Setup Menus in Admin Panel

  • LOGIN
  • No products in the basket.

Requires completion of course : Introduction to Cyber Security and Hacking

Course Curriculum

IT Security Trends
Introduction to Current Cyber Threats 00:15:00
IT Prehistory 00:15:00
Let’s look a few years’ back 00:15:00
Cyber-crimes – an evolution not revolution 00:15:00
Current Cyber Threats – examination 00:15:00
Popular myths about IT security – origins 00:15:00
Myths #1 – you’ll never be hacked 00:15:00
Myths #2 – you don’t need any protection software or hardware 00:15:00
Myths #3 – IT security is always a priority 00:15:00
Popular Myths About Computer System Security 00:15:00
Trends in IT Security 00:15:00
The birth of technology society 00:15:00
EXERCISE: How much info can you gather? 00:15:00
Fake identity 00:15:00
Online privacy 00:15:00
Analysing sniffing software 00:15:00
Cyber War 00:15:00
Changing IT Security Trends 00:15:00
Objective #1 – Data security – Introduction 00:15:00
Confidentiality of data 00:15:00
Exercise: Finding confidential data with search engines 00:15:00
Integrity of data 00:15:00
Data security 00:15:00
Computer Network Security
Network security – introduction 00:15:00
OSI MODEL #1 – Physical layer 00:15:00
OSI MODEL #2 – Data link layer 00:15:00
Threats: MAC spoofing 00:15:00
Threats: ARP Poisoning 00:15:00
Exercise: Data Link Layer Attack 00:15:00
OSI MODEL #3 – Network layer 00:15:00
TCP Tunnelling over ICMP 00:15:00
Network Protocols 00:15:00
OSI MODEL #4 – Transport Layer 00:15:00
Threats: Enumerating Remote Computers 00:15:00
Exercise: Transport Layer Attack using METASPLOIT part 1 00:15:00
Exercise: Transport Layer Attack using METASPLOIT part 2 00:15:00
OSI MODEL #5 – Session Layer 00:15:00
Transport Protocols 00:15:00
OSI MODEL #6 – Presentation Layer 00:15:00
OSI MODEL #7 – Application Layer 00:15:00
Exercise: Application Layer Attacks 00:15:00
Backtrack: Attack Demonstration 00:15:00
Man-in-the-Middle and Denial of Service Attacks 00:15:00
Modifying Transmitted Packets 00:15:00
Unencrypted protocols 00:15:00
Application Protocols 00:15:00
Designing Secure Computer Networks
Designing Computer Networks – introduction 00:15:00
Subnetting IPv4 00:15:00
Subnetting IPv6 00:15:00
Subnetting 00:15:00
IPv6 address notation 00:15:00
DMZ: demilitarized Zone 00:15:00
Protocols and services: IP SEC 00:15:00
IP SEC: Phase 1 00:15:00
Network Address translation 00:15:00
Network access control: RADIUS 00:15:00
Protocols and Services 00:15:00
Network administration
Introduction to Monitoring Transmitted Data 00:15:00
Monitoring Transmitted Data – Basic information 00:15:00
Intrusion detection systems 00:15:00
Why are firewalls and NDIS not enough? 00:15:00
Wireshark – Introduction to network analysis 00:15:00
How to use Wireshark? 00:15:00
Analysing Captured data 00:15:00
How to analyse telnet protocol? 00:15:00
Intrusion detection 00:15:00
Scanning computers 00:15:00
Monitoring transmitted data 00:15:00
Wireless Networks Security
Wireless Networks 00:15:00
WIFI security solutions – introduction 00:15:00
WIFI – working principles 00:15:00
Other wireless technologies 00:15:00
Threats and risks 00:15:00
Ineffective solutions 00:15:00
Authentication methods 00:15:00
802.11 WEP 00:15:00
802.11I WPA 00:15:00
Standards and Security Solutions 00:15:00
Threats of WIFI networks 00:15:00
Client Attacks: Launching a rogue access point 00:15:00
Client Attacks: Evil twin 00:15:00
Client Attacks: Denial of service 00:15:00
Exercise: WPA attack 00:15:00
Wi-Fi Security Threats 00:15:00
Operating Systems Security
Operating systems security – introduction 00:15:00
Security boundaries 00:15:00
Three core 00:15:00
Exercise: OS boundaries 00:15:00
Process isolation 00:15:00
Kernel Mode Code Signing 00:15:00
Java Virtual Machine and code access security 00:15:00
OS Security Boundaries 00:15:00
Malware 00:15:00
Exercise: Vulnerability attacks 00:15:00
Exercise: Identifying suspicious processes 00:15:00
Demonstration: Process Explorer 00:15:00
Exercise: Removing malware 00:15:00
Rootkits 00:15:00
Exercise: Detecting rootkits 00:15:00
Exercise: Security evaluation 00:15:00
Malware – OSS 00:15:00
Access Control
Authentication and authorisation – Introduction 00:15:00
Authentication users 00:15:00
How secure is your password? 00:15:00
Authentication protocols and services 00:15:00
Authentication 00:15:00
LM Hash 00:15:00
Cached Credentials 00:15:00
KERBEROS 00:15:00
Identity Theft 00:15:00
Exercise: Offline attacks 00:15:00
Using online cracking services 00:15:00
Identity Theft Advanced 00:15:00
Windows Security
Windows Security – what you’ll learn 00:15:00
User Account Control 00:15:00
UAC configuration 00:15:00
