Become CISS: Complete Certified Ethical Hacking Training 3.0

The best and the most extensive Ethical Hacking Training Program on the market. Covers CISS, CEH, CompTIA and CISSP
4.0 (405 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
15,558 students enrolled
$19
$100
81% off
Take This Course
  • Lectures 239
  • Length 27 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2014 English

Course Description

BONUS: Finishing this course, you will get a free voucher for ISA CISS Examination!

New course edition: 3.0 (updated October, 2016)

This EXTENDED version contains over 239+ detailed lectures and over 23,5+ HOURS of VIDEO training. It's one of the most comprehensive ITsec and ethical hacking courses on Udemy.

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.

IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You’re welcome to join us and start your training now.

About the training

Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.

This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing.

Warning: While this comprehensive training includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these techniques to infiltrate networks or IT systems without permission and consent.

Become CISS – Certified IT Security Specialist by covering the following topics:

  • Security and Hacking Myths Debunked
  • Beginner to Advanced IT Security
  • Microsoft Windows Threats and WiFi Weaknesses
  • Current Black-Hat Threats and Trends
  • Designing More Secure Networks
  • Encrypted Data, Identify Spoofing, and Windows Authorization
  • IT Security Academy Exam Preparation


Boost Network Security and Identify Weaknesses

Certified hackers identify network security threats to prevent criminal hacking attempts. The best way to do this, is to understand how cyber criminals evaluate and test your network for vulnerabilities.

Contents and Overview

This course is designed for anyone seeking a career in IT security, as well as programmers and technology enthusiasts who want to develop hacking and prevention skills. A basic understanding of IT and infrastructure is recommended but not required.

With 239 lectures and over 23+ hours of content, you will start with the basics of IT security and progress to the advanced curriculum in a matter of days.

What are the requirements?

  • General IT knowledge
  • No programming skills needed on IT Sec Beginner course

What am I going to get from this course?

  • IT security trends.
  • Security myths.
  • Learn about Wi-Fi network standards and protection.
  • Get to know about Wi-Fi threats.
  • Improve your grasp on Windows security.
  • Understand what security boundaries are.
  • Find out how to fight malware.
  • Discover secret tips on access control in Windows.
  • Learn how Windows authentication works.
  • Prevent identity spoofing.
  • Find out the mechanisms of Windows authorisation.
  • Learn about Windows 7 security mechanisms.
  • Get to know how to encrypt data in Windows.
  • Wi-Fi network standards and protection.
  • Wi-Fi network threats.
  • How to prevent identity spoofing.

What is the target audience?

  • Future IT Sec Professionals
  • IT Students
  • Programmers
  • IT enthusiasts

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: IT Security Trends
Introduction to Current Cyber Threats
Preview
04:46
IT Prehistory
04:41
Let’s look a few years back
04:42
Cyber crimes - an evolution not revolution
04:25
Current Cyber Threats - notes for the examination
18 pages
Popular myths about IT security - origins
05:33
Myths #1 - you’ll never be hacked
05:55
Myths #2 - you don’t need any protection software or hardware
05:11
Myths #3 - IT security is always a priority
01:13
Popular Myths About Computer System Security - notes for the examination
9 pages
Trends in IT Security
03:44
The birth of technology society
03:16
EXERCISE: How much info can you gather?
03:59
Fake identity
05:03
Online privacy
06:14
Analyzing sniffing software
03:33
Cyber War
08:23
Changing IT Security Trends - notes for the examination
32 pages
Objective #1 - Data security - Introduction
06:58
Confidentiality of data
05:33
EXERCISE: Finding confidential data with search engines
06:05
Integrity of data
07:04
Data security - notes for the examination
22 pages
Section 2: Computer Network Security
Network security - introduction
05:44
OSI MODEL #1 - Physical layer
05:45
OSI MODEL #2 - Data link layer
04:46
Threats: MAC spoofing
05:54
Threats: ARP Poisoning
06:38
EXERCISE: Data Link Layer Attack
07:32
OSI MODEL #3 - Network layer
06:58
TCP Tunnelling over ICMP
07:39
Network Protocols - notes for the examination
26 pages
OSI MODEL #4 - Transport Layer
06:04
Threats: Enumerating Remote Computers
03:40
EXERCISE: Transport Layer Attack using METASPLOIT part 1
05:27
EXERCISE: Transport Layer Attack using METASPLOIT part 2
05:13
OSI MODEL #5 - Session Layer
03:33
Transport Protocols - notes for the examination
10 pages
OSI MODEL #6 - Presentation Layer
06:52
OSI MODEL #7 - Application Layer
03:48
EXERCISE: Application Layer Attacks
06:03
Backtrack: Attack Demonstration
03:34
Man-in-the-Middle and Denial of Service Attacks
02:49
Modifying Transmitted Packets
04:45
Unencrypted protocols
02:58
Application Protocols - notes for the examination
21 pages
Section 3: Designing Secure Computer Networks
Designing Computer Networks - introduction
02:18
Subnetting IPv4
07:01
Subnetting IPv6
03:18
Subnetting - notes for the examination
20 pages
IPv6 address notation
06:46
DMZ: demilitarized Zone
06:28
Protocols and services: IP SEC
09:33
IP SEC: Phase 1
07:27
Network Address translation
12:18
Network access control: RADIUS
10:04
Protocols and Services - notes for the examination
20 pages
Section 4: Network administration
Introduction to Monitoring Transmitted Data
01:06
Monitoring Transmitted Data - Basic informations
08:03
Intrusion detection systems
07:43
Why are firewalls and NDIS not enough?
05:41
Wireshark - Introduction to network analysis
Preview
06:29
How to use Wireshark?
Preview
08:27
Analyzing Captured data
Preview
05:43
How to analyze telnet protocol?
08:09
Intrusion detection
07:48
Scanning computers
07:47
Monitoring transmitted data - notes for the examination
28 pages
Section 5: Wireless Networks Security
Wireless Networks
01:16
WIFI security solutions - introduction
05:44
WIFI - working principles
05:48
Other wireless technologies
02:56
Threats and risks
04:38
Ineffective solutions
04:11
Authentication methods
08:31
802.11 WEP
07:06
802.11I WPA
06:24
Standards and Security Solutions - notes for the examination
29 pages
Threats of WIFI networks
05:58
Client Attacks: Launching a rogue access point
07:03
Client Attacks: Evil twin
04:51
Client Attacks: Denial of service
09:17
EXERCISE: WPA attack
03:24
Wi-Fi Security Threats - notes for the examination
19 pages
Section 6: Operating Systems Security
Operating systems security - introduction
09:10
Security boundaries
04:44
Three core
07:15
EXERCISE: OS boundaries
07:54
Process isolation
06:30
Kernel Mode Code Signing
06:24
Java Virtual Machine and code access security
04:17
OS Security Boundaries - notes for the examination
28 pages
Malware
12:09
EXERCISE: Vulnerability attacks
10:26

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

IT Security Academy, IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Instructor Biography

Hacking School, IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

Ready to start learning?
Take This Course

The Psychology of Cyber Security

With all of the data stored and accessed online, consumers appreciate now, more than ever, the importance of cyber security. Their behavior, however, does not always reflect this. There is a distinct disconnect between what users know and how they apply that knowledge.