Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Network Hacking and Defense
IT Security Trends
1. Introduction to Current Cyber Threats (4:46)
2. IT Prehistory (4:41)
3. Let’s look a few years back (4:42)
4. Cyber crimes - an evolution not revolution (4:25)
6. Popular myths about IT security - origins (5:33)
7. Myths #1 - you’ll never be hacked (5:55)
8. Myths #2 - you don’t need any protection software or hardware (5:11)
9. Myths #3 - IT security is always a priority (1:13)
11. Trends in IT Security (3:44)
12. The birth of technology society (3:16)
13. EXERCISE How much info can you gather (3:59)
14. Fake identity (5:03)
15. Online privacy (6:14)
16. Analyzing sniffing software (3:33)
17. Cyber War (8:23)
19. Objective #1 - Data security - Introduction (6:58)
20. Confidentiality of data (5:33)
21. EXERCISE Finding confidential data with search engines (6:05)
22. Integrity of data (7:04)
Computer Network Security
1. Network security - introduction (5:44)
2. OSI MODEL #1 - Physical layer (5:45)
3. OSI MODEL #2 - Data link layer (4:46)
4. Threats MAC spoofing (5:54)
5. Threats ARP Poisoning (6:38)
6. EXERCISE Data Link Layer Attack (7:32)
7. OSI MODEL #3 - Network layer (6:58)
8. TCP Tunnelling over ICMP (7:39)
10. OSI MODEL #4 - Transport Layer (6:04)
11. Threats Enumerating Remote Computers (3:40)
12. EXERCISE Transport Layer Attack using METASPLOIT part 1 (5:27)
13. EXERCISE Transport Layer Attack using METASPLOIT part 2 (5:13)
14. OSI MODEL #5 - Session Layer (3:33)
16. OSI MODEL #6 - Presentation Layer (6:52)
17. OSI MODEL #7 - Application Layer (3:48)
18. EXERCISE Application Layer Attacks (6:03)
19. Backtrack Attack Demonstration (3:34)
20. Man-in-the-Middle and Denial of Service Attacks (2:49)
21. Modifying Transmitted Packets (4:45)
22. Unencrypted protocols (2:58)
Designing Secure Computer Networks
1. Designing Computer Networks - introduction (2:18)
2. Subnetting IPv4 (7:01)
3. Subnetting IPv6 (3:18)
5. IPv6 address notation (6:46)
6. DMZ demilitarized Zone (6:28)
7. Protocols and services IP SEC (9:33)
8. IP SEC Phase 1 (7:27)
9. Network Address translation (12:18)
10. Network access control RADIUS (10:04)
Network administration
1. Introduction to Monitoring Transmitted Data (1:06)
2. Monitoring Transmitted Data - Basic informations (8:03)
3. Intrusion detection systems (7:43)
4. Why are firewalls and NDIS not enough (5:41)
5. Wireshark - Introduction to network analysis (6:29)
6. How to use Wireshark (8:27)
7. Analyzing Captured data (5:43)
8. How to analyze telnet protocol (8:09)
9. Intrusion detection (7:48)
10. Scanning computers (7:47)
Wireless Networks Security
1. Wireless Networks (1:16)
2. WIFI security solutions - introduction (5:44)
3. WIFI - working principles (5:48)
4. Other wireless technologies (2:06)
5. Threats and risks (4:38)
6. Ineffective solutions (4:11)
7. Authentication methods (8:31)
8. 802.11 WEP (7:06)
9. 802.11I WPA (6:24)
11. Threats of WIFI networks (5:58)
12. Client Attacks Launching a rogue access point (7:03)
13. Client Attacks Evil twin (4:51)
14. Client Attacks Denial of service (9:17)
15. EXERCISE WPA attack (3:24)
Operating Systems Security
1. Operating systems security - introduction (9:10)
2. Security boundaries (4:44)
3. Three core (7:15)
4. EXERCISE OS boundaries (7:54)
5. Process isolation (6:30)
6. Kernel Mode Code Signing (6:24)
7. Java Virtual Machine and code access security (4:17)
9. Malware (12:09)
10. EXERCISE Vulnerability attacks (10:26)
11. EXERCISE Identifying suspicious processes (6:54)
12. Demonstration Process Explorer (9:13)
13. EXERCISE Removing malware (8:38)
14. Rootkits (6:14)
15. EXERCISE Detecting rootkits (11:07)
16. EXERCISE Security evaluation (6:00)
Access Control
1. Authentication and authorisation - Introduction (1:57)
2. Authentication users (6:56)
3. How secure is your password (5:03)
4. Authentication protocols and services (8:25)
6. LM Hash (7:02)
7. Cached Credentials (4:29)
8. KERBEROS (11:30)
9. Identity Theft (9:13)
10. EXERCISE Offline attacks (12:22)
11. Using online cracking services (8:41)
Windows Security
1. Windows Security - what you’ll learn (1:17)
2. User Account Control (6:22)
3. UAC configuration (8:02)
4. Additional Security Features - ASLR and DEP (11:39)
5. PatchGuard (1:34)
7. Encryption - key protection (9:31)
8. Drive encryption (8:25)
9. BitLocker (7:57)
10. BitLocker To Go Reader (4:43)
11. File and folder encryption - EFS (7:30)
12. EXERCISE EFS (5:36)
Teach online with
9. Malware
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock