Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Core Fundamentals of CEH - Certified Ethical Hacking
Introduction to Ethical Hacking
Introduction to Ethical Hacking (10:00)
Understanding Vulnerabilities (6:58)
Learn Defense-in-depth (3:31)
What is Penetration Testing? (7:28)
Demonstration Session 1: Penetration Testing (5:17)
Demonstration Session 2: Penetration Testing (2:20)
Demonstration Session 3: Penetration Testing (3:10)
Demonstration Session 4: Penetration Testing (4:56)
Methodology of Ethical Penetration Testing (2:37)
Understanding Vulnerability Management (1:14)
Incident Management in Cyber World (2:40)
Establishing Cyber Security Policy (1:52)
Disaster Recovery and Risk Management
What is cyber risk management? (2:15)
Devising Strategies for Managing Risk (2:12)
Risk Assessment Techniques (5:23)
Demonstration Session: Risk Assessment (18:16)
Implementing Disaster Recovery Strategies (5:03)
Disaster Recovery Plan Testing and Execution (2:15)
Chapter Keynotes (1:00)
Penetration Testing
What is Security Auditing? (5:48)
Common Penetration Testing Types (4:32)
Demonstration Session: Vulnerability Assessment (10:36)
Primary Areas of Penetration Testing (4:45)
Penetration Testing and Compliance (1:37)
Employee Education on Cyber Security (1:25)
Chapter Keynotes (1:04)
Vulnerability Assessment
Understanding what is Vulnerability (2:34)
How Testing is Performed (0:50)
Common Security Alerts (4:09)
Vulnerability Assessment Scanners (4:21)
Demonstration Session: Nessus (4:17)
Demonstration Session: IBM AppScan (2:54)
Demonstration Session: GFI Languard (1:34)
How to Analyze Scan Results (4:32)
How to Generate Reports (1:54)
Continuous Vulnerability Remediation (7:47)
Vulnerability Scanning vs. Patch Management (1:28)
Chapter Keynotes (1:03)
Physical Security
Overview of Physical Security (0:46)
Importance of Physical Security (3:33)
Planning Physical Security Schemes (4:49)
Implementing CPTED Strategies (6:52)
Protecting Your Critical Digital Assets (1:45)
Introduction to Internal Support System (2:38)
Power Supply and Protection (6:42)
Implementing Environmental Controls (2:46)
Security and Fire Protection in Storage Facilities (3:41)
Ensuring Perimeter Security (3:28)
Implying External Boundary Protection (1:38)
Use of Locks and Fencing (1:36)
Essential Lighting and Patrols (2:51)
Installing Surveillance Devices (1:11)
Installing Intrusion Detection Systems (1:50)
How to Audit Physical Security (0:51)
Remedial Action Plan: Testing and Drills (1:11)
Chapter Keynotes (0:39)
Footprinting
Introduction to Chapter Contents (1:14)
What is Footprinting? (4:34)
Self Assessment: Knowledge Check on Footprinting (1:16)
Performing Information Gathering (6:34)
Self Assessment: Knowledge Check on Information Gathering (1:57)
Understanding Footprinting Hierarchy (1:08)
Demonstration Session: WHOIS Footprinting (1:53)
Self Assessment: Knowledge Check on WHOIS Footprinting (1:30)
Implementing Footprinting Methodology (2:42)
Understanding Passive vs. Active Footprinting (4:39)
Self Assessment: Knowledge Check on DNS Zone Data (1:59)
Footprinting Through Social Engineering (8:03)
Footprinting with Google (1:57)
How Google Hacking Takes Place (0:49)
Using Exploit Database (1:19)
Google Hacking in the Name of Charity (1:32)
Using Google Advance Search Operations (1:48)
Common Google Hacking Tools (2:59)
Common Footprinting Tools (1:13)
Demonstration Session: Maltego (1:41)
Understanding Footprinting PenTesting (3:03)
Formally Used Footprinting Tools (0:46)
Effective Countermeasures (2:18)
Chapter Keynotes (1:55)
Reconnaissance
What is Reconnaissance? (1:51)
Understanding Reconnaissance Threats (3:10)
Basic Steps of Information Gathering (6:25)
Passive vs. Active Footprinting (3:07)
Common Passive Footprinting Tools (0:23)
Demonstration Session: PassiveRecon (2:00)
Demonstration Session: Shodanhq.com (0:40)
Understanding Active Footprinting (2:35)
Demonstration Session: Visualroute Trace (0:46)
Common Scanning Networks and Ports (5:40)
NMAP Network Scanning Technique (1:41)
Effective Reconnaissance Countermeasures (2:15)
Chapter Keynotes (1:06)
Scanning Networks
Introduction to Private and Public Scanning (0:51)
Common Private Network Scanning Techniques (2:27)
Demonstration Session: Angry IP (6:45)
Demonstration Session: Nmap (4:19)
Demonstration Session: Hping (3:13)
Public Scanning with Zmap (2:31)
Demonstration Session: Zmap (4:53)
Chapter Keynotes (0:41)
Port Scanning
What is Port Scanning? (4:34)
What are Ping Scans? (3:26)
Demonstration Session A: Ping Tester (4:19)
Demonstration Session B: Ping Tester (4:19)
Identifying Well-Known Ports (3:13)
Demonstration Session: Netstat (3:04)
Informational Sites for Port Numbers (0:58)
Common Port Scanning Techniques (11:12)
Demonstration Session: Nmap (1:39)
Vulnerability Scans and Firewalls (10:10)
Demonstration Session: Nmap Version Detection (4:32)
Understanding User Datagram Protocol (UDP) (3:23)
Advanced Scanning Techniques (2:43)
Tools for Port Scanning (5:33)
Advanced Port Scanning Techniques (3:57)
Port Scanning Countermeasures (3:18)
Chapter Keynotes (1:22)
Banner Grabbing
Introduction to Chapter (0:49)
What is Banner Grabbing? (3:52)
Common Types of Banner Grabbing (2:35)
Tools for Banner Grabbing (3:42)
Demonstration Session: Banner Grabbing Using Telnet (1:46)
Effective Countermeasures (1:29)
Chapter Keynotes (0:50)
Enumeration
What is Enumeration? (0:57)
Common Enumeration Applications (1:42)
Demonstration Session: NetBIOS (4:12)
Performing SNMP Monitoring (3:10)
LDAP Enumeration Technique (0:42)
Demonstration Session: LDAP (3:27)
NTP Enumeration Technique (1:05)
SMTP Enumeration Technique (1:28)
Using DNS Enumeration (1:33)
Demonstration Session: NSlookup (2:23)
Chapter Keynotes (0:33)
Covering Tracks
Investigating Gaps in your Windows Logs (6:00)
How to Work with WinZapper? (2:24)
Using MRU-Blaster Application (1:52)
Cover Tracks Using Metasploit (1:45)
Demonstration Session: Meterpreter Timestomp (1:54)
Demonstration Session: Meterpreter Event Manager (2:24)
Demonstration Session: Clearing the Bash History (3:30)
Demonstration Session: Clearing Linux Events (2:16)
Performing File Shredding (1:35)
Understanding Anonymity (3:27)
Understanding Security Testing Distribution (2:32)
Effective Countermeasures (2:58)
Chapter Keynotes (0:47)
Sniffers
Understanding Packet Sniffers (15:27)
How to Use Wireshark Pentesting Tool (9:29)
Sniffing Techniques (2:30)
Poisoning Attacks on Networks (3:37)
Demonstration Session: ARP Poisoning (10:32)
Common Sniffing and Spoofing Tools (10:15)
Effective Countermeasures (1:14)
Demonstrating Advanced ARP Spoofing Detection (3:07)
Cisco Switch Security Configuration (1:43)
Chapter Keynotes (0:34)
Social Engineering
What is Social Engineering? (1:35)
Security Policy Implementation (1:24)
Analyzing Human-based Attacks (2:29)
What is Piggybacking? (3:46)
Analyzing Computer-based Attacks (1:11)
Demonstration Session: Phishing Email (4:33)
Demonstration Session: SET-webTemplate (7:11)
Demonstration Session: SET-spear phishing (4:36)
Demonstration Session: SET-trojan (4:17)
Demonstration Session: SET-SMS Spoofing (2:21)
Social Media Phishing (0:57)
Chapter Keynotes (0:52)
Understanding Passive vs. Active Footprinting
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock