Get $1 credit for every $25 spent!

The Ultimate 2020 White Hat Hacker Certification Bundle

Ending In:
Add to Cart - $39.90
Add to Cart ($39.90)
$1,345
97% off
wishlist
Courses
10
Lessons
996
Enrolled
1,101

What's Included

Product Details

Access
Lifetime
Content
11.0 hours
Lessons
120

The Complete Cyber Security Course, Vol.1: Hackers Exposed

Stop Hackers, Prevent Tracking, & Counter Government Surveillance

By Nathan House | in Online Courses

Internet security has never been as important as it is today with more information than ever being handled digitally around the globe. In this course, you'll get an introduction to hacking and how to protect yourself and others. You'll develop an understanding of the threat and vulnerability landscape through threat modeling and risk assessments, and build a foundation for which to expand your security knowledge.

25,373 positive ratings from 146,300 students enrolled

  • Access 120 lectures & 11 hours of content 24/7
  • Explore the Darknet, malware, exploit kits, phishing, zero-day vulnerabilities, & more
  • Learn about global tracking & hacking infrastructures that nation states run
  • Understand the foundations of operating system security & privacy functionality
  • Get a crash course on encryption, how it can be bypassed, & what you can do to mitigate risks
  • Discover defenses against phishing, SMShing, vishing, identity theft, & other cons

"It's a fantastic course that I would highly recommend for anyone who wishes to jump in/enrich their knowledge in regards to cybersecurity." – Marcin Duszynski

Nathan House | Leading Cyber Security Expert

4.5/5 Instructor Rating: ★ ★ ★ ★

Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.

His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:
  • BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: all levels

Requirements

  • Basic understanding of using operating systems, networks, and the Internet
  • Able to download and install software

Course Outline

  • Section 1. Introduction
    • Welcome and Introduction to the Instructor! - 2:06
    • Security Quick Win! - 11:40
    • Goals and Learning Objectives - Volume 1 - 2:30
    • Target Audience Preview - 1:54
    • Study Recommendations - 4:19
    • The Forum - For Questions, Answers and Other Resources - 1:34
    • Course updates - 0:40
  • Section 2. Know Yourself - The Threat and Vulnerability Landscape
    • Goals and Learning Objectives - 0:41
    • Protect What You Value - 2:04
    • What is Privacy, Anonymity and Pseudonymity - 4:35
    • Security, Vulnerabilities, Threats and Adversaries - 4:37
    • Threat Modeling and Risk Assessments - 7:51
    • Security vs Privacy vs Anonymity - Can we have it all? - 1:56
    • Defense In Depth - 1:35
    • The Zero Trust Model - 3:40
  • Section 3. Know Your Enemy - The Current Threat and Vulnerability Landscape
    • Goals and Learning Objectives - 0:43
    • Why You Need Security – The Value Of A Hack - 5:14
    • The Top 3 Things You Need To Stay Safe Online - 1:23
    • Security Bugs and Vulnerabilities - The Vulnerability Landscape - 5:48
    • Hackers, crackers and cyber criminals - 2:32
    • Malware, viruses, rootkits and RATs - 6:56
    • Spyware, Adware, Scareware, PUPs & Browser hijacking - 4:44
    • What is Phishing, Vishing and SMShing - 14:53
    • Spamming & Doxing - 3:15
    • Social engineering - Scams, cons, tricks and fraud - 5:31
    • Darknets, Dark Markets and Exploit kits - 8:04
    • Governments, spies and secret stuff part I - 5:12
    • Governments, spies and secret stuff part II - 9:43
    • Regulating encryption, mandating insecurity & legalizing spying - 14:36
    • Trust & Backdoors - 10:14
    • Censorship - 2:24
    • Security News and Alerts – Stay Informed - 0:49
  • Section 4. Encryption Crash Course
    • Goals and Learning Objectives - 0:24
    • Symmetric Encryption - 9:54
    • Asymmetric Encryption - 10:17
    • Hash Functions - 6:32
    • Digital Signatures - 4:45
    • Secure Sockets Layer (SSL) and Transport layer security (TLS) - 13:26
    • SSL Stripping - 12:02
    • HTTPS (HTTP Secure) - 7:49
    • Digital Certificates - 6:19
    • Certificate Authorities and HTTPS - 12:56
    • End-to-End Encryption (E2EE) - 1:57
    • Steganography - 8:12
    • How Security and Encryption is Really Attacked - 2:42
  • Section 5. Setting up a Testing Environment Using Virtual Machines
    • Goals and Learning Objectives - 0:27
    • Introduction to Setting up a Testing Environment Using Virtual Machines - 10:08
    • Vmware - 10:55
    • Virtual box - 12:03
    • Kali Linux - 2:50
  • Section 6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)
    • Goals and Learning Objectives - 0:37
    • Security Features and Functionality - 5:56
    • Security Bugs and Vulnerabilities - 5:31
    • Usage Share - 5:01
    • Windows 10 - Privacy & Tracking - 6:08
    • Windows 10 - Disable tracking automatically - 4:42
    • Windows 10 - Tool : Disable Windows 10 Tracking - 8:14
    • Windows 10 – Cortana - 2:59
    • Windows 10 – Privacy Settings - 9:40
    • Windows 10 - WiFi Sense - 4:16
    • Windows 7, 8 and 8.1 - Privacy & Tracking - 7:19
    • Mac - Privacy & Tracking - 4:28
    • Linux and Unix “like” Operating systems - 3:30
    • General Use Operating Systems (Windows, MacOS and Linux) - 3:45
    • General Use Operating Systems With a Security and Privacy Focus (Debian, Arch) - 5:04
    • Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS) - 2:55
    • Anonymity Focused Operating Systems (Tails and Whonix OS) - 2:56
    • Penetration Testing and Ethical Hacking Focused Operating Systems - 0:49
    • Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish) - 2:31
    • Linux - Debian 8 Jessie - Virtual box guest additions Issue - 6:26
  • Section 7. Security Bugs and Vulnerabilities
    • Goals and Learning Objectives - 0:25
    • The Importance of Patching - 3:47
    • Windows 7 - Auto Update - 1:15
    • Windows 8 & 8.1 - Auto Update - 1:24
    • Windows 10 - Auto Update - 1:25
    • Windows - Criticality and Patch Tuesday - 3:46
    • Windows 7, 8, 8.1 & 10 - Automate the pain away from patching - 8:34
    • Linux - Debian - Patching - 10:58
    • Mac - Patching - 6:58
    • Firefox - Browser and extension updates - 4:23
    • Chrome - Browser and extension updates - 1:13
    • IE and Edge - Browser and extention updates - 0:46
    • Auto updates - The Impact to privacy and anonymity - 1:41
  • Section. 8 Reducing Threat Privilege
    • Goals and Learning Objectives + Removing Privilege - 2:53
    • Windows 7 - Not using admin - 3:32
    • Windows 8 and 8.1 - Not using admin - 4:14
    • Windows 10 - Not using admin - 3:25
  • Section 9. Social Engineering and Social Media Offence and Defence
    • Goals and Learning Objectives - 0:26
    • Information Disclosure and Identity Strategies for Social Media - 12:34
    • Identify Verification and Registration - 5:05
    • Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1 - 7:50
    • Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2 - 10:22
    • Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons) - 5:02
  • Section 10. Security Domains
    • Goals and Learning Objectives - 0:20
    • Security Domains - 10:00
  • Section 11. Security Through Isolation and Compartmentalization
    • Goals and Learning Objectives - 0:37
    • Introduction to Isolation and Compartmentalization - 2:10
    • Physical and Hardware Isolation - How to change the Mac Address - 7:10
    • Physical and Hardware Isolation - Hardware Serials - 11:18
    • Virtual Isolation - 8:36
    • Dual Boot - 2:41
    • Built-in Sandboxes and Application Isolation - 3:07
    • Windows - Sandboxes and Application Isolation - 5:57
    • Windows - Sandboxes and Application Isolation - Sandboxie - 11:29
    • Linux - Sandboxes and Application Isolation - 3:04
    • Mac - Sandboxes and Application Isolation - 6:33
    • Virtual Machines - 10:51
    • Virtual Machine Weaknesses - 10:31
    • Virtual Machine Hardening - 9:15
    • Whonix OS - Anonymous Operating system - 20:51
    • Whonix OS - Weaknesses - 4:18
    • Qubes OS - 19:07
    • Security Domains, Isolation and Compartmentalization - 4:42
  • Section 12. BONUS - What's next?... Volume 2, 3 and 4
    • Important Information - 0:46
    • Congratulations - 0:58
    • Certificate of Completion for CPEs - 0:56
    • BONUS Lecture from Volume 2 - Router Vulnerability Scanning (Shodan, Qualys) - 16:23
    • BONUS Lecture from Volume 2 - Password cracking part 2 - 7:09
    • BONUS Lecture from Volume 3 - Bypassing firewalls and HTTP proxies part 3 - 15:21
    • BONUS Lecture from Volume 4 - Email clients, protocols and authentication - 13:17

View Full Curriculum


Access
Lifetime
Content
7.0 hours
Lessons
51

CompTIA CySA+ Cybersecurity Analyst (CS0-001) Prep Course

Ace the High-Stakes Security Analyst Certification & Become a Well-Respected Professional in the Cybersecurity Field

By Total Seminars | in Online Courses

Properly trained IT security staff who can analyze, monitor and protect cybersecurity resources are in high demand. The U.S. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest-growing overall job category, with 37 percent overall growth between 2012 and 2022. And if you're aiming to stack your resumé with a recognized certification and earn big bucks as a security analyst, this course is for you. With 51 lectures, this class will teach you everything you need to know to respond to cybersecurity threats and attacks. It will make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam.

