Section 1 : Chapter 1
|
Lecture 1 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM |
Section 2 : Introduction to Ethical Hacking
|
Lecture 1 | Introduction to Ethical Hacking | 00:10:00 Duration |
|
Lecture 2 | Vulnerabilities | 00:06:58 Duration |
|
Lecture 3 | Defense-in-depth | 00:03:25 Duration |
|
Lecture 4 | Penetration Testing | 00:07:28 Duration |
|
Lecture 5 | Pentesting Demo 1 | 00:05:17 Duration |
|
Lecture 6 | Pentesting Demo 2 | 00:02:20 Duration |
|
Lecture 7 | Pentesting Demo 3 | 00:03:11 Duration |
|
Lecture 8 | Pentesting Demo 4 | 00:04:56 Duration |
|
Lecture 9 | Methodology for Penetration TestingEthical Hacking | 00:02:38 Duration |
|
Lecture 10 | Vulnerability Management | 00:01:15 Duration |
|
Lecture 11 | Incident Management | 00:02:41 Duration |
|
Lecture 12 | Security Policy | 00:01:52 Duration |
|
Lecture 13 | Conclusion | 00:00:56 Duration |
Section 3 : Disaster Recovery and Risk Management
|
Lecture 1 | Defining Risk Management | 00:02:15 Duration |
|
Lecture 2 | Strategies For Managing Risk | 00:02:12 Duration |
|
Lecture 3 | How to Analyze Risk | 00:05:23 Duration |
|
Lecture 4 | Risk Assessment Demo | 00:18:16 Duration |
|
Lecture 5 | DR Strategies | 00:05:03 Duration |
|
Lecture 6 | Plan Testing and Execution | 00:02:15 Duration |
|
Lecture 7 | Conclusion | 00:01:00 Duration |
Section 4 : Penetration Testing
|
Lecture 1 | Security Auditing | 00:05:49 Duration |
|
Lecture 2 | Penetration Testing Types | 00:04:32 Duration |
|
Lecture 3 | Vulnerability Assessment Demo | 00:10:36 Duration |
|
Lecture 4 | Areas of Pentest | 00:04:45 Duration |
|
Lecture 5 | Awareness and Compliance | 00:01:37 Duration |
|
Lecture 6 | Educating Employees | 00:01:26 Duration |
|
Lecture 7 | Conclusion | 00:01:05 Duration |
Section 5 : Vulnerability Assessment
|
Lecture 1 | Introduction | 00:02:34 Duration |
|
Lecture 2 | Testing Overview | 00:00:51 Duration |
|
Lecture 3 | Security Alerts | 00:04:09 Duration |
|
Lecture 4 | Scanners | 00:04:21 Duration |
|
Lecture 5 | Nessus Demo | |
|
Lecture 6 | IBM AppScan Demo | 00:02:54 Duration |
|
Lecture 7 | GFI Languard Demo | 00:01:34 Duration |
|
Lecture 8 | Analyzing the Scan Results | 00:04:32 Duration |
|
Lecture 9 | Generating Reports | 00:01:55 Duration |
|
Lecture 10 | Remediation | 00:07:47 Duration |
|
Lecture 11 | Patch Management | 00:01:28 Duration |
|
Lecture 12 | Conclusion | 00:01:04 Duration |
Section 6 : Physical Security
|
Lecture 1 | Introduction | 00:00:46 Duration |
|
Lecture 2 | Importance of Physical Security | 00:03:34 Duration |
|
Lecture 3 | Physical Security Planning | 00:04:49 Duration |
|
Lecture 4 | CPTED | 00:06:52 Duration |
|
Lecture 5 | Protecting Assets | 00:01:45 Duration |
|
Lecture 6 | Introduction | 00:02:38 Duration |
|
Lecture 7 | Power Supply and Protection | 00:06:43 Duration |
|
Lecture 8 | Environment Control | 00:02:46 Duration |
|
Lecture 9 | Fire Prevention, Detection, and Suppression | 00:03:41 Duration |
|
Lecture 10 | Perimeter Security | 00:03:28 Duration |
|
Lecture 11 | External Boundary Protection | 00:01:38 Duration |
|
Lecture 12 | Locks and Fencing | 00:01:36 Duration |
|
Lecture 13 | Lighting and Patrols | 00:02:51 Duration |
|
Lecture 14 | Surveillance Devices | 00:01:11 Duration |
|
Lecture 15 | Intrusion Detection Systems | 00:01:50 Duration |
|
Lecture 16 | Auditing Physical Security | 00:00:52 Duration |
|
Lecture 17 | Testing and Drills | 00:01:12 Duration |
|
Lecture 18 | Conclusion | 00:00:39 Duration |
Section 7 : Footprinting
|
Lecture 1 | Introduction | 00:01:14 Duration |
|
Lecture 2 | FootprintingReconnaissance | 00:04:34 Duration |
|
Lecture 3 | Knowledge Check Possible Threats of Footprinting | 00:01:17 Duration |
|
Lecture 4 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 5 | Knowledge Check Information Gathering Groups | 00:01:58 Duration |
|
Lecture 6 | Footprinting Hierarchy | 00:01:08 Duration |
|
Lecture 7 | WHOIS Footprinting Demo | 00:01:53 Duration |
|
Lecture 8 | Footprinting Methodology | 00:02:42 Duration |
|
Lecture 9 | Passive vs | 00:04:39 Duration |
|
Lecture 10 | Knowledge Check WHOIS Databases | 00:01:30 Duration |
|
Lecture 11 | Knowledge Check DNS Zone Data | 00:02:00 Duration |
|
Lecture 12 | Social Engineering | 00:08:03 Duration |
|
Lecture 13 | Footprinting with Google | 00:01:57 Duration |
|
Lecture 14 | Google Hacking | 00:00:50 Duration |
|
Lecture 15 | Exploit Database Demo | 00:01:19 Duration |
|
Lecture 16 | Google Hacking for Charity Demo | |
|
Lecture 17 | Google Advance Search Operations | 00:01:49 Duration |
|
Lecture 18 | Google Hacking Tools | 00:03:00 Duration |
|
Lecture 19 | Footprinting Tools | 00:01:13 Duration |
|
Lecture 20 | Maltego Demo | 00:01:42 Duration |
|
Lecture 21 | Additional Footprinting Tools | 00:00:46 Duration |
|
Lecture 22 | Footprinting Countermeasures | 00:02:18 Duration |
|
Lecture 23 | Footprinting PenTesting | 00:03:03 Duration |
|
Lecture 24 | Conclusion | 00:01:55 Duration |
Section 8 : Reconnaissance
|
Lecture 1 | Introduction | 00:01:51 Duration |
|
Lecture 2 | Reconnaissance Threats | 00:03:11 Duration |
|
Lecture 3 | 7 Steps of Information Gathering | 00:06:25 Duration |
|
Lecture 4 | Footprinting Methodology | 00:02:37 Duration |
|
Lecture 5 | Passive vs | 00:03:07 Duration |
|
Lecture 6 | Passive Footprinting Tools | 00:00:23 Duration |
|
Lecture 7 | PassiveRecon Demo | 00:02:01 Duration |
|
Lecture 8 | Shodanhq | 00:00:41 Duration |
|
Lecture 9 | Active Footprinting | 00:02:35 Duration |
|
Lecture 10 | Visualroute Trace Demo | 00:00:46 Duration |
|
Lecture 11 | Scanning Networks and Ports | 00:05:40 Duration |
|
Lecture 12 | Nmap Scan Demo | 00:01:41 Duration |
|
Lecture 13 | Enumeration | 00:01:25 Duration |
|
Lecture 14 | Reconnaissance Countermeasures | 00:02:15 Duration |
|
Lecture 15 | Conclusion | 00:01:06 Duration |
Section 9 : Scanning Networks
|
Lecture 1 | Defining Private and Public Scanning | 00:00:52 Duration |
|
Lecture 2 | Techniques for Private Network Scanning | 00:02:27 Duration |
|
Lecture 3 | Angry IP Demo | 00:06:45 Duration |
|
Lecture 4 | Nmap Demo | 00:04:20 Duration |
|
Lecture 5 | Hping Demo | 00:03:14 Duration |
|
Lecture 6 | Public Scanning with Zmap | 00:02:31 Duration |
|
Lecture 7 | Zmap Demo | 00:04:53 Duration |
|
Lecture 8 | Conclusion | 00:00:41 Duration |
Section 10 : Port Scanning
|
Lecture 1 | Introduction to Port Scanning | 00:03:53 Duration |
|
Lecture 2 | Port Scanning Methods | 00:04:34 Duration |
|
Lecture 3 | Ping Demo | 00:03:26 Duration |
|
Lecture 4 | Ping Tester Demo | 00:04:04 Duration |
|
Lecture 5 | Well-Known Ports | 00:03:16 Duration |
|
Lecture 6 | Netstat Demo | 00:03:05 Duration |
|
Lecture 7 | Informational Sites | 00:00:58 Duration |
|
Lecture 8 | Port Scanning Techniques I | 00:11:13 Duration |
|
Lecture 9 | Nmap Demo | 00:01:39 Duration |
|
Lecture 10 | Scans and Firewalls | 00:10:11 Duration |
|
