Total Training Duration 15.5 Hours
Course 01 - Advanced Ethical Hacking
Duration:6.5 hrs
Video Lessons : 101 tutorials
Video Lessons : 101 tutorials
Introduction
Welcome(01:10)
What This Course Will Cover(02:17)
System Requirements(03:20)
Prerequisites(02:54)
Dradis: Results Tracking
Acquiring Dradis(04:24)
Installing Dradis(02:32)
Using Dradis(04:02)
Adding Notes(02:50)
Categorizing Information(04:10)
Welcome(01:10)
What This Course Will Cover(02:17)
System Requirements(03:20)
Prerequisites(02:54)
Dradis: Results Tracking
Acquiring Dradis(04:24)
Installing Dradis(02:32)
Using Dradis(04:02)
Adding Notes(02:50)
Categorizing Information(04:10)
Nmap
Review of Scan Types(04:36)
Advanced Scanning(05:14)
Scripting Engine(05:03)
Investigating Scan Types with Wireshark(05:33)
Importing Results to Dradis(03:18)
Review of Scan Types(04:36)
Advanced Scanning(05:14)
Scripting Engine(05:03)
Investigating Scan Types with Wireshark(05:33)
Importing Results to Dradis(03:18)
Nessus
Acquiring Nessus(02:23)
Setting Up Nessus(04:02)
Configuring Nessus(04:30)
Scan Details: Network(04:13)
Scan Details: Credentials / Plugins / Options(04:25)
Scan Details: Web Applications(05:54)
Starting a Scan(03:45)
Reviewing Results(04:49)
False Positives(03:27)
Setting Up Jobs(02:49)
Acquiring Nessus(02:23)
Setting Up Nessus(04:02)
Configuring Nessus(04:30)
Scan Details: Network(04:13)
Scan Details: Credentials / Plugins / Options(04:25)
Scan Details: Web Applications(05:54)
Starting a Scan(03:45)
Reviewing Results(04:49)
False Positives(03:27)
Setting Up Jobs(02:49)
Nexpose
Acquiring Nexpose(03:02)
Setting Up Nexpose(02:13)
Configuring Nexpose(04:22)
Adding Hosts to Nexpose(03:29)
Reviewing Results & Manual Checks(03:30)
Manual Testing
Netcat(04:23)
Protocol Checking(07:52)
SSL_Client(04:48)T
SSLScan(04:37)T
Nikto(05:00)T
Snmpwalk(04:00)T
Acquiring Nexpose(03:02)
Setting Up Nexpose(02:13)
Configuring Nexpose(04:22)
Adding Hosts to Nexpose(03:29)
Reviewing Results & Manual Checks(03:30)
Manual Testing
Netcat(04:23)
Protocol Checking(07:52)
SSL_Client(04:48)T
SSLScan(04:37)T
Nikto(05:00)T
Snmpwalk(04:00)T
Metasploit
Acquiring Metasploit(02:32)T
Setting Up Metasploit(02:01)T
Metasploit Web Interface(03:26)T
Configuring Workspaces(02:44)T
Running Nmap from Metasploit(03:34)T
Importing Nessus Results(02:43)T
Scanning with Metasploit(03:51)T
Looking at Vulnerabilities(02:48)T
Searching for Vulnerabilities(02:09)T
Running Exploits(02:33)T
Post Exploitation Data Gathering(04:08)T
Pivoting & Tunneling(03:19)T
Writing an MSF Plugin(06:11)T
Writing Fuzzers(06:18)T
Social Engineering Toolkit(02:06)T
Spear Phishing(05:53)T
Simple Web Application Testing
Browser Plugins with Chrome(04:21)T
Browser Plugins with Firefox(03:49)T
Tamperdata(04:36)T
Performing Injections with Tamperdata(02:43)T
Cookie Data with Tamperdata(05:55)T
SQL Inject Me(03:26)T XSS Me(03:25)T
Firebug(04:30)T Hackbar(04:00)T
Wappalyzer(03:47)T Passiverecon(04:05)T
Groundspeed(03:54)T
Acquiring Metasploit(02:32)T
Setting Up Metasploit(02:01)T
Metasploit Web Interface(03:26)T
Configuring Workspaces(02:44)T