2,108 positive ratings from 12,284 students enrolled

  • Access 51 lectures & 7 hours of content 24/7
  • Apply environmental reconnaissance techniques like OS fingerprinting, e-mail harvesting, & social media profiling using tools such as Nmap, Netstat, and Syslog
  • Analyze the results of network reconnaissance, & recommend or implement countermeasures
  • Secure a corporate environment by scanning for vulnerabilities
  • Respond to cyber incidents w/ a forensics toolkit, maintain the chain of custody, & analyze incident severity

"So far, the course has been very good in providing practical examples not just theories to pass an exam. I am very impressed." – Alhaji O. Gbla

Total Seminars | Home of Mike Meyers & His Team of IT Certification Pros

4.6/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

261,146 Total Students
69,197 Reviews

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: intermediate

Requirements

  • Basic familiarity with PCs and networks
  • Some understanding of CompTIA A+, Network+, and Security+ would be helpful

Course Outline

  • Introduction to CySA+
    • Introduction - 1:50
  • Conducting Reconnaissance
    • Thinking Like the Enemy - 9:20
    • Tools of the Trade - 7:35
  • Analyzing Reconnaissance Results
    • Recon Results: Part 1 - 13:06
    • Recon Results: Part 2 - 4:52
    • Data Output - 5:01
  • Responding to Network-Based Threats
    • Protecting Your Territory - 4:53
    • Hardening Strategies - 12:42
  • Securing a Corporate Environment
    • Pen Testing - 5:42
    • Training - 4:03
    • Reverse Engineering - 7:42
    • Risk Evaluation - 2:34
  • Vulnerability Management
    • Requirements Identification - 4:50
    • Scanning - 5:49
    • Configuring and Executing Scans - 7:47
    • Reporting and Remediating - 9:24
  • Analyzing Vulnerabilities Scan Results
    • Common Vulnerabilities: Part 1 - 7:58
    • Common Vulnerabilities: Part 2 - 7:50
  • Incident Response
    • Incident Response Process - 6:40
    • IR Roles and Responsibilities - 7:43
  • Preparation Phase
    • IR Active Preparation - 9:45
    • Threat Trends - 7:35
  • Forensic Tools
    • Digital Forensics - 9:37
    • Seizure and Acquisitions - 4:56
    • Forensics Acquisition Tools - 8:57
    • Forensics Analysis: Part 1 - 4:29
    • Forensics Analysis: Part 2 - 7:51
  • Common Symptoms of Compromise
    • Network Symptoms - 3:34
    • Host Symptoms - 8:07
    • Application Symptoms - 4:27
  • Incident Recovery and Post-Incident Response Process
    • Moving Forward: Part 1 - 13:06
    • Moving Forward: Part 2 - 8:02
  • Frameworks, Common Policies, Controls, and Procedures
    • Frameworks - 13:06
    • Policies - 7:31
    • Controls & Procedures - 7:44
    • Verifications - 6:16
  • Identity and Access Management
    • Context-Based Authentication - 6:20
    • Identities - 15:17
    • Managing Identities - 9:43
    • Exploits - 8:12
  • Defense Strategies
    • Data Analytics - 9:48
    • Defense in Depth - 14:14
  • Software Development Life Cycle (SDLC)
    • Secure Software Development - 7:47
    • Best Coding Practices - 4:12
  • Tools and Technologies
    • Preventative Tools: Part 1 - 20:35
    • Preventative Tools: Part 2 - 6:20
    • Collective Tools - 8:57
    • Vulnerability Scanning - 15:54
    • Packet Capture - 11:40
    • Connectivity Tools - 8:00
    • Pen Testing Tools - 11:55

View Full Curriculum


Access
Lifetime
Content
10.0 hours
Lessons
196

Cyber Security: Python & Web Applications

Apply Your Python Knowledge to a Practical, Very In-Demand Field

By Mashrur Hossain | in Online Courses

Develop a practical skill set by learning how to detect and defeat online threats in this beginner-to-advanced course. You'll build security analysis tools using Python and learn how to analyze web app security vulnerabilities and solutions using frameworks like Ruby onRails and PHP. Put your newfound Python skills to the test by applying them to a practical, very in-demand use.

151 positive ratings from 1,672 students enrolled

  • Access 196 lectures & 10 hours of content 24/7
  • Discuss vulnerability analysis, security scanning, phishing protection, & more
  • Perform password complexity analysis, multi-factor authentication, network traffic analysis, & more
  • Explore the biggest threats in IT, including botnets, code exploits, SQL injection, social engineering, & more

"Useful to grasp the OWASP top 10 and security basics not just the topics but the code too. Thanks for the great course!" – Hamsalekha Madiraju

Mashrur Hossain | Technology Professional and Entrepreneur

4.5/5 Instructor Rating: ★ ★ ★ ★

Mashrur Hossain has been a technology professional for over a decade and holds degrees in both Computer Science and Economics. He has worked with Enterprise Software Systems throughout his career with roles in analysis, development, and management. He is very passionate about web application development and believes Ruby on Rails has proven to be a very strong force in this field. Join him for his comprehensive Ruby on Rails Developer courses as he guides you through the world of web application development using Rails.

101.446 Total Students 14,305 Reviews

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Basic understanding of how the web works will be useful

Course Outline

  • Introduction
    • Course Introduction - 3:03
    • Course Work Overview - 6:26
    • Sample Tool 1 - Log Analyzer - 10:22
    • Sample Tool 1 - Text Instructions
    • Sample Tool 2 - Password Checker - 7:26
    • Sample Tool 2 - Text Instructions
    • Development Environment Overview - 5:00
    • Important course updates - don't skip!
  • Cyber Security
    • Cyber Security: Introduction to Section 2 - 0:45
    • What is Cyber Security? - 8:03
    • Cyber Security Introduction Quiz
    • Explaining the Methodology - 7:12
    • Methodology Quiz
    • Intro to Python and Python Crash Course
    • repl.it Introduction - 6:33
    • Basics Review
    • Penetration Testing - Overview - 5:31
    • Penetration Testing - Code Example - 5:27
    • Penetration Testing - Text Instructions
    • Penetration Testing - Remediation - 8:28
    • Penetration Testing Quiz
    • Port Scanning - Overview - 4:29
    • Port Scanning - Code Examples - 3:38
    • Port Scanning - Text Instructions
    • Port Scanning - Remediation - 3:51
    • Port Scanning Quiz
    • Botnets - Overview - 6:01
    • Botnets - Code Example - 5:06
    • Botnets - Code Example Continued - 5:04
    • Botnets - Text Instructions
    • Botnets - Remediation - 12:15
    • Cyber Security Topics Review 1
    • Code Exploits - Overview - 4:51
    • Code Exploits - Code Example - 5:33
    • Code Exploits - Text Instructions
    • Code Exploits - Remediation - 3:55
    • Forensic Investigations - 5:31
    • Forensic Investigations - Code Example - 8:29
    • Forensic Investigations - Text Instructions
    • Forensic Investigations - Remediation - 5:09
    • Network Traffic Analysis - Overview - 5:11
    • Network Traffic Analysis - Code Example - 4:28
    • Network Traffic Analysis - Text Instructions
    • Network Traffic Analysis - Remediation - 3:43
    • Cyber Security Topics Review 2
    • Wireless - Overview - 4:33
    • Wireless - Code Example - 3:08
    • Wireless - Text Instructions
    • Wireless - Remediation - 9:58
    • Web Reconnaissance - Overview - 5:31
    • Web Reconnaissance - Code Example - 9:36
    • Web Reconnaissance - Text Instructions
    • Web Reconnaissance - Remediation - 6:30
    • Antivirus Evasion - Overview - 5:39
    • Antivirus Evasion - Code Example - 7:02
    • Antivirus Evasion - Text Instructions
    • Antivirus Evasion - Remediation - 3:33
    • Social Engineering - Overview - 6:57
    • Social Engineering - Code Example - 4:30
    • Social Engineering - Text Instructions
    • Social Engineering - Remediation - 2:56
    • Cyber Security Topics Review 3
  • Building a Security Tool
    • Intro to Section 3: Building your own security tool - 1:15
    • Installing Python Locally - Text Instructions
    • Tool Development with Python - Overview - 4:54
    • Introduction to Pip - 3:55
    • Introduction to Pip - Text Instructions
    • Basic Python Script - 3:24
    • Basic Python Script - Text Instructions
    • Command Line Arguments - 3:16
    • Command Line Arguments - Text Instructions
    • Argument Parsing - 6:29
    • Argument Parsing - Text Instructions
    • Python Tools Review 1
    • Validating Input - 3:37
    • Validating Input - Text Instructions
    • Sending Requests to the Web - 2:40
    • Sending Requests to the Web - Text Instructions
    • Parsing Results - 6:43
    • Parsing Results - Text Instructions
    • Checking Forms - 4:31
    • Checking Forms - Text Instructions
    • Python Tools Review 2
    • Generating the Report - 2:19
    • Generating the Report - Text Instructions
    • Checking Comments - 6:32
    • Checking Comments - Text Instructions
    • Checking Inputs - 5:12
    • Checking Inputs - Text Instructions
    • Improving the Report - 2:57
    • Improving the Report - Text Instructions
    • Using Config Settings - 7:16
    • Using Config Settings - Text Instructions
    • Configuration from File - 3:42
    • Configuration from File - Text Instructions
    • Merging the Configs - 2:09
    • Merging the Configs - Text Instructions
    • Outputting the Report - 8:36
    • Outputting the Report - Text Instructions
    • Python Tools Review 3
    • Pushing to GitHub - 4:29
    • Pushing to Github - Text Instructions
    • Testing the Python Tool - 6:05
    • Writing the Documentation - 6:24
    • Distributing Your Tool - 5:48
    • Python Tools Review 4
  • Web Application Security
    • Section 4 Introduction - 1:17
    • Web Application Security Introduction - 6:00
    • OWASP Overview - 4:37
    • Introduction to the OWASP Top 10 List - 1:27
    • Rails Overview - 3:14
    • PHP Overview - 5:08
    • Installing Rails and PHP
    • OWASP Top 10 Vulnerabilities Example Code - Where to get it
    • Command Injection - Overview - 4:48
    • Command Injection - Rails Example - 6:44
    • Command Injection - Rails Example - Text Instructions
    • Command Injection - PHP Example - 4:10
    • Command Injection - PHP Example - Text Instructions
    • SQL Injection - Overview - 6:25
    • SQL Injection - Rails Example - 3:59
    • SQL Injection - Rails Example - Text Instructions
    • SQL Injection - PHP Example - 3:31
    • SQL Injection - PHP Example - Text Instructions
    • SQL Injection - PHP Example - Remediation - 2:26
    • Password Complexity - Overview - 6:46
    • Password Complexity - Rails Example - 6:50
    • Password Complexity - Rails Example - Text Instructions
    • Password Complexity - PHP Example - 6:28
    • Password Complexity - PHP Example - Text Instructions
    • Information Leakage - Overview - 4:56
    • Information Leakage - Rails Example - 3:07
    • Information Leakage - Rails Example - Text Instructions
    • Information Leakage - PHP Example - 7:13
    • Information Leakage - PHP Example - Text Instructions
    • Sensitive Data Exposure - Overview - 4:53
    • Sensitive Data Exposure - Rails Example - 4:23
    • Sensitive Data Exposure - Rails Example - Text Instructions
    • Sensitive Data Exposure - PHP Example - 2:54
    • Sensitive Data Exposure - PHP Example - Text Instructions
    • Web Application Security Review 1
    • XML External Entities (XXE) - Overview - 4:40
    • XML External Entities (XXE) - Rails Example - 4:36
    • XML External Entities (XXE) - Rails Example - Text Instructions
    • XML External Entities (XXE) - PHP Example - 4:28
    • XML External Entities (XXE) - PHP Example - Text Instructions
    • Broken Access Control - Overview - 5:12
    • Broken Access Control - Rails Example - 11:56
    • Broken Access Control - Rails Example - Text Instructions
    • Broken Access Control - PHP Example - 3:39
    • Broken Access Control - PHP Example - Text Instructions
    • Security Misconfiguration - Overview - 5:50
    • Security Misconfiguration - Rails Example - 3:46
    • Security Misconfiguration - Rails Example - Text Instructions
    • Security Misconfiguration - PHP Example - 3:28
    • Security Misconfiguration - PHP Example - Text Instructions
    • Web Application Security Review 2
    • Cross-Site Scripting (XSS) - Overview - 1:34
    • Cross-Site Scripting (XSS) - Rails Example - 5:09
    • Cross-Site Scripting (XSS) - Rails Example - Text Instructions
    • Cross-Site Scripting (XSS) - PHP Example - 5:50
    • Cross-Site Scripting (XSS) - PHP Example - Text Instructions
    • Insecure Deserialization - Overview - 3:46
    • Insecure Deserialization - Rails Example - 5:18
    • Insecure Deserialization - Rails Example - Text Instructions
    • Insecure Deserialization - PHP Example - 7:22
    • Insecure Deserialization - PHP Example - Text Instructions
    • Using Components with Known Vulnerabilities - Overview - 5:28
    • Using Components with Known Vulnerabilities - Rails Example - 11:01
    • Using Components with Known Vulnerabilities - Rails Example - Text Instructions
    • Using Components with Known Vulnerabilities - PHP Example - 4:38
    • Using Components with Known Vulnerabilities - PHP Example - Text Instructions
    • Insufficient Logging and Monitoring - Overview - 4:06
    • Insufficient Logging and Monitoring - Rails Example - 5:49
    • Insufficient Logging and Monitoring - Rails Example - Text Instructions
    • Insufficient Logging and Monitoring - PHP Example - 6:14
    • Insufficient Logging and Monitoring - PHP Example - Text Instructions
    • Web Application Security Review 3
    • Web Security Analysis Tool - 9:17
  • Bonus Material
    • Multi-Factor Authentication - 16:35
    • Ethical Hacking - 5:08
    • Password Complexity - 11:18
    • Physical Security - 10:31
    • Data Breaches - 9:34
    • Cloud Security - 11:44
  • Summary
    • Appendix A: Acknowledgements
    • Appendix B: Glossary
    • Thank you! - 1:07
  • Python crash course
    • Installation and expectations
    • Strings
    • Numbers
    • List, Tuples and Sets
    • Dictionaries
    • Branching and Functions/Methods
    • Standard library and imports
    • Object Oriented Programming (OOP)

View Full Curriculum


Access
Lifetime
Content
13.0 hours
Lessons
78

Complete Ethical Hacking & Cyber Security Masterclass Course

A Comprehensive Guide to the Newest Techniques of PenTest & Ethical Hacking

By Joe Parys | in Online Courses

In this complete ethical hacking masterclass course, you will learn from scratch how to master ethical hacking and cybersecurity. This course offers more than 13+ hours of content starting from a beginner and working your way up to some more advanced ethical hacking skills. The skills you learn in this course can help translate into the workplace and help you further your career as cybersecurity and ethical hacking professional.

917 positive ratings from 42,388 students enrolled

  • Access 78 lectures & 13 hours of content 24/7
  • Ethically hack a server using command injection vulnerability w/ Netcat
  • Bypass antivirus by changing the malware binary
  • Change the look of a page using HTML code injection

"The course was amazing. I am actually a beginner in cybersecurity and frankly, this course has helped me a lot." – Avnish Oswal

Joe Parys | Best-Selling Instructor

4.3/5 Instructor Rating: ★ ★ ★ ★

Joe Parys is a bestselling online instructor, entrepreneur, and international speaker whose eLearning courses have been featured on Udemy, Buzzfeed, CBS News, and many other professional platforms. He is the founder of The Joe Parys Academy, a leader in the e-learning industry with more than 100+ co-authored courses.

Joe is also a licensed Psychology, History and Government teacher for grades 5-12. He has been teaching High School for the past three year, and a licensed and certified professional life coach and motivational speaker from the Fowler Institute.

663,114 Total Students
43,723 Reviews

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: all levels

Requirements

  • Basic IT skills are helpful, but not necessary
  • Programming skills are a plus
  • Computer with a minimum of 4GB RAM
  • Wireless card that supports monitor mode (for Wi-Fi cracking)

Course Outline

  • Introduction & Setting Up Our Hacking Lab
    • Learn Ethical Hacking Skills & Cyber Security Skills With Us Today! - 1:45
    • Welcome To The Complete Ethical Hacking and Cyber Security Master Class - 0:19
    • Virtual Box 6.0 Installation - 5:27
    • Installing Kali Linux As Operating System For Hacking - 14:54
    • Going Full Screen On Kali Linux! - 5:51
  • Linux Basics
    • Linux Environment - 6:53
    • Terminal Commands - Part 1 - 11:13
    • Terminal Commands - Part 2 - 8:48
    • Configuring IP Address And Network Settings - 6:48
    • Cat, Echo, Apt-get ... - 11:49
  • Information Gathering & Footprinting
    • Five Phases Of A Penetration Test - 7:04
    • Active & Passive Footprinting Theory - 5:23
    • Finding Target Emails With Harvester - 12:19
    • Gathering Valuable Information With Dnsdumpster & OSINT - 8:38
    • Network Scanning Terminology And Theory - 14:40
    • Ping & Traceroute - 6:45
    • Bettercap & Netdiscover - 6:13
  • Evading Firewall & IDS & Honeypots Using Advance Scanning
    • Performing Default Nmap Scan - 4:36
    • What is IDS & IPS, Honeypot And Firewall? - 4:22
    • Evading Firewall with Nmap - 11:01
    • Bypassing IDS & IPS - 3:56
    • Creating Decoys during scan with Fragmented Packets - 12:18
    • Discovering Service Version on an Open Port - 16:55
  • Vulnerability Analysis
    • Searchsploit & Shodan - 16:49
  • Gaining Access To a Network - WPA2/WPA Cracking
    • Wireless Hacking Theory - 9:51
    • Putting Our Wireless Card Into Monitor Mode - 4:36
    • Sniffing Network Information In Monitor Mode - 7:15
    • Deauthenticating Everyone On The Network And Capturing 4 Way Handshake - 5:49
    • Cracking The Password Hash With Aircrack-ng - 9:44
    • Cracking The Password Faster Using Hashcat - 15:39
  • Gaining Access - Evil Twin Attack
    • Creating Fake Access Point With Airgedon - 14:51
    • Capturing Wireless Password With Fake Access Point - 7:48
  • Man In The Middle - Steal Everyones Data
    • Theory Of Arp Spoofing - 6:17
    • MITMf Full Installation - 4:39
    • Performing An ARP Spoof Attack - 9:08
    • Redirecting To A Fake Captive Portal - 15:54
    • Sniffing Passwords & Flipping Images On Targets Browser - 8:47
  • Gaining Access To A Machine - System Hacking
    • System Hacking Theory - 7:15
    • Metasploit Framework Structure - 15:39
    • Exploiting Windows With Eternalblue Attack - 12:42
    • Running Doublepulsar Attack - 16:31
    • Using Evasion Modules To Bypass Windows Defender - 7:31
    • Using Msfvenom To Generate A Trojan & Windows 10 Hacking - 17:35
    • Bypassing Antivirus Using Encoders And "Bad Bytes" - 10:55
    • Changing Executable Binary With Hexeditor - 10:31
    • Hack Any Machine Over Internet Using Port Forwarding - 9:40
  • Coding Project 1: Reverse Shell In Python
    • Creating Server & Payload - 18:44
    • Converting Python File To Exe - 8:41
  • Post Exploitation - Stealing Valuable Information
    • Meterpreter Commands - Part 1 - 15:52
    • Meterpreter Commands - Part 2 - 15:15
    • Creating Persistence On Target PC & Registry Edit - 11:14
    • Discovering Other Machines On A Target Network - 7:31
    • Bypassing UAC & Gaining Privileges - 7:38
    • Stealing Targets Chrome and WLAN Passwords After Exploit - 6:59
    • Embedding A Backdoor Into An Image - 4:58
  • Web Application Penetration Testing - Injections, Bruteforcers, Packet Sniffers
    • OWASP Installation - Vulnerable Web Application - 7:22
    • DIRB & Whatweb For Website Identification - 8:29
    • Hydra - Bruteforcing Any Login Page - 13:16
    • Burpsuite Introduction & Configuration - 11:53
    • Command Injection & Target Exploitation - 13:41
    • XSS Attack Theory - 5:20
    • Finding XSS Vulnerability On A Webpage - 5:45
    • Solving XSS Challenges On An Online Lab - 7:40
    • HTML Character Encoding To Exploit an XSS Vulnerability - 6:34
    • HTML Code Injection Vulnerability - 4:16
    • What is SQL & SQL Injection Theory - 13:22
    • Stealing Database Passwords With Advance Manual SQL Injection - 22:38
  • Coding Project 2: Making Bruteforcer In Python
    • Coding Login Form Bruteforcer Using Python - 15:53
  • Creating Undetectable Malware Using C Language
    • Describing What We Are Going To Code - 8:57
    • Using Struct sockaddr_in To Setup Socket Object - 12:47
    • Binding And Accepting Target Connection In a Server - 7:08
    • Sending Command To Target To Execute - 17:30
    • Starting With The Malware & Defining Bzero Function - 8:22
    • Creating APIENTRY Function And Hiding Program Console - 12:45
    • Executing Commands On Target System - 12:10
    • First Test Of Our Malware - 12:20
    • Making Our Malware Look Like An Error - 15:33
  • Social Media Hacking - Diffrent Ways To Gain Access To Online Accounts
    • Hacking Instagram - Way #1 - 6:14

View Full Curriculum


Access
Lifetime
Content
2.0 hours
Lessons
28

Python 3 for Offensive PenTest: A Complete Practical Course

Learn to Write Python Scripts to Build Your Own White Hat Hacking Tools!

By Hussam Khrais | in Online Courses

This is not your average penetration testing course. While most courses introduce you to simple techniques based on unrealistic situations with completely unsecured systems, this course will teach you the real skills you need. The instructor strongly believes that ethical hackers shouldn't rely on other tools--they should be able to make their own.

1,117 positive ratings from 12,639 students enrolled

  • Access 28 lectures & 2 hours of content 24/7
  • Learn to use Python to create your own tools
  • Understand why using Python is essential
  • Set up your own virtual hacking workplace
  • Learn to counter most types of attacks
  • Expand your expertise in cybersecurity

"This is a great course by a knowledgeable instructor, with lessons broken into very digestible segments, usually less than ten minutes each. The code is clean and easily extensible, and the instructor is very active in the QA forum." – Sean DiSanti

Total Seminars | Home of Mike Meyers & His Team of IT Certification Pros

4.6/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

261,146 Total Students
69,197 Reviews

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: intermediate

Requirements

  • Basic knowledge in Python or any other programming/scripting languages
  • Intermediate knowledge in penetration testing and ethical hacking

Course Outline

  • Quick Intro
    • Course Intro - 1:55
  • Python 3 / Windows 10 / Kali 2 : Gaining Access - Your First Persistence Shell
    • TCP Reverse Shell Outline - 4:50
    • Server Side - Coding a TCP Reverse Shell - 7:46
    • Client Side - Coding a TCP Reverse Shell - 8:44
    • Coding a Low Level Data Exfiltration - 7:11
    • Exporting To EXE - 2:52
    • HTTP Reverse Shell Outline - 2:36
    • Coding a HTTP Reverse Shell - 11:06
    • Data Exfiltration - 7:54
    • Persistence Outline - 4:29
    • Making our HTTP Reverse Shell Persistent - 10:07
    • Tuning the connection attempts - 4:24
  • Python 3 / Windows 10 / Kali 2 : Advanced Scriptable Shell
    • DDNS Aware Shell - 5:28
    • Interacting with Twitter - 9:49
    • Target Directory Navigation - 6:45
    • Replicating Metasploit "Screen Capturing" - 4:54
    • Replicating Metasploit "Searching for Content" - 5:49
    • Integrating Low Level Port Scanner - 5:29
  • Python 3 / Windows 10 / Kali 2 : Catch Me If You Can!
    • Bypassing Host Based Firewall Outline - 3:24
    • Hijacking Internet Explorer - Shell Over Internet Explorer - 5:04
    • Bypassing Reputation Filtering in Next Generation Firewalls - Outline - 2:56
    • Interacting with Source Forge - 5:49
    • Interacting with Google Forms - 4:55
  • Python 3: How Malware Abuse Cryptography? Python Answers
    • Bypassing IPS with Hand-Made XOR Encryption - 7:27
    • Quick Introduction To Encryption Algorithms - 7:05
    • Protecting Your Tunnel with AES - 8:57
    • Protecting Your Tunnel with RSA - 12:41
    • Developing One Time, Hybrid - Encryption Key - 4:35

View Full Curriculum


Access
Lifetime
Content
4.0 hours
Lessons
54

The Complete Nmap Ethical Hacking Course: Network Security Assessment

Use Nmap to Scan & Find Vulnerabilities on Networks That Can Be Exploited by Hackers

By Nathan House | in Online Courses

Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discover more about the security of a network and its hosts. This course will help you go from beginner to expert in easy-to-follow structured steps, covering all major platforms that Nmap can be used on, including - Windows, Mac, Linux, and Kali. At the end of this course, you'll have a practical skill-set in using Nmap to scan networks. You will be able to find vulnerabilities and weaknesses in systems that can be exploited by hackers.

1,871 positive ratings from 17,955 students enrolled

  • Access 54 lectures & 4 hours of content 24/7
  • Use Nmap for ethical hacking, system administration, & network security
  • Discover the secrets of ethical hacking & network discovery
  • Explore the Nmap Scripting Engine (NSE) used for more advanced discovery & hacking

"This was a good review of the features of NMAP and allowed me to shore up my fundamentals. I will be using it as a reference as I expand my skill set." – Marcus Chenier

Nathan House | Leading Cyber Security Expert

4.5/5 Instructor Rating: ★ ★ ★ ★

Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.

His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:
  • BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: all levels

Requirements

  • Basic understanding of using operating systems, networks, TCP/IP and the Internet

Course Outline

  • Introduction to the Course
    • Introduction to the Instructor - 1:51
    • Target Audience - 0:44
    • What is Nmap - 3:10
    • Course Goals and Learning Objectives - 3:05
  • Nmap Cheat Sheet
    • Nmap Cheat sheet - 1:07
  • How to Install Nmap
    • Goals and Learning Objectives - 0:39
    • How to Install Nmap - 9:25
    • Cloud Based Hacking Lab - 3:36
  • Nmap Basics, Target Specification & Port States
    • Goals and Learning Objectives - 0:21
    • An Introduction to Port Scanning and Fingerprinting - 2:17
    • Nmap Basics - 3:38
    • Nmap Target Specification - 5:13
    • Nmap Port states - 3:29
  • Nmap Discovery and Ping Scanning
    • Goals and Learning Objectives - 0:19
    • Nmap Discovery - Part 1 - 4:24
    • Nmap Discovery - Part 2 - 3:52
    • Nmap Discovery - Part 3 - 4:10
    • Nmap Discovery - Part 4 - 4:28
  • Nmap Scan Techniques
    • Goals and Learning Objectives - 0:19
    • Nmap Scan Techniques - SYN and Connect - 6:11
    • Nmap Scan Techniques - UDP and SCTP - 5:50
    • Nmap Scan Techniques - TCP ACK and Window - 1:48
    • Nmap Scan Techniques - NULL, FIN, Xmas, Maimon Idle Scan and IP Protocol - 4:46
  • Nmap Port Specification, Service, Version & OS Detection
    • Goals and Learning Objectives - 0:20
    • Nmap Port Specification - 5:20
    • Nmap Service and Version Detection - 6:48
    • Nmap OS Detection - 7:52
  • Nmap Scripting Engine (NSE)
    • Goals and Learning Objectives - 0:25
    • Nmap Scripting Engine (NSE) Part 1 - Categories - 7:35
    • Nmap Scripting Engine (NSE) Part 2 - Usage and Cool Scripts - 8:07
    • Nmap Scripting Engine (NSE) Part 3 - Usage and Cool Scripts - 9:15
    • Nmap Scripting Engine (NSE) Part 4 - Usage and Cool Scripts - 10:03
    • Writing Nmap Scripting Engine (NSE) Scripts - 4:00
  • Nmap Performance, Firewall and IDS Evasion
    • Goals and Learning Objectives - 0:19
    • Nmap Timing and Performance - 4:19
    • Nmap Firewall / IDS Evasion and Spoofing Part 1 - 5:50
    • Nmap Firewall / IDS Evasion and Spoofing Part 2 - 5:09
  • Nmap Output and Extras
    • Goals and Learning Objectives - 0:24
    • Nmap Output - 7:17
    • Nmap Output & Miscellaneous Options - 4:49
    • Extras - 3:45
  • Zenmap
    • Goals and Learning Objectives - 0:24
    • How to Use Zenmap - Nmap GUI - 8:07
    • Zenmap Built-in Profiles - 6:52
    • How to use the Zenmap Profile Editor - 4:29
  • How Criminal Black Hats Use Nmap with Hacking Infrastructures
    • Goals and Learning Objectives - 0:29
    • Command and Control (C&C) Hacking Infrastructure - 8:54
  • Wrap up
    • Congratulations - 0:23
  • Preview
    • Preview Introduction - 0:17
    • Password cracking part 1 - 16:17
    • Password cracking part 2 - 7:09
    • Bypassing firewalls and HTTP proxies part 3 - 15:21
    • Choosing an E-Mail provider - 13:46
    • Router Vulnerability Scanning (Shodan, Qualys) - 16:23

