Jump to content

IT Security and Ethical Hacking


Recommended Posts

 

1902181453430109.jpg

IT Security and Ethical Hacking

.MP4 | Video: 1280x720, 30 fps® | Audio: AAC, 48000 Hz, 2ch | 23 GB

Duration: 26 hours | Genre: eLearning Video | Language: English

 

Learn the basics of IT Security, Ethical Hacking and its various concepts. Work on becoming a Certified Ethical Hacker!

What you'll learn

Recently updated to be compatible with CEHv9 Cloud Computing Concepts

Upon completion of this course, students will have a basic introduction to ethical hacking and its various concepts.

You will be able to understand and apply information technologies concepts that include: vulnerabilities, defense-in-depth, penetration testing, the methodology for pentesting/ethical hacking, vulnerability management, incident management, and creating and implementing a security policy.

You will also know the countermeasures that can be taken to protect yourself from the dangers of hacking, and all that that may entail.

You will be able to identify what a SQL injection is along with the different wireless types and vulnerabilities. You will also gain a basic understanding of the concepts behind buffer overflow, cryptography and their weaknesses, mobile hacking, how to evade both firewalls and honeypots, and successfully evade IDS.

Communicate with the instructor and openly ask questions that will be addressed within 48 hours!

Download extra printable and saveable flash cards, games, slideshows, and other supplemental materials for each lecture in our course

Participate in active discussions with other information technology students & participants becoming certified

Apply your knowledge througout the course with quick quizzes

Requirements

No prerequisites for this course - A computer with Internet

The majority of the tools used in this series must be run on a Windows machine. There might be a MAC equivalent, but the tools demonstrated were all run on a Windows machine.

Description

Welcome to our IT Security and Ethical Hacking Course.

These lectures teach the principles, techniques, and tools needed to successfully prepare for and pass the "Ethical Hacking and Countermeasures" exam.

These sections can be taken in any order, as a review of a concept or knowledge area. However, if you are just becoming familiar with it security and ethical hacking it is recommended that you view the sections sequentially.

Note: This course covers many of the same concepts taught in our "IT Security Fundamentals: CompTIA Security+ 2015" course. This course has additional advanced material that pertains to ethical hacking. Most customers will want to purchase one or the other but likely not both.

Course Overview:

Ethical hacking is testing the IT resources for a good cause and for the betterment of technology. This training will establish your understanding of all the fundamental concepts, processes, and procedures.. You will spend time concentrating on each knowledge area, and studying the tools and techniques, inputs, and outputs associated with each knowledge area.

Section 1: In the pre-assessment quiz you'll face questions from all sections of this Ethical Hacking training. Test your current knowledge and know your strengths and weaknesses.

Sections 2-4: In Introduction to Ethical Hacking, you will be introduced to various concepts on ethical hacking. You will receive an introduction to the basics of Risk Management and Disaster Recovery. As well as an introduction to Penetration Testing.

Sections 5-7: You will gain a comprehensive understanding of vulnerability assessment and the tools used in this process. What kind of security measures do you take to protect your facilities, equipment, resources, personnel, and property from damage caused by unauthorized access? In this course, Physical Security, these are questions that we will be answering. Footprinting is the gathering of information related to a particular computer and its users and systems.

Sections 8-10: Reconnaissance is an exploration that is conducted to gain information. Network scanning is the scanning of public or private networks to find out which systems are running, their IP addresses, and which services they are running. In Port Scanning, you will learn how ports can be scanned, how a hacker can break into your network through the ports, and the countermeasures you can take to protect your device or network.

Sections 11-13: Banner grabbing is a technique used to grab information about computer systems on a network and the services running its open ports. In this course you will be introduced to enumeration and the many different uses it has in computer systems. This course will include demos on the different tools and uses of enumeration. In this course you will be learning the fundamentals of Linux. We will be pairing this course with demos with a more in-depth look into some of the fundamentals and tools of Linux.

Sections 14-16: Pentesting is an attack on a system in hopes of finding security weaknesses. In the course Configuring Linux for Pentesting, you will be learning the steps to configure Linux for pentesting and tools used for pentesting on a Linux system. Whenever we login to a computer system, we provide information to identify ourselves. We refer to this as authentication. Ensure that you know everything involved in securing a Windows system against attack. During this course you'll get into Windows passwords - how they're created, how they're stored, and different methods used to crack them.

Section 17-19: You will take a good look at spyware, the activities it performs, different types of spyware, and the countermeasures needed in order to prevent hackers from utilizing these types of techniques against your company. You will also spend time studying different types of keyloggers. There are three different types of keyloggers that we see used in today's environments: hardware, software, and kernel/driver keyloggers. Covering Tracks will be going over various ways that attackers have at their disposal to cover any tracks that may lead to their unwanted eviction, or worse yet, to an audit trail that would lead directly back to them. Trojans and Backdoors is the course where our software is going to be going undercover.

