Paths

Ethical Hacking (CEH Prep)

Authors: Dale Meredith , Troy Hunt, James D. Murray, Jason Helmick

Welcome to the world of ethical hacking. This series will teach you the basic concepts, techniques, concerns, tools and technologies involved in ethical hacking. The courses in... Read more

CEH 312-50

In this series, you'll gain an understanding of the core concepts, techniques, tools and "lingo" used in the security field. NOTE: Crypto information for this Path is provided through two courses, one of which is shared with our SSCP path.

1

Ethical Hacking: Understanding Ethical Hacking

by Dale Meredith

May 20, 2015 / 7h

Beginner • 7h

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the duty of all System Admins and Security Professionals to protect their infrastructure from not only outside attackers but also attackers within your company. We will cover the terminology used by attackers, the difference between "hacking" and "ethical hacking", the phases of hacking, the types of attacks on a system, what skills an Ethical Hacker needs to obtain, types of security policies, why Ethical Hacking is essential, how to be in the "know" of what's happening in the hacking world, who a "hacker" is, what are the biggest security attack vectors, and more. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. The Truth About Living in a Technology Based World
    6m 56s
  2. Overview of the CEH Certification Program
    21m 10s
  3. How to Build a Lab to Hack Safely
    42m 36s
  4. Installing and Configuring Your Windows Server VMs
    45m 54s
  5. Installing and Configuring Your Desktop VMs
    59m
  6. Information Security Overview
    23m 10s
  7. Security Threats and Attack Vectors
    44m 22s
  8. Hacking Concepts
    46m 55s
  9. Hacking Phases
    28m 38s
  10. Attack Types
    32m 7s
  11. Information Security Controls
    48m 50s
  12. How to Prepare for the Certified Ethical Hacker Exam
    21m 14s
2

Ethical Hacking: Reconnaissance/Footprinting

by Dale Meredith

May 20, 2015 / 3h 29m

Beginner • 3h 29m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. As an Ethical Hacker, you've been asked to do a "Blackbox" attack on a customer's infrastructure. Your first step is finding out as much as you can about the "target." You accomplish this via reconnaissance/footprinting. This is the initial stage in gaining a blueprint of the security profile of a target, and it is accomplished in an organized manner. Reconnaissance is one of the three "pre-attack phases," and results in a unique profile of an organization's networks and systems. "Reconning" an organization is necessary in order to systematically gather all the related data in regards to the technologies deployed within the network. Reconnaissance can take up to 90% of the time during penetration testing or an actual attack. We'll show you how attackers are currently reconning your company, as well as discuss in detail the steps of reconnaissance. Finally we'll look at some possible countermeasures to help discourage attackers. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. What Do You Mean by Reconnaissance/Footprinting?
    27m 32s
  2. Initially What Do You Look For?
    44m 45s
  3. The More You Look, the More You Find
    31m 23s
  4. Other Reconnaissance Techniques
    38m 29s
  5. Reconnaissance via Google Hacking
    40m 35s
  6. Reconnaissance Countermeasures & Pen Testing
    26m 15s
3

Ethical Hacking: Scanning Networks

by Dale Meredith

Jul 14, 2015 / 3h 45m

Beginner • 3h 45m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. So, after reconnaissance, we need to scan for basics, kind of like knocking on all the doors to see who is home and what they look like. Then, when you find a machine that's "live", we need to get to know it really well, asking some rather personal questions like, "what OS are you running?" or "what applications are you running?" and "which ports are listening on the network?". We'll go over all you'll need to know for the exam regarding scanning, and play with some pretty fun tools along the way. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. Overview of Scanning
    22m 48s
  2. Understanding the 3-way Handshake
    21m 8s
  3. Checking for "Live" Systems and Their Open Ports
    32m 5s
  4. Types of Scanning
    44m 18s
  5. Banner Grabbing and OS Fingerprinting
    30m 5s
  6. Vulnerability Scanning and Drawing Out the Network
    55m 51s
  7. Preparing Proxies and Other Anonymizing Techniques
    19m 41s
4