View Full Curriculum


Access
Lifetime
Content
16.0 hours
Lessons
176

The Complete Cyber Security Course, Vol.4: End-Point Protection

Learn About Application & Execution Control, Disk Encryption, & Antivirus Protection

By Nathan House | in Online Courses

Personal or professional, it makes no difference, learning to secure laptops, desktops, and mobile services is an excellent skill to have, and this course will teach you how to protect each from advanced hackers, trackers, exploit kits, thieves, and much more. Covering end-point-protection on Windows, Mac OS, Linux, iOS, and Android, this course will help you master techniques to defend all kinds of devices. Maybe somebody will even pay you for it!

2,421 positive ratings from 52,705 students enrolled

  • Access 176 lectures & 16 hours of content 24/7
  • Master the selection & implementation of solid disk encryption technology
  • Understand the current & next-gen antivirus solutions, how they work, & how to select the best products
  • Learn how to detect & monitor for threats such as malware & hackers
  • Get up to speed on hacker hunting
  • Perform operating system hardening to decrease the attack surfaces of your devices
  • Explore the best techniques in anti-forensics to securely delete data & meta-data

"The course looks at setting up protection for most operating systems and it explains clearly how to do it. I appreciate the time taken to explain the strengths and weaknesses for each option and also the clarity in which it is explained." – Bret Duddy

Nathan House | Leading Cyber Security Expert

4.5/5 Instructor Rating: ★ ★ ★ ★

Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.

His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:
  • BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: all levels

Requirements

  • Basic understanding of using operating systems, networks, and the Internet
  • Able to download and install software
  • Completing The Complete Cyber Security Course, Vol.1, 2 & 3 is recommended

Course Outline

  • Section 1: Introduction
    • 1. Welcome to Volume 4 - 0:44
    • 2. Introduction to the Instructor! - 2:06
    • 3. Security Quick Win! - 11:23
    • 4. Target Audience - 1:54
    • 5. Study Recommendations - 4:34
    • 6. The Forum - For Questions, Answers and Other Resources - 1:34
    • 7. Course updates - 0:40
  • Section 2: Goals and Learning Objectives - Volume 4
    • 8. What is End Point Protection? and why is it important? - 4:38
    • 9. Goals and Learning Objectives - Volume 4 - 3:26
  • Section 3: File and Disk Encryption
    • 10. Goals and Learning Objectives - 0:44
    • 11. Disk Encryption – What is it good for? - 7:48
    • 12. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation - 5:29
    • 13. Disk Encryption Attacks - Physical - 11:17
    • 14 Disk Encryption Attacks - Containers, Volumes and Partitions - 2:21
    • 15. Windows - Disk Encryption - An Introduction - 2:39
    • 16. Windows - Disk Encryption - Bitlocker - 12:06
    • 17. Windows - Setting Up BitLocker - 9:30
    • 18. Windows - Disk Encryption - VeraCrypt - 11:28
    • 19. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt - 3:06
    • 20. Windows, Mac & Linux - Setting up VeraCrypt - 11:42
    • 21. Mac - Filevault2 - 5:39
    • 22. Mac - Setting up Filevault2 - 7:35
    • 23. Linux Whole Disk Encryption - Dm-crypt and LUKS - 5:54
    • 24. Linux - Setting up DMCrypt/LUKS - 5:09
    • 25. Linux - Encrypting the boot partition with Grub2 - 4:47
    • 26. Self Encrypting Drives (SEDs) - 1:47
    • 27. Defense Against Disk Decryption Attacks - 7:48
    • 28. File Encryption - 4:13
    • 29. Mandatory Key Disclosure & Plausible Deniability - 7:34
    • 30. Nesting Crypto Systems & Obfuscation - 3:20
    • 31. Case Studies in Disk Decryption - 2:45
  • Section 4: Anti-Virus and End-Point-Protection
    • 32. Goals and Learning Objectives - 0:37
    • 33. Is Anti-Virus dead? - The Threat Landscape - 3:55
    • 34. Is Anti-Virus dead? - Protection Methods - 10:53
    • 35. Ransomware - 4:17
    • 36. Anti-Virus and End-Point-Protection Testing - 5:40
    • 37. The Problem With AV and EPP Testing - 3:38
    • 38. The Best of Business End-Point-Protection (EPP) - 4:04
    • 39. Windows - The Best of Anti-Virus and End-Point-Protection - 4:05
    • 40. Business End Point Protection (EPP) - 2:23
    • 41. Mac - XProtect - 2:51
    • 42. Mac - The Best of Anti-Virus and End-Point-Protection - 2:34
    • 43. Linux - The Best of Anti-Virus and End-Point-Protection - 2:41
    • 44. Online and Second Opinion - Anti-Virus and End-Point-Protection - 3:12
    • 45. Is Anti-Virus and End-Point-Protection Dangerous? - 6:35
  • Section 5: Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)
    • 46. Goals and Learning Objectives - 0:34
    • 47. Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP) - 4:59
    • 48. End Point Detection and Response (EDR) - 6:39
    • 49. End-Point-Protection: How it works together in layers - 6:57
  • Section 6: End-Point-Protection Technology
    • 50. Goals and Learning Objectives - 0:40
    • 51. What is application and execution control? - 9:49
    • 52. Windows - Application control - ACLs, Windows Permission Identifier & Accessenum - 6:26
    • 53. Windows - Application control - User Account Control (UAC) - 4:18
    • 54. Windows - Application control - Software Restriction Policies - 4:34
    • 55. Windows - Application control - AppLocker - 10:23
    • 56. Windows - Application Control - Parental controls - 2:43
    • 57. Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks - 6:35
    • 58. Windows - Exploitation Prevention - EMET - 12:58
    • 59. Windows - Exploitation Prevention - Traps, MBEA and HMPA - 4:49
    • 60. Windows 10 - Device Guard - 11:32
    • 61. Windows - Defender Application Guard for Microsoft Edge - 2:21
    • 62. Linux - Access Control Models - 7:45
    • 63. Linux - Security frameworks - AppArmor - 2:13
    • 64. Linux - Security frameworks - SElinux - 3:19
    • 65. Linux - Security frameworks - Grsecurity - 3:59
    • 66. Linux - Security frameworks - PaX and more - 1:40
    • 67. Linux & Mac - File permissions, POSIX and ACLs - 8:03
    • 68. Mac - Application control - Parental controls - 3:03
    • 69. Mac - Application control - Gatekeeper - 5:23
    • 70. Mac - Application control - System Integrity Protection - 5:42
    • 71. Mac - Application control - Santa - 3:47
    • 72. Mac - Application control - Little Flocker - 6:59
    • 73. Mac - Other Stuff! - 1:19
    • 74. The New Normal For End-Point-Protection Technology - 7:50
    • 75. Cylance - 4:46
  • Section 7: Threat Detection and Monitoring
    • 76. Goals and Learning Objectives - 0:48
    • 77. A Complete Failure to Detect Threats - 5:20
    • 78. Rethinking Honeypots - 4:37
    • 79. CanaryTokens - 18:46
    • 80. OpenCanary - 12:19
    • 81. CanaryPi
    • 82. Artillery - Binary Defense - 3:32
    • 83. Honey Drive - 1:13
    • 84. Intrusion Detection Systems (IDS) Part 1 - Methods - 7:11
    • 85. Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n - 4:55
    • 86. Host-Based Intrusion Detection - OSSEC - 4:40
    • 87. Network Analysis - Sguil, Xplico & NetworkMiner - 3:05
    • 88. File Integrity Monitoring (FIM) and Checking Part 1 - 2:58
    • 89. File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe - 2:31
    • 90. Network Security Toolkit (NST) - 2:03
    • 91. Security Onion - 1:17
    • 92. Security Information and Event Management Software (SIEM) - 2:51
  • Section 8: Malware and Hacker Hunting on the End-Point
    • 93. Goals and Learning Objectives - 0:48
    • 94. Introduction to Malware and Hacker Hunting - 8:20
    • 95. Windows - Farbar Recovery Scanner - 9:20
    • 96. Automated Malware Removal Tools - 10:41
    • 97. Live Rescue Operating Systems, CDs, and USBs - 6:42
    • 98. Windows - Malware Seek & Destroy (Process Explorer) Part 1 - 11:33
    • 99. Windows - Malware Seek & Destroy - Process Explorer - Part 2 - 10:04
    • 100. Windows - Malware Seek & Destroy - Process Tools - 2:09
    • 101. Windows - Malware Seek & Destroy - Sigcheck - 2:31
    • 102. Windows - Malware Seek & Destroy - Autoruns - 10:09
    • 103. Windows - Malware Seek & Destroy - Process Monitor - 10:47
    • 104. Windows - Malware Seek & Destroy - Network Connections - 8:10
    • 105. Malware Seek & Destroy - Networkx - 2:21
    • 106. Linux - Seek & Destroy Malware - Sysdig - 10:27
    • 107. Linux - Seek & Destroy Malware and Hackers - Csysdig - 11:13
    • 108. Linux - Seek & Destroy Malware and Hackers - debsums and unhide - 1:53
    • 109. Linux & Mac OS X - Malware Seek & Destroy - netstat - 7:13
    • 110. Linux & Mac OS X - Malware Seek & Destroy - lsof - 8:15
    • 111. Linux - Malware Seek & Destroy - rkhunter - 6:13
    • 112. Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD - 2:00
    • 113. Linux - Malware Seek & Destroy - Linux - Persistence Part 1 - 3:23
    • 114. Linux - Malware Seek & Destroy - Linux - Persistence Part 2 - 10:18
    • 115. Linux - Malware Seek & Destroy - Linux - Persistence Part 3 - 2:55
    • 116. Mac - Malware Seek & Destroy - Task Explorer - 5:21
    • 117. Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer - 7:26
    • 118. Mac, Linux & Windows - OSquery - 14:47
    • 119. Firmware Rootkits – Seek and Destroy Part 1 - 7:28
    • 120. Firmware Rootkits – Seek and Destroy Part 2 - 4:05
    • 121. End-Point-Protection Recovery and Remediation Technology - 3:17
    • 122. Encrypted Backup and Cloud Storage - 6:03
  • Section 9: Operating System and Application Hardening
    • 123. Goals and Learning Objectives - 0:47
    • 124. An Introduction to Hardening - 5:28
    • 125. Hardening Standards - 10:01
    • 126. OpenSCAP - 12:46
    • 127. Baseline Auditing - 3:31
    • 128. Windows – Hardening - 1:54
    • 129. Windows - Security Compliance Manager (SCM) - 11:01
    • 130. Mac – Hardening - 1:35
    • 131. Linux – Hardening - 3:31
    • 132. Security Focused Operating Systems - 4:49
    • 133. Monitoring for Security Drift - 1:16
  • Section 10: Secure Deleting, Evidence Elimination and Anti-Forensics
    • 134. Goals and Learning Objectives - 0:43
    • 135 Secure File Deletion - Mechanical drives - 8:10
    • 136. Secure File Deletion - Solid Sate Drive - 6:37
    • 137. Evidence Elimination & Anti-Forensics - An Introduction - 4:42
    • 138. Evidence Elimination - CCleaner and Bleachit - 7:02
    • 139. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer - 5:49
    • 140. Disk Wiping - Mechanical Drives - 5:46
    • 141. Disk Wiping - Solid State Drives - 10:53
    • 142. Scrubbing EXIF & Metadata Part 1 - Introduction - 6:56
    • 143. Scrubbing EXIF & Metadata Part 2 - Tools - 5:14
    • 144. Scrubbing EXIF & Metadata Part 3 - Guidance - 4:36
    • 145. Sensor Noise Camera Identification - 4:06
  • Section 11: Email Security, Privacy and Anonymity
    • 146. Goals and Learning Objectives - 1:05
    • 147. Clients, Protocols and Authentication - 13:17
    • 148. Email Weaknesses - 13:02
    • 149. PGP & GPG & Privacy - 5:50
    • 150. PGP & GPG Clients - 6:27
    • 151. Windows - PGP & GPG - 19:52
    • 152. Tail - PGP & GPG - 4:01
    • 153. PGP & GPG Weaknesses - 6:15
    • 154. Improving OpenPGP Security - Best Practices - Part 1 - 2:32
    • 155. Improving OpenPGP Security - Primary and Subkeys - Part 2 - 12:20
    • 156. Improving OpenPGP Security - Smartcards/Yubikey - Part 3 - 7:41
    • 157. Email Tracking & Exploits - 10:33
    • 158. Email Anonymity & Pseudonymity - 6:18
    • 159. TorBirdy - 7:36
    • 160. Remailers - 7:33
    • 161. Choosing an Email Provider - 13:46
    • 162. Email Alternatives - 3:17
  • Section 12: Messengers - Security, Privacy and Anonymity
    • 163. Goals and Learning Objectives - 0:19
    • 164. An Introduction to Instant Messengers - 3:08
    • 165. Instant Messengers - Signal - 2:30
    • 166. Instant Messengers - Chatsecure - 1:38
    • 167. Instant Messengers - Cryptocat - 0:45
    • 168. Instant Messengers - Ricochet - 0:46
    • 169. Instant Messengers - Other - 0:38
    • 170. Video and Voice Messengers - Linphone - 4:28
    • 171. Video and Voice Messengers - Jitsi - 1:40
    • 172. Video and Voice Messengers - Other - 0:57
  • Section 13: BONUS SECTION
    • 173. Congratulations!! - 0:29
    • 176. BONUS Sample Lecture from Volume 1 - Qubes OS - 19:07
    • 177. BONUS Sample Lecture from Volume 2 - Effective Network Isolation - 12:27
    • 178. BONUS Sample Lecture from Volume 3 - Socks5 proxy tunneling - 10:20

View Full Curriculum


Access
Lifetime
Content
13.0 hours
Lessons
120

The Complete Cyber Security Course, Vol.3: Anonymous Browsing

Dive Into Anonymous Browsing, Hiding IP Addresses, Hacker OPSEC, & More

By Nathan House | in Online Courses

Anonymity and web privacy are hot button issues these days, especially now that internet service providers can sell off your browsing data without informing you. This course takes a deep dive into the best anonymizing and privacy methods, from Tor to bulletproof hosting and everything in between.

2,884 positive ratings from 60,812 students enrolled

  • Access 120 lectures & 13 hours of content 24/7
  • Analyze the strengths & weaknesses of anonymity services like Tor, VPNs, proxy servers, OPSEC, I2P, & much more
  • Explore chaining & nesting anonymizing services together to provide layers of obfuscation
  • Cover bypassing censors, firewalls, & proxies
  • Understand how to use off-site connections & cellular networks for privacy & anonymity

"This course is the best comprehensive guide to private and anonymous internet access and "opsec" that I have seen." – Albert Sunseri

Nathan House | Leading Cyber Security Expert

4.5/5 Instructor Rating: ★ ★ ★ ★

Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.

His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:
  • BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: all levels

Requirements

  • Basic understanding of using operating systems, networks, and the Internet
  • Able to download and install software
  • Completing The Complete Cyber Security Course, Vol.1 & 2 is recommended

