Offer Curriculum
Available in
days
days
after you enroll
- 1. Introduction to Current Cyber Threats (4:46)
- 2. IT Prehistory (4:41)
- 3. Let’s look a few years back (4:42)
- 4. Cyber crimes - an evolution not revolution (4:25)
- 6. Popular myths about IT security - origins (5:33)
- 7. Myths #1 - you’ll never be hacked (5:55)
- 8. Myths #2 - you don’t need any protection software or hardware (5:11)
- 9. Myths #3 - IT security is always a priority (1:13)
- 11. Trends in IT Security (3:44)
- 12. The birth of technology society (3:16)
- 13. EXERCISE How much info can you gather (3:59)
- 14. Fake identity (5:03)
- 15. Online privacy (6:14)
- 16. Analyzing sniffing software (3:33)
- 17. Cyber War (8:23)
- 19. Objective #1 - Data security - Introduction (6:58)
- 20. Confidentiality of data (5:33)
- 21. EXERCISE Finding confidential data with search engines (6:05)
- 22. Integrity of data (7:04)
Available in
days
days
after you enroll
- 1. Network security - introduction (5:44)
- 2. OSI MODEL #1 - Physical layer (5:45)
- 3. OSI MODEL #2 - Data link layer (4:46)
- 4. Threats MAC spoofing (5:54)
- 5. Threats ARP Poisoning (6:38)
- 6. EXERCISE Data Link Layer Attack (7:32)
- 7. OSI MODEL #3 - Network layer (6:58)
- 8. TCP Tunnelling over ICMP (7:39)
- 10. OSI MODEL #4 - Transport Layer (6:04)
- 11. Threats Enumerating Remote Computers (3:40)
- 12. EXERCISE Transport Layer Attack using METASPLOIT part 1 (5:27)
- 13. EXERCISE Transport Layer Attack using METASPLOIT part 2 (5:13)
- 14. OSI MODEL #5 - Session Layer (3:33)
- 16. OSI MODEL #6 - Presentation Layer (6:52)
- 17. OSI MODEL #7 - Application Layer (3:48)
- 18. EXERCISE Application Layer Attacks (6:03)
- 19. Backtrack Attack Demonstration (3:34)
- 20. Man-in-the-Middle and Denial of Service Attacks (2:49)
- 21. Modifying Transmitted Packets (4:45)
- 22. Unencrypted protocols (2:58)
Available in
days
days
after you enroll
- 1. Designing Computer Networks - introduction (2:18)
- 2. Subnetting IPv4 (7:01)
- 3. Subnetting IPv6 (3:18)
- 5. IPv6 address notation (6:46)
- 6. DMZ demilitarized Zone (6:28)
- 7. Protocols and services IP SEC (9:33)
- 8. IP SEC Phase 1 (7:27)
- 9. Network Address translation (12:18)
- 10. Network access control RADIUS (10:04)
Available in
days
days
after you enroll
- 1. Introduction to Monitoring Transmitted Data (1:06)
- 2. Monitoring Transmitted Data - Basic informations (8:03)
- 3. Intrusion detection systems (7:43)
- 4. Why are firewalls and NDIS not enough (5:41)
- 5. Wireshark - Introduction to network analysis (6:29)
- 6. How to use Wireshark (8:27)
- 7. Analyzing Captured data (5:43)
- 8. How to analyze telnet protocol (8:09)
- 9. Intrusion detection (7:48)
- 10. Scanning computers (7:47)
Available in
days
days
after you enroll
- 1. Wireless Networks (1:16)
- 2. WIFI security solutions - introduction (5:44)
- 3. WIFI - working principles (5:48)
- 4. Other wireless technologies (2:06)
- 5. Threats and risks (4:38)
- 6. Ineffective solutions (4:11)
- 7. Authentication methods (8:31)
- 8. 802.11 WEP (7:06)
- 9. 802.11I WPA (6:24)
- 11. Threats of WIFI networks (5:58)
- 12. Client Attacks Launching a rogue access point (7:03)
- 13. Client Attacks Evil twin (4:51)
- 14. Client Attacks Denial of service (9:17)
- 15. EXERCISE WPA attack (3:24)
Available in
days
days
after you enroll
- 1. Operating systems security - introduction (9:10)
- 2. Security boundaries (4:44)
- 3. Three core (7:15)
- 4. EXERCISE OS boundaries (7:54)
- 5. Process isolation (6:30)
- 6. Kernel Mode Code Signing (6:24)
- 7. Java Virtual Machine and code access security (4:17)
- 9. Malware (12:09)
- 10. EXERCISE Vulnerability attacks (10:26)
- 11. EXERCISE Identifying suspicious processes (6:54)
- 12. Demonstration Process Explorer (9:13)
- 13. EXERCISE Removing malware (8:38)
- 14. Rootkits (6:14)
- 15. EXERCISE Detecting rootkits (11:07)
- 16. EXERCISE Security evaluation (6:00)
Available in
days
days
after you enroll
- 1. Authentication and authorisation - Introduction (1:57)
- 2. Authentication users (6:56)
- 3. How secure is your password (5:03)
- 4. Authentication protocols and services (8:25)
- 6. LM Hash (7:02)
- 7. Cached Credentials (4:29)
- 8. KERBEROS (11:30)
- 9. Identity Theft (9:13)
- 10. EXERCISE Offline attacks (12:22)
- 11. Using online cracking services (8:41)
Available in
days
days
after you enroll
- 1. Windows Security - what you’ll learn (1:17)
- 2. User Account Control (6:22)
- 3. UAC configuration (8:02)
- 4. Additional Security Features - ASLR and DEP (11:39)
- 5. PatchGuard (1:34)
- 7. Encryption - key protection (9:31)
- 8. Drive encryption (8:25)
- 9. BitLocker (7:57)
- 10. BitLocker To Go Reader (4:43)
- 11. File and folder encryption - EFS (7:30)
- 12. EXERCISE EFS (5:36)