Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Online Business Business Strategy Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Hacking Techniques for IT Professionals 2.0 Complete Course

One of the best Ethical Hacking courses. Covers CISS, CompTIA, CISSP programs. Hacking Academy Certificate included.
Rating: 3.3 out of 53.3 (226 ratings)
8,523 students
Created by IT Security Academy, Hacking School
Last updated 11/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Become Certified IT Security Professional
  • Application attacks and how to prevent them.
  • Application security assessment.
  • Global management of user software.
  • Cryptography and cryptanalysis.
  • Symmetric and asymmetric encryption.
  • Public key infrastructure management.
  • Modelling and classifying threats.
  • Managing risk.
  • Attack methodologies.
  • How to use and deal with social engineering and rogue software.
  • Defence-in-depth.
  • Immutable security laws.

Requirements

  • Finished IT Security Beginner Training
  • IT knowledge
  • Programming skills will be useful
  • Basics of Linux systems

Description

LAST UPDATED: 11/2020

BONUS: Finishing this course you will get free voucher for IT Security Academy Online Examination Center where you can archive your IT Security Certificate. 


Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.

Welcome to IT Secutiry Academy! IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you've ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You're welcome to join us and start your training now.
     

About the training

This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security. 

Training is starting with IT Security current threat and trends. Afterwards we are discussing popular security myths. Great part of the training relates to Network security. 

We will start with local networks, talk about protocols and theirs vulnerabilities. You will learn how to design secure computer networks and subnets. You will become real network administrator. 

Next you will discover why wireless networks could be so dangerous. You will learn standards, protocols and security solutions. Wi-Fi networks are an integral part of our lives, but not everyone realizes that if it is inadequately protected, your enterprise or home network can disclose your confidential passwords and give attackers easy access to the machines you’re administrating. 

Topics covered include core issues related to effectively securing the most popular Microsoft OS: identity theft, authentication, authorization, encryption. We identify typical mistakes and guide you towards achieving good OS protection. 

Who this course is for:

  • Future IT Security Managers
  • Network and Enterprise OS Administrators
  • IT Professionals

Course content

12 sections • 117 lectures • 15h 2m total length

  • Welcome to the course
    00:05
  • Preview01:56
  • Preview03:53
  • Preview04:13
  • Information security - level up
    04:04
  • Security issues
    04:50
  • Why are security solutions fallible?
    05:42
  • Security policy issues
    04:50
  • Introduction to threat modelling and classification
    05:14
  • Threat modelling - STRIDE
    04:06
  • STRIDE: Spoofing identity
    05:03
  • STRIDE: Tampering with Data
    04:28
  • STRIDE: Denial of Service
    03:51
  • Threat Modelling and Classification - notes for the examination
    19 pages

  • Introduction to Risk Management
    01:27
  • Attack Methods
    06:42
  • Local attacks
    02:56
  • Target scanning and enumeration techniques #1
    05:52
  • Target scanning and enumeration techniques #2
    03:30
  • Passive scanning
    02:06
  • Attack Methodologies - notes for the examination
    25 pages
  • Introduction to risk assessment
    06:20
  • DREAD: Risk assessment model
    04:50
  • DREAD: Exploitability
    05:24
  • EXERCISE: Risk Assessment
    07:17
  • Risk Assessment - notes for the examination
    27 pages
  • Introduction to Social Engineering and rogue software
    04:19
  • Manipulation tactics
    09:01
  • EXERCISE: Social Engineering attacks
    06:44
  • SE with KALI / BackTrack
    07:06
  • Rogue Software
    02:28
  • Fraud tools #1
    07:10
  • Fraud tools #2
    06:32
  • Social Engineering and Rogue Software - notes for the examination
    28 pages

  • Introduction to Defence in Depth
    01:32
  • How to use Defence in Depth model?
    05:45
  • DiD: OS and LAN Layers
    06:39
  • DiD: Perimeter and Physical Access Layers
    06:06
  • DiD: Demonstration
    02:48
  • Automated attack targeting a service
    05:23
  • Automated user-targeting attack
    04:31
  • The Defence in Depth Model - notes for the examination
    25 pages

  • Introduction to Immutable laws of security - Law #1
    04:35
  • Law #2
    02:56
  • Law #3
    02:23
  • Law #4
    01:52
  • Law #5
    03:28
  • Law #6
    02:07
  • Law #7
    01:11
  • Law #8
    01:43
  • Law #9
    03:57
  • Law #10
    00:48
  • Laws for administrators
    05:59
  • Immutable Laws of Security - notes for the examination
    21 pages

  • Introduction to Disaster Recovery
    01:33
  • How to reduce losses?
    05:24
  • Ensuring continous availability
    04:08
  • Threat discovery #1
    04:28
  • Threat discovery #2
    03:40
  • Audit users and keep control accounts
    05:18
  • High risk users
    03:23
  • Collecting and analysing evidence
    07:13
  • Forensics example
    03:52
  • CONFICKER: CASE STUDY
    07:11
  • How to reduce losses - notes for the examination
    31 pages

  • Introduction to Application Security
    08:18
  • Attacks on applications
    10:18
  • SQL Injection
    08:10
  • EXERCISE: Analyze the application
    13:31
  • Blind SQL Injection
    09:33
  • Automated SQL Injection
    11:44
  • Cross-site scripting - XSS
    10:10
  • Application Attacks - notes for the examination
    29 pages
  • Program security assessment
    05:10
  • Unsafe applications
    10:11
  • Program Security Assessment - notes for the examination
    10 pages

  • Here’s what you’ll learn in this module
    01:05
  • Managing applications
    08:26
  • Software updates
    02:39
  • MS Update
    06:53
  • System Center Configuration Manager
    02:46
  • Blocking applications
    07:35
  • Software restrictions policies
    05:57
  • EXERCISE: Application control rules
    12:11
  • Isolating applications
    06:30
  • How to protect users without interrupting their work - notes for the examination
    25 pages

  • Introduction to cryptography
    09:42
  • History of ciphers
    10:57
  • Symmetric and asymmetric ciphers
    06:13
  • Symmetric-key algorithms
    05:49
  • Block ciphers
    06:01
  • Data encryption standard
    06:51
  • DES-X
    07:35
  • Advanced encryption standards
    05:28
  • Block cipher modes
    07:16
  • Stream Ciphers - RC4
    03:40
  • Asymmetric-key algorithms
    08:11
  • RSA
    05:33
  • ELGAMAL
    02:05
  • HASH functions
    05:56
  • Digital signature
    05:56
  • Hybrid Schemes
    06:24
  • Symmetric and Asymmetric Ciphers - notes for the examination
    57 pages

  • Introduction to cryptology
    02:12
  • Public key infrastructure
    06:10
  • Implementing public key infrastructure
    05:39
  • What will PKI allow you?
    06:29
  • EXERCISE: Certificates
    08:37
  • Certificate life cycle
    06:24
  • Planning the PKI
    08:33
  • PKI Administration
    07:29
  • Public Key Infrastructure - Trust but verify - notes for the examination
    37 pages

  • Answer sample questions which you can find during the examination
    5 questions

Instructors

IT Security Academy
IT Security Certified Professional
IT Security Academy
  • 4.0 Instructor Rating
  • 8,963 Reviews
  • 173,083 Students
  • 17 Courses

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Hacking School
IT Security Experts - We turn beginners into professionals.
Hacking School
  • 4.0 Instructor Rating
  • 8,963 Reviews
  • 173,083 Students
  • 17 Courses

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.