Ethical Hacking: Enumeration

by Dale Meredith

Sep 3, 2015 / 2h 59m

Beginner • 2h 59m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. Enumeration Explained & the Techniques Used
    17m 41s
  2. Enumerating via Defaults & NetBIOS
    47m 29s
  3. Enumerating via SNMP
    15m 55s
  4. Enumerating via LDAP
    16m 46s
  5. Enumerating via NTP
    10m 34s
  6. Enumerating via SMTP
    18m 39s
  7. Enumerating via DNS
    20m 46s
  8. Linux Isn't Safe Either
    18m 27s
  9. Countermeasures for Enumeration
    13m 38s
5

Ethical Hacking: System Hacking

by Dale Meredith

Sep 24, 2015 / 3h 18m

Beginner • 3h 18m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. This is what it all comes down to. After we've done our research, we've found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of this box. In turn, we then use this box to repeat our efforts to pwn more boxes within the network as well as grab any intellectual property that could be of great worth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. Understanding This Stage
    10m 43s
  2. Phase 1: Gaining Access – Cracking Passwords
    48m 26s
  3. More Cracking
    39m 17s
  4. Phase 2: Gaining Access – Escalating Privileges
    24m
  5. Phase 3: Maintaining Access – Executing Applications
    32m 39s
  6. Phase 4: Maintaining Access – Hiding Your Tools
    24m 35s
  7. Phase 5: Covering Your Tracks - Clearing Logs and Evidence
    19m 1s
6

Ethical Hacking: Malware Threats

by Dale Meredith

Dec 1, 2015 / 3h 32m

Beginner • 3h 32m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. The easiest way to get into a system or network is to get someone to let us in. Do you pirate software, movies, music, or heaven forbid - an operating system? I'm about 99.999% sure you've already been pwned. Malware is specifically designed to gain access or damage systems without the knowledge of the victim. Malware is on the rise due to the sheer volume of new types that are easily created daily, and the money that can be made through organized Internet crime. We'll talk about the various malware types, including viruses, Trojans, and worms. Now, we won't leave you in despair, we'll also talk about countermeasures and ways to detect these bad boys. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. The Hard Truth Behind Malware
    26m 22s
  2. What's a Trojan?
    25m 47s
  3. Trojan Infections
    29m 4s
  4. Types of Trojans
    26m 22s
  5. Virus and Worms
    44m 39s
  6. Detecting Malware
    34m 2s
  7. Countermeasures
    25m 50s
7

Ethical Hacking: Sniffing

by Dale Meredith

Mar 21, 2016 / 2h 11m

Beginner • 2h 11m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. There's so much an attacker can learn from simply "listening" or sniffing your network. Passwords? Check. Emails? check, and the list goes on and on. This course, Ethical Hacking: Sniffing (part of the Ethical Hacking series) will clarify the central ideas of sniffing and their utilization in hacking exercises. You'll also learn how imperative it is for security professionals to be "up" on sniffers and their methods. Furthermore, you'll be shown a plethora of instruments and procedures utilized as part of securing your network from these types of attacks. By the end of this course, you'll understand much more about sniffing and how to keep your data protected.

Table of contents
  1. Sniffing – It's Not the Cold Season
    26m 5s
  2. DHCP Assaults
    21m 53s
  3. Big-MAC Attacks
    15m 40s
  4. ARP Poisoning
    29m 12s
  5. DNS Poisoning
    21m 24s
  6. Countermeasures
    17m 15s
8

Ethical Hacking: Buffer Overflow

by James D. Murray

May 27, 2016 / 4h 2m

Beginner • 4h 2m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Buffer overflow is a topic that only software developers using low-level programming languages really get an opportunity to fully understand. However, IT security professionals are increasingly called upon to better understand how vulnerabilities created by poor software design and implementation practices can be exploited to create security issues in systems and networks. The problem is that most IT professionals do not have the extensive software development background needed to tackle the subject of buffer overflow. This course breaks down the technical subjects of computer memory management, controlling code, and data inside of a running program, and exploiting poor quality software into terms that IT people with no software development experience can understand. Also examined are ways to prevent buffer overflow conditions and minimize the impact of buffer overflows that do happen. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. What Are Buffer Overflows?
    35m 10s
  2. Inside Buffer Overflows
    1h 1m 16s
  3. Finding Buffer Overflows
    1h 25m 26s
  4. Mitigating Buffer Overflows
    1h 25s
9

Ethical Hacking: Social Engineering

by Troy Hunt

Feb 4, 2016 / 4h 36m

Beginner • 4h 36m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Security defenses within information systems focus primarily on technology controls, that is, security is implemented within physical appliances and software. These controls are frequently bypassed when the humans themselves are compromised by a social engineering attack. Social engineering involves compromising the individuals that use these systems. Attackers look to exploit weaknesses in human nature and coerce people into performing actions which give the attacker an advantage. In this course, we'll look at various different social engineering techniques that can be used to compromise systems. We'll also look at both computer-based and behavior-based tools to help defend against this risk. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. Humans: The Soft Center Within the Hard Shell
    29m 14s
  2. A Walkthrough of a Social Engineering Attack
    50m 28s
  3. Reconnaissance and OSINT
    37m 41s
  4. Phishing Attacks
    58m 46s
  5. Identity Theft and Impersonation
    45m 29s
  6. Social Engineering Countermeasures
    54m 47s
10

Ethical Hacking: Denial of Service

by Troy Hunt

Mar 21, 2016 / 2h 49m

Beginner • 2h 49m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Denial of service attacks typically seek to render a service unavailable by flooding it with malicious traffic so that it becomes unresponsive to legitimate requests. In this course, Ethical Hacking: Denial of Service (part of the Ethical Hacking series), you'll look at the purposes of these attacks, ranging from disrupting gaming adversaries, to hacktivism, and to law enforcement by government agencies. You'll also explore various ways attacks are constructed and the weaknesses they exploit in order to be successful. Finally, you'll delve into defensive patterns to help protect services from malicious attacks. By the end of this course, you'll have a much better understanding of denial of service attacks and how to protect yourself from them.

Table of contents
  1. Understanding Denial of Service Attacks
    38m 46s
  2. Attack Techniques
    52m 58s
  3. Tools and Services
    31m 53s
  4. Defending Against Attacks
    45m 53s
11

Ethical Hacking: Session Hijacking

by Troy Hunt

Jul 29, 2015 / 3h 27m

Beginner • 3h 27m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Session persistence is a fundamental concept in information systems. On the web, for example, which is dependent on the stateless HTTP protocol, session persistence is a key component of features ranging from shopping carts to the ability to logon. At a lower level on the network tier, the TCP protocol relies on sessions for communication between machines such as a client and a server. The confidentiality and integrity of this communication can be seriously impacted by a session hijacking attack. Learning how to identify these risks is an essential capability for the ethical hacker. Systems are frequently built insecurely and readily expose these flaws. Conversely, the risks are often easy to defend against by implementing simple patterns within the application. This course walks through both the risks and the defenses. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. Understanding Session Hijacking
    18m 31s
  2. Session Persistence in Web Applications
    31m 43s
  3. Hijacking Sessions in Web Applications
    47m 18s
  4. Network and Client Level Session Hijacking
    36m 53s
  5. Mitigating the Risk of Session Hijacking
    45m 56s
  6. Automating Session Hijack Attacks
    27m 27s
12

Ethical Hacking: Hacking Web Servers

by Troy Hunt

Nov 11, 2015 / 2h 25m

Beginner • 2h 25m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Vulnerabilities in web server implementations are frequently the vector by which online attackers compromise systems. The impact can range from short periods of outage, to the total disclosure of sensitive internal information. There are many different levels an attacker may focus their efforts on, including the application, the host operating system, and of course the web server itself. Each has their own weaknesses and each must have the appropriate defenses in place to ensure resiliency from online attacks. In this course, we'll look at various attack vectors in web servers. These include exploiting misconfigured servers, leveraging weaknesses in unpatched environments, compromising weak SSL implementations and much, much more. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. Understanding How Web Servers Are Hacked
    19m 59s
  2. Discovering Risks in Web Servers
    31m 35s
  3. Web Server Misconfiguration
    34m 45s
  4. Managing and Hardening Web Servers
    29m 40s
  5. Other Attacks Against Web Servers
    29m 31s
13

