Welcome to our IT Security and Ethical Hacking Course.
These lectures teach the principles, techniques, and tools needed to successfully prepare for and pass the “Ethical Hacking and Countermeasures" exam.
These sections can be taken in any order, as a review of a concept or knowledge area. However, if you are just becoming familiar with it security and ethical hacking it is recommended that you view the sections sequentially.
Note: This course covers many of the same concepts taught in our "IT Security Fundamentals: CompTIA Security+ 2015" course. This course has additional advanced material that pertains to ethical hacking. Most customers will want to purchase one or the other but likely not both.
Ethical hacking is testing the IT resources for a good cause and for the betterment of technology. This training will establish your understanding of all the fundamental concepts, processes, and procedures.. You will spend time concentrating on each knowledge area, and studying the tools and techniques, inputs, and outputs associated with each knowledge area.
Section 1: In the pre-assessment quiz you'll face questions from all sections of this Ethical Hacking training. Test your current knowledge and know your strengths and weaknesses.
Sections 2-4: In Introduction to Ethical Hacking, you will be introduced to various concepts on ethical hacking. You will receive an introduction to the basics of Risk Management and Disaster Recovery. As well as an introduction to Penetration Testing.
Sections 5-7: You will gain a comprehensive understanding of vulnerability assessment and the tools used in this process. What kind of security measures do you take to protect your facilities, equipment, resources, personnel, and property from damage caused by unauthorized access? In this course, Physical Security, these are questions that we will be answering. Footprinting is the gathering of information related to a particular computer and its users and systems.
Sections 8-10: Reconnaissance is an exploration that is conducted to gain information. Network scanning is the scanning of public or private networks to find out which systems are running, their IP addresses, and which services they are running. In Port Scanning, you will learn how ports can be scanned, how a hacker can break into your network through the ports, and the countermeasures you can take to protect your device or network.
Sections 11-13: Banner grabbing is a technique used to grab information about computer systems on a network and the services running its open ports. In this course you will be introduced to enumeration and the many different uses it has in computer systems. This course will include demos on the different tools and uses of enumeration. In this course you will be learning the fundamentals of Linux. We will be pairing this course with demos with a more in-depth look into some of the fundamentals and tools of Linux.
Sections 14-16: Pentesting is an attack on a system in hopes of finding security weaknesses. In the course Configuring Linux for Pentesting, you will be learning the steps to configure Linux for pentesting and tools used for pentesting on a Linux system. Whenever we login to a computer system, we provide information to identify ourselves. We refer to this as authentication. Ensure that you know everything involved in securing a Windows system against attack. During this course you'll get into Windows passwords — how they're created, how they're stored, and different methods used to crack them.
Section 17-19: You will take a good look at spyware, the activities it performs, different types of spyware, and the countermeasures needed in order to prevent hackers from utilizing these types of techniques against your company. You will also spend time studying different types of keyloggers. There are three different types of keyloggers that we see used in today's environments: hardware, software, and kernel/driver keyloggers. Covering Tracks will be going over various ways that attackers have at their disposal to cover any tracks that may lead to their unwanted eviction, or worse yet, to an audit trail that would lead directly back to them. Trojans and Backdoors is the course where our software is going to be going undercover.
Section 20-22: You will discover what viruses and worms are and how they can infect computers and systems. Sniffers is our course where we take a look at Network Sniffing. Social engineering is the art of extorting employees for information.
Sections 23-26: Become familiar with the following concepts: denial-of-service, distributed denial-of-service, and how the denial-of-service and distributed denial-of-service attacks take place. In the course Session Hijacking, you will learn details about session hijacking, well-known techniques employed by aggressors, the steps involved in session hijacking, various types of session hijacking, tools for hijacking sessions, ways you can protect yourselves from session hijacking, and how pentesting can be used to identify vulnerabilities. Hacking Web and Application Servers, is a course that will give you a good idea about vulnerabilities and attacks available for web servers and web applications. In our course our course Advanced Exploitation Techniques, you will learn what advanced exploitation techniques are and how you can use them in your penetration testing.
Sections 36-37: There are many benefits to using Cloud Computing, and in order to take full advantage of those benefits, it’s important to better understand what cloud computing is. Gain an introduction to Cloud Computing concepts and threats. We discuss the four types of cloud types as well as the different forms of cloud computing. Then, we spend time briefly discussing the many threats associated with cloud computing and how they can affect procedures and security. Moving to the cloud can ease a company’s management and support costs so cover the types of threats that can happen on the cloud. We discuss their characteristics, then talk about how to sure up security in order to protect against these attacks. We also discuss the security responsibilities of both the cloud provider and the consumer.
Learn from others! Here are some reviews from the participants enrolled in this course (Click on reviews to see full list of reviews)
- Excellent Course, Highly Recommended - If you are interested in learning the principles of IT Security and Hacking, this course is for you. Very detailed, in-depth, and well-presented. With over 25 hours of video, and references to several outside resources. This course builds and excellent foundation for the beginner and provides a good review for the more experienced IT professional Michael Chesbro
- Great for all levels - the Idea about this course is to get thinking about Security. And you will learn something . Something is new something is old. But everyone need a refresh now and then and see the whole picture. I recommend this course Alf-Olav NIlsen
- Ethical hacking helps - The production of your teaching is awesome. Thanks to your teaching I have gotten rid of some hacker which have been bothering me for quite some time. I didn't know much about Security or ethical hacking until until I took this course. It has opened up a new world for me John Ackerman
This lecture will give a brief orientation to the course supplemental materials.
Introduction to Ethical Hacking, will be introducing you to various concepts on ethical hacking. You will learn about vulnerabilities, exploits, defense strategy, penetration testing, and pentest types and methodology. You will also learn about vulnerability management, incident management, and security policy development.
This lecture will discuss the topics to be covered within Introduction to Ethical Hacking, as well as its implementations within the hacking world.
Topics Covered Include:
- Ethical Hacking
Topics Covered Include:
The principle of defence-in-depth is layered security mechanisms. The layered security enhances the security of the system as a whole. During an attack, if one layer gets impacted, other layers can still “hold down the fort.” Implementing defense-in-depth strategy is not an easy mechanism. Implementing this approach could add to the complexity of the system.
This lecture will discuss the components of Defence-in-depth, as well as how to implement it within ethical hacking.
Topics Covered Include:
- Data Layer
- Host Level
This lecture will discuss the components within penetration testing, as well as why it it used within ethical hacking.
Topics Covered Include:
- Penetration Test
- Penetration Testing
This lecture will show one of four demonstrations on how to carry out a Penetration Test.
This lecture will show the second of four demonstrations on how to carry out a Penetration Test.
This lecture will show the third of four demonstrations on how to carry out a Penetration Test.
This lecture will show the final of the four demonstrations on how to carry out a Penetration Test.
- No prerequisites for this course - A computer with Internet
- The majority of the tools used in this series must be run on a Windows machine. There might be a MAC equivalent, but the tools demonstrated were all run on a Windows machine.