Requires completion of course : Introduction to Cyber Security and Hacking
Course Curriculum
IT Security Trends | |||
Introduction to Current Cyber Threats | 00:15:00 | ||
IT Prehistory | 00:15:00 | ||
Let’s look a few years’ back | 00:15:00 | ||
Cyber-crimes – an evolution not revolution | 00:15:00 | ||
Current Cyber Threats – examination | 00:15:00 | ||
Popular myths about IT security – origins | 00:15:00 | ||
Myths #1 – you’ll never be hacked | 00:15:00 | ||
Myths #2 – you don’t need any protection software or hardware | 00:15:00 | ||
Myths #3 – IT security is always a priority | 00:15:00 | ||
Popular Myths About Computer System Security | 00:15:00 | ||
Trends in IT Security | 00:15:00 | ||
The birth of technology society | 00:15:00 | ||
EXERCISE: How much info can you gather? | 00:15:00 | ||
Fake identity | 00:15:00 | ||
Online privacy | 00:15:00 | ||
Analysing sniffing software | 00:15:00 | ||
Cyber War | 00:15:00 | ||
Changing IT Security Trends | 00:15:00 | ||
Objective #1 – Data security – Introduction | 00:15:00 | ||
Confidentiality of data | 00:15:00 | ||
Exercise: Finding confidential data with search engines | 00:15:00 | ||
Integrity of data | 00:15:00 | ||
Data security | 00:15:00 | ||
Computer Network Security | |||
Network security – introduction | 00:15:00 | ||
OSI MODEL #1 – Physical layer | 00:15:00 | ||
OSI MODEL #2 – Data link layer | 00:15:00 | ||
Threats: MAC spoofing | 00:15:00 | ||
Threats: ARP Poisoning | 00:15:00 | ||
Exercise: Data Link Layer Attack | 00:15:00 | ||
OSI MODEL #3 – Network layer | 00:15:00 | ||
TCP Tunnelling over ICMP | 00:15:00 | ||
Network Protocols | 00:15:00 | ||
OSI MODEL #4 – Transport Layer | 00:15:00 | ||
Threats: Enumerating Remote Computers | 00:15:00 | ||
Exercise: Transport Layer Attack using METASPLOIT part 1 | 00:15:00 | ||
Exercise: Transport Layer Attack using METASPLOIT part 2 | 00:15:00 | ||
OSI MODEL #5 – Session Layer | 00:15:00 | ||
Transport Protocols | 00:15:00 | ||
OSI MODEL #6 – Presentation Layer | 00:15:00 | ||
OSI MODEL #7 – Application Layer | 00:15:00 | ||
Exercise: Application Layer Attacks | 00:15:00 | ||
Backtrack: Attack Demonstration | 00:15:00 | ||
Man-in-the-Middle and Denial of Service Attacks | 00:15:00 | ||
Modifying Transmitted Packets | 00:15:00 | ||
Unencrypted protocols | 00:15:00 | ||
Application Protocols | 00:15:00 | ||
Designing Secure Computer Networks | |||
Designing Computer Networks – introduction | 00:15:00 | ||
Subnetting IPv4 | 00:15:00 | ||
Subnetting IPv6 | 00:15:00 | ||
Subnetting | 00:15:00 | ||
IPv6 address notation | 00:15:00 | ||
DMZ: demilitarized Zone | 00:15:00 | ||
Protocols and services: IP SEC | 00:15:00 | ||
IP SEC: Phase 1 | 00:15:00 | ||
Network Address translation | 00:15:00 | ||
Network access control: RADIUS | 00:15:00 | ||
Protocols and Services | 00:15:00 | ||
Network administration | |||
Introduction to Monitoring Transmitted Data | 00:15:00 | ||
Monitoring Transmitted Data – Basic information | 00:15:00 | ||
Intrusion detection systems | 00:15:00 | ||
Why are firewalls and NDIS not enough? | 00:15:00 | ||
Wireshark – Introduction to network analysis | 00:15:00 | ||
How to use Wireshark? | 00:15:00 | ||
Analysing Captured data | 00:15:00 | ||
How to analyse telnet protocol? | 00:15:00 | ||
Intrusion detection | 00:15:00 | ||
Scanning computers | 00:15:00 | ||
Monitoring transmitted data | 00:15:00 | ||
Wireless Networks Security | |||
Wireless Networks | 00:15:00 | ||
WIFI security solutions – introduction | 00:15:00 | ||
WIFI – working principles | 00:15:00 | ||
Other wireless technologies | 00:15:00 | ||
Threats and risks | 00:15:00 | ||
Ineffective solutions | 00:15:00 | ||