Running Nmap from Metasploit(03:34)T
Importing Nessus Results(02:43)T
Scanning with Metasploit(03:51)T
Looking at Vulnerabilities(02:48)T
Searching for Vulnerabilities(02:09)T
Running Exploits(02:33)T
Post Exploitation Data Gathering(04:08)T
Pivoting & Tunneling(03:19)T
Writing an MSF Plugin(06:11)T
Writing Fuzzers(06:18)T
Social Engineering Toolkit(02:06)T
Spear Phishing(05:53)T
Simple Web Application Testing
Browser Plugins with Chrome(04:21)T
Browser Plugins with Firefox(03:49)T
Tamperdata(04:36)T
Performing Injections with Tamperdata(02:43)T
Cookie Data with Tamperdata(05:55)T
SQL Inject Me(03:26)T XSS Me(03:25)T
Firebug(04:30)T Hackbar(04:00)T
Wappalyzer(03:47)T Passiverecon(04:05)T
Groundspeed(03:54)T
Webgoat
Acquiring Webgoat(02:50)T
Practicing Web Application Attacks(02:33)T
Basics of Webgoat(03:04)T
Working Through Lessons(04:27)T
Burpsuite
Acquiring Burpsuite(01:32)T
Installing Burpsuite(01:57)T
Running Burpsuite & Configuring Your Browser(02:49)T
Spidering(03:16)T
Passive Scanning(03:10)T
Active Scanning(03:20)T
Investigating Results(06:32)T
Password Attacks(05:20)T
Fuzzing Attacks(06:40)T
Doing Sequencing(04:34)T
Using the Intruder(05:55)T
Acquiring Webgoat(02:50)T
Practicing Web Application Attacks(02:33)T
Basics of Webgoat(03:04)T
Working Through Lessons(04:27)T
Burpsuite
Acquiring Burpsuite(01:32)T
Installing Burpsuite(01:57)T
Running Burpsuite & Configuring Your Browser(02:49)T
Spidering(03:16)T
Passive Scanning(03:10)T
Active Scanning(03:20)T
Investigating Results(06:32)T
Password Attacks(05:20)T
Fuzzing Attacks(06:40)T
Doing Sequencing(04:34)T
Using the Intruder(05:55)T
Other Web
Acquiring W3Af(02:17)T
Installing W3Af(02:11)T
Running W3Af(02:48)T
Configuring W3Af(04:28)T
Acquiring & Configuring Zed Attack Proxy (ZAP)(02:49)T
Quick Start with ZAP(02:50)T
Scanning with ZAP(03:06)T
Spidering with ZAP(02:39)T
Fuzzing With ZAP(03:30)T
Acquiring W3Af(02:17)T
Installing W3Af(02:11)T
Running W3Af(02:48)T
Configuring W3Af(04:28)T
Acquiring & Configuring Zed Attack Proxy (ZAP)(02:49)T
Quick Start with ZAP(02:50)T
Scanning with ZAP(03:06)T
Spidering with ZAP(02:39)T
Fuzzing With ZAP(03:30)T
Injection
Web Architecture(03:15)T
Basics of SQL Injection(04:46)T
Manual Testing(03:48)T
SQLMap(06:04)T
Command Injection(03:24)T
Cross Site Scripting(03:49)T
Web Architecture(03:15)T
Basics of SQL Injection(04:46)T
Manual Testing(03:48)T
SQLMap(06:04)T
Command Injection(03:24)T
Cross Site Scripting(03:49)T
Social Engineering
Spear Phishing(03:53)T
Cross Site Request Forgery(04:12)T
Rogue Servers(04:15)T
Spoofed Certificates(06:05)T
Conclusion
Course Wrap Up(02:19)T
Course 01 -Wireless Hacking and Security Course
Duration : 9 hrs
Video Lessons : 104
Welcome(01:44)
Course Outline(05:12)TT
Overview of Wireless Networking
Wireless Terminology(04:16)TT
Wireless Basics(04:09)TT
Wireless Hardware(04:28)TT
Wireless Transmission Methods(03:14)TT
802.11 Standards pt. 1(04:40)TT
802.11 Standards pt. 2(04:17)TT
Other Standards(02:42)TT
Wireless Topologies(04:47)TT
Spear Phishing(03:53)T
Cross Site Request Forgery(04:12)T