Course Outline

  • Section: 1 Introduction
    • 1. Welcome to Volume III - 0:35
    • 2. Introduction to the Instructor! - 2:06
    • 3. Security Quick Win! - 11:23
    • 3. Target Audience - 1:54
    • 4. Study Recommendations - 4:34
    • 5. The Forum - For Questions, Answers and Other Resources - 1:34
    • 6. Course updates - 0:40
  • Section: 2 Goals and Objectives for Volume III
    • 7. Goals and Learning Objectives - 3:39
  • Section: 3 OPSEC (Operational Security)
    • 8. Goals and Learning Objectives - 0:45
    • 9. Introduction to OPSEC - 3:45
    • 10. Identities, pseudonyms and aliases (Identity Strategies) - 6:04
    • 11. Establishing Cover - 9:12
    • 12. Identify Cross Contamination - 5:57
    • 13. 10 Rules of OPSEC - 13:47
    • 14. Authorship Recognition and Evasion Methods - 4:06
    • 15. The knock - 4:48
    • 16. Case Studies of OPSEC Failures - 7:22
  • Section: 4 Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny Core linux
    • 17. Goals and Learning Objectives - 0:13
    • 18. Introduction to live operating systems - 11:35
    • 19. Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go - 12:18
    • 20. Tails - 13:43
    • 21. Tails Demo - 9:48
  • Section: 5 Virtual Private Networks (VPNs)
    • 22. Goals and Learning Objectives - 0:39
    • 23. Introduction to VPNs - 10:10
    • 24. Which VPN protocol is best to use? and why? - 11:43
    • 25. VPN Weaknesses - 16:32
    • 26. Can you trust VPN providers? - 8:52
    • 27. VPNs and Domain Name System (DNS) Leaks - 9:36
    • 28. Setting up an OpenVPN client in Windows, Mac, iPhone and Android - 11:56
    • 29. Setting up an OpenVPN client on Linux - 9:24
    • 30. Preventing VPN Leaks - Firewalls and kill switches - 12:16
    • 31. Choosing the right VPN provider - 11:42
    • 32. Setting up an OpenVPN server Part 1 - The fast and easy way - 12:28
    • 33. Setting up an OpenVPN server Part 2 - Debian client - 7:18
    • 34. Setting up an OpenVPN server Part 3 - Home VPN - 3:12
  • Section: 6 Tor
    • 35. Goals and Learning Objectives - 0:20
    • 36. What is Tor? - 7:35
    • 37. The Tor Network and Browser - 8:13
    • 38. What should Tor be used for? - 10:36
    • 39. Directory Authorities and Relays - 7:11
    • 40. Tor Bridges - 6:19
    • 41. Tor Pluggable Transports and Traffic Obfuscation - 8:20
    • 42. Torrc Configuration File - 13:32
    • 43. Running other applications through Tor - 13:54
    • 44. Tor Weaknesses Part 1 - 14:05
    • 45. Tor Weaknesses Part 2 - 6:55
    • 46. Conclusions on Tor and mitigation to reduce risk - 4:31
    • 47. Attacking Tor: how the NSA targets users' online anonymity - 14:04
    • 48. Hidden services – The Tor darknet - 3:04
    • 49. Finding Tor hidden services - 2:44
    • 50. Other Tor Apps - 2:43
  • Section: 7 VPN and Tor Routers
    • 51. Goals and Learning Objectives - 0:14
    • 52. Introduction to VPN and Tor Routers - 6:05
    • 53. Custom Router Firmware for VPN & TOR Tunneling - 6:19
    • 54. Off the shelf VPN and TOR Routers - 6:56
    • 55. DIY Hardware TOR Routers - 2:56
    • 56. TOR and VPN Gateway Virtual Machines - 5:55
  • Section: 8 Proxies – HTTP, HTTPS, SOCKs and Web
    • 57. Goals and Learning Objectives - 0:18
    • 58. Proxies – HTTP, HTTPS and SOCKS Part 1 - 9:04
    • 59. Proxies – HTTP, HTTPS and SOCKS Part 2 - 7:36
    • 60. CGI proxies - Web proxy or web form proxy - 4:15
  • Section: 9 SSH Secure Shell
    • 61. Goals and Learning Objectives - 0:18
    • 62. Introduction & How to Login - 5:23
    • 63. SSH Remote Port Forwarding - 8:27
    • 64. SSH Local Port Forwarding - 4:05
    • 65. SSH Socks5 Proxy Tunneling with Dynamic Ports - 10:20
    • 66. SSH Public private key authentication - 9:29
    • 67. SSH Hardening - 4:16
  • Section: 10 I2P - The Invisible Internet Project
    • 68. Goals and Learning Objectives - 0:16
    • 69. I2P - Introduction - 11:28
    • 70. I2P Installing and Secure Configuration Part 1 - 16:54
    • 71. I2P Installing and Secure Configuration Part 2 - 11:15
    • 72. I2P Strengths and Weaknesses - 4:21
  • Section: 11 Other Privacy and Anonymising Services
    • 73. Goals and Learning Objectives - 0:15
    • 74. JonDonym - Introduction - 8:43
    • 75. JonDonym - Installing and Secure Configuration - 5:13
    • 76. Bullet Proof Hosting Services (BPHS) - 4:14
    • 77. Botnets and Hacked Boxes - 1:45
  • Section: 12 Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection
    • 78. Goals and Learning Objectives - 0:15
    • 79. Outbound Firewall Bypassing - The Fundamentals Part 1 - 10:08
    • 80. Outbound Firewall Bypassing - The Fundamentals Part 2 - 10:45
    • 81. Outbound Bypassing - Tunneling through HTTP proxies - 15:21
    • 82. Outbound Bypassing - Port Sharing and Knocking - 7:37
    • 83. Outbound Bypassing – Cloaking and Obfuscating - 7:57
    • 84. Outbound Bypassing - Remote login - VNC and RDP - 5:34
    • 85. Inbound Bypassing - Reverse shells, SSH remote tunneling and remote login - 7:53
  • Section: 13 Chaining/Nesting Privacy and Anonymising Services
    • 86. Goals and Learning Objectives - 0:27
    • 87. Introduction to nesting and chaining - Proxies, VPN, SSH, JonDonym and Tor - 6:35
    • 88. Strengths and Weaknesses : (User -> SSH-VPN-JonDonym -> Tor -> Internet) - 10:38
    • 89. Strengths and Weaknesses : (User -> Tor -> SSH-VPN-JonDonym -> Internet) - 10:17
    • 90. Nested VPNs - Strength and Weaknesses - 8:01
    • 91. How to setup nested VPNs - 6:16
    • 92. How to setup nested SSH - 6:28
    • 93. How to setup proxy chains - 7:14
    • 94. How to setup - (User -> VPN -> Tor -> Internet) - 2:08
    • 95. How to setup - (User -> SSH -> Tor -> Internet) - 3:45
    • 96. How to setup - (User -> JonDonym -> Tor -> Internet) - 1:42
    • 97. How to setup - (User -> Tor -> SSH/VPN/JonDoym -> Internet) with transproxy - 15:16
    • 98. How to setup - (User -> Tor -> SSH/VPN/JonDoym -> Internet) with Whonix - 8:02
    • 99. Setting up nested services (3 + hops) - 4:58
  • Section: 14 Off-site Internet Connections - Hotspots and Cafes
    • 100. Goals and Learning Objectives - 0:20
    • 101. Staying safe while on public Wi-Fi hotspots - 4:32
    • 102. Using Internet Cafés for security, privacy and anonymity safely - 7:38
    • 103. Using public Wi-Fi hotspots for security, privacy and anonymity safely - 9:30
    • 104. Finding public Wi-Fi hotspots - 4:20
    • 105. Boosting Wi-Fi range - 12:38
    • 106. How are Wi-Fi users geo located? - 4:50
  • Section: 15 Mobile, Cell Phones & Cellular Networks
    • 107. Goals and Learning Objectives - 0:20
    • 108. Cellular Network Weaknesses - The Network Operator - 6:03
    • 109. Cellular Networks Weaknesses - IMSI catchers - 4:49
    • 110. Cellular Networks Weaknesses - Signaling System No7 (SS7) - 4:08
    • 111. Mobile and Cell Phone Weaknesses - 10:29
    • 112. How to use a laptop and cellular networks for Internet privacy and anonymity - 9:11
    • 113. How you are geo located when using a cellular network - 4:28
  • Section: 16 BONUS SECTION - Whats next Volume IV
    • 114. Important information - 0:46
    • 115. Congratultions - 1:14
    • 116. Certificate of Completion for CPEs - 0:56
    • 117. BONUS - Example Lecture from Volume I- Intro to Isolation & Compartmentalization - 2:10
    • 118. BONUS - Example Lecture from Volume II - Firefox Hardening - 18:49
    • 119. BONUS - Example Lecture from Volume 4 - Email Tracking & Exploits - 10:33

View Full Curriculum


Access
Lifetime
Content
12.0 hours
Lessons
106

The Complete Cyber Security Course, Vol.2: Network Security

Discuss Network Security, Firewalls, & Learn the Best Password Managers On the Market

By Nathan House | in Online Courses

Over this course, you'll learn network hacking techniques and vulnerability scanning to discover security risks across an entire network, learning skills for which companies are willing to pay top dollar. Whether you want to protect your own network or protect corporate networks professionally, this course will get you up to speed.

7,582 positive ratings from 96,078 students enrolled

  • Access 106 lectures & 12 hours of content 24/7
  • Architect your network for maximum security & prevent local & remote attacks
  • Understand the various types of firewalls available, including layer 4 firewalls like Iptables & PF
  • Discuss firewalls on all platforms, including Windows, Mac OS, & Linux
  • Explore wireless security & learn how WiFi is hacked
  • Use tools like Wireshark, Tcpdump, & Syslog to monitor your network
  • Dive into search engine privacy & tracking, learning how to mitigate tracking & privacy issues

"Look no further if you want a great foundation in cybersecurity, Nathan shares a lot of bits of information that will help you get on the way to be safer online." – Jose Castilla

Nathan House | Leading Cyber Security Expert

4.5/5 Instructor Rating: ★ ★ ★ ★

Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.

His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:
  • BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: all levels

Requirements

  • Basic understanding of networking concepts
  • The Complete Cyber Security Course, Vol.1 is recommended

Course Outline

  • Section: 1 Introduction
    • 1. Welcome to Volume 2 - 0:34
    • 2. Introduction to the Instructor! - 2:06
    • 3. Security Quick Win! - 11:23
    • 4. Target Audience - 1:54
    • 5. Study Recommendations - 4:34
    • 6. The Forum - For Questions, Answers and Other Resources - 1:34
    • 7. Course updates - 0:40
  • Section: 2 Goals and Learning Objectives - Volume 2
    • 8. Goals and Learning Objectives - Volume 2 - 3:09
  • Section: 3 Routers - Port and Vulnerability scanning
    • 9. Goals and Learning Objectives - 0:28
    • 10. The Home Router - 13:44
    • 11. External Vulnerability Scanning - Shodan, Qualys & Nmap - 16:23
    • 12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS - 19:33
    • 13. Open Source Custom Router Firmware - 11:37
  • Section: 4 Firewalls
    • 14. Goals and Learning Objectives - 0:25
    • 15. Firewalls – Host-based, network-based and virtual Part 1 - 14:48
    • 16. Firewalls – Host-based, network-based and virtual Part 2 - 4:54
    • 17. Windows - Host Based Firewalls - Windows Firewall - 10:29
    • 18. Windows - Host Based Firewalls - Windows Firewall Control (WFC) - 5:18
    • 19. Windows - Host Based Firewalls - Third Party - 8:45
    • 20. Linux - Host Based Firewalls - iptables - 19:58
    • 21. Linux - Host Based Firewalls - UFW, gufw & nftables - 12:07
    • 22. Mac OS X - Host based Firewalls - Application Firewall & PF - 13:52
    • 23. Mac OS X - Host based Firewalls - pflist, Icefloor & Murus - 7:47
    • 24. Mac OS X - Host based Firewalls - Little Snitch - 6:22
    • 25. Network based firewalls - Routers - DD-WRT - 5:09
    • 26. Network based firewalls - Hardware - 2:43
    • 27. Network based firewalls - PFsence, Smoothwall and Vyos - 10:34
  • Section: 5 Network Attacks, Architecture and Isolation
    • 28. Goals and Learning Objectives - 0:17
    • 29. Network Attacks and Network Isolation - Introduction and IOT - 6:34
    • 30. Network Attacks and Network Isolation - Arp Spoofing and Switches - 6:19
    • 31. Effective Network Isolation Part 1 - 12:27
    • 32. Effective Network Isolation Part 2 - 7:26
  • Section: 6 Wireless and Wi-Fi Security
    • 33. Goals and Learning Objectives - 0:25
    • 34. Wi-Fi Weaknesses - WEP - 2:28
    • 35. Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP - 13:40
    • 36. Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP - 6:49
    • 37. Wi-Fi Security Testing - 4:01
    • 38. Wireless Security - Secure Configuration and Network Isolation - 14:18
    • 39. Wireless security - RF Isolation and Reduction - 3:01
    • 40. Wireless security - Who is on my Wi-Fi Network? - 3:20
  • Section: 7 Network Monitoring for Threats
    • 41. Goals and Learning Objectives - 0:17
    • 42. Syslog - 16:59
    • 43. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1 - 14:01
    • 44. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2 - 7:59
    • 45. Wireshark - Finding malware and hackers - Part 1 - 15:46
    • 46. Wireshark - Finding malware and hackers - Part 2 - 8:12
    • 47. Network Monitoring - Wincap, NST, Netminer and NetWorx - 1:38
  • Section: 8 How We Are Tracked Online
    • 48. Goals and Learning Objectives - 0:23
    • 49. Types of Tracking - 4:25
    • 50. IP Address - 5:27
    • 51. 3rd Party Connections - 4:25
    • 52. HTTP Referer - 3:21
    • 53. Cookies and Scripts - 7:59
    • 54. Super Cookies - 5:12
    • 55. Browser Fingerprinting and Browser Volunteered Information - 2:36
    • 56. Browser and Browser Functionality - 1:39
    • 57. More Tracking - 2:48
    • 58. Browser and Internet Profiling - 6:35
  • Section: 9 Search Engines and Privacy
    • 59. Goals and Learning Objectives - 0:19
    • 60. Search Engine Tracking, Censorship and Privacy - 12:44
    • 61. Ixquick and Startpage - 7:56
    • 62. DuckDuckGo - 3:44
    • 63. Disconnect search - 4:43
    • 64. Yacy - 3:32
    • 65. Private and Anonymous Searching - 7:34
  • Section: 10 Browser Security and Tracking Prevention
    • 66. Goals and Learning Objectives - 0:21
    • 67. Which Browser – Choice of Browser - 6:01
    • 68. Reducing the Browser Attack Surface - 11:34
    • 69. Browser Hacking Demo - 9:26
    • 70. Browser Isolation and Compartmentalization - 6:10
    • 71. Firefox Security, Privacy and Tracking - 12:26
    • 72. uBlock origin - HTTP Filters, ad and track blockers - 14:13
    • 73. uMatrix - HTTP Filters, ad and track blockers - 7:14
    • 74. Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers - 6:37
    • 75. ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers - 6:46
    • 76. No-script - HTTP Filters, ad and track blockers - 8:29
    • 77. Policeman and others - HTTP Filters, ad and track blockers - 3:56
    • 78. History, Cookies and Super cookies Part 1 - 11:43
    • 79. History, Cookies and Super cookies Part 2 - 12:13
    • 80. HTTP Referer - 2:19
    • 81. Browser Fingerprinting - 18:26
    • 82. Certificates and Encryption - 11:29
    • 83. Firefox Hardening - 18:49
  • Section: 11 Passwords and Authentication Methods
    • 84. Goals and Learning Objectives - 0:31
    • 85. Password Attacks - 3:22
    • 86. How Passwords are Cracked - Hashes - Part 1 - 16:17
    • 87. How Passwords are Cracked - Hashcat - Part 2 - 7:09
    • 88. Operating System Passwords - 2:27
    • 89. Password Managers - An Introduction - 2:07
    • 90. Password Managers - Master Password - 5:12
    • 91. Password Managers - Keepass and Keepassx - 4:59
    • 92. Password Managers - Lastpass - 11:22
    • 93. Password Managers - Hardening Lastpass - 7:34
    • 94. Creating a Strong Password That You Can Remember - Part 1 - 8:53
    • 95. Creating a Strong Password That You Can Remember - Part 2 - 9:23
    • 96. Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy - 10:54
    • 97. Multi-Factor Authentication - Hard Tokens - 2FA Dongles - 5:53
    • 98. Choosing a Method of Multi-Factor Authentication - 2:50
    • 99. Multi-Factor Authentication - Strengths and Weaknesses - 2:09
    • 100. The Future of Password and Authentication - 1:22
  • Section: 12 BONUS Section... Whats Next?...Volume 3 and 4
    • 101. Important Information - 0:46
    • 102. Congratulations - 1:41
    • 103. Certificate of Completion for CPEs - 0:56
    • 104. BONUS Lecture from Volume 3 - Which VPN protocol is best to use? and why? - 11:43
    • 105. BONUS Lecture from Volume 4 - Email Tracking and Hacking - 10:33
    • 106. BONUS Lecture from Volume 1 - Security Vulnerabilities, Threats and Adversaries - 4:37

View Full Curriculum


Access
Lifetime
Content
10.0 hours
Lessons
67

CompTIA PenTest+ (PT0-001) Ethical Hacking

Master the Fastest-Growing Job Categories in the Cybersecurity Realm: Penetration Testing & Vulnerability Management

By Total Seminars | in Online Courses

Penetration testing and information security are one of the fastest-growing job categories according to the U.S. Bureau of Labor Statistics. Whether you're looking to pass the CompTIA PenTest+ certification exam, take your next step in the CompTIA Cybersecurity Pathway, or you're just looking to learn some awesome ethical hacking skills, you’re in the right place. This course focuses on how to be a pentester. A pen tester plans and scopes a pen test engagement with a client, finds vulnerabilities, exploits them to get into a network, then reports on those findings to the client.

583 positive ratings from 6,333 students enrolled

  • Access 67 lectures & 10 hours of content 24/7
  • Use the tools you’ll need to scan networks, crack passwords, analyze & intercept traffic, discover code vulnerabilities, and compromise resources
  • Recognize vulnerabilities within a system, run exploits, & suggest solutions to a client to remediate the weak points
  • Work within a virtual environment to practice your pen-testing skills, including using Oracle VM manager, Kali Linux, Metasploitable, & DVWA
  • Scope, plan, & execute a pen test engagement from start to finish

"I was looking for not only pen testing cert help but the focus on reporting and project management will certainly help my pen testing career!" – Peter Gruessing

Total Seminars | Home of Mike Meyers & His Team of IT Certification Pros

4.6/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

261,146 Total Students
69,197 Reviews

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: intermediate

Requirements

  • Basic familiarity with networks and network security is suggested
  • Familiarity with the information in the CompTIA Network+ and Security+ exams is recommended

Course Outline

  • Introduction to PenTest+
    • Welcome to CompTIA PenTest+ (PT0-001) Ethical Hacking - 8:40
  • Chapter 1: Planning and Scoping
    • Planning a Pen Test - 8:54
    • Rules of Engagement - 10:41
    • Resources and Budgets - 7:21
    • Impact and Constraints - 5:17
    • Support Resources - 13:26
    • Legal Groundwork - 11:57
    • Scope Considerations - 10:51
    • Lab Environment Setup - 22:56
    • Project Strategy and Risk - 9:24
    • Scope Vulnerabilities - 13:32
    • Compliance-Based Assessments - 5:25
  • Chapter 2: Surveying the Target
    • Scanning and Enumeration - 4:35
    • Scanning and Enumeration Demo - 10:59
    • Packet Investigation - 8:03
    • Packet Inspection Demo - 6:02
    • Application and Open-Source Resources - 11:52
    • Vulnerability Scanning - 8:50
    • Vulnebarility Scanning Demo - 16:31
    • Target and Asset Considerations - 15:39
    • Nmap Timing and Performance Options - 6:43
    • Prioritization of Vulnerabilities - 9:17
    • Common Attack Techniques - 12:17
    • Credential Attacks - 14:41
    • Weaknesses in Specialized Systems - 18:08
  • Chapter 3: Selecting Your Attack Vector
    • Remote Social Engineering - 6:50
    • Spear Phishing Demo - 10:19
    • In-Person Social Engineering - 12:00
    • Network-Based Exploits - 7:19
    • FTP Exploit Demo - 8:28
    • Man-in-the Middle Exploits - 7:18
    • Wireless Exploits - 13:29
    • Application Exploits, Part 1 - 5:41
    • SQL Injection Demo - 8:48
    • Application Exploits, Part 2 - 8:14
    • Application Exploits, Part 3 - 9:15
    • Cross-Site Scripting Demo - 7:11
    • Code Vulnerabilities - 16:48
    • Local Host Vulnerabilities - 5:08
    • Privilege Escalation (Linux) - 9:49
    • Privilege Escalation (Windows) - 6:17
    • Misc. Privilege Escalation - 8:07
    • Misc. Local Host Vulnerabilities - 8:17
    • Physical Security - 11:27
    • Post-Exploitation Techniques - 11:23
    • Persistence and Stealth - 10:55
  • Chapter 4: Selecting Pen Testing Tools
    • Nmap Scoping and Output Options - 21:15
    • Pen Testing Toolbox - 6:59
    • Using Kali Linux - 6:27
    • Scanners and Credential Tools - 10:22
    • Code Cracking Tools - 4:35
    • Open-Source Research Tools - 6:36
    • Wireless and Web Pen Testing Tools - 11:03
    • Remote Access Tools - 6:28
    • Analyzers and Mobile Pen Testing Tools - 2:43
    • Other Pen Testing Tools - 4:39
    • Using Scripting in Pen Testing - 12:46
    • Bash Scripting Basics - 15:10
    • Bash Scripting Techniques - 10:21
    • PowerShell Scripts - 4:16
    • Ruby Scripts - 6:43
    • Python Scripts - 5:59
    • Scripting Languages Comparison - 11:06
  • Chapter 5: Reporting and Communication
    • Writing Reports - 16:02
    • Post-Report Activities - 5:36
    • Mitigation Strategies - 5:13
    • Communication - 9:54

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 15 days of purchase. Once your license is redeemed, all sales are final.