Authentication methods | 00:15:00 | ||
802.11 WEP | 00:15:00 | ||
802.11I WPA | 00:15:00 | ||
Standards and Security Solutions | 00:15:00 | ||
Threats of WIFI networks | 00:15:00 | ||
Client Attacks: Launching a rogue access point | 00:15:00 | ||
Client Attacks: Evil twin | 00:15:00 | ||
Client Attacks: Denial of service | 00:15:00 | ||
Exercise: WPA attack | 00:15:00 | ||
Wi-Fi Security Threats | 00:15:00 | ||
Operating Systems Security | |||
Operating systems security – introduction | 00:15:00 | ||
Security boundaries | 00:15:00 | ||
Three core | 00:15:00 | ||
Exercise: OS boundaries | 00:15:00 | ||
Process isolation | 00:15:00 | ||
Kernel Mode Code Signing | 00:15:00 | ||
Java Virtual Machine and code access security | 00:15:00 | ||
OS Security Boundaries | 00:15:00 | ||
Malware | 00:15:00 | ||
Exercise: Vulnerability attacks | 00:15:00 | ||
Exercise: Identifying suspicious processes | 00:15:00 | ||
Demonstration: Process Explorer | 00:15:00 | ||
Exercise: Removing malware | 00:15:00 | ||
Rootkits | 00:15:00 | ||
Exercise: Detecting rootkits | 00:15:00 | ||
Exercise: Security evaluation | 00:15:00 | ||
Malware – OSS | 00:15:00 | ||
Access Control | |||
Authentication and authorisation – Introduction | 00:15:00 | ||
Authentication users | 00:15:00 | ||
How secure is your password? | 00:15:00 | ||
Authentication protocols and services | 00:15:00 | ||
Authentication | 00:15:00 | ||
LM Hash | 00:15:00 | ||
Cached Credentials | 00:15:00 | ||
KERBEROS | 00:15:00 | ||
Identity Theft | 00:15:00 | ||
Exercise: Offline attacks | 00:15:00 | ||
Using online cracking services | 00:15:00 | ||
Identity Theft Advanced | 00:15:00 | ||
Windows Security | |||
Windows Security – what you’ll learn | 00:15:00 | ||
User Account Control | 00:15:00 | ||
UAC configuration | 00:15:00 | ||
Additional Security Features – ASLR and DEP | 00:15:00 | ||
PatchGuard | 00:15:00 | ||
Techniques and Methods | 00:15:00 | ||
Encryption – key protection | 00:15:00 | ||
Drive encryption | 00:15:00 | ||
BitLocker | 00:15:00 | ||
BitLocker to Go Reader | 00:15:00 | ||
File and folder encryption – EFS | 00:15:00 | ||
Exercise: EFS | 00:15:00 | ||
Encryption | 00:15:00 | ||
Security Policies | |||
Security policies – introduction | 00:15:00 | ||
What is security? | 00:15:00 | ||
Information security | 00:15:00 | ||
Information security – level up | 00:15:00 | ||
Security issues | 00:15:00 | ||
Why are security solutions fallible? | 00:15:00 | ||
Security policy issues | 00:15:00 | ||
Introduction to threat modelling and classification | 00:15:00 | ||
Threat modelling – STRIDE | 00:15:00 | ||
STRIDE: Spoofing identity | 00:15:00 | ||
STRIDE: Tampering with Data | 00:15:00 | ||
STRIDE: Denial of Service | 00:15:00 | ||
Risk Management | |||
Introduction to Risk Management | 00:15:00 | ||
Attack methods | 00:15:00 | ||
Local attacks | 00:15:00 | ||
Target scanning and enumeration techniques #1 | 00:15:00 | ||
Target scanning and enumeration techniques #2 | 00:15:00 | ||
Passive scanning | 00:15:00 | ||
Attack Methodologies | 00:15:00 | ||
Introduction to risk assessment | 00:15:00 | ||
DREAD: Risk assessment model | 00:15:00 | ||
DREAD: Exploitability | 00:15:00 | ||
Exercise: Risk Assessment | 00:15:00 | ||
Risk Assessment | 00:15:00 | ||
Introduction to Social Engineering and rogue software | 00:15:00 | ||
Manipulation tactics | 00:15:00 | ||
Exercise: Social Engineering attacks | 00:15:00 | ||
SE with KALI / BackTrack | 00:15:00 | ||
Rogue Software | 00:15:00 | ||
Fraud tools #1 | 00:15:00 | ||
Fraud tools #2 | 00:15:00 | ||
Social Engineering and Rogue Software | 00:15:00 | ||
Defence in Depth | |||
Introduction to Defence in Depth | 00:15:00 | ||
How to use Defence in Depth model? | 00:15:00 | ||
DiD: OS and LAN Layers | 00:15:00 | ||
DiD: Perimeter and Physical Access Layers | 00:15:00 | ||
DiD: Demonstration | 00:15:00 | ||
Automated attack targeting a service | 00:15:00 | ||
Automated user-targeting attack | 00:15:00 | ||
The Defence in Depth Model | 00:15:00 | ||
Introduction to Immutable laws of security – Law #1 | 00:15:00 | ||
Law #2 | 00:15:00 | ||
Law #3 | 00:15:00 | ||
Law #4 | 00:15:00 | ||
Law #5 | 00:15:00 | ||
Law #6 | 00:15:00 | ||
Law #7 | 00:15:00 | ||
Law #8 | 00:15:00 | ||
Law #9 | 00:15:00 | ||
Law #10 | 00:15:00 | ||
Laws for administrators | 00:15:00 | ||
Immutable Laws of Security | 00:15:00 | ||
Disaster Recovery | |||
Introduction to Disaster Recovery | 00:15:00 | ||
How to reduce losses? | 00:15:00 | ||
Ensuring continuous availability | 00:15:00 | ||
Threat discovery #1 | 00:15:00 | ||
Threat discovery #2 | 00:15:00 | ||
Audit users and keep control accounts | 00:15:00 | ||
High risk users | 00:15:00 | ||
Collecting and analysing evidence | 00:15:00 | ||
Forensics example | 00:15:00 | ||
CONFICKER: CASE STUDY | 00:15:00 | ||
How to reduce losses – Level Up | 00:15:00 | ||
Application Security | |||
Check your knowledge and get ready for the exam | 00:15:00 | ||
Introduction to Application Security | 00:15:00 | ||
Attacks on applications | 00:15:00 | ||
SQL Injection – Level Up | 00:15:00 | ||
Exercise: Analyse the application | 00:15:00 | ||
Blind SQL Injection | 00:15:00 | ||
Automated SQL Injection | 00:15:00 | ||
Cross-site scripting – XSS | 00:15:00 | ||
Application Attacks | 00:15:00 | ||
Program Security Assessment | 00:15:00 | ||
Unsafe applications | 00:15:00 | ||
Program security assessment Level Up | 00:15:00 | ||
Check your knowledge and get ready for the exam | 00:15:00 | ||
Application Security - Configuration and Management | |||
Here’s what you’ll learn in this module | 00:15:00 | ||
Managing applications | 00:15:00 | ||
Software updates | 00:15:00 | ||
MS Update | 00:15:00 | ||
System Center Configuration Manager | 00:15:00 | ||
Blocking applications | 00:15:00 | ||
Software restrictions policies | 00:15:00 | ||
Exercise: Application control rules | 00:15:00 | ||
Isolating applications | 00:15:00 | ||
How to protect users without interrupting their work | 00:15:00 | ||
Cryptography | |||
Introduction to cryptology | 00:15:00 | ||
History of ciphers | 00:15:00 | ||
Symmetric and asymmetric ciphers | 00:15:00 | ||
Symmetric-key algorithms | 00:15:00 | ||
Block ciphers | 00:15:00 | ||
Data encryption standard | 00:15:00 | ||
DES-X | 00:15:00 | ||
Advanced encryption standards | 00:15:00 | ||
Block cipher modes | 00:15:00 | ||
Stream Ciphers – RC4 | 00:15:00 | ||
Asymmetric-key algorithms | 00:15:00 | ||
RSA_ | 00:15:00 | ||
ELGAMAL | 00:15:00 | ||
HASH functions | 00:15:00 | ||
Digital signature | 00:15:00 | ||
Hybrid Schemes | 00:15:00 | ||
Symmetric and Asymmetric Ciphers Advanced | 00:15:00 | ||
Public Key Infrastructure | |||
Introduction to cryptology | 00:15:00 | ||
Public key infrastructure | 00:15:00 | ||
Implementing public key infrastructure | 00:15:00 | ||
What will PKI allow you? | 00:15:00 | ||
Exercise: Certificates | 00:15:00 | ||
Planning the PKI | 00:15:00 | ||
Certificate life cycle | 00:15:00 | ||
PKI Administration | 00:15:00 | ||
Threat Modelling and Classification | 00:15:00 | ||
Public Key Infrastructure – Trust but verify | 00:15:00 | ||
BONUS section - get your coupon code here | |||
BONUS: Examination – your voucher | 00:15:00 | ||
BONUS LECTURE | 00:15:00 |
Course Reviews
No Reviews found for this course.
15 STUDENTS ENROLLED