Rogue Servers(04:15)T
Spoofed Certificates(06:05)T
Conclusion
Course Wrap Up(02:19)T
Course 01 -Wireless Hacking and Security Course
Duration : 9 hrs
Video Lessons : 104
Welcome(01:44)
Course Outline(05:12)TT
Overview of Wireless Networking
Wireless Terminology(04:16)TT
Wireless Basics(04:09)TT
Wireless Hardware(04:28)TT
Wireless Transmission Methods(03:14)TT
802.11 Standards pt. 1(04:40)TT
802.11 Standards pt. 2(04:17)TT
Other Standards(02:42)TT
Wireless Topologies(04:47)TT
Wireless Security Basics
Wireless vs Wired Networks(02:51)TT
Wireless Security Issues(03:38)TT
Encryption(03:14)TT Authentication(05:41)TT
SSID Broadcasting(04:37)TT
MAC Address Filtering(05:34)TT
Wireless vs Wired Networks(02:51)TT
Wireless Security Issues(03:38)TT
Encryption(03:14)TT Authentication(05:41)TT
SSID Broadcasting(04:37)TT
MAC Address Filtering(05:34)TT
Wireless Security Protocols
WEP(05:53)T
WPA(03:52)T
WPA2(04:21)T
802.1x(04:10)T
EAP(04:53)T
WAP(05:03)T
Authentication Methods(05:28)T
Securing Desktop Clients
General Client Security(06:47)T
Legacy Clients(04:58)T
Securing Windows 7 and 8(06:31)T
Securing a Linux Client(06:02)T
Physical Security(06:45)T
Security Policies and Enforcement(06:27)T
WEP(05:53)T
WPA(03:52)T
WPA2(04:21)T
802.1x(04:10)T
EAP(04:53)T
WAP(05:03)T
Authentication Methods(05:28)T
Securing Desktop Clients
General Client Security(06:47)T
Legacy Clients(04:58)T
Securing Windows 7 and 8(06:31)T
Securing a Linux Client(06:02)T
Physical Security(06:45)T
Security Policies and Enforcement(06:27)T
Wireless Access Points
Securing WAPs pt. 1(04:01)T
Securing WAPs pt. 2(05:18)T
Securing WAP Traffic pt. 1(06:52)T
Securing WAP Traffic pt. 2(06:01)T
Securing Client Access(04:52)T
AP Physical Security(05:28)T
Securing WAPs pt. 1(04:01)T
Securing WAPs pt. 2(05:18)T
Securing WAP Traffic pt. 1(06:52)T
Securing WAP Traffic pt. 2(06:01)T
Securing Client Access(04:52)T
AP Physical Security(05:28)T
Mobile Wireless
Securing Smartphones(07:05)T
Securing Tablets(03:52)T
WiMAX(05:42)T
ZigBee(05:53)T
RFID(04:13)TSecuring
Securing Smartphones(07:05)T
Securing Tablets(03:52)T
WiMAX(05:42)T
ZigBee(05:53)T
RFID(04:13)TSecuring
Bluetooth
Overview of Bluetooth(04:27)T
Bluetooth Weaknesses(03:45)T
Bluetooth Security Features(05:19)T
Bluetooth Attacks(03:48)T
Bluetooth Attack Tools(05:24)T
Securing Bluetooth(03:49)T
Overview of Bluetooth(04:27)T
Bluetooth Weaknesses(03:45)T
Bluetooth Security Features(05:19)T
Bluetooth Attacks(03:48)T
Bluetooth Attack Tools(05:24)T
Securing Bluetooth(03:49)T
Hacking Basics
Intro to Penetration Testing(05:29)T
Wardriving and Warchalking(04:41)T
Methodology(06:15)T Goals(06:14)T
Planning the Test(06:41)T
Conducting the Test(05:54)T
Professional Conduct(06:15)T
Intro to Penetration Testing(05:29)T
Wardriving and Warchalking(04:41)T
Methodology(06:15)T Goals(06:14)T
Planning the Test(06:41)T
Conducting the Test(05:54)T
Professional Conduct(06:15)T
Wireless Security Tools
Intro to Security Tools(04:54)T
Hardware(06:19)T
Pen Testing Platforms(06:16)T
Backtrack Toolset(05:41)T
Kismet(04:21)T
Aircrack-ng(06:25)T
