Learning Outcome:
Requirement:
LearnSmart






If you are interested in learning about new innovations and enthusiastic about kicking off your career as an ethical hacker, at that point this course is for you! The EC Council Certified Ethical Hacker Training Program gives you a strong establishment in every domain you have to ace to pass the Certified Ethical Hacker Exam. Plunge into hands-on projects, and guard yourself from would-be-attackers. This course offers you an clear and structured approach to deal with getting affirmed; as an ethical hacker you'll know the intricate details of cybersecurity, conquer security vulnerabilities, and even build up your own assurance answers for systems around the world.
Target Audience:
- Any individual who needs to pass the Certified Ethical Hacker Exam and end up noticeably in charge of securing a home or enterprise network.
- This course is a solid match for aspiring proficient pen testers– including system executives or IT experts keen on rolling out career advancement.
- This course is most appropriate for the individuals who operate with or have privileged access in their company’s network.
Course Curriculum
Introduction to Ethical Hacking
Available in
days
days
after you enroll
-
Preview
Introduction to Ethical Hacking
(10:02)
-
Start
Introduction to Ethical Hacking: Supplemental Resources
-
Preview
Vulnerabilities
(7:00)
-
Start
Defense-in-depth
(3:26)
-
Start
Penetration Testing
(7:30)
-
Start
Pentesting Demo 1
(5:19)
-
Start
Pentesting Demo 2
(2:21)
-
Start
Pentesting Demo 3
(3:10)
-
Start
Methodology for Penetration Testing/Ethical Hacking
(7:36)
-
Start
Vulnerability Management
(1:14)
-
Start
Security Policy
(1:52)
-
Start
Incident Management
(2:41)
Disaster Recovery and Risk Management
Available in
days
days
after you enroll
-
Start
Disaster Recovery and Risk Management: Supplemental Resources
-
Preview
Defining Risk Management
(2:16)
-
Start
Strategies For Managing Risk
(2:13)
-
Start
How to Analyze Risk
(5:25)
-
Start
Risk Assessment Demo
(18:16)
-
Start
DR Strategies
(5:05)
-
Start
Plan Testing and Execution
(2:16)
-
Start
Conclusion
(1:00)
Penetration Testing
Available in
days
days
after you enroll
Vulnerability Assessment
Available in
days
days
after you enroll
-
Start
Vulnerability Assessment: Supplemental Resources
-
Start
Introduction
(2:35)
-
Start
Testing Overview
(0:50)
-
Start
Security Alerts
(4:11)
-
Start
Scanners
(4:23)
-
Start
Nessus Demo
(4:17)
-
Start
IBM AppScan Demo
(2:55)
-
Start
GFI Languard Demo
(1:34)
-
Start
Analyzing the Scan Results
(4:34)
-
Start
Generating Reports
(1:54)
-
Start
Remediation
(7:49)
-
Start
Patch Management
(1:28)
-
Start
Conclusion
(1:03)
Physical Security
Available in
days
days
after you enroll
-
Start
Physical Security: Supplemental Resources
-
Start
Introduction
(0:46)
-
Start
Importance of Physical Security
(3:34)
-
Start
Physical Security Planning
(4:51)
-
Start
CPTED
(6:54)
-
Start
Protecting Assets
(1:45)
-
Start
Introduction
(2:39)
-
Start
Environment Control
(2:47)
-
Start
Power Supply and Protection
(6:44)
-
Start
Fire Prevention, Detection, and Suppression
(3:42)
-
Start
Perimeter Security
(3:29)
-
Start
External Boundary Protection
(1:38)
-
Start
Locks and Fencing
(1:36)
-
Start
Lighting and Patrols
(2:52)
-
Start
Surveillance Devices
(1:11)
-
Start
Auditing Physical Security
(2:41)
-
Start
Testing and Drills
(1:12)
-
Start
Conclusion
(0:39)
Footprinting
Available in
days
days
after you enroll
-
Start
Introduction
(1:14)
-
Start
Footprinting: Supplemental Resources
-
Start
Footprinting/Reconnaissance
(4:36)
-
Start
Knowledge Check
(1:16)
-
Start
Information Gathering
(6:36)
-
Start
Knowledge Check
(1:58)
-
Start
Footprinting Hierarchy
(1:08)
-
Start
WHOIS Footprinting Demo
(1:53)
-
Start
Footprinting Methodology
(2:43)
-
Start
Passive vs. Active Footprinting
(4:41)
-
Start
Knowledge Check
(1:30)
-
Start
Knowledge Check
(1:59)
-
Start
Footprinting with Google
(1:57)
-
Start
Social Engineering
(8:05)
-
Start
Google Hacking
(0:49)
-
Start
Exploit Database Demo
(1:20)
-
Start
Google Hacking for Charity Demo
(1:33)
-
Start
Google Advance Search Operations
(1:49)
-
Start
Footprinting Tools
(1:13)
-
Start
Google Hacking Tools
(3:00)
-
Start
Maltego Demo
(1:42)
-
Start
Additional Footprinting Tools
(0:46)
-
Start
Footprinting Countermeasures
(2:19)
-
Start
Footprinting PenTesting
(3:03)
-
Start
Conclusion
(1:55)
Reconnaissance
Available in
days
days
after you enroll
-
Start
Reconnaissance: Supplemental Resources
-
Start
Introduction
(1:51)
-
Start
Reconnaissance Threats
(3:11)
-
Start
7 Steps of Information Gathering
(6:27)
-
Start
Footprinting Methodology
(2:38)
-
Start
Passive vs. Active Footprinting
(3:08)
-
Start
Passive Footprinting Tools
(0:23)
-
Start
PassiveRecon Demo
(2:01)
-
Start
Shodanhq.com Demo
(0:41)
