In this Ethical Hacking - White Hat Hacking and Penetration testing training course, expert Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks. Some of the topics covered in this …
White Hat Hacking and Penetration Testing
Video description
In this Ethical Hacking - White Hat Hacking and Penetration testing training course, expert Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks. Some of the topics covered in this course are; researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography. You will learn about scanning networks, penetration testing and the use of Metasploit, malware and viruses, DoS and DDoS attacks, web application hacking and securing wireless networks. Finally, you will learn about detection evasion and preventing programming attacks, and much more throughout this video based tutorial. By the time you have completed this video tutorial for White Hat Hacking and Penetration testing, you will have a deeper understanding of the areas you may be potentially be vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers.
Types Of Hacking (Ethical, Black Hat, Gray Hat, Hacktivism, Etc)
00:06:05
Being Ethical
00:03:24
Legal Issues Around Hacking
00:06:30
Methodology
00:06:56
Types Of Attacks
00:08:19
Skills Necessary And Skills To Be Learned
00:06:03
What Is Penetration Testing/Scope?
00:08:38
Getting The Background - Footprinting And Reconnaissance
What Is Footprinting?
00:04:16
History Lessons - Way Back Machine
00:05:38
Using Your Resources - Job Listings, People Searches, Social Networks
00:04:42
Using Whois Lookups
00:06:35
Using DNS To Extract Information
00:07:07
Finding Network Ranges
00:05:15
Google Hacking
00:03:41
Mining For Information Using Google Hacking
00:05:06
Google Hacking Database
00:04:44
Networking Fundamentals
History Of TCP/IP
00:07:06
Using Wireshark To Examine Packets
00:05:40
OSI And IP Models
00:08:46
Addressing
00:03:43
UDP
00:05:15
TCP
00:08:06
Services
00:05:47
Using Wireshark For Deep Analysis
00:08:44
DHCP
00:09:24
Using ARP
00:09:34
Cryptography
History Of Cryptography
00:07:26
Types Of Cryptography
00:07:02
Public Key
00:04:35
Certificates
00:08:18
Hashing
00:05:35
AES, DES, 3DES
00:05:54
SSL/TLS
00:07:47
SSH
00:06:56
Disk Encryption
00:04:19
Cryptographic Analysis
00:03:44
Scanning And Enumeration
Types Of Scans
00:07:45
Using NMAP
00:03:49
Other Types Of Scans
00:07:04
Using hping And Its Uses
00:06:28
War Dialing
00:03:55
IDS Evasion
00:06:54
Banner Grabbing
00:08:42
Vulnerability Scanning
00:05:51
Using Nessus
00:08:56
Enumeration Techniques
00:06:47
SNMP
00:09:07
LDAP
00:08:40
Using Proxies
00:05:43
Tor And Anonymizers
00:05:20
Tunneling
00:06:40
Penetration
Goals
00:07:49
Password Cracking And Complexity
00:07:12
Password Attacks - Chapter 6
00:05:43
Password Storage Techniques
00:04:34
Privilege Escalation
00:06:13
Spyware, Rootkits And Key Loggers
00:07:52
Metasploit Basics
00:04:55
Auditing/Logging
00:08:04
Metasploit Again
00:04:24
Malware - Trojans, Backdoors, Viruses And Worms
Definitions And History
00:05:04
Detection Of Malware
00:06:19
Anti-Virus Evasion
00:04:32
Deployment Of Malware
00:04:59
Virus Types
00:06:05
Malware Analysis
00:06:01
Windows ADS And Hiding Malware
00:05:42
Doing Debugging - OllyDbg
00:09:00
Packing And Automated A/V Maker Tools
00:03:37
More Malware Analysis
00:06:07
Denial Of Service Attacks
What Is DoS? DDoS?
00:04:52
DoS Attacks
00:06:05
Cyber Crime
00:06:48
Botnets
00:06:59
Attack Countermeasures - Flooding
00:08:57
Web Application Hacking
What Is Web Application Testing?
00:04:56
Web Application Architecture
00:05:13
Web Testing Tools
00:05:26
Cross Site Scripting
00:04:13
SQL Injection
00:05:02
Cross Site Request Forgery
00:04:53
Session Hijacking And Attacks And Cookies
00:06:56
Password Attacks - Chapter 9
00:05:26
Encoding
00:03:48
Wireless Networking
Wireless Networking
00:04:57
Encryption Techniques - WEP, WPA, WPA2
00:06:43
Finding Hotspots
00:07:23
Breaking WEP Encryption
00:06:41
Rogue Access Points And Attacks
00:04:52
Wireless Sniffing
00:04:44
Protecting Wireless Networks
00:06:43
Detection Evasion
What Is Evasion And Why Do We Use It?
00:03:59
Steganography
00:05:08
Programming Attacks
Stacks And Heaps
00:05:18
Buffer Overflows
00:07:48
Protecting Against Buffer Overflow Attacks
00:08:09
Format String
00:04:57
De-Compilation
00:04:22
Reverse Engineering
00:05:09
About The Author
About Me
00:02:13
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept