Search This Blog

Monday, July 6, 2015

Advanced Ethical Hacking & Wireless Hacking and Security Video Training Tutorial DVD Rs 399/-



Total Training Duration 15.5 Hours

Course 01 - Advanced Ethical Hacking 

Duration:6.5 hrs 
Video Lessons : 101 tutorials


Introduction
 Welcome(01:10) 
What This Course Will Cover(02:17) 
System Requirements(03:20) 
Prerequisites(02:54)
Dradis: Results Tracking
Acquiring Dradis(04:24) 
Installing Dradis(02:32)
Using Dradis(04:02) 
Adding Notes(02:50) 
Categorizing Information(04:10)

Nmap
 Review of Scan Types(04:36)
Advanced Scanning(05:14) 
Scripting Engine(05:03) 
Investigating Scan Types with Wireshark(05:33)
Importing Results to Dradis(03:18)

Nessus
 Acquiring Nessus(02:23) 
Setting Up Nessus(04:02) 
Configuring Nessus(04:30) 
Scan Details: Network(04:13) 
Scan Details: Credentials / Plugins / Options(04:25) 
Scan Details: Web Applications(05:54) 
Starting a Scan(03:45) 
Reviewing Results(04:49) 
False Positives(03:27) 
Setting Up Jobs(02:49)

Nexpose
 Acquiring Nexpose(03:02) 
Setting Up Nexpose(02:13) 
Configuring Nexpose(04:22)
Adding Hosts to Nexpose(03:29)
Reviewing Results & Manual Checks(03:30)
Manual Testing
 Netcat(04:23) 
Protocol Checking(07:52) 
SSL_Client(04:48)T 
SSLScan(04:37)T 
Nikto(05:00)T 
Snmpwalk(04:00)T

Metasploit
 Acquiring Metasploit(02:32)T 
Setting Up Metasploit(02:01)T 
Metasploit Web Interface(03:26)T 
Configuring Workspaces(02:44)T 
Running Nmap from Metasploit(03:34)T 
Importing Nessus Results(02:43)T 
Scanning with Metasploit(03:51)T
 Looking at Vulnerabilities(02:48)T
 Searching for Vulnerabilities(02:09)T
 Running Exploits(02:33)T 
Post Exploitation Data Gathering(04:08)T 
Pivoting & Tunneling(03:19)T 
Writing an MSF Plugin(06:11)T 
Writing Fuzzers(06:18)T 
Social Engineering Toolkit(02:06)T 
Spear Phishing(05:53)T
Simple Web Application Testing
 Browser Plugins with Chrome(04:21)T 
Browser Plugins with Firefox(03:49)T 
Tamperdata(04:36)T 
Performing Injections with Tamperdata(02:43)T 
Cookie Data with Tamperdata(05:55)T 
SQL Inject Me(03:26)T XSS Me(03:25)T 
Firebug(04:30)T Hackbar(04:00)T 
Wappalyzer(03:47)T Passiverecon(04:05)T 
Groundspeed(03:54)T

Webgoat
 Acquiring Webgoat(02:50)T 
Practicing Web Application Attacks(02:33)T 
Basics of Webgoat(03:04)T 
Working Through Lessons(04:27)T
Burpsuite
 Acquiring Burpsuite(01:32)T 
Installing Burpsuite(01:57)T 
Running Burpsuite & Configuring Your Browser(02:49)T 
Spidering(03:16)T 
Passive Scanning(03:10)T 
Active Scanning(03:20)T 
Investigating Results(06:32)T 
Password Attacks(05:20)T 
Fuzzing Attacks(06:40)T 
Doing Sequencing(04:34)T 
Using the Intruder(05:55)T

Other Web 
 Acquiring W3Af(02:17)T
 Installing W3Af(02:11)T 
Running W3Af(02:48)T 
Configuring W3Af(04:28)T 
Acquiring & Configuring Zed Attack Proxy (ZAP)(02:49)T 
Quick Start with ZAP(02:50)T 
Scanning with ZAP(03:06)T 
Spidering with ZAP(02:39)T 
Fuzzing With ZAP(03:30)T

Injection
Web Architecture(03:15)T 
Basics of SQL Injection(04:46)T 
Manual Testing(03:48)T 
SQLMap(06:04)T 
Command Injection(03:24)T 
Cross Site Scripting(03:49)T

Social Engineering
 Spear Phishing(03:53)T 
Cross Site Request Forgery(04:12)T 
Rogue Servers(04:15)T 
Spoofed Certificates(06:05)T
Conclusion
 Course Wrap Up(02:19)T 

