Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
BONUS: Finishing this course, you will get a free voucher for ISA CISS Examination!
New course edition: 3.0 (updated September, 2016)
This EXTENDED version contains over 239+ detailed lectures and over 23,5+ HOURS of VIDEO training. It's one of the most comprehensive ITsec and ethical hacking courses on Udemy.
Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.
IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You’re welcome to join us and start your training now.
About the training
Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.
This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing.
Warning: While this comprehensive training includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these techniques to infiltrate networks or IT systems without permission and consent.
Become CISS – Certified IT Security Specialist by covering the following topics:
Boost Network Security and Identify Weaknesses
Certified hackers identify network security threats to prevent criminal hacking attempts. The best way to do this, is to understand how cyber criminals evaluate and test your network for vulnerabilities.
Contents and Overview
This course is designed for anyone seeking a career in IT security, as well as programmers and technology enthusiasts who want to develop hacking and prevention skills. A basic understanding of IT and infrastructure is recommended but not required.
With 239 lectures and over 23+ hours of content, you will start with the basics of IT security and progress to the advanced curriculum in a matter of days.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: IT Security Trends|
Introduction to Current Cyber ThreatsPreview
Let’s look a few years back
Cyber crimes - an evolution not revolution
Current Cyber Threats - notes for the examination
Popular myths about IT security - origins
Myths #1 - you’ll never be hacked
Myths #2 - you don’t need any protection software or hardware
Myths #3 - IT security is always a priority
Popular Myths About Computer System Security - notes for the examination
Trends in IT Security
The birth of technology society
EXERCISE: How much info can you gather?
Analyzing sniffing software
Changing IT Security Trends - notes for the examination
Objective #1 - Data security - Introduction
Confidentiality of data
EXERCISE: Finding confidential data with search engines
Integrity of data
Data security - notes for the examination
|Section 2: Computer Network Security|
Network security - introduction
OSI MODEL #1 - Physical layer
OSI MODEL #2 - Data link layer
Threats: MAC spoofing
Threats: ARP Poisoning
EXERCISE: Data Link Layer Attack
OSI MODEL #3 - Network layer
TCP Tunnelling over ICMP
Network Protocols - notes for the examination
OSI MODEL #4 - Transport Layer
Threats: Enumerating Remote Computers
EXERCISE: Transport Layer Attack using METASPLOIT part 1
EXERCISE: Transport Layer Attack using METASPLOIT part 2
OSI MODEL #5 - Session Layer
Transport Protocols - notes for the examination
OSI MODEL #6 - Presentation Layer
OSI MODEL #7 - Application Layer
EXERCISE: Application Layer Attacks
Backtrack: Attack Demonstration
Man-in-the-Middle and Denial of Service Attacks
Modifying Transmitted Packets
Application Protocols - notes for the examination
|Section 3: Designing Secure Computer Networks|
Designing Computer Networks - introduction
Subnetting - notes for the examination
IPv6 address notation
DMZ: demilitarized Zone
Protocols and services: IP SEC
IP SEC: Phase 1
Network Address translation
Network access control: RADIUS
Protocols and Services - notes for the examination
|Section 4: Network administration|
Introduction to Monitoring Transmitted Data
Monitoring Transmitted Data - Basic informations
Intrusion detection systems
Why are firewalls and NDIS not enough?
Wireshark - Introduction to network analysisPreview
How to use Wireshark?Preview
Analyzing Captured dataPreview
How to analyze telnet protocol?
Monitoring transmitted data - notes for the examination
|Section 5: Wireless Networks Security|
WIFI security solutions - introduction
WIFI - working principles
Other wireless technologies
Threats and risks
Standards and Security Solutions - notes for the examination
Threats of WIFI networks
Client Attacks: Launching a rogue access point
Client Attacks: Evil twin
Client Attacks: Denial of service
EXERCISE: WPA attack
Wi-Fi Security Threats - notes for the examination
|Section 6: Operating Systems Security|
Operating systems security - introduction
EXERCISE: OS boundaries
Kernel Mode Code Signing
Java Virtual Machine and code access security
OS Security Boundaries - notes for the examination
EXERCISE: Vulnerability attacks
IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.
The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.
We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.
With all of the data stored and accessed online, consumers appreciate now, more than ever, the importance of cyber security. Their behavior, however, does not always reflect this. There is a distinct disconnect between what users know and how they apply that knowledge.