Autoplay
Autocomplete
Previous Lesson
Complete and Continue
System Hacking & Security
Authentication Systems
What are Authentication Factors? (1:54)
Various Forms of Authentication (3:51)
Introduction to Authentication Protocols (1:07)
What is CHAP and MS-CHAP Authentication? (2:44)
What is NT LAN Manager (NTLM)? (5:52)
How Does NTLM Work? (3:30)
Demonstration Session: Authentication Methods (13:03)
Understanding Triple As (Authentication, Authorization and Accounting) (1:24)
Demonstration Session: RADIUS Protocol (Part A) (6:09)
Demonstration Session: RADIUS Protocol (Part B) (2:30)
What is LDAP ((Lightweight Directory Access Protocol) Authentication? (2:58)
How Does Single Sign-On (SSO) Work? (1:59)
Chapter Keynotes (1:35)
System Hacking
Introduction to System Hacking (1:48)
Different Types of Password Attacks (2:29)
How to Perform Password Guessing? (3:38)
Difference between Password Hashing and Encryption (10:35)
Ethical Password Cracking Technique (25:42)
What Is Privilege Escalation and Why Is It Important? (1:13)
Important Countermeasures (5:11)
Chapter Knowledge Check (Part A) (0:44)
Chapter Knowledge Check (Part B) (0:49)
An Introduction to Steganography & Its Uses (5:37)
Steganography Knowledge Check (Part A) (0:33)
Steganography Knowledge Check (Part B) (0:31)
What is a Rootkit and How to Detect It (3:36)
Chapter Keynotes (1:54)
Spyware & Keyloggers
What are Spyware and Keyloggers? (7:24)
Understanding Spyware Distribution (13:59)
Spyware Distribution Knowledge Check (0:42)
Understanding Keyloggers (1:33)
Understanding Types of Keyloggers: Software Keylogger (2:54)
Understanding Types of Keyloggers: Hardware Keyloggers (3:26)
Practice Session: Keylogger Examples (11:27)
Understanding Types of Keyloggers: Kernel Keyloggers (1:43)
Keyloggers Knowledge Check (0:36)
Important Countermeasures (14:13)
Chapter Keynotes (1:00)
Trojans and Backdoors
What are Trojans and Backdoors? (1:30)
Definition and Distribution (7:50)
Capabilities of Malware (8:25)
Malware Knowledge Check (0:41)
What is a Backdoor Attack? (5:45)
Understanding Database Security Wrappers (7:20)
Understanding Malware: Trojans (12:06)
Methodology of Avoiding Detection (3:14)
Malware Tools Knowledge Check (0:31)
Countermeasure Considerations (5:43)
Types of Investigation Tools (1:29)
Monitoring TCP Ports (1:29)
Understanding File Integrity Monitoring (FIM) (1:21)
Understanding Software Restriction Policies (4:34)
Additional Countermeasure Tools (1:28)
Countermeasures Knowledge Check (0:49)
Chapter Keynotes (1:58)
Viruses and Worms
Introduction to Chapter (2:38)
Computer Virus Information: What Do Viruses Do? (0:51)
Demonstration Session: DELmE Virus Maker (4:49)
Types of Computer Viruses (9:14)
Demonstration Session: JPS Virus Maker (3:49)
Understanding Stealth Malware (4:36)
Demonstration Session: Virus Mutation (2:55)
Impact of Viruses (2:05)
Common Viruses Examples (2:28)
What is a computer worm and how does it work? (1:31)
Demonstration Session: Worms in Action (7:27)
List of Known Dangerous Worms (11:16)
Chapter Keynotes (0:49)
Introduction to Chapter
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock