Section 1 : Pre-Assessment
|
Lecture 1 | About Certification |
Section 2 : Introduction to Ethical Hacking
|
Lecture 1 | Introduction to Ethical Hacking | |
|
Lecture 2 | Vulnerabilities | 00:01:34 Duration |
|
Lecture 3 | Defense-in-depth | 00:03:25 Duration |
|
Lecture 4 | Penetration Testing | 00:07:30 Duration |
|
Lecture 5 | Pentesting Demo 1 | 00:05:18 Duration |
|
Lecture 6 | Pentesting Demo 2 | 00:02:20 Duration |
|
Lecture 7 | Pentesting Demo 3 | 00:03:11 Duration |
|
Lecture 8 | Pentesting Demo 4 | 00:04:57 Duration |
|
Lecture 9 | Methodology for Penetration Testing-Ethical Hackin | 00:02:38 Duration |
|
Lecture 10 | Vulnerability Management | 00:01:15 Duration |
|
Lecture 11 | Incident Management | |
|
Lecture 12 | Security Policy | 00:01:52 Duration |
|
Lecture 13 | Conclusion | 00:00:56 Duration |
Section 3 : Disaster Recovery and Risk Management
|
Lecture 1 | Defining Risk Management | 00:02:16 Duration |
|
Lecture 2 | Strategies For Managing Risk | |
|
Lecture 3 | How to Analyze Risk | 00:10:01 Duration |
|
Lecture 4 | Risk Assessment Demo | 00:10:01 Duration |
|
Lecture 5 | DR Strategies | 00:10:01 Duration |
|
Lecture 6 | Plan Testing and Execution | 00:10:01 Duration |
|
Lecture 7 | Conclusion | 00:10:01 Duration |
Section 4 : Penetration Testing
|
Lecture 1 | Security Auditing | 00:10:01 Duration |
|
Lecture 2 | Penetration Testing Types | 00:10:01 Duration |
|
Lecture 3 | Vulnerability Assessment Demo | 00:10:01 Duration |
|
Lecture 4 | Areas of Pentest | |
|
Lecture 5 | Awareness and Compliance | 00:10:01 Duration |
|
Lecture 6 | Educating Employees | 00:10:01 Duration |
|
Lecture 7 | Conclusion | 00:10:01 Duration |
Section 5 : Vulnerability Assessment
|
Lecture 1 | Introduction | 00:10:01 Duration |
|
Lecture 2 | Testing Overview | 00:10:01 Duration |
|
Lecture 3 | Security Alerts | 00:10:01 Duration |
|
Lecture 4 | Scanners | 00:10:01 Duration |
|
Lecture 5 | Nessus Demo | 00:10:01 Duration |
|
Lecture 6 | IBM AppScan Demo | 00:10:01 Duration |
|
Lecture 7 | GFI Languard Demo | 00:10:01 Duration |
|
Lecture 8 | Analyzing the Scan Results | 00:10:01 Duration |
|
Lecture 9 | Generating Reports | 00:10:01 Duration |
|
Lecture 10 | Remediation | 00:10:01 Duration |
|
Lecture 11 | Patch Management | 00:10:01 Duration |
|
Lecture 12 | Conclusion | 00:01:04 Duration |
Section 6 : Physical Security
|
Lecture 1 | Introduction | 00:00:46 Duration |
|
Lecture 2 | Importance of Physical Security | 00:03:34 Duration |
|
Lecture 3 | Physical Security Planning | 00:04:50 Duration |
|
Lecture 4 | CPTED | 00:06:52 Duration |
|
Lecture 5 | Protecting Assets | 00:01:45 Duration |
|
Lecture 6 | Introduction | 00:02:38 Duration |
|
Lecture 7 | Power Supply and Protection | 00:02:38 Duration |
|
Lecture 8 | Environment Control | 00:06:43 Duration |
|
Lecture 9 | Fire Prevention, Detection, and Suppression | 00:02:46 Duration |
|
Lecture 10 | Perimeter Security | 00:03:41 Duration |
|
Lecture 11 | External Boundary Protection | 00:03:28 Duration |
|
Lecture 12 | Locks and Fencing | 00:01:38 Duration |
|
Lecture 13 | Lighting and Patrols | 00:01:36 Duration |
|
Lecture 14 | Surveillance Devices | 00:02:51 Duration |
|
Lecture 15 | Intrusion Detection Systems | 00:01:11 Duration |
|
Lecture 16 | Auditing Physical Security | 00:01:50 Duration |
|
Lecture 17 | Testing and Drills | 00:00:52 Duration |
|
Lecture 18 | Conclusion | 00:01:12 Duration |
Section 7 : Footprinting
|
Lecture 1 | Introduction | 00:04:35 Duration |
|
Lecture 2 | Footprinting-Reconnaissance | |
|
Lecture 3 | Knowledge Check- Possible Threats of Footprinting | 00:04:35 Duration |
|