Ethical Hacking: Hacking Web Applications

by Troy Hunt

Oct 8, 2015 / 4h 49m

Beginner • 4h 49m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. The security profile of web applications is enormously important when it comes to protecting sensitive customer data, financial records, and reputation. Yet, web applications are frequently the target of malicious actors who seek to destroy these things by exploiting vulnerabilities in the software. Most attacks against web applications exploit well known vulnerabilities for which tried and tested defenses are already well-established. Learning these patterns – both those of the attacker and the defender – is essential for building the capabilities required to properly secure applications on the web today. In this course, we'll look a range of different security paradigms within web applications both conceptually and in practice. They'll be broken down into detail, exploited, and then discussed in the context of how the attacks could have been prevented. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. Understanding Security in Web Applications
    39m 3s
  2. Reconnaissance and Footprinting
    43m 7s
  3. Tampering of Untrusted Data
    37m 54s
  4. Attacks Involving the Client
    50m 14s
  5. Attacks Against Identity Management and Access Controls
    30m 38s
  6. Denial of Service Attacks
    43m 5s
  7. Other Attacks on the Server
    45m 27s
14

Ethical Hacking: SQL Injection

by Troy Hunt

May 20, 2015 / 5h 25m

Beginner • 5h 25m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Ever since we started connecting websites to databases, SQL injection has been a serious security risk with dire ramifications. The ability for attackers to run arbitrary queries against vulnerable systems can result in data exposure, modification, and in some cases, entire system compromise. SQL injection is classified as the number one risk on the web today due to the "perfect storm" of risk factors. It's very easily discoverable, very easily exploited, and the impact of a successful attack is severe. Add to that the fact that injection risks remain rampant, it's clear how it deserves that number one spot. This course takes you through everything from understanding the SQL syntax used by attackers, basic injection attacks, database discovery and data exfiltration, advanced concepts, and even using injection for network reconnaissance and running system commands. It's everything an ethical hacker needs to know to be effective in identifying the SQL injection risk in target systems. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. Why SQL Injection Matters
    20m 52s
  2. Understanding SQL Queries
    23m 3s
  3. The Mechanics of SQL Injection Attacks
    45m 9s
  4. Discovering Schema and Extracting Data
    45m 26s
  5. Blind SQL Injection
    46m 53s
  6. Advanced SQL Injection Concepts
    44m 55s
  7. Defending Against Attacks
    44m 56s
  8. Evasion Techniques
    20m 43s
  9. Automating Attacks
    33m 54s
15

Ethical Hacking: Hacking Wireless Networks

by Dale Meredith

May 3, 2016 / 2h 57m

Beginner • 2h 57m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Great! You have just finished setting up your wireless network. You did everything you were suppose to, like giving your SSID a unique name and securing your network with a strong password, so that someone can't piggyback off your network. Now that you are "safe and secure," you don't have to worry about hackers right? SLOW DOWN there skippy. While you have taken the "basic" steps required, you still need to be aware of some hacking methods that can be used to gain access to your network, despite your precautions. You also need to be very wary whenever you are accessing the network that is not your own, and let's not forget about other wireless technology; Bluetooth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking.

Table of contents
  1. Insights into Wireless
    53m 16s
  2. Encryption in Wireless
    23m 50s
  3. Threats from Wireless
    18m 23s
  4. The Methodology of Hacking Wireless
    45m 20s
  5. Hacking Bluetooth
    17m 23s
  6. Countermeasures
    18m 51s
16

Ethical Hacking: Hacking Mobile Platforms

by Dale Meredith

Feb 2, 2016 / 4h 41m

Beginner • 4h 41m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Okay, who here DOESN'T have a mobile device? Hands anyone? Didn't think so. Mobile devices have, at an alarming rate, become extremely popular with users and businesses. So next question, what are you doing about it's security? Anyone? Most folks have approached mobile devices with the attitude of "if it works, syncs, and plays games, I'm good". Overlooking this side of technology will lead you into one day appearing on an online video with the words "FAIL" plastered across your company's logo (or your face!). This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. Mobile Device Attack Vectors
    46m 36s
  2. Hacking Android
    1h 19m 18s
  3. Hacking iOS
    50m 14s
  4. Hacking Other Mobile Platforms
    19m 14s
  5. MDM: Mobile Device Management, Guidelines, and Tools
    33m 21s
  6. Mobile Malware
    37m 50s
  7. Mobile Payments
    15m 4s
17

Ethical Hacking: Evading IDS, Firewalls, and Honeypots

by Troy Hunt

May 3, 2016 / 3h

Beginner • 3h

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Most modern networks are protected by a combination of intrusion detection systems and firewalls. Increasingly, they may also include honeypots as a means of early detection of malicious activity. Attackers are constantly looking for ways of evading these defenses in order to render them ineffective. They're seeking to both gain access to resources which are intended to be beyond their reach, and do so in a stealthy manner so as to go undetected. In this course, we'll look at the advantages each of these security defenses provides and the roles they play in securing networks. We'll then look at how attackers seek to undermine their effectiveness by employing a range of techniques that help them evade detection. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking.

