Test | 2m 22s
Lock icon
Red vs Blue Team! | 2m 53s
Lock icon
Types of Penetration Testing | 7m 32s
Lock icon
Pre-Attack Phase: Rules of Engagement | 2m 24s
Lock icon
Pre-Attack Phase: Understanding your Client's requirements | 3m 59s
Lock icon
Pre-Attack Phase: Scope of a Penetration Test | 6m 55s
Lock icon
Pre-Attack Phase: Information Gathering | 6m 17s
Lock icon
Pre-Attack Phase: Two Types of Information Gathering | 5m 27s
Lock icon
Attack Phase | 1m 36s
Lock icon
Attack Phase: Penetrating the Perimeter | 4m 27s
Lock icon
Attack Phase: Target Acquisition | 3m 3s
Lock icon
Attack Phase: Privilege Escalation | 3m 14s
Lock icon
Attack Phase: Execute, Implant, Retract | 3m 42s
Lock icon
Post-Attack Phase | 2m 8s
Lock icon
Security Testing Methodologies | 7m 7s
Lock icon
QUIZ SOLUTION: Penetration Testing - Questions answered and explained | 10m 12s
Lock icon
QUIZ: Penetration Testing
Footprinting Process
3h 15m 8s
Lock icon
About Footprinting | 2m 57s
Lock icon
Hacker State of Mind | 5m 25s
Lock icon
Search Engine and Online Resources | 17m 55s
Lock icon
Whois GeoIpLocation and DNS Interogation | 14m 40s
Lock icon
Email Header Analysis | 16m 14s
Lock icon
Getting an IP Address from an Email and More | 16m 42s
Lock icon
Quick Look at a Website Certificate, Source Code and Traffic | 14m 59s
Lock icon
How to Clone a Website and Extract Metadata from Files | 18m 26s
Lock icon
Nmap and Traceroute | 19m 11s
Lock icon
QUIZ SOLUTION: Footprinting - Questions answered and explained | 8m 39s
Lock icon
QUIZ: Footprinting
Lock icon
Extract Data from a File | 30m
Lock icon
Phishing Emails and GeoIP Lookup | 30m
Reports and Countermeasures
24m 32s
Lock icon
Countermeasures and Best Practices | 11m 40s
Lock icon
What Goes into a Footprinting Report? | 5m 14s
Lock icon
QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained | 7m 38s
Lock icon
QUIZ: Reports and Countermeasures
Network Scanning Techniques
48m 40s
Lock icon
Banner Grabbing | 6m 30s
Lock icon
Drawing and Mapping Out Network Topologies | 9m 17s
Lock icon
Scanning for Vulnerabilities | 15m 15s
Lock icon
Enumeration | 8m 8s
Lock icon
QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained | 9m 30s
Lock icon
QUIZ: Network Scanning Techniques
Password Cracking Techniques
1h 39m 13s
Lock icon
Password Cracking, Crunch, and Some Basics | 17m 7s
Lock icon
Using Hydra for online password cracking | 17m 23s
Lock icon
Hashcat: Environment Setup | 16m 58s
Lock icon
HashCat: Installation | 7m 51s
Lock icon
HashCat: Let Us Crack Some Passwords! | 17m 8s
Lock icon
HashCat: Results and Recap | 11m 37s
Lock icon
QUIZ SOLUTION: Password Cracking Techniques - Questions answered and explained | 11m 9s
Lock icon
QUIZ: Password Cracking Techniques
Techniques for Creating and Maintaining Access to the Remote System
1h 8m 5s
Lock icon
Reverse Shell and Remote Service Exploitation | 16m 16s
Lock icon
Keylogger Intro and Environment Setup | 10m 59s
Lock icon
Keylogger Source Code Download and Import | 4m 42s
Lock icon
Keylogger Configuration | 7m 14s
Lock icon
Keylogger Demo | 12m 6s
Lock icon
Decrypting Keylogger Logs | 8m 41s
Lock icon
QUIZ SOLUTION: Persistent Remote Access - Questions Answered and Explained | 8m 7s
Lock icon
QUIZ: Persistent Remote Access
Hiding Malicious Programs
1h 16m 7s
Lock icon
SandBox | 15m 39s
Lock icon
How to Create a Safe Sandbox Environment | 13m 16s