Lecture 11 | Nmap Version Detection Demo | 00:04:33 Duration |
|
Lecture 12 | UDP | 00:03:23 Duration |
|
Lecture 13 | Advanced Scanning Techniques | 00:02:43 Duration |
|
Lecture 14 | Port Scanning Tools | 00:05:33 Duration |
|
Lecture 15 | Port Scanning Techniques II | 00:03:58 Duration |
|
Lecture 16 | Port Scanning Countermeasures | 00:03:18 Duration |
|
Lecture 17 | Conclusion | 00:01:23 Duration |
Section 11 : Banner Grabbing
|
Lecture 1 | Introduction | 00:00:50 Duration |
|
Lecture 2 | What is Banner Grabbing | 00:03:52 Duration |
|
Lecture 3 | Types of Banner Grabbing | 00:02:35 Duration |
|
Lecture 4 | Banner Grabbing Tools | 00:03:43 Duration |
|
Lecture 5 | Banner Grabbing Using Telnet Demo | 00:01:46 Duration |
|
Lecture 6 | Countermeasures | 00:01:29 Duration |
|
Lecture 7 | Conclusion | 00:00:50 Duration |
Section 12 : Enumeration
|
Lecture 1 | Introduction | 00:00:57 Duration |
|
Lecture 2 | Applications | 00:01:42 Duration |
|
Lecture 3 | NetBIOS Demo | 00:04:12 Duration |
|
Lecture 4 | SNMP | 00:02:37 Duration |
|
Lecture 5 | LDAP | 00:00:42 Duration |
|
Lecture 6 | LDAP Demo | 00:03:28 Duration |
|
Lecture 7 | NTP | 00:01:05 Duration |
|
Lecture 8 | SMTP | 00:01:29 Duration |
|
Lecture 9 | DNS Enumeration | 00:01:33 Duration |
|
Lecture 10 | NSlookup Demo | 00:02:24 Duration |
|
Lecture 11 | Conclusion | 00:00:33 Duration |
Section 13 : Linux Fundamentals
|
Lecture 1 | Linux History | 00:01:48 Duration |
|
Lecture 2 | GUI & Shell | 00:04:43 Duration |
|
Lecture 3 | Linux Shell | 00:01:27 Duration |
|
Lecture 4 | Managing Files and Directories | 00:01:08 Duration |
|
Lecture 5 | Root Enable Disable Demo | 00:03:17 Duration |
|
Lecture 6 | Linux Commands | 00:03:30 Duration |
|
Lecture 7 | Navigating in Linux | 00:03:12 Duration |
|
Lecture 8 | Linux Navigation Demo | 00:06:15 Duration |
|
Lecture 9 | Tar | 00:02:28 Duration |
|
Lecture 10 | Compression Demo | 00:03:18 Duration |
|
Lecture 11 | Configuring Subdirectories | 00:03:13 Duration |
|
Lecture 12 | Vi Demo | 00:04:06 Duration |
|
Lecture 13 | Conclusion | 00:00:51 Duration |
Section 14 : Configuring Linux for Pentesting
|
Lecture 1 | Installing Applications | 00:02:05 Duration |
|
Lecture 2 | apt-get Demo | 00:03:08 Duration |
|
Lecture 3 | Applications for Pentesting | 00:01:42 Duration |
|
Lecture 4 | Essential Tools and GUI Demo | 00:07:55 Duration |
|
Lecture 5 | Iptables | 00:01:00 Duration |
|
Lecture 6 | Iptables Demo | 00:09:26 Duration |
|
Lecture 7 | IP Forwarding Demo | 00:03:01 Duration |
|
Lecture 8 | Conclusion | 00:00:54 Duration |
Section 15 : Authentication Systems
|
Lecture 1 | Authentication Factors | 00:01:54 Duration |
|
Lecture 2 | Forms of Authentication | 00:03:52 Duration |
|
Lecture 3 | Introduction to Authentication Protocols | 00:01:08 Duration |
|
Lecture 4 | CHAP and MS-CHAP | 00:02:44 Duration |
|
Lecture 5 | NTLM | 00:05:53 Duration |
|
Lecture 6 | NTLM Continued | 00:03:30 Duration |
|
Lecture 7 | Authentication Methods Demo | 00:13:03 Duration |
|
Lecture 8 | Triple As | 00:01:25 Duration |
|
Lecture 9 | RADIUS Demo | 00:06:09 Duration |
|
Lecture 10 | RADIUS 2 Demo | |
|
Lecture 11 | LDAP | 00:02:58 Duration |
|
Lecture 12 | Single Sign-on | 00:01:59 Duration |
|
Lecture 13 | Conclusion | 00:01:35 Duration |
Section 16 : System Hacking
|
Lecture 1 | Introduction | 00:01:49 Duration |
|
Lecture 2 | Types of Password Attacks | 00:02:29 Duration |
|
Lecture 3 | Password Guessing | 00:03:38 Duration |
|
Lecture 4 | Password Hashing and Encryption | 00:10:35 Duration |
|
Lecture 5 | Password Cracking Technique | |
|
Lecture 6 | Privilege Escalation | 00:01:14 Duration |
|
Lecture 7 | Countermeasures | 00:05:11 Duration |
|
Lecture 8 | Knowledge Check | 00:00:44 Duration |
|
Lecture 9 | Hiding Files with NTFS | 00:02:55 Duration |
|
Lecture 10 | Knowledge Check | 00:00:49 Duration |
|
Lecture 11 | Steganography and Its Uses | 00:05:37 Duration |
|
Lecture 12 | Knowledge Check | 00:00:33 Duration |
|
Lecture 13 | Understanding Rootkits | 00:03:36 Duration |
|
Lecture 14 | Knowledge Check | 00:00:31 Duration |
|
Lecture 15 | Conclusion | 00:01:55 Duration |
Section 17 : Spyware & Keyloggers
|
Lecture 1 | Introduction | 00:07:24 Duration |
|
Lecture 2 | Spyware Distribution | 00:13:59 Duration |
|
Lecture 3 | Knowledge Check | 00:00:43 Duration |
|
Lecture 4 | Understanding Keyloggers | 00:01:33 Duration |
|
Lecture 5 | Hardware Keyloggers | 00:03:27 Duration |
|
Lecture 6 | Software Keylogger | 00:02:54 Duration |
|
Lecture 7 | Keylogger Examples | 00:11:27 Duration |
|
Lecture 8 | Kernel Keyloggers | 00:01:44 Duration |
|
Lecture 9 | Protecting Yourself | 00:14:13 Duration |
|
Lecture 10 | Knowledge Check | 00:00:36 Duration |
|
Lecture 11 | Conclusion | 00:01:01 Duration |
Section 18 : Covering Tracks
|
Lecture 1 | Dealing with Windows Logs | 00:06:01 Duration |
|
Lecture 2 | Working with WinZapper | |
|
Lecture 3 | MRU-Blaster | 00:01:53 Duration |
|
Lecture 4 | Using Metasploit to Cover Tracks | 00:01:46 Duration |
|
Lecture 5 | Meterpreter Event Manager Demo | 00:02:25 Duration |
|
Lecture 6 | Meterpreter Timestomp Demo | 00:01:54 Duration |
|
Lecture 7 | Linux History and Events | 00:02:21 Duration |
|
Lecture 8 | Clearing the Bash History Demo | 00:03:30 Duration |
|
Lecture 9 | Clearing Linux Events Demo | 00:02:16 Duration |
|
Lecture 10 | File Shredding | 00:01:35 Duration |
|
Lecture 11 | Anonymity | 00:03:27 Duration |
|
Lecture 12 | Using Live CDs, Proxies, and Onion routers | 00:02:32 Duration |
|
Lecture 13 | Countermeasures | 00:02:58 Duration |
|
Lecture 14 | Conclusion | 00:00:47 Duration |
Section 19 : Trojans and Backdoors
|
Lecture 1 | Introduction | 00:01:31 Duration |
|
Lecture 2 | Definition and Distribution | 00:07:50 Duration |
|
Lecture 3 | Capabilities | 00:08:25 Duration |
|
Lecture 4 | Malware Knowledge Check | 00:00:41 Duration |
|
Lecture 5 | Backdoors | 00:05:45 Duration |
|
Lecture 6 | Trojans | 00:12:06 Duration |
|
Lecture 7 | Wrappers | 00:07:21 Duration |
|
Lecture 8 | Avoiding Detection | 00:03:15 Duration |
|
Lecture 9 | Tools of the Trade Knowledge Check | 00:00:32 Duration |
|
Lecture 10 | Countermeasure Considerations | 00:05:44 Duration |
|
Lecture 11 | Investigation Tools | 00:01:30 Duration |
|
Lecture 12 | Port Monitorization | 00:01:30 Duration |
|
Lecture 13 | System File Monitorization | 00:01:21 Duration |
|
Lecture 14 | Software Restriction Policies | 00:04:34 Duration |
|
Lecture 15 | Additional Countermeasure Tools | 00:01:28 Duration |
|
Lecture 16 | Countermeasures Knowledge Check | 00:00:49 Duration |
|
Lecture 17 | Conclusion | 00:01:58 Duration |
Section 20 : Viruses and Worms
|
Lecture 1 | Virus Definition and Behavior | 00:02:38 Duration |
|
Lecture 2 | DELme Demo | 00:04:49 Duration |
|
Lecture 3 | Viruses | 00:00:51 Duration |
|
Lecture 4 | Virus Types | 00:09:14 Duration |
|
Lecture 5 | JPS Demo | 00:03:50 Duration |
