Become CISS: Complete Certified Ethical Hacking Training 3.0
4.2 (563 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
17,195 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Become CISS: Complete Certified Ethical Hacking Training 3.0 to your Wishlist.

Add to Wishlist

Become CISS: Complete Certified Ethical Hacking Training 3.0

The best and the most extensive Ethical Hacking Training program on the market. Covers CISS, CompTIA and CISSP.
4.2 (563 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
17,195 students enrolled
Last updated 11/2016
English
Current price: $10 Original price: $100 Discount: 90% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 20.5 hours on-demand video
  • 12 Articles
  • 32 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • IT security trends.
  • Security myths.
  • Learn about Wi-Fi network standards and protection.
  • Get to know about Wi-Fi threats.
  • Improve your grasp on Windows security.
  • Understand what security boundaries are.
  • Find out how to fight malware.
  • Discover secret tips on access control in Windows.
  • Learn how Windows authentication works.
  • Prevent identity spoofing.
  • Find out the mechanisms of Windows authorisation.
  • Learn about Windows 7 security mechanisms.
  • Get to know how to encrypt data in Windows.
  • Wi-Fi network standards and protection.
  • Wi-Fi network threats.
  • How to prevent identity spoofing.
View Curriculum
Requirements
  • General IT knowledge
  • No programming skills needed on IT Sec Beginner course
Description

BONUS: Finishing this course, you will get a free voucher for ISA CISS Examination!

New course edition: 3.0 (LAST UPDATED: JUNE 2017)


This EXTENDED version contains over 239+ detailed lectures and over 23,5+ HOURS of VIDEO training. It's one of the most comprehensive ITsec and ethical hacking courses on Udemy.

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.

IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You’re welcome to join us and start your training now.

About the training

Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.

This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing.

Warning: While this comprehensive training includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these techniques to infiltrate networks or IT systems without permission and consent.

Become CISS – Certified IT Security Specialist by covering the following topics:

  • Security and Hacking Myths Debunked
  • Beginner to Advanced IT Security
  • Microsoft Windows Threats and WiFi Weaknesses
  • Current Black-Hat Threats and Trends
  • Designing More Secure Networks
  • Encrypted Data, Identify Spoofing, and Windows Authorization
  • IT Security Academy Exam Preparation


Boost Network Security and Identify Weaknesses

Certified hackers identify network security threats to prevent criminal hacking attempts. The best way to do this, is to understand how cyber criminals evaluate and test your network for vulnerabilities.

Contents and Overview

This course is designed for anyone seeking a career in IT security, as well as programmers and technology enthusiasts who want to develop hacking and prevention skills. A basic understanding of IT and infrastructure is recommended but not required.

With 239 lectures and over 23+ hours of content, you will start with the basics of IT security and progress to the advanced curriculum in a matter of days.

Who is the target audience?
  • Future IT Sec Professionals
  • IT Students
  • Programmers
  • IT enthusiasts
Students Who Viewed This Course Also Viewed
Curriculum For This Course
239 Lectures
26:46:36
+
IT Security Trends
23 Lectures 01:36:18

IT Prehistory
04:41

Let’s look a few years back
04:42

Cyber crimes - an evolution not revolution
04:25

Current Cyber Threats - notes for the examination
18 pages

Popular myths about IT security - origins
05:33

Myths #1 - you’ll never be hacked
05:55

Myths #2 - you don’t need any protection software or hardware
05:11

Myths #3 - IT security is always a priority
01:13

Popular Myths About Computer System Security - notes for the examination
9 pages

Trends in IT Security
03:44

The birth of technology society
03:16

EXERCISE: How much info can you gather?
03:59

Fake identity
05:03

Online privacy
06:14

Analyzing sniffing software
03:33

Cyber War
08:23

Changing IT Security Trends - notes for the examination
32 pages

Objective #1 - Data security - Introduction
06:58

Confidentiality of data
05:33

EXERCISE: Finding confidential data with search engines
06:05

Integrity of data
07:04

Data security - notes for the examination
22 pages
+
Computer Network Security
23 Lectures 01:45:42
Network security - introduction
05:44

OSI MODEL #1 - Physical layer
05:45

OSI MODEL #2 - Data link layer
04:46

Threats: MAC spoofing
05:54

Threats: ARP Poisoning
06:38

EXERCISE: Data Link Layer Attack
07:32

OSI MODEL #3 - Network layer
06:58

TCP Tunnelling over ICMP
07:39

Network Protocols - notes for the examination
26 pages

OSI MODEL #4 - Transport Layer
06:04

Threats: Enumerating Remote Computers
03:40

EXERCISE: Transport Layer Attack using METASPLOIT part 1
05:27

EXERCISE: Transport Layer Attack using METASPLOIT part 2
05:13

OSI MODEL #5 - Session Layer
03:33

Transport Protocols - notes for the examination
10 pages

OSI MODEL #6 - Presentation Layer
06:52

OSI MODEL #7 - Application Layer
03:48

EXERCISE: Application Layer Attacks
06:03

Backtrack: Attack Demonstration
03:34

Man-in-the-Middle and Denial of Service Attacks
02:49

Modifying Transmitted Packets
04:45

Unencrypted protocols
02:58

Application Protocols - notes for the examination
21 pages
+
Designing Secure Computer Networks
11 Lectures 01:05:13
Designing Computer Networks - introduction
02:18