-
Start
Active Footprinting
(2:36)
-
Start
Visualroute Trace Demo
(0:45)
-
Start
Scanning Networks and Ports
(5:42)
-
Start
Nmap Scan Demo
(1:41)
-
Start
Enumeration
(1:25)
-
Start
Reconnaissance Countermeasures
-
Start
Conclusion
Scanning Networks
Available in
days
days
after you enroll
Port Scanning
Available in
days
days
after you enroll
-
Start
Port Scanning: Supplemental Resources
-
Start
Introduction to Port Scanning
(3:54)
-
Start
Port Scanning Methods
(4:36)
-
Start
Ping Demo
(3:26)
-
Start
Ping Tester Demo
(4:03)
-
Start
Well-Known Ports
(3:17)
-
Start
Netstat Demo
(3:04)
-
Start
Informational Sites
(0:58)
-
Start
Port Scanning Techniques I
(11:14)
-
Start
Nmap Demo
(1:39)
-
Start
Scans and Firewalls
(10:12)
-
Start
Nmap Version Detection Demo
(4:34)
-
Start
UDP
(3:24)
-
Start
Advanced Scanning Techniques
(2:44)
-
Start
Port Scanning Tools
(5:35)
-
Start
Port Scanning Techniques II
(3:58)
-
Start
Port Scanning Countermeasures
(3:19)
-
Start
Conclusion
(1:23)
Banner Grabbing
Available in
days
days
after you enroll
Enumeration
Available in
days
days
after you enroll
Linux Fundamentals
Available in
days
days
after you enroll
-
Start
Linux Fundamentals: Supplemental Resources
-
Start
Linux History
(1:49)
-
Start
GUI & Shell
(4:44)
-
Start
Linux Shell
(1:27)
-
Start
Managing Files and Directories
(1:08)
-
Start
Root Enable Disable Demo
(3:17)
-
Start
Linux Commands
(3:30)
-
Start
Navigating in Linux
(3:13)
-
Start
Linux Navigation Demo
(6:15)
-
Start
Tar
(2:28)
-
Start
Compression Demo
(3:19)
-
Start
Configuring Subdirectories
(3:14)
-
Start
Vi Demo
(4:05)
-
Start
Conclusion
(0:51)
Configuring Linux for Pentesting
Available in
days
days
after you enroll
-
Start
Configuring Linux for Pentesting: Supplemental Resources
-
Start
Installing Applications
(2:06)
-
Start
apt-get Demo
(3:08)
-
Start
Applications for Pentesting
(1:42)
-
Start
Essential Tools and GUI Demo
(7:55)
-
Start
Iptables
(1:00)
-
Start
Iptables Demo
(9:28)
-
Start
IP Forwarding Demo
(3:02)
-
Start
Conclusion
(0:54)
Authentication Systems
Available in
days
days
after you enroll
-
Start
Authentication Systems: Supplemental Resources
-
Start
Forms of Authentication
(3:52)
-
Start
Authentication Factors
(1:54)
-
Start
Introduction to Authentication Protocols
(1:08)
-
Start
CHAP and MS-CHAP
(2:45)
-
Start
NTLM
(5:54)
-
Start
NTLM Continued
(3:31)
-
Start
Authentication Methods Demo
(13:05)
-
Start
Triple As
(1:25)
-
Start
RADIUS 2 Demo
(8:40)
-
Start
LDAP
(2:59)
-
Start
Single Sign-on
(1:59)
-
Start
Conclusion
(1:35)
System Hacking
Available in
days
days
after you enroll
-
Start
System Hacking: Supplemental Resources
-
Start
Introduction
(1:49)
-
Start
Types of Password Attacks
(2:30)
-
Start
Password Guessing
(3:39)
-
Start
Password Hashing and Encryption
(10:37)
-
Start
Password Cracking Technique
(25:44)
-
Start
Privilege Escalation
(1:14)
-
Start
Knowledge Check
(0:44)
-
Start
Hiding Files with NTFS
(2:55)
-
Start
Knowledge Check
(0:49)
-
Start
Steganography and Its Uses
(5:39)
-
Start
Understanding Rootkits
(3:37)
-
Start
Knowledge Check
(0:33)
-
Start
Knowledge Check
(0:31)
-
Start
Conclusion
(1:55)
Spyware & Keyloggers
Available in
days
days
after you enroll
-
Start
Spyware & Keyloggers: Supplemental Resources
-
Start
Introduction
(7:26)
-
Start
Spyware Distribution
(14:01)
-
Start
Knowledge Check
(0:43)
-
Start
Understanding Keyloggers
(1:33)
-
Start
Hardware Keyloggers
(3:27)
-
Start
Software Keylogger
(2:55)
-
Start
Keylogger Examples
(11:29)
-
Start
Kernel Keyloggers
(1:44)
-
Start
Protecting Yourself
(14:15)
-
Start
Knowledge Check
(0:36)
-
Start
Conclusion
(1:01)
Covering Tracks
Available in
days
days
after you enroll
-
Start
Covering Tracks: Supplemental Resources
-
Start
MRU-Blaster
(1:53)
-
Start
Working with WinZapper
(2:25)
-
Start
Dealing with Windows Logs
(6:02)
-
Start
Using Metasploit to Cover Tracks
(1:46)
-
Start
Meterpreter Event Manager Demo
(2:25)
-
Start
Meterpreter Timestomp Demo
(1:54)
-
Start
Linux History and Events
(2:22)
-
Start
Clearing the Bash History Demo
(3:30)
-
Start
Clearing Linux Events Demo
(2:16)
-
Start
File Shredding
(1:35)
-
Start
Anonymity
(3:28)
-
Start
Using Live CDs, Proxies, and Onion routers
(2:33)
-
Start
New Lecture
-
Start
Conclusion
(3:46)
Trojans and Backdoors
Available in
days
days
after you enroll
-
Start
Trojans and Backdoors: Supplemental Resources
-
Start
Introduction
(1:31)
-
Start
Definition and Distribution
(7:52)
-
Start
Capabilities
(8:27)
-
Start
Malware Knowledge Check
(0:41)
-
Start
Backdoors
(5:47)
-
Start
Trojans
(12:08)
-
Start
Wrappers
(7:22)
-
Start
Avoiding Detection
(3:15)
-
Start
Tools of the Trade Knowledge Check
(0:31)
-
Start
Countermeasure Considerations
(5:45)
-
Start
Investigation Tools
(1:29)
-
Start
Port Monitorization
(1:30)
-
Start
System File Monitorization
(1:22)
-
Start
Software Restriction Policies
(4:36)
-
Start
Additional Countermeasure Tools
(1:28)
-
Start
Countermeasures Knowledge Check
(0:49)
-
Start
Conclusion
(1:58)
Viruses and Worms
Available in
days
days
after you enroll
-
Start
Viruses and Worms: Supplemental Resources
-
Start
Virus Definition and Behavior
(2:39)
-
Start
DELme Demo
(4:51)
-
Start
Viruses
(0:51)
-
Start
Virus Types
(9:16)
-
Start
JPS Demo
(3:50)
-
Start
Stealth Strategies and Infection
(4:38)
-
Start
Virus Mutation Demo
(2:56)
-
Start
Virus Infection
(2:06)
-
Start
Viruses Examples
(2:28)
-
Start
Defining Worms
(1:31)
-
Start
Worms Demo
(7:29)
-
Start
Known Dangerous Worms
(11:18)
-
Start
Conclusion
(0:49)
Sniffers
Available in
days
days
after you enroll
-
Start
Sniffers: Supplemental Resources
-
Start
Wireshark Demo
(9:31)
-
Start
Packet Sniffers
(15:29)
-
Start
Sniffing
(2:31)
-
Start
Techniques for Poisoning the Network
(3:38)
-
Start
ARP Poisoning Demo
(10:34)
-
Start
Sniffing and Spoofing Tools
(10:17)
-
Start
Countermeasures
(1:14)
-
Start
XARP Demo
(3:08)
-
Start
Cisco Switch Security Configuration
(1:43)
-
Start
Conclusion
(0:34)
Social Engineering
Available in
days
days
after you enroll
-
Start
Social Engineering: Supplemental Resources
-
Start
Introduction
(1:35)
-
Start
Security Policy
(1:24)
-
Start
Human-based Attacks
(2:30)
-
Start
Piggybacking
(3:47)
-
Start
Computer-based Attacks
(1:12)
-
Start
Phishing Email Demo
(4:35)
-
Start
SET-webTemplate Demo
(7:11)
-
Start
SET-spear phishing Demo
(4:36)
-
Start
SET-trojan Demo
(4:17)
-
Start
SET-SMS Spoofing Demo
(2:22)
-
Start
Using Social Media
(0:58)
-
Start
Conclusion
(0:52)
Denial of Service
Available in
days
days
after you enroll
-
Start
Introduction
(2:29)
-
Start
Denial of Service: Supplemental Resources
-
Start
2014 DDoS Attacks and Impact Report
(4:32)
-
Start
DoS and Distributed DoS
(4:45)
-
Start
Distributed DoS
(3:13)
-
Start
DoS Impact
(1:19)
-
Start
Distributed DoS Attack Symptoms
(0:46)
-
Start
Digital Attack Map Demo
(2:55)
-
Start
DoS, DDoS Attacks
(7:02)
-
Start
Introduction to Botnets
(2:20)
-
Start
Botnet Ecosystem
(8:08)
-
Start
Botnet Propagation
(2:08)
-
Start
Botnet Tools
(2:02)
-
Start
DDoS Tools
(0:42)
-
Start
HOIC Demo
(1:27)
-
Start
DoS Attack Detection
(0:57)
-
Start
Activity Profiling
(0:58)
-
Start
Sequential Change-Point Detection
(0:57)
-
Start
Wavelet Analysis
(0:35)
-
Start
Botnet Countermeasures
(1:09)
-
Start
DoS, DDoS Countermeasures
(8:13)
-
Start
Advanced DoS, DDoS Protection Tools
(3:03)
-
Start
DDoS in Penetration Testing
(1:57)
-
Start
Advanced DDoS Protection Method
(0:42)
-
Start
Conclusion
(2:01)
Session Hijacking
Available in
days
days
after you enroll
-
Start
Session Hijacking: Supplemental Resources
-
Start
Contributors to Session Hijacking
(2:33)
-
Start
Introduction
(5:41)
-
Start
Impact of Session Hijacking
(0:53)
-
Start
Session Hijacking Strategies
(2:24)
-
Start
Session Hijacking Process
(2:58)
-
Start
Types of Session Hijacking
(11:49)
-
Start
ZAP Tool Demo
(4:54)
-
Start
Session Hijacking Tools
(0:50)
-
Start
New Lecture
-
Start
TamperIE Demo
(15:32)
-
Start
Protection Against Session Hijacking
(2:45)
-
Start
IP Security Architecture
(1:53)
-
Start
Penetration Testing in Session Hijacking
(4:10)
-
Start
Conclusion
(1:37)
Hacking Web and App Servers
Available in
days
days
after you enroll
-
Start
Hacking Web and App Servers: Supplemental Resources
-
Start
Web server Attacks
(4:09)
-
Start
Apache2 Demo
(9:16)
-
Start
Gathering Information
(1:29)
-
Start
Website Mirroring Demo
(3:43)
-
Start
Netcraft Demo
(5:21)
-
Start
WMAP Demo
(5:23)
-
Start
Vulnerabilites
(4:50)
-
Start
W3AF Demo
(5:07)
-
Start
Conclusion
(0:46)
Advanced Exploitation Techniques
Available in
days
days
after you enroll
-
Start
Advanced Exploitation Techniques: Supplemental Resources
-
Start
Introduction to Exploits
(4:04)
-
Start
Metasploit
(2:20)
-
Start
Metasploit Demo
(3:59)
-
Start
Understanding Metasploit
(5:52)
-
Start
Armitage
(2:00)
-
Start
Meterpreter Demo
(8:23)
-
Start
Metasploit
(1:53)
-
Start
Armitage Demo
(4:47)
-
Start
Hands on Metasploit
(1:03)
-
Start
Exploiting Vulnerabilities
(1:41)
-
Start
Payload
(1:43)
-
Start
Armitage-mimkatz Demo
(4:29)
-
Start
Core Impact Pro
(2:55)
-
Start
Conclusion
(1:01)
SQL Injections
Available in
days
days
after you enroll
-
Start
Introduction to SQL Injections
(5:31)
-
Start
SQL Injections: Supplemental Resources
-
Start
SQL Injection Methodology
(5:24)
-
Start
SQL Injection Attacks
(5:17)
-
Start
SQL Injection Detection
(1:11)
-
Start
Buffer Overflow Exploit
(1:02)
-
Start
BSQL Tool Demo
(1:44)
-
Start
SQL Injection Username and Password Demo
(4:04)
-
Start
Testing for SQL Injection
(1:37)
-
Start
Countermeasures
(2:50)
-
Start
SQL Injection Detection Tools
(0:55)
-
Start
Conclusion
(1:14)
Wireless Types and Vulnerabilities
Available in
days
days
after you enroll
-
Start
Introduction
(0:38)
-
Start
Wireless Types and Vulnerabilities: Supplemental Resources
-
Start
Wireless Communication Systems
(2:13)
-
Start
Standards
(4:42)
-
Start
InSSIDer Demo
(5:49)
-
Start
Encryption Protocols
(8:41)
-
Start
WPA2 Encryption
(2:54)
-
Start
Systems
(7:03)
-
Start
Jammer Demo
(2:25)
-
Start
Fake AP Demo
(2:45)
-
Start
Attacks
(5:05)
-
Start
Capsa Demo
(5:40)
-
Start
Conclusion
(0:39)
Hacking Wireless Networks
Available in
days
days
after you enroll
Mobile Hacking Basics
Available in
days
days
after you enroll
-
Start
Rise of Mobility
(4:57)
-
Start
Device Security
(5:25)
-
Start
Mobile Hacking Basics: Supplemental Resources
-
Start
Introduction
(1:18)
-
Start
Android Security Features Demo
(7:31)
-
Start
Areas to Consider
(2:31)
-
Start
Geo Tagging Demo
(5:44)
-
Start
Application Security
(1:50)
-
Start
Lookout Demo
(4:33)
-
Start
Mobile Applications
(4:38)
-
Start
Sophos Demo
(5:12)
-
Start
Trend Micro Security Demo
(4:45)
-
Start
BYOD Concerns
(1:52)
-
Start
iScan Demo
(4:03)
-
Start
Options
(4:06)
-
Start
App Permissions Demo
(4:58)
-
Start
The Virtualization Option
(1:52)
-
Start
Conclusion
(1:24)
Evading Firewalls and Honeypots
Available in
days
days
after you enroll
-
Start
Introduction
(1:14)
-
Start
Evading Firewalls and Honeypots: Supplemental Resources
-
Start
Understanding Firewalls
(4:02)
-
Start
Firewall Architectures
(2:37)
-
Start
Types of Firewalls
(4:47)
-
Start
Evading Firewalls
(6:32)
-
Start
Configuring Proxy Demo
(1:17)
-
Start
Evading Firewalls Using Tunneling
(2:53)
-
Start
Evading Firewalls Using MitM Attacks
(1:17)
-
Start
Evading Firewalls Using External Systems
(1:20)
-
Start
Firewall Evasion Tools
(2:11)
-
Start
Firewall Bypassing and Pentration Testing Demo
(1:23)
-
Start
Firewall Evasion Tools Continued
(3:28)
-
Start
Honeypots Defined
(0:54)
-
Start
Types of Honeypots
(3:29)
-
Start
Detecting Honeypots
(2:10)
-
Start
Honeypot Using Atomic Software Demo
(1:49)
-
Start
Countermeasures
(1:31)
-
Start
Conclusion
(1:09)
-
Start
Penetration Testing
(3:31)
Evading IDS
Available in
days
days
after you enroll
-
Start
Evading IDS: Supplemental Resources
-
Start
Introduction
(2:10)
-
Start
Introduction
(4:23)
-
Start
Encryption and Flooding
(0:38)
-
Start
Obfuscating
(1:59)
-
Start
Fragmentation Attack
(0:59)
-
Start
Overlapping Fragments
(1:40)
-
Start
Vulnerabilites
(0:57)
-
Start
How to Avoid IDS Demo
(0:55)
-
Start
Insertion Attack
(1:43)
-
Start
Evasion Attack
(0:52)
-
Start
Denial-of-Service Attack
(0:47)
-
Start
Denial-of-Service Attack
(2:16)
-
Start
Application-Layer Attacks
(0:56)
-
Start
Time to Live Attacks
(1:22)
-
Start
False Positive Generation
(0:35)
-
Start
Urgency Flag
(0:52)
-
Start
Session Splicing
(1:23)
-
Start
Pre Connection SYN
(1:08)
-
Start
Post Connection SYN
(1:49)
-
Start
Snort
(0:43)
-
Start
More Tools
(3:36)
-
Start
Ways to Detect
(2:57)
-
Start
ADMutate
(0:34)
-
Start
Other Evading Tools
(1:40)
-
Start
Centralized Security Management
(3:28)
-
Start
IDS Penetration Testing
(2:30)
-
Start
Conclusion
(0:46)
Buffer Overflows
Available in
days
days
after you enroll
-
Start
Buffer Overflows: Supplemental Resources
-
Start
Introduction to Buffer Overflow
(3:15)
-
Start
Stacks
(4:27)
-
Start
Stack Overflow Demo
(1:57)
-
Start
Heaps
(2:06)
-
Start
Heap Overflow Demo
(2:04)
-
Start
Format Strings
(1:10)
-
Start
Format String Buffer Overflow Demo
(1:48)
-
Start
Integer Overflow Demo
(1:15)
-
Start
Vulnerability to Buffer Overflows
(3:34)
-
Start
Buffer Overflow Demo
-
Start
Handling Buffer Overflow
-
Start
Identifying Buffer Overflows
-
Start
Defense Against Buffer Overflows
-
Start
Programming Countermeasures
-
Start
Buffer Overflow Security Tools
-
Start
Buffer Overflow Pentesting
-
Start
Conclusion
Cryptography
Available in
days
days
after you enroll
-
Start
Cryptography: Supplemental Resources
-
Start
Introduction
(0:30)
-
Start
Public key Infrastructure (PKI)
(2:30)
-
Start
PKI Installation Demo
(11:33)
-
Start
Certificate Authority (CA)
(0:48)
-
Start
Confi-complete Demo
(7:54)
-
Start
CRL Demo
(4:08)
-
Start
Enroll Certificate Demo
(2:52)
-
Start
Secure Communication with Certificates
(3:01)
-
Start
Certificate Management
(1:59)
-
Start
CA Management Demo
(6:21)
-
Start
Conclusion
(0:34)
Cryptography Weaknesses
Available in
days
days
after you enroll
-
Start
Introduction
(1:01)
-
Start
Cryptography Weaknesses: Supplemental Resources
-
Start
Symmetric Demo
(2:42)
-
Start
Cryptographic Schemes
(0:47)
-
Start
BitLocker Demo
(4:16)
-
Start
Introduction
(2:31)
-
Start
AES
(9:41)
-
Start
Stream and Block Ciphers
(3:43)
-
Start
Introduction
(1:58)
-
Start
Asymmetric Demo
(3:13)
-
Start
Key Exchange Methods
(3:40)
-
Start
Hashing
(1:01)
-
Start
Hashcalc Demo
(1:37)
-
Start
Hash Algorithms
(3:52)
-
Start
Encryption Usage Examples
(1:28)
-
Start
Signature Demo
(4:09)
-
Start
Internet Security
(2:53)
-
Start
Conclusion
(0:38)
Cross-Site Scripting
Available in
days
days
after you enroll
-
Start
Cross-Site Scripting: Supplemental Resources
-
Start
Introduction
(1:15)
-
Start
CSS Vulnerabilities
(3:28)
-
Start
XSS Attacks
(1:56)
-
Start
Stealing a Cookie Demo
(1:03)
-
Start
Types of XSS Overview
(1:53)
-
Start
Stored XSS
(1:59)
-
Start
Stored Cross-Site Scripting Demo
(1:09)
-
Start
Reflected XSS
(1:19)
-
Start
Reflected Cross-Site Scripting Demo
(1:12)
-
Start
DOM-Based XSS
(1:02)
-
Start
Server-Side XSS
(1:11)
-
Start
Client-Side XSS
(1:00)
-
Start
XSS in the Matrix
(1:08)
-
Start
Preventing XSS
(2:43)
-
Start
Testing for Vulnerability
(1:47)
-
Start
Browser Behaviors Leading to XSS
(7:24)
-
Start
Web Application Security Scanners
(2:06)
-
Start
Manual Testing Demo
(1:39)
-
Start
Conclusions
(0:36)
Security Incidents
Available in
days
days
after you enroll
-
Start
Security Incidents: Supplemental Resources
-
Start
Incident Handling Teams
(3:51)
-
Start
Introduction
(1:31)
-
Start
Identifying Incidents
(1:42)
-
Start
Taking Action
(1:34)
-
Start
Recovery
(1:13)
-
Start
Analyze the Attack
(1:27)
-
Start
Reporting the Incident
(0:55)
-
Start
Evidence Integrity
(1:10)
-
Start
Conclusion
(0:45)
Cloud Computing-Concepts
Available in
days
days
after you enroll
Cloud Computing-Attacks
Available in
days
days
after you enroll
-
PreviewIntroduction to Ethical Hacking (10:02)
-
StartIntroduction to Ethical Hacking: Supplemental Resources
-
PreviewVulnerabilities (7:00)
-
StartDefense-in-depth (3:26)
-
StartPenetration Testing (7:30)
-
StartPentesting Demo 1 (5:19)
-
StartPentesting Demo 2 (2:21)
-
StartPentesting Demo 3 (3:10)
-
StartMethodology for Penetration Testing/Ethical Hacking (7:36)
-
StartVulnerability Management (1:14)
-
StartSecurity Policy (1:52)
-
StartIncident Management (2:41)
-
StartDisaster Recovery and Risk Management: Supplemental Resources
-
PreviewDefining Risk Management (2:16)
-
StartStrategies For Managing Risk (2:13)
-
StartHow to Analyze Risk (5:25)
-
StartRisk Assessment Demo (18:16)
-
StartDR Strategies (5:05)
-
StartPlan Testing and Execution (2:16)
-
StartConclusion (1:00)
-
StartVulnerability Assessment: Supplemental Resources
-
StartIntroduction (2:35)
-
StartTesting Overview (0:50)
-
StartSecurity Alerts (4:11)
-
StartScanners (4:23)
-
StartNessus Demo (4:17)
-
StartIBM AppScan Demo (2:55)
-
StartGFI Languard Demo (1:34)
-
StartAnalyzing the Scan Results (4:34)
-
StartGenerating Reports (1:54)
-
StartRemediation (7:49)
-
StartPatch Management (1:28)
-
StartConclusion (1:03)
-
StartPhysical Security: Supplemental Resources
-
StartIntroduction (0:46)
-
StartImportance of Physical Security (3:34)
-
StartPhysical Security Planning (4:51)
-
StartCPTED (6:54)
-
StartProtecting Assets (1:45)
-
StartIntroduction (2:39)
-
StartEnvironment Control (2:47)
-
StartPower Supply and Protection (6:44)
-
StartFire Prevention, Detection, and Suppression (3:42)
-
StartPerimeter Security (3:29)
-
StartExternal Boundary Protection (1:38)
-
StartLocks and Fencing (1:36)
-
StartLighting and Patrols (2:52)
-
StartSurveillance Devices (1:11)
-
StartAuditing Physical Security (2:41)
-
StartTesting and Drills (1:12)
-
StartConclusion (0:39)
-
StartIntroduction (1:14)
-
StartFootprinting: Supplemental Resources
-
StartFootprinting/Reconnaissance (4:36)
-
StartKnowledge Check (1:16)
-
StartInformation Gathering (6:36)
-
StartKnowledge Check (1:58)
-
StartFootprinting Hierarchy (1:08)
-
StartWHOIS Footprinting Demo (1:53)
-
StartFootprinting Methodology (2:43)
-
StartPassive vs. Active Footprinting (4:41)
-
StartKnowledge Check (1:30)
-
StartKnowledge Check (1:59)
-
StartFootprinting with Google (1:57)
-
StartSocial Engineering (8:05)
-
StartGoogle Hacking (0:49)
-
StartExploit Database Demo (1:20)
-
StartGoogle Hacking for Charity Demo (1:33)
-
StartGoogle Advance Search Operations (1:49)
-
StartFootprinting Tools (1:13)
-
StartGoogle Hacking Tools (3:00)
-
StartMaltego Demo (1:42)
-
StartAdditional Footprinting Tools (0:46)
-
StartFootprinting Countermeasures (2:19)
-
StartFootprinting PenTesting (3:03)
-
StartConclusion (1:55)
-
StartReconnaissance: Supplemental Resources
-
StartIntroduction (1:51)
-
StartReconnaissance Threats (3:11)
-
Start7 Steps of Information Gathering (6:27)
-
StartFootprinting Methodology (2:38)
-
StartPassive vs. Active Footprinting (3:08)
-
StartPassive Footprinting Tools (0:23)
-
StartPassiveRecon Demo (2:01)
-
StartShodanhq.com Demo (0:41)
-
StartActive Footprinting (2:36)
-
StartVisualroute Trace Demo (0:45)
-
StartScanning Networks and Ports (5:42)
-
StartNmap Scan Demo (1:41)
-
StartEnumeration (1:25)
-
StartReconnaissance Countermeasures
-
StartConclusion
-
StartPort Scanning: Supplemental Resources