Section 20-22: You will discover what viruses and worms are and how they can infect computers and systems. Sniffers is our course where we take a look at Network Sniffing. Social engineering is the art of extorting employees for information.

Sections 23-26: Become familiar with the following concepts: denial-of-service, distributed denial-of-service, and how the denial-of-service and distributed denial-of-service attacks take place. In the course Session Hijacking, you will learn details about session hijacking, well-known techniques employed by aggressors, the steps involved in session hijacking, various types of session hijacking, tools for hijacking sessions, ways you can protect yourselves from session hijacking, and how pentesting can be used to identify vulnerabilities. Hacking Web and Application Servers, is a course that will give you a good idea about vulnerabilities and attacks available for web servers and web applications. In our course our course Advanced Exploitation Techniques, you will learn what advanced exploitation techniques are and how you can use them in your penetration testing.

Sections 36-37: There are many benefits to using Cloud Computing, and in order to take full advantage of those benefits, it's important to better understand what cloud computing is. Gain an introduction to Cloud Computing concepts and threats. We discuss the four types of cloud types as well as the different forms of cloud computing. Then, we spend time briefly discussing the many threats associated with cloud computing and how they can affect procedures and security. Moving to the cloud can ease a company's management and support costs so cover the types of threats that can happen on the cloud. We discuss their characteristics, then talk about how to sure up security in order to protect against these attacks. We also discuss the security responsibilities of both the cloud provider and the consumer.

Recommendations:

Learn from others! Here are some reviews from the participants enrolled in this course (Click on reviews to see full list of reviews)

Excellent Course, Highly Recommended - If you are interested in learning the principles of IT Security and Hacking, this course is for you. Very detailed, in-depth, and well-presented. With over 25 hours of video, and references to several outside resources. This course builds and excellent foundation for the beginner and provides a good review for the more experienced IT professional - Michael Chesbro

Great for all levels - the Idea about this course is to get thinking about Security. And you will learn something . Something is new something is old. But everyone need a refresh now and then and see the whole picture. I recommend this course - Alf-Olav NIlsen

Ethical hacking helps - The production of your teaching is awesome. Thanks to your teaching I have gotten rid of some hacker which have been bothering me for quite some time. I didn't know much about Security or ethical hacking until until I took this course. It has opened up a new world for me - John Ackerman

Who this course is for:

This course is intended for individuals looking to expand their knowledge of different IT Security principals.

 

 

 

1902181453440107.jpg

DOWNLOAD

(Buy premium account for maximum speed and resuming ability)

 

http://nitroflare.com/view/6D12702E9600186/xzzqr.IT.Security.and.Ethical.Hacking.part1.rar

http://nitroflare.com/view/4A28971B719092A/xzzqr.IT.Security.and.Ethical.Hacking.part2.rar

http://nitroflare.com/view/D4ED957F111567D/xzzqr.IT.Security.and.Ethical.Hacking.part3.rar

http://nitroflare.com/view/34EEF20C7654A4C/xzzqr.IT.Security.and.Ethical.Hacking.part4.rar

http://nitroflare.com/view/25C30B515F3FB16/xzzqr.IT.Security.and.Ethical.Hacking.part5.rar

 

https://rapidgator.net/file/38b708997a77cd0bb5ba9cdf0ee12424/xzzqr.IT.Security.and.Ethical.Hacking.part1.rar

https://rapidgator.net/file/dc6fb736d4ab338fed2eac39dc4d94ec/xzzqr.IT.Security.and.Ethical.Hacking.part2.rar

https://rapidgator.net/file/f30c41277d9fa5888183cb67d3e2a05a/xzzqr.IT.Security.and.Ethical.Hacking.part3.rar

https://rapidgator.net/file/89e1f2fa892eb5ed70bcbd4819f627b5/xzzqr.IT.Security.and.Ethical.Hacking.part4.rar

https://rapidgator.net/file/e1ea5fd15a2e5591a418138201049747/xzzqr.IT.Security.and.Ethical.Hacking.part5.rar

 

http://turbobit.net/zqdjju0n5nm5/xzzqr.IT.Security.and.Ethical.Hacking.part1.rar.html

http://turbobit.net/x8jguq770psn/xzzqr.IT.Security.and.Ethical.Hacking.part2.rar.html

http://turbobit.net/fqvs19rd4y9l/xzzqr.IT.Security.and.Ethical.Hacking.part3.rar.html

http://turbobit.net/tz0nsoemc2fx/xzzqr.IT.Security.and.Ethical.Hacking.part4.rar.html

http://turbobit.net/trihr28fubxk/xzzqr.IT.Security.and.Ethical.Hacking.part5.rar.html

 

 

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...