Course 01 -Wireless Hacking and Security Course

Duration : 9 hrs 
Video Lessons :  104 

 
Welcome(01:44) 
Course Outline(05:12)TT
Overview of Wireless Networking 
 Wireless Terminology(04:16)TT 
Wireless Basics(04:09)TT 
Wireless Hardware(04:28)TT 
Wireless Transmission Methods(03:14)TT 
802.11 Standards pt. 1(04:40)TT
802.11 Standards pt. 2(04:17)TT 
Other Standards(02:42)TT 
Wireless Topologies(04:47)TT

Wireless Security Basics 
 Wireless vs Wired Networks(02:51)TT 
Wireless Security Issues(03:38)TT 
Encryption(03:14)TT Authentication(05:41)TT 
SSID Broadcasting(04:37)TT 
MAC Address Filtering(05:34)TT

Wireless Security Protocols 
 WEP(05:53)T 
WPA(03:52)T 
WPA2(04:21)T 
802.1x(04:10)T 
EAP(04:53)T 
WAP(05:03)T 
Authentication Methods(05:28)T
Securing Desktop Clients 
 General Client Security(06:47)T 
Legacy Clients(04:58)T 
Securing Windows 7 and 8(06:31)T 
Securing a Linux Client(06:02)T 
Physical Security(06:45)T 
Security Policies and Enforcement(06:27)T

Wireless Access Points 
 Securing WAPs pt. 1(04:01)T 
Securing WAPs pt. 2(05:18)T 
Securing WAP Traffic pt. 1(06:52)T 
Securing WAP Traffic pt. 2(06:01)T 
Securing Client Access(04:52)T 
AP Physical Security(05:28)T

Mobile Wireless 
 Securing Smartphones(07:05)T 
Securing Tablets(03:52)T 
WiMAX(05:42)T 
ZigBee(05:53)T 
RFID(04:13)TSecuring 

Bluetooth 
 Overview of Bluetooth(04:27)T 
Bluetooth Weaknesses(03:45)T 
Bluetooth Security Features(05:19)T 
Bluetooth Attacks(03:48)T 
Bluetooth Attack Tools(05:24)T
 Securing Bluetooth(03:49)T

Hacking Basics 
 Intro to Penetration Testing(05:29)T 
Wardriving and Warchalking(04:41)T 
Methodology(06:15)T Goals(06:14)T 
Planning the Test(06:41)T 
Conducting the Test(05:54)T 
Professional Conduct(06:15)T

Wireless Security Tools 
 Intro to Security Tools(04:54)T 
Hardware(06:19)T 
Pen Testing Platforms(06:16)T 
Backtrack Toolset(05:41)T 
Kismet(04:21)T 
Aircrack-ng(06:25)T 
Gerix(05:58)T Wireshark(06:14)T 
Net Stumbler(04:16)T 
Modern Windows Tools(06:24)T 
Other Tools(04:51)T

Wireless Security Testing 

Section One
 Setting Up Hardware(06:54)T 
Verifying Hardware(05:08)T 
Monitor Mode pt. 1(04:19)T 
Monitor Mode pt. 2(03:54)T 
Scanning(05:30)T 
Capturing Traffic pt. 1(06:00)T 
Capturing Traffic pt. 2(04:46)T 
Viewing Traffic Captures pt. 1(05:05)T 
Viewing Traffic Captures pt. 2(06:59)T
Wireless Security Testing 

Section Two
 WEP Attacks(03:15)T
 Aireplay-ng Attacks(06:00)T 
Fake Authentication(04:33)T 
Deauthentication Attacks(05:50)T
 ARP Replay Attacks(05:22)T 
Cracking WEP pt. 1(04:58)T 
Cracking WEP pt. 2(05:46)T
Wireless Security Testing 
Section Three 
 WPA Attacks(02:41)T 
Cracking WPA pt. 1(02:30)T 
Cracking WPA pt. 2(03:38)T 
Rogue APs(06:06)T 
Detecting Rogue APs(04:11)T 
Attacking Past Wireless(06:24)T

Legal Issues 
 Intro to Legal Issues(03:49)T 
Laws and Regulations pt. 1(06:22)T 
Laws and Regulations pt. 2(06:19)T 
Laws and Regulations pt. 3(06:30)T 
Liability(06:31)T
Wireless Security 

Best Practices 
 Wireless Security Standards(05:27)T 
Designing the Network(06:10)T 
Configuring Wireless Clients(05:28)T 
Configuring Access Points(05:45)T 
Securing Users(05:05)T 
Connecting Different Networks(05:53)T 
Corporate Policies(04:58)T 
Security Testing(05:23)T

Conclusion 
 Resources(03:26)T 
Wireless Tools(07:13)T 
Certifications(03:44)T 
Course Wrap Up(03:13)T

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term

Shipping Banner

No comments:

Post a Comment