Cybersecurity Attacks (Red Team Activity)
4.2 (16 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
232 students enrolled

Cybersecurity Attacks (Red Team Activity)

Learn about the different kinds of cyber attacks and how they can be executed
4.2 (16 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
232 students enrolled
Created by Packt Publishing
Last updated 3/2018
English
English [Auto-generated]
Current price: $11.99 Original price: $124.99 Discount: 90% off
4 days left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3.5 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to Udemy's top 3,000+ courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • See different types of cyber attacks, how they are executed, and to provide vulnerability assessment
  • Explore the technology of cyber espionage and quickly discover upcoming cyber attacks

  • Use Kali Linux, Metasploit, Owasp ZAP, BurpSuite, Maltego, and a lot of other first-class tools for ethical hacking

  • Deal with hackers that manipulate the human mind and behaviour to break into your assets
  • See how email and social media accounts can become your enemy
  • Know how cybercriminals can control your browser and what they can do with it
  • See how SQL injection and XSS play a vital role in the modern cybersecurity field and why they’re so dangerous
  • Use Python for penetration testing
Requirements
  • Prior knowledge in networking, web-application functioning, Linux command, and Python will be beneficial, throughout a short review of these topics will be given.
Description

There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans.
Refined hackers know how to hack a human brain first to hack digital assets. You’ll find out what social engineering, phishing, and spear-phishings, and why they’re becoming especially dangerous today.By the end of this course, you’ll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them

About the Author

Sergii Nesterenko is Information Security Consultant and Penetration Tester with 20 years’ experience in the information security and 6 years’ in the cybersecurity field. He consults international business companies, military staff, NGOs, politicians, Members of Parliament, law enforcement, and other VIP on security issues. His wide knowledge in information technologies and human psychology let him elaborate effective technologies to prevent and overcome most cunning cyberattacks. He has also known for his publications and lectures on cybersecurity, anti-fraud, and counter-cyberespionage issues.

Who this course is for:
  • This course is for IT professionals who want to become cybersecurity-aware, Penetration Testers, System Administrators, Information Security Consultants, and everybody who wants to feel safe in the information field today.
Course content
Expand all 35 lectures 03:35:10
+ Building Our Lab
7 lectures 45:05

This video provides an overview of the entire course.

Preview 06:41

In this video, we are going to know what Kali Linux is and why using it is the best and fastest way to become a cybersecurity pro.

What is Kali Linux and Why We Should Use it
03:29

In this video, we are going to install Kali Linux as virtual machine and run it for the first time.

Installing Kali Linux on Virtual Machine
06:19

In this video, we are going to know nuts and bolts of Kali Linux interface and how to run it for easy use.

Getting Acquainted with Kali Linux Easy Way
09:08

In this video, we are going to learn how to use Kali terminal and its commands necessary to know for this course.

Getting Acquainted with Terminal Commands
07:52

In this video, we are going to tune up Python correctly for the course purposes.

Tune Up Python
03:57

In this video, we are going to install Metasploitable 2 as our main target virtual machine and get acquainted with its applications. Also we will install Windows 7 as the secondary target virtual machine.

Installing Metasploitable 2 on Virtual Machine
07:39
+ Attacking a Network
9 lectures 01:01:49

In this video, we will consider the variety of ways a network can be attacked and categorize them.

Preview 02:59

In this video, we will learn how to scan a target with Nmap for finding open ports and fingerprinting.

Hidden Scanning Ports with Nmap
08:52

In this video, we will know how to find vulnerabilities in a network with an OpenVas scanner.

Scanning the Network with OpenVas
07:39

In this video, we will discover how to use Wireshark for sniffing a network to intercept user’s data.

Intercepting Traffic with Wireshark
05:29

In this video, we will know about what is man-in-the-middle attack and what harm can be done with it.

Types of man-in-the-middle Attack
05:19

In this video, we will learn about variety of dangerous browser attacks with BeEf framework.

Taking Control Over Target Browser with BeEf
11:08

In this video, we will discover how to set a reverse on target computer using Metasploit framework.

Creating Reverse Shell with Metasploit
09:29

In this video, we will find out what is persistent backdoor and how it can be installed on target machine.

Leaving a Backdoor in the Target Machine
04:37

In this video, we will consider using Python language in cybersecurity field and create flexible Portscanner with Python script.

Advanced-Level Hacking - Scanning Hosts with Python Script
06:17
+ Website and Web-Application Attacks
10 lectures 57:51

In this video, we discover how to find vulnerabilities in a web-application using a browser only.

Preview 06:07

In this video, we get to know OWASP ZAP scanner and learn to find vulnerabilities with automated scanning.

Scanning Web-Application with OWASP ZAP
05:30

In this video, we learn SQL injection attack and its purposes.

Breaking Database with SQL Injection
03:01

In this video, we discover how to test a web-application for SQL injection vulnerability.

Manual Testing for SQL Injection
08:10

In this video, we learn to exploit SQL injection to extract credentials from database with SQLmap.

Executing SQL Injection with SQLmap
05:19

In this video, we learn how to execute proxy attack using Burp Suite.

Proxy Attack with Burp Suite
08:08

In this video, we get to know with session hijacking attack and demonstrate how cookies can be stolen.

Executing a Session Hijacking
06:04

In this video, we will learn Cross Site Scripting and execute stored XSS attack.

Infecting Website with Stored XSS
06:12

In this video, we discover details about another type of XSS attack – reflected XSS and how it’s executed.

Executing Reflected XSS
04:26

In this video, we will learn why and when using Python scripts is
useful. In addition, we create and run Python script for XSS testing.

Using Python Script to Find Vulnerabilities
04:54
+ Hacking the Human in a Cyber Crime Attack
9 lectures 50:25

In this video, we will learn about social engineering and become aware why attacking humans often more effective than attacking computers.

Preview 03:37

In this video, we will get acquainted with Social Engineering Toolkit and get hands-on experience of making a phishing email

Making a Phishing Email with SET
06:11

In this video, we will learn to make a malicious payload for a phishing email.

Creating a Malicious File with SET
05:12

In this video, we will know how malicious USB is created.

Creating and Delivering Malicious USB Card
03:53

In this video, we will learn about whaling kind of cyberattack targeted at VIP and techniques using in spear-phishing attacks.

Learning Spear-Phishing Methods for VIP
05:38

In this video we will get to know with Maltego framework and find out how to extract e-mails and phone numbers from the Internet assets

Gathering Emails and Phone Numbers with Maltego
06:31

In this video, we get to know with session hijacking attack and demonstrate how cookies can be stolen.In this video, we will learn OSINT (Open Source Intelligence) techniques to extract information from social media.

Looking for Secrets in Social Media with Online Tools
06:16

In this video, we will learn why and how cybercriminals use psychological manipulation techniques to influence their victims.

Playing on Human Emotions and Weaknesses to Get the Information
05:46

In this video, we will learn a few hacking techniques that don’t require neither special tools nor direct contact with a target.

How to Hack Without Getting in Touch with a Target
07:21