|
Lecture 6 | Stealth Strategies and Infection | 00:04:36 Duration |
|
Lecture 7 | Virus Mutation Demo | 00:02:55 Duration |
|
Lecture 8 | Virus Infection | 00:02:05 Duration |
|
Lecture 9 | Viruses Examples | 00:02:28 Duration |
|
Lecture 10 | Defining Worms | 00:01:31 Duration |
|
Lecture 11 | IT Security Fundamentals- CompTIA Security+ 2015 SY0-401- Course Map | |
|
Lecture 12 | Known Dangerous Worms | 00:11:17 Duration |
|
Lecture 13 | Conclusion | 00:00:49 Duration |
Section 21 : Sniffers
|
Lecture 1 | Packet Sniffers | 00:15:27 Duration |
|
Lecture 2 | Wireshark Demo | 00:09:30 Duration |
|
Lecture 3 | Sniffing Passive vs Active | 00:02:31 Duration |
|
Lecture 4 | Techniques for Poisoning the Network | 00:03:38 Duration |
|
Lecture 5 | ARP Poisoning Demo | 00:10:33 Duration |
|
Lecture 6 | Sniffing and Spoofing Tools | 00:10:15 Duration |
|
Lecture 7 | Countermeasures | 00:01:14 Duration |
|
Lecture 8 | XARP Demo | 00:03:08 Duration |
|
Lecture 9 | Cisco Switch Security Configuration | 00:01:43 Duration |
|
Lecture 10 | Conclusion | 00:01:06 Duration |
Section 22 : Social Engineering
|
Lecture 1 | Introduction | 00:01:35 Duration |
|
Lecture 2 | Security Policy | 00:01:24 Duration |
|
Lecture 3 | Human-based Attacks | 00:02:29 Duration |
|
Lecture 4 | Piggybacking | 00:03:47 Duration |
|
Lecture 5 | Computer-based Attacks | 00:01:12 Duration |
|
Lecture 6 | Phishing Email Demo | 00:04:33 Duration |
|
Lecture 7 | SET-webTemplate Demo | 00:07:12 Duration |
|
Lecture 8 | SET-spear phishing Demo | 00:04:37 Duration |
|
Lecture 9 | SET-trojan Demo | 00:04:17 Duration |
|
Lecture 10 | SET-SMS Spoofing Demo | 00:02:21 Duration |
|
Lecture 11 | Using Social Media | 00:00:58 Duration |
|
Lecture 12 | Conclusion | 00:00:52 Duration |
Section 23 : Denial of Service
|
Lecture 1 | Introduction | 00:02:29 Duration |
|
Lecture 2 | 2014 DDoS Attacks and Impact Report | 00:04:31 Duration |
|
Lecture 3 | DoS and Distributed DoS | 00:04:43 Duration |
|
Lecture 4 | Distributed DoS | 00:03:12 Duration |
|
Lecture 5 | DoS Impact | 00:01:19 Duration |
|
Lecture 6 | Distributed DoS Attack Symptoms | 00:00:46 Duration |
|
Lecture 7 | Digital Attack Map Demo | 00:02:55 Duration |
|
Lecture 8 | DoS, DDoS Attacks | 00:07:00 Duration |
|
Lecture 9 | Introduction to Botnets | 00:02:19 Duration |
|
Lecture 10 | Botnet Ecosystem | 00:08:06 Duration |
|
Lecture 11 | Botnet Propagation | 00:02:08 Duration |
|
Lecture 12 | Botnet Tools | 00:02:01 Duration |
|
Lecture 13 | DDoS Tools | 00:00:42 Duration |
|
Lecture 14 | HOIC Demo | 00:01:27 Duration |
|
Lecture 15 | DoS Attack Detection | 00:00:57 Duration |
|
Lecture 16 | Activity Profiling | 00:00:59 Duration |
|
Lecture 17 | Sequential Change-Point Detection | 00:00:57 Duration |
|
Lecture 18 | Wavelet Analysis | 00:00:36 Duration |
|
Lecture 19 | DoS, DDoS Countermeasures | 00:08:11 Duration |
|
Lecture 20 | Botnet Countermeasures | 00:01:09 Duration |
|
Lecture 21 | Advanced DoS, DDoS Protection Tools | 00:03:02 Duration |
|
Lecture 22 | DDoS in Penetration Testing | 00:01:57 Duration |
|
Lecture 23 | Advanced DDoS Protection Method | 00:00:42 Duration |
|
Lecture 24 | Conclusion | 00:02:00 Duration |
Section 24 : Session Hijacking
|
Lecture 1 | Introduction | 00:05:40 Duration |
|
Lecture 2 | Contributors to Session Hijacking | 00:02:32 Duration |
|
Lecture 3 | Impact of Session Hijacking | 00:00:53 Duration |
|
Lecture 4 | Session Hijacking Strategies | 00:02:24 Duration |