Lecture 4 | Information Gathering | 00:01:17 Duration |
|
Lecture 5 | Knowledge Check- Information Gathering Groups | 00:06:34 Duration |
|
Lecture 6 | Footprinting Hierarchy | 00:01:58 Duration |
|
Lecture 7 | WHOIS Footprinting Demo | 00:01:09 Duration |
|
Lecture 8 | Footprinting Methodology | 00:01:53 Duration |
|
Lecture 9 | Passive vs. Active Footprinting | 00:02:42 Duration |
|
Lecture 10 | Knowledge Check- WHOIS Databases | 00:04:39 Duration |
|
Lecture 11 | Knowledge Check- DNS Zone Data | 00:01:30 Duration |
|
Lecture 12 | Social Engineering | 00:02:00 Duration |
|
Lecture 13 | Footprinting with Google | 00:08:03 Duration |
|
Lecture 14 | Google Hacking | 00:01:57 Duration |
|
Lecture 15 | Exploit Database Demo | 00:00:50 Duration |
|
Lecture 16 | Google Hacking for Charity Demo | 00:01:33 Duration |
|
Lecture 17 | Google Advance Search Operations | 00:01:49 Duration |
|
Lecture 18 | Google Hacking Tools | |
|
Lecture 19 | Footprinting Tools | 00:01:14 Duration |
|
Lecture 20 | Maltego Demo | 00:01:42 Duration |
|
Lecture 21 | Additional Footprinting Tools | 00:00:46 Duration |
|
Lecture 22 | Footprinting Countermeasures | 00:02:18 Duration |
|
Lecture 23 | Footprinting PenTesting | 00:03:03 Duration |
|
Lecture 24 | Conclusion | 00:01:55 Duration |
Section 8 : Reconnaissance
|
Lecture 1 | Introduction | 00:01:51 Duration |
|
Lecture 2 | Reconnaissance Threats | 00:03:11 Duration |
|
Lecture 3 | 7 Steps of Information Gathering | 00:07:30 Duration |
|
Lecture 4 | Footprinting Methodology | 00:02:37 Duration |
|
Lecture 5 | Passive vs. Active Footprinting | 00:03:07 Duration |
|
Lecture 6 | Passive Footprinting Tools | 00:00:23 Duration |
|
Lecture 7 | PassiveRecon Dem | 00:02:01 Duration |
|
Lecture 8 | Shodanhq.com Demo | 00:00:41 Duration |
|
Lecture 9 | Active Footprinting | 00:02:35 Duration |
|
Lecture 10 | Visualroute Trace Demo | 00:00:46 Duration |
|
Lecture 11 | Scanning Networks and Ports | 00:05:40 Duration |
|
Lecture 12 | Nmap Scan Demo | 00:01:41 Duration |
|
Lecture 13 | Enumeration | 00:01:25 Duration |
|
Lecture 14 | Reconnaissance Countermeasures | 00:02:15 Duration |
|
Lecture 15 | Conclusion | 00:01:07 Duration |
Section 9 : Scanning Networks
|
Lecture 1 | Defining Private and Public Scanning | 00:00:52 Duration |
|
Lecture 2 | Techniques for Private Network Scanning | 00:02:28 Duration |
|
Lecture 3 | Angry IP Demo | 00:06:45 Duration |
|
Lecture 4 | Nmap Demo | 00:04:20 Duration |
|
Lecture 5 | Hping Demo | 00:03:14 Duration |
|
Lecture 6 | Public Scanning with Zmap | 00:02:31 Duration |
|
Lecture 7 | Zmap Demo | 00:04:54 Duration |
|
Lecture 8 | Conclusion | 00:00:41 Duration |
Section 10 : Port Scanning
|
Lecture 1 | Introduction to Port Scanning | 00:03:53 Duration |
|
Lecture 2 | Port Scanning Method | 00:04:35 Duration |
|
Lecture 3 | Ping Demo | 00:03:27 Duration |
|
Lecture 4 | Ping Tester Demo | 00:04:04 Duration |
|
Lecture 5 | Well-Known Ports | 00:03:16 Duration |
|
Lecture 6 | Netstat Demo | 00:03:05 Duration |
|
Lecture 7 | Informational Sites | 00:00:58 Duration |
|
Lecture 8 | Nmap explained | 00:01:39 Duration |
|
Lecture 9 | Nmap Demo | 00:01:39 Duration |
|
Lecture 10 | Scans and Firewalls | 00:01:39 Duration |
|
Lecture 11 | Nmap Version Detection Demo | 00:01:39 Duration |
|
Lecture 12 | UDP | 00:01:39 Duration |
|
Lecture 13 | Advanced Scanning Techniques | 00:02:44 Duration |
|
Lecture 14 | Port Scanning Tools | 00:05:33 Duration |
|
Lecture 15 | Port Scanning Techniques II | 00:03:58 Duration |
|
Lecture 16 | Port Scanning Countermeasures | 00:03:18 Duration |
|
Lecture 17 | Conclusion | 00:01:23 Duration |