Hacking Techniques for IT Professionals 2.0 Complete Course
3.8 (96 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,947 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Hacking Techniques for IT Professionals 2.0 Complete Course to your Wishlist.

Add to Wishlist

Hacking Techniques for IT Professionals 2.0 Complete Course

One of the best Ethical Hacking courses. Covers CISS, CompTIA, CISSP programs. Hacking Academy Certificate included.
3.8 (96 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,947 students enrolled
Last updated 5/2015
English
Current price: $10 Original price: $100 Discount: 90% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 9 hours on-demand video
  • 14 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Become Certified IT Security Professional
  • Application attacks and how to prevent them.
  • Application security assessment.
  • Global management of user software.
  • Cryptography and cryptanalysis.
  • Symmetric and asymmetric encryption.
  • Public key infrastructure management.
  • Modelling and classifying threats.
  • Managing risk.
  • Attack methodologies.
  • How to use and deal with social engineering and rogue software.
  • Defence-in-depth.
  • Immutable security laws.
View Curriculum
Requirements
  • Finished IT Security Beginner Training
  • IT knowledge
  • Programming skills will be useful
  • Basics of Linux systems
Description

New course edition: 2.0 (LAST UPDATED: MARCH 2017)

BONUS:

Finishing this course you will get free voucher for IT Security Academy Online Examination Center where you can archive your IT Security Certificate.

——

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.

Welcome to IT Secutiry Academy! IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you've ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You're welcome to join us and start your training now.

About the training

This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security.

Training is starting with IT Security current threat and trends. Afterwards we are discussing popular security myths. Great part of the training relates to Network security.

We will start with local networks, talk about protocols and theirs vulnerabilities. You will learn how to design secure computer networks and subnets. You will become real network administrator.

Next you will discover why wireless networks could be so dangerous. You will learn standards, protocols and security solutions. Wi-Fi networks are an integral part of our lives, but not everyone realizes that if it is inadequately protected, your enterprise or home network can disclose your confidential passwords and give attackers easy access to the machines you’re administrating.

Topics covered include core issues related to effectively securing the most popular Microsoft OS: identity theft, authentication, authorization, encryption. We identify typical mistakes and guide you towards achieving good OS protection.

Who is the target audience?
  • Future IT Security Managers
  • Network and Enterprise OS Administrators
  • IT Professionals
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 113 Lectures Collapse All 113 Lectures 14:44:04
+
Security Policies
13 Lectures 52:10



Information security - level up
04:04

Security issues
04:50

Why are security solutions fallible?
05:42

Security policy issues
04:50

Introduction to threat modelling and classification
05:14

Threat modelling - STRIDE
04:06

STRIDE: Spoofing identity
05:03

STRIDE: Tampering with Data
04:28

STRIDE: Denial of Service
03:51

Threat Modelling and Classification - notes for the examination
19 pages
+
Risk Management
20 Lectures 01:29:44
Introduction to Risk Management
01:27

Attack Methods
06:42

Local attacks
02:56

Target scanning and enumeration techniques #1
05:52

Target scanning and enumeration techniques #2
03:30

Passive scanning
02:06

Attack Methodologies - notes for the examination
25 pages

Introduction to risk assessment
06:20

DREAD: Risk assessment model
04:50

DREAD: Exploitability
05:24

EXERCISE: Risk Assessment
07:17

Risk Assessment - notes for the examination
27 pages

Introduction to Social Engineering and rogue software
04:19

Manipulation tactics
09:01

EXERCISE: Social Engineering attacks
06:44

SE with KALI / BackTrack
07:06

Rogue Software
02:28

Fraud tools #1
07:10

Fraud tools #2
06:32

Social Engineering and Rogue Software - notes for the examination
28 pages
+
Defence in Depth
20 Lectures 01:03:43
Introduction to Defence in Depth
01:32

How to use Defence in Depth model?
05:45

DiD: OS and LAN Layers
06:39

DiD: Perimeter and Physical Access Layers
06:06

DiD: Demonstration
02:48

Automated attack targeting a service
05:23

Automated user-targeting attack
04:31

The Defence in Depth Model - notes for the examination
25 pages

Introduction to Immutable laws of security - Law #1
04:35

Law #2
02:56

Law #3
02:23

Law #4
01:52

Law #5
03:28

Law #6
02:07

Law #7
01:11

Law #8
01:43

Law #9
03:57

Law #10
00:48

Laws for administrators
05:59

Immutable Laws of Security - notes for the examination
21 pages
+
Disaster Recovery
11 Lectures 46:10
Introduction to Disaster Recovery
01:33

How to reduce losses?
05:24

Ensuring continous availability
04:08

Threat discovery #1
04:28

Threat discovery #2
03:40

Audit users and keep control accounts
05:18

High risk users
03:23

Collecting and analysing evidence
07:13

Forensics example
03:52

CONFICKER: CASE STUDY
07:11

How to reduce losses - notes for the examination
31 pages
+
Application Security
11 Lectures 01:27:05
Introduction to Application Security
08:18

Attacks on applications
10:18

SQL Injection
08:10

EXERCISE: Analyze the application
13:31

Blind SQL Injection
09:33

Automated SQL Injection
11:44

Cross-site scripting - XSS
10:10

Application Attacks - notes for the examination
29 pages

Program security assessment
05:10

Unsafe applications
10:11

Program Security Assessment - notes for the examination
10 pages
+
Application Security - Configuration and Management
10 Lectures 54:02
Here’s what you’ll learn in this module
01:05

Managing applications
08:26

Software updates
02:39

MS Update
06:53

System Center Configuration Manager
02:46

Blocking applications
07:35

Software restrictions policies
05:57

EXERCISE: Application control rules
12:11

Isolating applications
06:30

How to protect users without interrupting their work - notes for the examination
25 pages
+
Cryptography
17 Lectures 01:43:37
Introduction to cryptography
09:42

History of ciphers
10:57

Symmetric and asymmetric ciphers
06:13

Symmetric-key algorithms
05:49

Block ciphers
06:01

Data encryption standard
06:51

DES-X
07:35

Advanced encryption standards
05:28

Block cipher modes
07:16

Stream Ciphers - RC4
03:40

Asymmetric-key algorithms
08:11

RSA
05:33

ELGAMAL
02:05

HASH functions
05:56

Digital signature
05:56

Hybrid Schemes
06:24

Symmetric and Asymmetric Ciphers - notes for the examination
57 pages
+
Public Key Infrastructure
9 Lectures 51:33
Introduction to cryptology
02:12

Public key infrastructure
06:10

Implementing public key infrastructure
05:39

What will PKI allow you?
06:29

EXERCISE: Certificates
08:37

Certificate life cycle
06:24

Planning the PKI
08:33

PKI Administration
07:29

Public Key Infrastructure - Trust but verify - notes for the examination
37 pages
+
Prepare for the examination
0 Lectures 00:00

Here are sample questions which you can find during the examination. These are only 5 questions from our question base which contains hundreds of tasks, so prepare yourself well.

Good luck!

Robert,

IT Security Academy

Answer sample questions which you can find during the examination
5 questions
+
Your BONUS
2 Lectures 00:00
BONUS: Examination - your voucher
1 page

About the Instructor
IT Security Academy
4.1 Average rating
2,020 Reviews
68,754 Students
24 Courses
IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Hacking School
4.0 Average rating
1,729 Reviews
62,719 Students
13 Courses
IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.