|
Lecture 5 | Session Hijacking Process | 00:02:57 Duration |
|
Lecture 6 | Types of Session Hijacking | 00:11:47 Duration |
|
Lecture 7 | Session Hijacking Tools | 00:00:50 Duration |
|
Lecture 8 | ZAP Tool Demo | 00:04:52 Duration |
|
Lecture 9 | Burp Suite Demo | 00:07:39 Duration |
|
Lecture 10 | TamperIE Demo | 00:07:50 Duration |
|
Lecture 11 | Protection Against Session Hijacking | 00:02:44 Duration |
|
Lecture 12 | IP Security Architecture | 00:01:53 Duration |
|
Lecture 13 | Penetration Testing in Session Hijacking | 00:04:09 Duration |
|
Lecture 14 | Conclusion | 00:01:37 Duration |
Section 25 : Hacking Web and App Servers
|
Lecture 1 | Gathering Information | 00:01:29 Duration |
|
Lecture 2 | Apache2 Demo | 00:09:16 Duration |
|
Lecture 3 | Netcraft Demo | 00:05:20 Duration |
|
Lecture 4 | Website Mirroring Demo | 00:03:43 Duration |
|
Lecture 5 | Web server Attacks | 00:04:07 Duration |
|
Lecture 6 | W3AF Demo | 00:05:05 Duration |
|
Lecture 7 | Vulnerabilites | 00:04:48 Duration |
|
Lecture 8 | WMAP Demo | 00:05:23 Duration |
|
Lecture 9 | Conclusion | 00:00:46 Duration |
Section 26 : Advanced Exploitation Techniques
|
Lecture 1 | Introduction to Exploits | 00:04:03 Duration |
|
Lecture 2 | Metasploit | 00:02:19 Duration |
|
Lecture 3 | Metasploit Demo | 00:04:00 Duration |
|
Lecture 4 | Understanding Metasploit | 00:05:50 Duration |
|
Lecture 5 | Armitage | 00:02:00 Duration |
|
Lecture 6 | Meterpreter Demo | 00:08:22 Duration |
|
Lecture 7 | Metasploit | 00:01:53 Duration |
|
Lecture 8 | Armitage Demo | 00:04:45 Duration |
|
Lecture 9 | Hands on Metasploit | 00:01:03 Duration |
|
Lecture 10 | Exploiting Vulnerabilities | 00:01:41 Duration |
|
Lecture 11 | Payload | 00:01:43 Duration |
|
Lecture 12 | Armitage-mimkatz Demo | 00:04:27 Duration |
|
Lecture 13 | Core Impact Pro | 00:02:54 Duration |
|
Lecture 14 | Conclusion | 00:01:02 Duration |
Section 27 : SQL Injections
|
Lecture 1 | Introduction to SQL Injections | 00:05:29 Duration |
|
Lecture 2 | SQL Injection Methodology | 00:05:22 Duration |
|
Lecture 3 | SQL Injection Attacks | 00:05:16 Duration |
|
Lecture 4 | SQL Injection Detection | 00:01:12 Duration |
|
Lecture 5 | Buffer Overflow Exploit | 00:01:02 Duration |
|
Lecture 6 | BSQL Tool Demo | 00:01:45 Duration |
|
Lecture 7 | SQL Injection Username and Password Demo | 00:04:04 Duration |
|
Lecture 8 | Testing for SQL Injection | 00:01:37 Duration |
|
Lecture 9 | Countermeasures | 00:02:49 Duration |
|
Lecture 10 | SQL Injection Detection Tools | 00:00:55 Duration |
|
Lecture 11 | Conclusion | 00:01:14 Duration |
Section 28 : Wireless Types and Vulnerabilities
|
Lecture 1 | Introduction | 00:00:38 Duration |
|
Lecture 2 | Wireless Communication Systems | 00:02:12 Duration |
|
Lecture 3 | Standards | 00:04:40 Duration |
|
Lecture 4 | InSSIDer Demo | 00:05:49 Duration |
|
Lecture 5 | Encryption Protocols | 00:08:39 Duration |
|
Lecture 6 | WPA2 Encryption | 00:02:53 Duration |
|
Lecture 7 | Systems | 00:07:01 Duration |
|
Lecture 8 | Jammer Demo | 00:02:25 Duration |
|
Lecture 9 | Fake AP Demo | 00:02:44 Duration |
|
Lecture 10 | Attacks | 00:05:04 Duration |
|
Lecture 11 | Capsa Demo | 00:05:41 Duration |
|
Lecture 12 | Conclusion | 00:00:39 Duration |
Section 29 : Hacking Wireless Networks
|
Lecture 1 | Introduction | 00:02:02 Duration |
|
Lecture 2 | Aircrack Suite | 00:03:59 Duration |
|
Lecture 3 | WEP Demo | 00:10:15 Duration |
|
Lecture 4 | WPA2 Demo | 00:05:48 Duration |
|
Lecture 5 | Using Reaver | 00:01:25 Duration |
|
Lecture 6 | Using Windows | 00:01:31 Duration |
|
Lecture 7 | Windows Hacking Demo | 00:04:43 Duration |
|
Lecture 8 | DOS Demo | 00:03:45 Duration |
|
Lecture 9 | Conclusion | 00:00:41 Duration |
Section 30 : Mobile Hacking Basics
|
Lecture 1 | Introduction | 00:01:18 Duration |
|
Lecture 2 | Rise of Mobility | 00:04:55 Duration |
|
Lecture 3 | Areas to Consider | 00:02:30 Duration |
|
Lecture 4 | Device Security | 00:05:23 Duration |
|
Lecture 5 | Android Security Features Demo | 00:07:29 Duration |
|
Lecture 6 | Lookout Demo | 00:04:34 Duration |
|
Lecture 7 | Application Security | 00:01:50 Duration |
|
Lecture 8 | Geo Tagging Demo | 00:05:44 Duration |
|
Lecture 9 | Mobile Applications | 00:04:37 Duration |
|
Lecture 10 | Sophos Demo | 00:05:13 Duration |
|
Lecture 11 | Trend Micro Security Demo | 00:04:43 Duration |
|
Lecture 12 | BYOD Concerns | 00:01:52 Duration |
|
Lecture 13 | iScan Demo | 00:04:01 Duration |
|
Lecture 14 | Options | 00:04:04 Duration |
|
Lecture 15 | App Permissions Demo | 00:04:56 Duration |
|
Lecture 16 | The Virtualization Option | 00:01:52 Duration |
|
Lecture 17 | Conclusion | 00:01:24 Duration |
Section 31 : Evading Firewalls and Honeypots
|
Lecture 1 | Introduction | 00:01:14 Duration |
|
Lecture 2 | Understanding Firewalls | 00:04:01 Duration |
|
Lecture 3 | Firewall Architectures | 00:02:37 Duration |
|
Lecture 4 | Types of Firewalls | 00:04:45 Duration |
|
Lecture 5 | Evading Firewalls | 00:06:31 Duration |
|
Lecture 6 | Configuring Proxy Demo | 00:01:17 Duration |
|
Lecture 7 | Evading Firewalls Using Tunneling | 00:02:52 Duration |
|
Lecture 8 | Evading Firewalls Using External Systems | 00:01:20 Duration |
|
Lecture 9 | Evading Firewalls Using MitM Attacks | 00:01:17 Duration |
|
Lecture 10 | Firewall Evasion Tools | 00:02:11 Duration |
|
Lecture 11 | Firewall Bypassing and Pentration Testing Demo | 00:01:23 Duration |
|
Lecture 12 | Firewall Evasion Tools Continued | 00:03:27 Duration |
|
Lecture 13 | Honeypots Defined | 00:00:54 Duration |
|
Lecture 14 | Types of Honeypots | 00:03:29 Duration |
|
Lecture 15 | Detecting Honeypots | 00:02:09 Duration |
|
Lecture 16 | Honeypot Using Atomic Software Demo | 00:01:49 Duration |
|
Lecture 17 | Countermeasures | 00:01:31 Duration |
|
Lecture 18 | Penetration Testing | 00:03:30 Duration |
|
Lecture 19 | Conclusion | 00:01:10 Duration |
Section 32 : Evading IDS
|
Lecture 1 | Introduction | 00:02:09 Duration |
|
Lecture 2 | Intrusion Detection Systems | 00:04:21 Duration |
|
Lecture 3 | Introduction | 00:00:39 Duration |
|
Lecture 4 | Encryption and Flooding | 00:01:59 Duration |
|
Lecture 5 | Obfuscating | 00:00:59 Duration |
|
Lecture 6 | Fragmentation Attack | 00:01:40 Duration |
|
Lecture 7 | Overlapping Fragments | 00:00:57 Duration |
|
Lecture 8 | Vulnerabilites | 00:00:55 Duration |
|
Lecture 9 | How to Avoid IDS Demo | 00:01:43 Duration |
|
Lecture 10 | Insertion Attack | 00:00:52 Duration |
|
Lecture 11 | Evasion Attack | 00:00:47 Duration |
|
Lecture 12 | Denial-of-Service Attack | 00:02:17 Duration |
|
Lecture 13 | Application-Layer Attacks | 00:00:56 Duration |
|
Lecture 14 | Time to Live Attacks | 00:01:22 Duration |
|
Lecture 15 | False Positive Generation | 00:00:36 Duration |
|
Lecture 16 | Urgency Flag | 00:00:52 Duration |
|
Lecture 17 | Session Splicing | 00:01:23 Duration |
|
