Section 1 : Pre-Assessment

lecture 1 About Certification Pdf

Section 2 : Introduction to Ethical Hacking

lecture 2 Introduction to Ethical Hacking
lecture 3 Vulnerabilities 1:34
lecture 4 Defense-in-depth 3:25
lecture 5 Penetration Testing 7:30
lecture 6 Pentesting Demo 1 5:18
lecture 7 Pentesting Demo 2 2:20
lecture 8 Pentesting Demo 3 3:11
lecture 9 Pentesting Demo 4 4:57
lecture 10 Methodology for Penetration Testing-Ethical Hackin 2:38
lecture 11 Vulnerability Management 1:15
lecture 12 Incident Management
lecture 13 Security Policy 1:52
lecture 14 Conclusion 0:56

Section 3 : Disaster Recovery and Risk Management

lecture 15 Defining Risk Management 2:16
lecture 16 Strategies For Managing Risk
lecture 17 How to Analyze Risk 10:1
lecture 18 Risk Assessment Demo 10:1
lecture 19 DR Strategies 10:1
lecture 20 Plan Testing and Execution 10:1
lecture 21 Conclusion 10:1

Section 4 : Penetration Testing

lecture 22 Security Auditing 10:1
lecture 23 Penetration Testing Types 10:1
lecture 24 Vulnerability Assessment Demo 10:1
lecture 25 Areas of Pentest
lecture 26 Awareness and Compliance 10:1
lecture 27 Educating Employees 10:1
lecture 28 Conclusion 10:1

Section 5 : Vulnerability Assessment

lecture 29 Introduction 10:1
lecture 30 Testing Overview 10:1
lecture 31 Security Alerts 10:1
lecture 32 Scanners 10:1
lecture 33 Nessus Demo 10:1
lecture 34 IBM AppScan Demo 10:1
lecture 35 GFI Languard Demo 10:1
lecture 36 Analyzing the Scan Results 10:1
lecture 37 Generating Reports 10:1
lecture 38 Remediation 10:1
lecture 39 Patch Management 10:1
lecture 40 Conclusion 1:4

Section 6 : Physical Security

lecture 41 Introduction 0:46
lecture 42 Importance of Physical Security 3:34
lecture 43 Physical Security Planning 4:50
lecture 44 CPTED 6:52
lecture 45 Protecting Assets 1:45
lecture 46 Introduction 2:38
lecture 47 Power Supply and Protection 2:38
lecture 48 Environment Control 6:43
lecture 49 Fire Prevention, Detection, and Suppression 2:46
lecture 50 Perimeter Security 3:41
lecture 51 External Boundary Protection 3:28
lecture 52 Locks and Fencing 1:38
lecture 53 Lighting and Patrols 1:36
lecture 54 Surveillance Devices 2:51
lecture 55 Intrusion Detection Systems 1:11
lecture 56 Auditing Physical Security 1:50
lecture 57 Testing and Drills 0:52
lecture 58 Conclusion 1:12

Section 7 : Footprinting

lecture 59 Introduction 4:35
lecture 60 Footprinting-Reconnaissance
lecture 61 Knowledge Check- Possible Threats of Footprinting 4:35
lecture 62 Information Gathering 1:17
lecture 63 Knowledge Check- Information Gathering Groups 6:34
lecture 64 Footprinting Hierarchy 1:58
lecture 65 WHOIS Footprinting Demo 1:9
lecture 66 Footprinting Methodology 1:53
lecture 67 Passive vs. Active Footprinting 2:42
lecture 68 Knowledge Check- WHOIS Databases 4:39
lecture 69 Knowledge Check- DNS Zone Data 1:30
lecture 70 Social Engineering 2:0
lecture 71 Footprinting with Google 8:3
lecture 72 Google Hacking 1:57
lecture 73 Exploit Database Demo 0:50
lecture 74 Google Hacking for Charity Demo 1:33
lecture 75 Google Advance Search Operations 1:49
lecture 76 Google Hacking Tools
lecture 77 Footprinting Tools 1:14
lecture 78 Maltego Demo 1:42
lecture 79 Additional Footprinting Tools 0:46
lecture 80 Footprinting Countermeasures 2:18
lecture 81 Footprinting PenTesting 3:3
lecture 82 Conclusion 1:55

Section 8 : Reconnaissance

lecture 83 Introduction 1:51
lecture 84 Reconnaissance Threats 3:11
lecture 5 7 Steps of Information Gathering 7:30
lecture 86 Footprinting Methodology 2:37
lecture 87 Passive vs. Active Footprinting 3:7
lecture 88 Passive Footprinting Tools 0:23
lecture 89 PassiveRecon Dem 2:1
lecture 90 Shodanhq.com Demo 0:41
lecture 91 Active Footprinting 2:35
lecture 92 Visualroute Trace Demo 0:46
lecture 93 Scanning Networks and Ports 5:40
lecture 94 Nmap Scan Demo 1:41
lecture 95 Enumeration 1:25
lecture 96 Reconnaissance Countermeasures 2:15
lecture 97 Conclusion 1:7

Section 9 : Scanning Networks

lecture 98 Defining Private and Public Scanning 0:52
lecture 99 Techniques for Private Network Scanning 2:28
lecture 100 Angry IP Demo 6:45
lecture 101 Nmap Demo 4:20
lecture 102 Hping Demo 3:14
lecture 103 Public Scanning with Zmap 2:31
lecture 104 Zmap Demo 4:54
lecture 105 Conclusion 0:41

Section 10 : Port Scanning

lecture 106 Introduction to Port Scanning 3:53
lecture 107 Port Scanning Method 4:35
lecture 108 Ping Demo 3:27
lecture 109 Ping Tester Demo 4:4
lecture 110 Well-Known Ports 3:16
lecture 111 Netstat Demo 3:5
lecture 112 Informational Sites 0:58
lecture 113 Nmap explained 1:39
lecture 114 Nmap Demo 1:39
lecture 115 Scans and Firewalls 1:39
lecture 116 Nmap Version Detection Demo 1:39
lecture 117 UDP 1:39
lecture 118 Advanced Scanning Techniques 2:44
lecture 119 Port Scanning Tools 5:33
lecture 120 Port Scanning Techniques II 3:58
lecture 121 Port Scanning Countermeasures 3:18
lecture 122 Conclusion 1:23