Lock icon
Anti-Malware Software Overview | 10m 25s
Lock icon
Packing Malware | 11m 5s
Lock icon
Rootkits | 7m 27s
Lock icon
Hiding Files and Steganography | 12m 48s
Lock icon
QUIZ SOLUTION: Hiding Malicious Programs - Questions Answered and Explained | 5m 27s
Lock icon
QUIZ: Hiding Malicious Programs
Covering Tracks and Destroying Evidence
55m 31s
Lock icon
Log Files: Covering Your Tracks | 15m 49s
Lock icon
QUIZ SOLUTION: Covering Tracks and Destroying Evidence - Questions Answered and Explained | 9m 42s
Lock icon
QUIZ: Covering Tracks and Destroying Evidence
Lock icon
Examine Log Files and Remove Traces of Your Presence | 30m
Spoofing Techniques
50m 42s
Lock icon
ARP Spoofing | 16m 37s
Lock icon
MAC Address Spoofing | 12m 27s
Lock icon
DHCP Starvation | 6m 24s
Lock icon
QUIZ SOLUTION: Sniffing Techniques - Questions Answered and Explained | 15m 14s
Lock icon
QUIZ: Sniffing Techniques
Attacking and Exploiting Wireless Networks
42m 28s
Lock icon
Capturing the WPA2 Handshake | 15m 41s
Lock icon
Cracking WPA2 Passkey | 15m 52s
Lock icon
QUIZ SOLUTION: Wireless Networks - Questions Answered and Explained | 10m 55s
Lock icon
QUIZ: Wireless Networks
Tip, Tricks and Real Life Scenarios
38m 4s
Lock icon
Social Engineering | 17m 20s
Lock icon
Well Known Social Engineering Attacks: A Retrospective | 11m 44s
Lock icon
QUIZ SOLUTION: Social Engineering - Questions Answered and Explained | 9m
Lock icon
QUIZ: Social Engineering
Firewalls
44m 31s
Lock icon
What Is a Firewall? How Does It Work? | 8m 38s
Lock icon
Firewall Usage, Logging, and Configuration | 10m 29s
Lock icon
Evading Firewall GeoIpBock | 17m 22s
Lock icon
QUIZ SOLUTION: Firewalls - Questions answered and explained | 8m 2s
Lock icon
QUIZ: Firewalls
Honeypots
35m 29s
Lock icon
How to Set Up a Honeypot | 13m 55s
Lock icon
How to grab traffic from a Honeypot | 14m 13s
Lock icon
QUIZ SOLUTION: Honeypots - Questions Answered and Explained | 7m 21s
Lock icon
QUIZ: Honeypots
Let's Attack Web Servers and Web Applications!
40m 30s
Lock icon
OWASP - Open Web Application Security Project | 4m 45s
Lock icon
XSS Cross Site Scripting | 12m 20s
Lock icon
SQL Injections | 15m 54s
Lock icon
QUIZ SOLUTION: Attacking Web Servers and Web Applications - Questions Answered and Explained | 7m 31s
Lock icon
QUIZ: Attacking Web Servers and Web Applications
About Cryptography
25m 53s
Lock icon
Cryptography Basics | 8m 40s
Lock icon
Cryptography Common Algorithms and Message Digest | 9m 19s
Lock icon
PKI Public Key Infrastructure | 7m 54s
Encryption, Decryption, Cryptanalysis and Attack Vectors
1h 28m 23s
Lock icon
Cryptanalysis and Attack Vectors | 11m 2s
Lock icon
Checksum and File Encryption | 12m 49s
Lock icon
SSH RSA Demo | 13m 49s
Lock icon
Storage Medium Encryption | 12m 32s
Lock icon
QUIZ SOLUTION: Cryptography - Questions Answered and Explained | 8m 11s
Lock icon
QUIZ: Cryptography
Lock icon
Encrypting Storage Devices | 30m
Final
5m 13s
Lock icon
Final Practice Exam | 5m 13s
Final SOLUTIONS
1h 11m 48s
Lock icon
Final Practice Exam Question and Answer overview part 1 | 21m 4s
Lock icon
Final Practice exam Question and Answer overview part 2 | 12m 36s
Lock icon
Final Practice exam Question and Answer overview part 3 | 19m 49s
Lock icon
Final Practice exam Question and Answer overview part 4 | 18m 19s
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon