Section 1 : Pre-Assessment

Lecture 1 About Certification

Section 2 : Introduction to Ethical Hacking

Lecture 1 Introduction to Ethical Hacking
Lecture 2 Vulnerabilities 00:01:34 Duration
Lecture 3 Defense-in-depth 00:03:25 Duration
Lecture 4 Penetration Testing 00:07:30 Duration
Lecture 5 Pentesting Demo 1 00:05:18 Duration
Lecture 6 Pentesting Demo 2 00:02:20 Duration
Lecture 7 Pentesting Demo 3 00:03:11 Duration
Lecture 8 Pentesting Demo 4 00:04:57 Duration
Lecture 9 Methodology for Penetration Testing-Ethical Hackin 00:02:38 Duration
Lecture 10 Vulnerability Management 00:01:15 Duration
Lecture 11 Incident Management
Lecture 12 Security Policy 00:01:52 Duration
Lecture 13 Conclusion 00:00:56 Duration

Section 3 : Disaster Recovery and Risk Management

Lecture 1 Defining Risk Management 00:02:16 Duration
Lecture 2 Strategies For Managing Risk
Lecture 3 How to Analyze Risk 00:10:01 Duration
Lecture 4 Risk Assessment Demo 00:10:01 Duration
Lecture 5 DR Strategies 00:10:01 Duration
Lecture 6 Plan Testing and Execution 00:10:01 Duration
Lecture 7 Conclusion 00:10:01 Duration

Section 4 : Penetration Testing

Lecture 1 Security Auditing 00:10:01 Duration
Lecture 2 Penetration Testing Types 00:10:01 Duration
Lecture 3 Vulnerability Assessment Demo 00:10:01 Duration
Lecture 4 Areas of Pentest
Lecture 5 Awareness and Compliance 00:10:01 Duration
Lecture 6 Educating Employees 00:10:01 Duration
Lecture 7 Conclusion 00:10:01 Duration

Section 5 : Vulnerability Assessment

Lecture 1 Introduction 00:10:01 Duration
Lecture 2 Testing Overview 00:10:01 Duration
Lecture 3 Security Alerts 00:10:01 Duration
Lecture 4 Scanners 00:10:01 Duration
Lecture 5 Nessus Demo 00:10:01 Duration
Lecture 6 IBM AppScan Demo 00:10:01 Duration
Lecture 7 GFI Languard Demo 00:10:01 Duration
Lecture 8 Analyzing the Scan Results 00:10:01 Duration
Lecture 9 Generating Reports 00:10:01 Duration
Lecture 10 Remediation 00:10:01 Duration
Lecture 11 Patch Management 00:10:01 Duration
Lecture 12 Conclusion 00:01:04 Duration

Section 6 : Physical Security

Lecture 1 Introduction 00:00:46 Duration
Lecture 2 Importance of Physical Security 00:03:34 Duration
Lecture 3 Physical Security Planning 00:04:50 Duration
Lecture 4 CPTED 00:06:52 Duration
Lecture 5 Protecting Assets 00:01:45 Duration
Lecture 6 Introduction 00:02:38 Duration
Lecture 7 Power Supply and Protection 00:02:38 Duration
Lecture 8 Environment Control 00:06:43 Duration
Lecture 9 Fire Prevention, Detection, and Suppression 00:02:46 Duration
Lecture 10 Perimeter Security 00:03:41 Duration
Lecture 11 External Boundary Protection 00:03:28 Duration
Lecture 12 Locks and Fencing 00:01:38 Duration
Lecture 13 Lighting and Patrols 00:01:36 Duration
Lecture 14 Surveillance Devices 00:02:51 Duration
Lecture 15 Intrusion Detection Systems 00:01:11 Duration
Lecture 16 Auditing Physical Security 00:01:50 Duration
Lecture 17 Testing and Drills 00:00:52 Duration
Lecture 18 Conclusion 00:01:12 Duration