Lecture 18 | Pre Connection SYN | 00:01:08 Duration |
|
Lecture 19 | Post Connection SYN | 00:01:50 Duration |
|
Lecture 20 | Snort | 00:00:43 Duration |
|
Lecture 21 | More Tools | 00:03:36 Duration |
|
Lecture 22 | Ways to Detect | 00:02:56 Duration |
|
Lecture 23 | ADMutate | 00:00:34 Duration |
|
Lecture 24 | Other Evading Tools | 00:01:41 Duration |
|
Lecture 25 | Centralized Security Management | 00:03:27 Duration |
|
Lecture 26 | IDS Penetration Testing | 00:02:29 Duration |
|
Lecture 27 | Conclusion | 00:00:46 Duration |
Section 33 : Buffer Overflows
|
Lecture 1 | Introduction to Buffer Overflow | 00:03:14 Duration |
|
Lecture 2 | Stacks | 00:04:25 Duration |
|
Lecture 3 | Stack Overflow Demo | 00:01:57 Duration |
|
Lecture 4 | Heaps | 00:02:06 Duration |
|
Lecture 5 | Heap Overflow Demo | 00:02:04 Duration |
|
Lecture 6 | Format Strings | 00:01:10 Duration |
|
Lecture 7 | Format String Buffer Overflow Demo | 00:01:48 Duration |
|
Lecture 8 | Integer Overflow Demo | 00:01:15 Duration |
|
Lecture 9 | Vulnerability to Buffer Overflows | 00:03:34 Duration |
|
Lecture 10 | Buffer Overflow Demo | 00:01:26 Duration |
|
Lecture 11 | About Proctor Testing | |
|
Lecture 12 | Identifying Buffer Overflows | 00:01:47 Duration |
|
Lecture 13 | Defense Against Buffer Overflows | 00:02:27 Duration |
|
Lecture 14 | Programming Countermeasures | 00:02:45 Duration |
|
Lecture 15 | Buffer Overflow Security Tools | 00:02:29 Duration |
|
Lecture 16 | Buffer Overflow Pentesting | 00:01:12 Duration |
|
Lecture 17 | Conclusion | 00:00:42 Duration |
Section 34 : Cryptography
|
Lecture 1 | Introduction | 00:00:31 Duration |
|
Lecture 2 | Public key Infrastructure (PKI) | 00:02:29 Duration |
|
Lecture 3 | PKI Installation Demo | 00:11:33 Duration |
|
Lecture 4 | Certificate Authority (CA) | 00:00:48 Duration |
|
Lecture 5 | Confi-complete Demo | 00:07:54 Duration |
|
Lecture 6 | CRL Demo | 00:04:09 Duration |
|
Lecture 7 | Enroll Certificate Demo | 00:02:53 Duration |
|
Lecture 8 | Secure Communication with Certificates | 00:03:00 Duration |
|
Lecture 9 | Certificate Management | 00:01:59 Duration |
|
Lecture 10 | CA Management Demo | 00:06:22 Duration |
|
Lecture 11 | Conclusion | 00:00:35 Duration |
Section 35 : Cryptography Weaknesses
|
Lecture 1 | Introduction | 00:02:31 Duration |
|
Lecture 2 | BitLocker Demo | 00:04:16 Duration |
|
Lecture 3 | Cryptographic Schemes | 00:00:48 Duration |
|
Lecture 4 | Introduction | 00:01:02 Duration |
|
Lecture 5 | Symmetric Demo | 00:02:42 Duration |
|
Lecture 6 | Stream and Block Ciphers | 00:03:42 Duration |
|
Lecture 7 | AES | 00:09:39 Duration |
|
Lecture 8 | Introduction | 00:01:58 Duration |
|
Lecture 9 | Asymmetric Demo | 00:03:13 Duration |
|
Lecture 10 | Key Exchange Methods | 00:03:39 Duration |
|
Lecture 11 | Hashing | 00:01:01 Duration |
|
Lecture 12 | Hashcalc Demo | 00:01:37 Duration |
|
Lecture 13 | Hash Algorithms | 00:03:51 Duration |
|
Lecture 14 | Encryption Usage Examples | 00:01:28 Duration |
|
Lecture 15 | Signature Demo | 00:04:09 Duration |
|
Lecture 16 | Internet Security | 00:02:53 Duration |
|
Lecture 17 | Conclusion | 00:00:38 Duration |
Section 36 : Cloud Computing Concepts
|
Lecture 1 | Introduction to Cloud Computing | 00:08:45 Duration |
|
Lecture 2 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM |
Section 37 : Cloud Computing Attacks
|
Lecture 1 | Types of Attacks | 00:08:26 Duration |
|
Lecture 2 | Cloud Computing Security | 00:02:41 Duration |