Gerix(05:58)T Wireshark(06:14)T
Net Stumbler(04:16)T
Modern Windows Tools(06:24)T
Other Tools(04:51)T
Intro to Security Tools(04:54)T
Hardware(06:19)T
Pen Testing Platforms(06:16)T
Backtrack Toolset(05:41)T
Kismet(04:21)T
Aircrack-ng(06:25)T
Gerix(05:58)T Wireshark(06:14)T
Net Stumbler(04:16)T
Modern Windows Tools(06:24)T
Other Tools(04:51)T
Wireless Security Testing
Section One
Setting Up Hardware(06:54)T
Verifying Hardware(05:08)T
Monitor Mode pt. 1(04:19)T
Monitor Mode pt. 2(03:54)T
Scanning(05:30)T
Capturing Traffic pt. 1(06:00)T
Capturing Traffic pt. 2(04:46)T
Viewing Traffic Captures pt. 1(05:05)T
Viewing Traffic Captures pt. 2(06:59)T
Wireless Security Testing
Setting Up Hardware(06:54)T
Verifying Hardware(05:08)T
Monitor Mode pt. 1(04:19)T
Monitor Mode pt. 2(03:54)T
Scanning(05:30)T
Capturing Traffic pt. 1(06:00)T
Capturing Traffic pt. 2(04:46)T
Viewing Traffic Captures pt. 1(05:05)T
Viewing Traffic Captures pt. 2(06:59)T
Wireless Security Testing
Section Two
WEP Attacks(03:15)T
Aireplay-ng Attacks(06:00)T
Fake Authentication(04:33)T
Deauthentication Attacks(05:50)T
ARP Replay Attacks(05:22)T
Cracking WEP pt. 1(04:58)T
Cracking WEP pt. 2(05:46)T
Wireless Security Testing
Section Three
WPA Attacks(02:41)T
Cracking WPA pt. 1(02:30)T
Cracking WPA pt. 2(03:38)T
Rogue APs(06:06)T
Detecting Rogue APs(04:11)T
Attacking Past Wireless(06:24)T
WEP Attacks(03:15)T
Aireplay-ng Attacks(06:00)T
Fake Authentication(04:33)T
Deauthentication Attacks(05:50)T
ARP Replay Attacks(05:22)T
Cracking WEP pt. 1(04:58)T
Cracking WEP pt. 2(05:46)T
Wireless Security Testing
Section Three
WPA Attacks(02:41)T
Cracking WPA pt. 1(02:30)T
Cracking WPA pt. 2(03:38)T
Rogue APs(06:06)T
Detecting Rogue APs(04:11)T
Attacking Past Wireless(06:24)T
Legal Issues
Intro to Legal Issues(03:49)T
Laws and Regulations pt. 1(06:22)T
Laws and Regulations pt. 2(06:19)T
Laws and Regulations pt. 3(06:30)T
Liability(06:31)T
Wireless Security
Intro to Legal Issues(03:49)T
Laws and Regulations pt. 1(06:22)T
Laws and Regulations pt. 2(06:19)T
Laws and Regulations pt. 3(06:30)T
Liability(06:31)T
Wireless Security
Best Practices
Wireless Security Standards(05:27)T
Designing the Network(06:10)T
Configuring Wireless Clients(05:28)T
Configuring Access Points(05:45)T
Securing Users(05:05)T
Connecting Different Networks(05:53)T
Corporate Policies(04:58)T
Security Testing(05:23)T
Wireless Security Standards(05:27)T
Designing the Network(06:10)T
Configuring Wireless Clients(05:28)T
Configuring Access Points(05:45)T
Securing Users(05:05)T
Connecting Different Networks(05:53)T
Corporate Policies(04:58)T
Security Testing(05:23)T
Conclusion
Resources(03:26)T
Wireless Tools(07:13)T
Certifications(03:44)T
Course Wrap Up(03:13)T
Resources(03:26)T
Wireless Tools(07:13)T
Certifications(03:44)T
Course Wrap Up(03:13)T
======================================================================
This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV
This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV
======================================================================
No comments:
Post a Comment