Section 7 : Footprinting

Lecture 1 Introduction 00:04:35 Duration
Lecture 2 Footprinting-Reconnaissance
Lecture 3 Knowledge Check- Possible Threats of Footprinting 00:04:35 Duration
Lecture 4 Information Gathering 00:01:17 Duration
Lecture 5 Knowledge Check- Information Gathering Groups 00:06:34 Duration
Lecture 6 Footprinting Hierarchy 00:01:58 Duration
Lecture 7 WHOIS Footprinting Demo 00:01:09 Duration
Lecture 8 Footprinting Methodology 00:01:53 Duration
Lecture 9 Passive vs. Active Footprinting 00:02:42 Duration
Lecture 10 Knowledge Check- WHOIS Databases 00:04:39 Duration
Lecture 11 Knowledge Check- DNS Zone Data 00:01:30 Duration
Lecture 12 Social Engineering 00:02:00 Duration
Lecture 13 Footprinting with Google 00:08:03 Duration
Lecture 14 Google Hacking 00:01:57 Duration
Lecture 15 Exploit Database Demo 00:00:50 Duration
Lecture 16 Google Hacking for Charity Demo 00:01:33 Duration
Lecture 17 Google Advance Search Operations 00:01:49 Duration
Lecture 18 Google Hacking Tools
Lecture 19 Footprinting Tools 00:01:14 Duration
Lecture 20 Maltego Demo 00:01:42 Duration
Lecture 21 Additional Footprinting Tools 00:00:46 Duration
Lecture 22 Footprinting Countermeasures 00:02:18 Duration
Lecture 23 Footprinting PenTesting 00:03:03 Duration
Lecture 24 Conclusion 00:01:55 Duration

Section 8 : Reconnaissance

Lecture 1 Introduction 00:01:51 Duration
Lecture 2 Reconnaissance Threats 00:03:11 Duration
Lecture 3 7 Steps of Information Gathering 00:07:30 Duration
Lecture 4 Footprinting Methodology 00:02:37 Duration
Lecture 5 Passive vs. Active Footprinting 00:03:07 Duration
Lecture 6 Passive Footprinting Tools 00:00:23 Duration
Lecture 7 PassiveRecon Dem 00:02:01 Duration
Lecture 8 Shodanhq.com Demo 00:00:41 Duration
Lecture 9 Active Footprinting 00:02:35 Duration
Lecture 10 Visualroute Trace Demo 00:00:46 Duration
Lecture 11 Scanning Networks and Ports 00:05:40 Duration
Lecture 12 Nmap Scan Demo 00:01:41 Duration
Lecture 13 Enumeration 00:01:25 Duration
Lecture 14 Reconnaissance Countermeasures 00:02:15 Duration
Lecture 15 Conclusion 00:01:07 Duration

Section 9 : Scanning Networks

Lecture 1 Defining Private and Public Scanning 00:00:52 Duration
Lecture 2 Techniques for Private Network Scanning 00:02:28 Duration
Lecture 3 Angry IP Demo 00:06:45 Duration
Lecture 4 Nmap Demo 00:04:20 Duration
Lecture 5 Hping Demo 00:03:14 Duration
Lecture 6 Public Scanning with Zmap 00:02:31 Duration
Lecture 7 Zmap Demo 00:04:54 Duration
Lecture 8 Conclusion 00:00:41 Duration

Section 10 : Port Scanning

Lecture 1 Introduction to Port Scanning 00:03:53 Duration
Lecture 2 Port Scanning Method 00:04:35 Duration
Lecture 3 Ping Demo 00:03:27 Duration
Lecture 4 Ping Tester Demo 00:04:04 Duration
Lecture 5 Well-Known Ports 00:03:16 Duration
Lecture 6 Netstat Demo 00:03:05 Duration
Lecture 7 Informational Sites 00:00:58 Duration
Lecture 8 Nmap explained 00:01:39 Duration
Lecture 9 Nmap Demo 00:01:39 Duration
Lecture 10 Scans and Firewalls 00:01:39 Duration
Lecture 11 Nmap Version Detection Demo 00:01:39 Duration
Lecture 12 UDP 00:01:39 Duration
Lecture 13 Advanced Scanning Techniques 00:02:44 Duration
Lecture 14 Port Scanning Tools 00:05:33 Duration
Lecture 15 Port Scanning Techniques II 00:03:58 Duration
Lecture 16 Port Scanning Countermeasures 00:03:18 Duration
Lecture 17 Conclusion 00:01:23 Duration