Subnetting IPv4
07:01

Subnetting IPv6
03:18

Subnetting - notes for the examination
20 pages

IPv6 address notation
06:46

DMZ: demilitarized Zone
06:28

Protocols and services: IP SEC
09:33

IP SEC: Phase 1
07:27

Network Address translation
12:18

Network access control: RADIUS
10:04

Protocols and Services - notes for the examination
20 pages
+
Network administration
11 Lectures 01:06:56
Introduction to Monitoring Transmitted Data
01:06

Monitoring Transmitted Data - Basic informations
08:03

Intrusion detection systems
07:43

Why are firewalls and NDIS not enough?
05:41




How to analyze telnet protocol?
08:09

Intrusion detection
07:48

Scanning computers
07:47

Monitoring transmitted data - notes for the examination
28 pages
+
Wireless Networks Security
16 Lectures 01:17:07
Wireless Networks
01:16

WIFI security solutions - introduction
05:44

WIFI - working principles
05:48

Other wireless technologies
02:56

Threats and risks
04:38

Ineffective solutions
04:11

Authentication methods
08:31

802.11 WEP
07:06

802.11I WPA
06:24

Standards and Security Solutions - notes for the examination
29 pages

Threats of WIFI networks
05:58

Client Attacks: Launching a rogue access point
07:03

Client Attacks: Evil twin
04:51

Client Attacks: Denial of service
09:17

EXERCISE: WPA attack
03:24

Wi-Fi Security Threats - notes for the examination
19 pages
+
Operating Systems Security
17 Lectures 01:56:55
Operating systems security - introduction
09:10

Security boundaries
04:44

Three core
07:15

EXERCISE: OS boundaries
07:54

Process isolation
06:30

Kernel Mode Code Signing
06:24

Java Virtual Machine and code access security
04:17

OS Security Boundaries - notes for the examination
28 pages

Malware
12:09

EXERCISE: Vulnerability attacks
10:26

EXERCISE: Identifying suspicious processes
06:54

Demonstration: Process Explorer
09:13

EXERCISE: Removing malware
08:38

Rootkits
06:14

EXERCISE: Detecting rootkits
11:07

EXERCISE: Security evaluation
06:00

Malware - notes for the examination
18 pages
+
Access Control
12 Lectures 01:15:38
Authentication and authorisation - Introduction
01:57

Authentication users
06:56

How secure is your password?
05:03

Authentication protocols and services
08:25

Authentication - notes for the examination
26 pages

LM Hash
07:02

Cached Credentials
04:29

KERBEROS
11:30

Identity Theft
09:13

EXERCISE: Offline attacks
12:22

Using online cracking services
08:41

Identity Theft - notes for the examination
13 pages
+
Windows Security
13 Lectures 01:12:36
Windows Security - what you’ll learn
01:17

User Account Control
06:22

UAC configuration
08:02

Additional Security Features - ASLR and DEP
11:39

PatchGuard
01:34

Techniques and Methods - notes for the examination
18 pages

Encryption - key protection
09:31

Drive encryption
08:25

BitLocker
07:57

BitLocker To Go Reader
04:43

File and folder encryption - EFS
07:30

EXERCISE: EFS
05:36

Encryption - notes for the examination
23 pages
+
Security Policies
12 Lectures 52:10


Information security
04:13

Information security - level up
04:04

Security issues
04:50

Why are security solutions fallible?
05:42

Security policy issues
04:50

Introduction to threat modelling and classification
05:14

Threat modelling - STRIDE
04:06

STRIDE: Spoofing identity
05:03

STRIDE: Tampering with Data
04:28

STRIDE: Denial of Service
03:51
+
Risk Management
20 Lectures 01:29:44
Introduction to Risk Management
01:27

Attack methods
06:42

Local attacks
02:56

Target scanning and enumeration techniques #1
05:52

Target scanning and enumeration techniques #2
03:30

Passive scanning
02:06

Attack Methodologies - notes for the examination
00:00

Introduction to risk assessment
06:20

DREAD: Risk assessment model
04:50

DREAD: Exploitability
05:24

EXERCISE: Risk Assessment
07:17

Risk Assessment - notes for the examination
00:00

Introduction to Social Engineering and rogue software
04:19

Manipulation tactics
09:01

EXERCISE: Social Engineering attacks
06:44

SE with KALI / BackTrack
07:06

Rogue Software
02:28

Fraud tools #1
07:10

Fraud tools #2
06:32

Social Engineering and Rogue Software - notes for the examination
00:00
8 More Sections
About the Instructor
IT Security Academy
4.2 Average rating
2,189 Reviews
71,813 Students
25 Courses
IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Hacking School
4.2 Average rating
1,859 Reviews
65,268 Students
13 Courses
IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.