Additional Security Features – ASLR and DEP 00:15:00
PatchGuard 00:15:00
Techniques and Methods 00:15:00
Encryption – key protection 00:15:00
Drive encryption 00:15:00
BitLocker 00:15:00
BitLocker to Go Reader 00:15:00
File and folder encryption – EFS 00:15:00
Exercise: EFS 00:15:00
Encryption 00:15:00
Security Policies
Security policies – introduction 00:15:00
What is security? 00:15:00
Information security 00:15:00
Information security – level up 00:15:00
Security issues 00:15:00
Why are security solutions fallible? 00:15:00
Security policy issues 00:15:00
Introduction to threat modelling and classification 00:15:00
Threat modelling – STRIDE 00:15:00
STRIDE: Spoofing identity 00:15:00
STRIDE: Tampering with Data 00:15:00
STRIDE: Denial of Service 00:15:00
Risk Management
Introduction to Risk Management 00:15:00
Attack methods 00:15:00
Local attacks 00:15:00
Target scanning and enumeration techniques #1 00:15:00
Target scanning and enumeration techniques #2 00:15:00
Passive scanning 00:15:00
Attack Methodologies 00:15:00
Introduction to risk assessment 00:15:00
DREAD: Risk assessment model 00:15:00
DREAD: Exploitability 00:15:00
Exercise: Risk Assessment 00:15:00
Risk Assessment 00:15:00
Introduction to Social Engineering and rogue software 00:15:00
Manipulation tactics 00:15:00
Exercise: Social Engineering attacks 00:15:00
SE with KALI / BackTrack 00:15:00
Rogue Software 00:15:00
Fraud tools #1 00:15:00
Fraud tools #2 00:15:00
Social Engineering and Rogue Software 00:15:00
Defence in Depth
Introduction to Defence in Depth 00:15:00
How to use Defence in Depth model? 00:15:00
DiD: OS and LAN Layers 00:15:00
DiD: Perimeter and Physical Access Layers 00:15:00
DiD: Demonstration 00:15:00
Automated attack targeting a service 00:15:00
Automated user-targeting attack 00:15:00
The Defence in Depth Model 00:15:00
Introduction to Immutable laws of security – Law #1 00:15:00
Law #2 00:15:00
Law #3 00:15:00
Law #4 00:15:00
Law #5 00:15:00
Law #6 00:15:00
Law #7 00:15:00
Law #8 00:15:00
Law #9 00:15:00
Law #10 00:15:00
Laws for administrators 00:15:00
Immutable Laws of Security 00:15:00
Disaster Recovery
Introduction to Disaster Recovery 00:15:00
How to reduce losses? 00:15:00
Ensuring continuous availability 00:15:00
Threat discovery #1 00:15:00
Threat discovery #2 00:15:00
Audit users and keep control accounts 00:15:00
High risk users 00:15:00
Collecting and analysing evidence 00:15:00
Forensics example 00:15:00
CONFICKER: CASE STUDY 00:15:00
How to reduce losses – Level Up 00:15:00
Application Security
Check your knowledge and get ready for the exam 00:15:00
Introduction to Application Security 00:15:00
Attacks on applications 00:15:00
SQL Injection – Level Up 00:15:00
Exercise: Analyse the application 00:15:00
Blind SQL Injection 00:15:00
Automated SQL Injection 00:15:00
Cross-site scripting – XSS 00:15:00
Application Attacks 00:15:00
Program Security Assessment 00:15:00
Unsafe applications 00:15:00
Program security assessment Level Up 00:15:00
Check your knowledge and get ready for the exam 00:15:00
Application Security - Configuration and Management
Here’s what you’ll learn in this module 00:15:00
Managing applications 00:15:00
Software updates 00:15:00
MS Update 00:15:00
System Center Configuration Manager 00:15:00
Blocking applications 00:15:00
Software restrictions policies 00:15:00
Exercise: Application control rules 00:15:00
Isolating applications 00:15:00
How to protect users without interrupting their work 00:15:00
Cryptography
Introduction to cryptology 00:15:00
History of ciphers 00:15:00
Symmetric and asymmetric ciphers 00:15:00
Symmetric-key algorithms 00:15:00
Block ciphers 00:15:00
Data encryption standard 00:15:00
DES-X 00:15:00
Advanced encryption standards 00:15:00
Block cipher modes 00:15:00
Stream Ciphers – RC4 00:15:00
Asymmetric-key algorithms 00:15:00
RSA_ 00:15:00
ELGAMAL 00:15:00
HASH functions 00:15:00
Digital signature 00:15:00
Hybrid Schemes 00:15:00
Symmetric and Asymmetric Ciphers Advanced 00:15:00
Public Key Infrastructure
Introduction to cryptology 00:15:00
Public key infrastructure 00:15:00
Implementing public key infrastructure 00:15:00
What will PKI allow you? 00:15:00
Exercise: Certificates 00:15:00
Planning the PKI 00:15:00
Certificate life cycle 00:15:00
PKI Administration 00:15:00
Threat Modelling and Classification 00:15:00
Public Key Infrastructure – Trust but verify 00:15:00
BONUS section - get your coupon code here
BONUS: Examination – your voucher 00:15:00
BONUS LECTURE 00:15:00

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE
15 STUDENTS ENROLLED

    TOP RATED COURSES

    Reviews

    Template Design © eTraining.Online All rights reserved.
    X