Hacking Techniques for IT Professionals 2.0 Complete Course
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
New course edition: 2.0 (updated August, 2016)
BONUS (only in August, 2016):
Finishing this course you will get free voucher for IT Security Academy Online Examination Center where you can archive your IT Security Certificate.
Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.
Welcome to IT Secutiry Academy! IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you've ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You're welcome to join us and start your training now.
About the training
This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security.
Training is starting with IT Security current threat and trends. Afterwards we are discussing popular security myths. Great part of the training relates to Network security.
We will start with local networks, talk about protocols and theirs vulnerabilities. You will learn how to design secure computer networks and subnets. You will become real network administrator.
Next you will discover why wireless networks could be so dangerous. You will learn standards, protocols and security solutions. Wi-Fi networks are an integral part of our lives, but not everyone realizes that if it is inadequately protected, your enterprise or home network can disclose your confidential passwords and give attackers easy access to the machines you’re administrating.
Topics covered include core issues related to effectively securing the most popular Microsoft OS: identity theft, authentication, authorization, encryption. We identify typical mistakes and guide you towards achieving good OS protection.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Security Policies|
Security policies - introductionPreview
What is security?Preview
Information security - level up
Why are security solutions fallible?
Security policy issues
Introduction to threat modelling and classification
Threat modelling - STRIDE
STRIDE: Spoofing identity
STRIDE: Tampering with Data
STRIDE: Denial of Service
Threat Modelling and Classification - notes for the examination
|Section 2: Risk Management|
Introduction to Risk Management
Target scanning and enumeration techniques #1
Target scanning and enumeration techniques #2
Attack Methodologies - notes for the examination
Introduction to risk assessment
DREAD: Risk assessment model
EXERCISE: Risk Assessment
Risk Assessment - notes for the examination
Introduction to Social Engineering and rogue software
EXERCISE: Social Engineering attacks
SE with KALI / BackTrack
Fraud tools #1
Fraud tools #2
Social Engineering and Rogue Software - notes for the examination
|Section 3: Defence in Depth|
Introduction to Defence in Depth
How to use Defence in Depth model?
DiD: OS and LAN Layers
DiD: Perimeter and Physical Access Layers
Automated attack targeting a service
Automated user-targeting attack
The Defence in Depth Model - notes for the examination
Introduction to Immutable laws of security - Law #1
Laws for administrators
Immutable Laws of Security - notes for the examination
|Section 4: Disaster Recovery|
Introduction to Disaster Recovery
How to reduce losses?
Ensuring continous availability
Threat discovery #1
Threat discovery #2
Audit users and keep control accounts
High risk users
Collecting and analysing evidence
CONFICKER: CASE STUDY
How to reduce losses - notes for the examination
|Section 5: Application Security|
Introduction to Application Security
Attacks on applications
EXERCISE: Analyze the application
Blind SQL Injection
Automated SQL Injection
Cross-site scripting - XSS
Application Attacks - notes for the examination
Program security assessment
Program Security Assessment - notes for the examination
|Section 6: Application Security - Configuration and Management|
Here’s what you’ll learn in this module
System Center Configuration Manager
Software restrictions policies
EXERCISE: Application control rules
How to protect users without interrupting their work - notes for the examination
|Section 7: Cryptography|
Introduction to cryptography
History of ciphers
Symmetric and asymmetric ciphers
Data encryption standard
Advanced encryption standards
IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.
The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.
We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.