-
StartIntroduction to Port Scanning (3:54)
-
StartPort Scanning Methods (4:36)
-
StartPing Demo (3:26)
-
StartPing Tester Demo (4:03)
-
StartWell-Known Ports (3:17)
-
StartNetstat Demo (3:04)
-
StartInformational Sites (0:58)
-
StartPort Scanning Techniques I (11:14)
-
StartNmap Demo (1:39)
-
StartScans and Firewalls (10:12)
-
StartNmap Version Detection Demo (4:34)
-
StartUDP (3:24)
-
StartAdvanced Scanning Techniques (2:44)
-
StartPort Scanning Tools (5:35)
-
StartPort Scanning Techniques II (3:58)
-
StartPort Scanning Countermeasures (3:19)
-
StartConclusion (1:23)
-
StartLinux Fundamentals: Supplemental Resources
-
StartLinux History (1:49)
-
StartGUI & Shell (4:44)
-
StartLinux Shell (1:27)
-
StartManaging Files and Directories (1:08)
-
StartRoot Enable Disable Demo (3:17)
-
StartLinux Commands (3:30)
-
StartNavigating in Linux (3:13)
-
StartLinux Navigation Demo (6:15)
-
StartTar (2:28)
-
StartCompression Demo (3:19)
-
StartConfiguring Subdirectories (3:14)
-
StartVi Demo (4:05)
-
StartConclusion (0:51)
-
StartConfiguring Linux for Pentesting: Supplemental Resources
-
StartInstalling Applications (2:06)
-
Startapt-get Demo (3:08)
-
StartApplications for Pentesting (1:42)
-
StartEssential Tools and GUI Demo (7:55)
-
StartIptables (1:00)
-
StartIptables Demo (9:28)
-
StartIP Forwarding Demo (3:02)
-
StartConclusion (0:54)
-
StartAuthentication Systems: Supplemental Resources
-
StartForms of Authentication (3:52)
-
StartAuthentication Factors (1:54)
-
StartIntroduction to Authentication Protocols (1:08)
-
StartCHAP and MS-CHAP (2:45)
-
StartNTLM (5:54)
-
StartNTLM Continued (3:31)
-
StartAuthentication Methods Demo (13:05)
-
StartTriple As (1:25)
-
StartRADIUS 2 Demo (8:40)
-
StartLDAP (2:59)
-
StartSingle Sign-on (1:59)
-
StartConclusion (1:35)
-
StartSystem Hacking: Supplemental Resources
-
StartIntroduction (1:49)
-
StartTypes of Password Attacks (2:30)
-
StartPassword Guessing (3:39)
-
StartPassword Hashing and Encryption (10:37)
-
StartPassword Cracking Technique (25:44)
-
StartPrivilege Escalation (1:14)
-
StartKnowledge Check (0:44)
-
StartHiding Files with NTFS (2:55)
-
StartKnowledge Check (0:49)
-
StartSteganography and Its Uses (5:39)
-
StartUnderstanding Rootkits (3:37)
-
StartKnowledge Check (0:33)
-
StartKnowledge Check (0:31)
-
StartConclusion (1:55)
-
StartSpyware & Keyloggers: Supplemental Resources
-
StartIntroduction (7:26)
-
StartSpyware Distribution (14:01)
-
StartKnowledge Check (0:43)
-
StartUnderstanding Keyloggers (1:33)
-
StartHardware Keyloggers (3:27)
-
StartSoftware Keylogger (2:55)
-
StartKeylogger Examples (11:29)
-
StartKernel Keyloggers (1:44)
-
StartProtecting Yourself (14:15)
-
StartKnowledge Check (0:36)
-
StartConclusion (1:01)
-
StartCovering Tracks: Supplemental Resources
-
StartMRU-Blaster (1:53)
-
StartWorking with WinZapper (2:25)
-
StartDealing with Windows Logs (6:02)
-
StartUsing Metasploit to Cover Tracks (1:46)
-
StartMeterpreter Event Manager Demo (2:25)
-
StartMeterpreter Timestomp Demo (1:54)
-
StartLinux History and Events (2:22)
-
StartClearing the Bash History Demo (3:30)
-
StartClearing Linux Events Demo (2:16)
-
StartFile Shredding (1:35)
-
StartAnonymity (3:28)
-
StartUsing Live CDs, Proxies, and Onion routers (2:33)
-
StartNew Lecture
-
StartConclusion (3:46)
-
StartTrojans and Backdoors: Supplemental Resources
-
StartIntroduction (1:31)
-
StartDefinition and Distribution (7:52)
-
StartCapabilities (8:27)
-
StartMalware Knowledge Check (0:41)
-
StartBackdoors (5:47)
-
StartTrojans (12:08)
-
StartWrappers (7:22)
-
StartAvoiding Detection (3:15)
-
StartTools of the Trade Knowledge Check (0:31)
-
StartCountermeasure Considerations (5:45)
-
StartInvestigation Tools (1:29)
-
StartPort Monitorization (1:30)
-
StartSystem File Monitorization (1:22)
-
StartSoftware Restriction Policies (4:36)
-
StartAdditional Countermeasure Tools (1:28)
-
StartCountermeasures Knowledge Check (0:49)
-
StartConclusion (1:58)
-
StartViruses and Worms: Supplemental Resources
-
StartVirus Definition and Behavior (2:39)
-
StartDELme Demo (4:51)
-
StartViruses (0:51)
-
StartVirus Types (9:16)
-
StartJPS Demo (3:50)
-
StartStealth Strategies and Infection (4:38)
-
StartVirus Mutation Demo (2:56)
-
StartVirus Infection (2:06)
-
StartViruses Examples (2:28)
-
StartDefining Worms (1:31)
-
StartWorms Demo (7:29)
-
StartKnown Dangerous Worms (11:18)
-
StartConclusion (0:49)
-
StartSniffers: Supplemental Resources
-
StartWireshark Demo (9:31)
-
StartPacket Sniffers (15:29)
-
StartSniffing (2:31)
-
StartTechniques for Poisoning the Network (3:38)
-
StartARP Poisoning Demo (10:34)
-
StartSniffing and Spoofing Tools (10:17)
-
StartCountermeasures (1:14)
-
StartXARP Demo (3:08)
-
StartCisco Switch Security Configuration (1:43)
-
StartConclusion (0:34)
-
StartSocial Engineering: Supplemental Resources
-
StartIntroduction (1:35)
-
StartSecurity Policy (1:24)
-
StartHuman-based Attacks (2:30)
-
StartPiggybacking (3:47)
-
StartComputer-based Attacks (1:12)
-
StartPhishing Email Demo (4:35)
-
StartSET-webTemplate Demo (7:11)
-
StartSET-spear phishing Demo (4:36)
-
StartSET-trojan Demo (4:17)
-
StartSET-SMS Spoofing Demo (2:22)
-
StartUsing Social Media (0:58)
-
StartConclusion (0:52)
-
StartIntroduction (2:29)
-
StartDenial of Service: Supplemental Resources
-
Start2014 DDoS Attacks and Impact Report (4:32)
-
StartDoS and Distributed DoS (4:45)
-
StartDistributed DoS (3:13)
-
StartDoS Impact (1:19)
-
StartDistributed DoS Attack Symptoms (0:46)
-
StartDigital Attack Map Demo (2:55)
-
StartDoS, DDoS Attacks (7:02)
-
StartIntroduction to Botnets (2:20)
-
StartBotnet Ecosystem (8:08)
-
StartBotnet Propagation (2:08)
-
StartBotnet Tools (2:02)
-
StartDDoS Tools (0:42)
-
StartHOIC Demo (1:27)
-
StartDoS Attack Detection (0:57)
-
StartActivity Profiling (0:58)
-
StartSequential Change-Point Detection (0:57)
-
StartWavelet Analysis (0:35)
-
StartBotnet Countermeasures (1:09)
-
StartDoS, DDoS Countermeasures (8:13)
-
StartAdvanced DoS, DDoS Protection Tools (3:03)
-
StartDDoS in Penetration Testing (1:57)
-
StartAdvanced DDoS Protection Method (0:42)
-
StartConclusion (2:01)
-
StartSession Hijacking: Supplemental Resources
-
StartContributors to Session Hijacking (2:33)
-
StartIntroduction (5:41)
-
StartImpact of Session Hijacking (0:53)
-
StartSession Hijacking Strategies (2:24)
-
StartSession Hijacking Process (2:58)
-
StartTypes of Session Hijacking (11:49)
-
StartZAP Tool Demo (4:54)
-
StartSession Hijacking Tools (0:50)
-
StartNew Lecture
-
StartTamperIE Demo (15:32)
-
StartProtection Against Session Hijacking (2:45)
-
StartIP Security Architecture (1:53)
-
StartPenetration Testing in Session Hijacking (4:10)
-
StartConclusion (1:37)
-
StartHacking Web and App Servers: Supplemental Resources
-
StartWeb server Attacks (4:09)
-
StartApache2 Demo (9:16)
-
StartGathering Information (1:29)
-
StartWebsite Mirroring Demo (3:43)
-
StartNetcraft Demo (5:21)
-
StartWMAP Demo (5:23)
-
StartVulnerabilites (4:50)
-
StartW3AF Demo (5:07)
-
StartConclusion (0:46)
-
StartAdvanced Exploitation Techniques: Supplemental Resources
-
StartIntroduction to Exploits (4:04)
-
StartMetasploit (2:20)
-
StartMetasploit Demo (3:59)
-
StartUnderstanding Metasploit (5:52)
-
StartArmitage (2:00)
-
StartMeterpreter Demo (8:23)
-
StartMetasploit (1:53)
-
StartArmitage Demo (4:47)
-
StartHands on Metasploit (1:03)
-
StartExploiting Vulnerabilities (1:41)
-
StartPayload (1:43)
-
StartArmitage-mimkatz Demo (4:29)
-
StartCore Impact Pro (2:55)
-
StartConclusion (1:01)
-
StartIntroduction to SQL Injections (5:31)
-
StartSQL Injections: Supplemental Resources
-
StartSQL Injection Methodology (5:24)
-
StartSQL Injection Attacks (5:17)
-
StartSQL Injection Detection (1:11)
-
StartBuffer Overflow Exploit (1:02)
-
StartBSQL Tool Demo (1:44)
-
StartSQL Injection Username and Password Demo (4:04)
-
StartTesting for SQL Injection (1:37)
-
StartCountermeasures (2:50)
-
StartSQL Injection Detection Tools (0:55)
-
StartConclusion (1:14)
-
StartIntroduction (0:38)
-
StartWireless Types and Vulnerabilities: Supplemental Resources
-
StartWireless Communication Systems (2:13)
-
StartStandards (4:42)
-
StartInSSIDer Demo (5:49)
-
StartEncryption Protocols (8:41)
-
StartWPA2 Encryption (2:54)
-
StartSystems (7:03)
-
StartJammer Demo (2:25)
-
StartFake AP Demo (2:45)
-
StartAttacks (5:05)
-
StartCapsa Demo (5:40)
-
StartConclusion (0:39)
-
StartRise of Mobility (4:57)
-
StartDevice Security (5:25)
-
StartMobile Hacking Basics: Supplemental Resources
-
StartIntroduction (1:18)
-
StartAndroid Security Features Demo (7:31)
-
StartAreas to Consider (2:31)
-
StartGeo Tagging Demo (5:44)
-
StartApplication Security (1:50)
-
StartLookout Demo (4:33)
-
StartMobile Applications (4:38)
-
StartSophos Demo (5:12)
-
StartTrend Micro Security Demo (4:45)
-
StartBYOD Concerns (1:52)
-
StartiScan Demo (4:03)
-
StartOptions (4:06)
-
StartApp Permissions Demo (4:58)
-
StartThe Virtualization Option (1:52)
-
StartConclusion (1:24)
-
StartIntroduction (1:14)
-
StartEvading Firewalls and Honeypots: Supplemental Resources
-
StartUnderstanding Firewalls (4:02)
-
StartFirewall Architectures (2:37)
-
StartTypes of Firewalls (4:47)
-
StartEvading Firewalls (6:32)
-
StartConfiguring Proxy Demo (1:17)
-
StartEvading Firewalls Using Tunneling (2:53)
-
StartEvading Firewalls Using MitM Attacks (1:17)
-
StartEvading Firewalls Using External Systems (1:20)
-
StartFirewall Evasion Tools (2:11)
-
StartFirewall Bypassing and Pentration Testing Demo (1:23)
-
StartFirewall Evasion Tools Continued (3:28)
-
StartHoneypots Defined (0:54)
-
StartTypes of Honeypots (3:29)
-
StartDetecting Honeypots (2:10)
-
StartHoneypot Using Atomic Software Demo (1:49)
-
StartCountermeasures (1:31)
-
StartConclusion (1:09)
-
StartPenetration Testing (3:31)
-
StartEvading IDS: Supplemental Resources
-
StartIntroduction (2:10)
-
StartIntroduction (4:23)
-
StartEncryption and Flooding (0:38)
-
StartObfuscating (1:59)
-
StartFragmentation Attack (0:59)
-
StartOverlapping Fragments (1:40)
-
StartVulnerabilites (0:57)
-
StartHow to Avoid IDS Demo (0:55)
-
StartInsertion Attack (1:43)
-
StartEvasion Attack (0:52)
-
StartDenial-of-Service Attack (0:47)
-
StartDenial-of-Service Attack (2:16)
-
StartApplication-Layer Attacks (0:56)
-
StartTime to Live Attacks (1:22)
-
StartFalse Positive Generation (0:35)
-
StartUrgency Flag (0:52)
-
StartSession Splicing (1:23)
-
StartPre Connection SYN (1:08)
-
StartPost Connection SYN (1:49)
-
StartSnort (0:43)
-
StartMore Tools (3:36)
-
StartWays to Detect (2:57)
-
StartADMutate (0:34)
-
StartOther Evading Tools (1:40)
-
StartCentralized Security Management (3:28)
-
StartIDS Penetration Testing (2:30)
-
StartConclusion (0:46)
-
StartBuffer Overflows: Supplemental Resources
-
StartIntroduction to Buffer Overflow (3:15)
-
StartStacks (4:27)
-
StartStack Overflow Demo (1:57)
-
StartHeaps (2:06)
-
StartHeap Overflow Demo (2:04)
-
StartFormat Strings (1:10)
-
StartFormat String Buffer Overflow Demo (1:48)
-
StartInteger Overflow Demo (1:15)
-
StartVulnerability to Buffer Overflows (3:34)
-
StartBuffer Overflow Demo
-
StartHandling Buffer Overflow
-
StartIdentifying Buffer Overflows
-
StartDefense Against Buffer Overflows
-
StartProgramming Countermeasures
-
StartBuffer Overflow Security Tools
-
StartBuffer Overflow Pentesting
-
StartConclusion
-
StartCryptography: Supplemental Resources
-
StartIntroduction (0:30)
-
StartPublic key Infrastructure (PKI) (2:30)
-
StartPKI Installation Demo (11:33)
-
StartCertificate Authority (CA) (0:48)
-
StartConfi-complete Demo (7:54)
-
StartCRL Demo (4:08)
-
StartEnroll Certificate Demo (2:52)
-
StartSecure Communication with Certificates (3:01)
-
StartCertificate Management (1:59)
-
StartCA Management Demo (6:21)
-
StartConclusion (0:34)
-
StartIntroduction (1:01)
-
StartCryptography Weaknesses: Supplemental Resources
-
StartSymmetric Demo (2:42)
-
StartCryptographic Schemes (0:47)
-
StartBitLocker Demo (4:16)
-
StartIntroduction (2:31)
-
StartAES (9:41)
-
StartStream and Block Ciphers (3:43)
-
StartIntroduction (1:58)
-
StartAsymmetric Demo (3:13)
-
StartKey Exchange Methods (3:40)
-
StartHashing (1:01)
-
StartHashcalc Demo (1:37)
-
StartHash Algorithms (3:52)
-
StartEncryption Usage Examples (1:28)
-
StartSignature Demo (4:09)
-
StartInternet Security (2:53)
-
StartConclusion (0:38)
-
StartCross-Site Scripting: Supplemental Resources
-
StartIntroduction (1:15)
-
StartCSS Vulnerabilities (3:28)
-
StartXSS Attacks (1:56)
-
StartStealing a Cookie Demo (1:03)
-
StartTypes of XSS Overview (1:53)
-
StartStored XSS (1:59)
-
StartStored Cross-Site Scripting Demo (1:09)
-
StartReflected XSS (1:19)
-
StartReflected Cross-Site Scripting Demo (1:12)
-
StartDOM-Based XSS (1:02)
-
StartServer-Side XSS (1:11)
-
StartClient-Side XSS (1:00)
-
StartXSS in the Matrix (1:08)
-
StartPreventing XSS (2:43)
-
StartTesting for Vulnerability (1:47)
-
StartBrowser Behaviors Leading to XSS (7:24)
-
StartWeb Application Security Scanners (2:06)
-
StartManual Testing Demo (1:39)
-
StartConclusions (0:36)
-
StartSecurity Incidents: Supplemental Resources
-
StartIncident Handling Teams (3:51)
-
StartIntroduction (1:31)
-
StartIdentifying Incidents (1:42)
-
StartTaking Action (1:34)
-
StartRecovery (1:13)
-
StartAnalyze the Attack (1:27)
-
StartReporting the Incident (0:55)
-
StartEvidence Integrity (1:10)
-
StartConclusion (0:45)
Your Instructor
LearnSmart
LearnSmart has served the learning community with high-quality professional skills and IT certification training since 1997. In that time, the company has helped thousands earn career-related certifications from respected vendors, such as Project Management Institute (PMI)®, Cisco, Microsoft, CompTIA, Oracle, and EC-Council. LearnSmart offers over 1,000 courses covering IT, project management, administrative, HR, and workplace safety topics. With a rapidly growing clientele of individuals and corporations, LearnSmart serves a broad range of Fortune 500 companies to universities, as well as government institutions and the armed forces.
LearnSmart is able to meet diverse career and learning needs through its extensive selection of training. LearnSmart uses industry experts to give learners the most up-to-date content in a video format as well as training resources including; reference tools, pretests, study guides and labs. For more information about how we can help pinpoint and solve your individual or multi-user training challenges.
Reviews