Table of contents
  1. Understanding Organizational Defenses
    25m 4s
  2. Firewalls
    53m 20s
  3. Intrusion Detection Systems
    57m 52s
  4. Honeypots
    44m 25s
18

Ethical Hacking: Cloud Computing

by Troy Hunt

Jul 7, 2016 / 2h 59m

Beginner • 2h 59m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. "The Cloud" is revolutionizing how we run software and services by providing low cost, flexible, and innovative alternatives to traditional hosting models. However, with the shift to cloud comes new security considerations. The cloud isn't more secure or less secure, rather it's differently secure; it strengthens security profiles in many areas whilst presenting new risks in others. Then again, many of the traditional risks in software don't change at all. In this course, we'll look at the ways the cloud can enable us to build more secure software than ever, whilst also identifying where it can leave us more vulnerable. We'll also look at "hardening" the cloud – how can we take this new computing paradigm and use it to strengthen our security profiles? This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Table of contents
  1. Cloud Computing Concepts
    39m 18s
  2. Organizational Security Considerations
    32m 47s
  3. Cloud Computing Risks
    40m 41s
  4. Cloud Computing Security Strengths
    34m 46s
  5. Hardening the Cloud
    31m 30s
19

Ethical Hacking: Cryptography

by Jason Helmick

May 3, 2016 / 52m

Beginner • 52m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you will learn to understand and apply fundamental concepts of cryptography, the learner will understand requirements for cryptography, understand and support secure protocols, and will gain an understanding of how to operate and implement cryptographic systems. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking. Please make sure to watch SSCP®: Cryptography.

Table of contents
  1. Learning Cryptography
    17m 1s
  2. Additional Cryptography Topics
    20m 18s
  3. Cryptography Tools for Advanced Study
    15m 26s
20

SSCP®: Cryptography

by Jason Helmick

Oct 29, 2015 / 2h 48m

Beginner • 2h 48m

Start Course
Description

In this course, you will learn to understand and apply fundamental concepts of cryptography, the learner will understand requirements for cryptography, and will understand and support secure protocols, the learner will operate and implement cryptographic systems.

Table of contents
  1. Introduction
    4m 41s
  2. Understand and Apply Fundamental Concepts of Cryptography
    1h 3m 33s
  3. Understand Requirements for Cryptography
    32m 42s
  4. Understand and Support Secured Protocols
    21m 19s
  5. Operate and Implement Cryptographic Systems
    45m 44s
21

Ethical Hacking: Penetration Testing

by Dale Meredith

Jul 18, 2016 / 4h 43m

Beginner • 4h 43m

Start Course
Description

Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client's, using the same tools, techniques, and steps that an attacker would. The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

Table of contents
  1. Understanding Penetration Testing
    1h 58s
  2. Pen Testing: Reconning and/or Footprinting the Target
    8m 28s
  3. Pen Testing: Scanning the Target
    8m 51s
  4. Pen Testing: Enumerating the Target
    14m 20s
  5. Pen Testing: Hacking the Target
    25m 15s
  6. Pen Testing: Sniffing the Target
    9m 16s
  7. Pen Testing: Social Engineering the Target
    16m 46s
  8. Pen Testing: DoS/DDoS the Target
    12m 25s
  9. Pen Testing: Session Hijacking the Target
    10m 4s
  10. Pen Testing: Targeting Web Servers
    13m 23s
  11. Pen Testing: Hitting Web Apps
    29m 53s
  12. Pen Testing: Looking at the Wi-Fi
    11m 11s
  13. Pen Testing: Focusing on the Mobile Devices
    19m 56s
  14. Pen Testing: Target the Firewall and/or IDS
    16m 44s
  15. Pen Testing: Going After the Cloud
    13m 43s
  16. How to Bring It All Together
    11m 52s

What you will learn

  • Five phases of hacking
  • How to identify and understand risks
  • How to defend against risks or attacks
  • How to extrapolate data
  • The difference between "hacking" and "ethical hacking"

Pre-requisites

This material is meant to be entry-level, but you should have a strong understanding in TCP/IP and operating systems, with at least one year of experience with networking technologies.