This is where we develop your technical skills. You will learn security tools such as SPLUNK, Nessus and Wireshark. We will also teach you the practical side of ethical hacking. I hope you’re as excited as I am about that.

TAKE THIS COURSE

NOTE This Introductory course starts at Chapter 4 (Chapters 1-3 teaches FISMA Compliance and is NOT a pre-requisite for this course).

In this course, you will develop a home lab and learn how to use the popular security tools such as SPLUNK, Nessus and Wireshark. These are the most popular tools in use by major companies today.

After learning how to use popular security tools, we will learn how to hack with Metasploit Framework.

You will learn to hack wired and wireless networks. If you can think like an hacker, you will be better suited to defend against them. Not to mention is will be impressive to discuss your hacking skills during your job interview 😉

Course Curriculum

Chapter 4.0_Introduction to Phase 2: Security Engineering and Ethical Hacking Details FREE 00:00:00
Chapter 4.1 Introduction to Virtual Machines Details 00:06:00
4.1 Questions Unlimited
Chapter 4.2 VMware Installation Details 00:03:00
4.2 Lab Unlimited
Chapter 4.3 Kali Linux Installation Details 00:06:00
4.3 Lab Unlimited
Chapter 4.4 Windows 10 Installation Details 00:07:00
4.4 Lab Unlimited
Chapter 4.5 Introduction to Splunk Details 00:06:00
4.5 Questions Unlimited
Chapter 4.6 Splunk Installation and Splunk App Details 00:07:00
4.6 Lab Unlimited
Chapter 4.7 Introduction to Subnetting Details 00:06:00
4.7 Questions Unlimited
Chapter 4.8 Maping Your Lab Network Details 00:06:00
Chapter 4.9 Install Splunk Forwarders Part 1 Details 00:06:00
4.9 Lab Unlimited
Chapter 4.10 Install SPLUNK Forwarders Part 2 Details 00:08:00
4.10 Lab Unlimited
Chapter 4.11 Install SPLUNK Forwarders Part 4 Details 00:05:00
4.11 Lab Unlimited
Chapter 4.12 Searching with SPLUNK Details 00:06:00
4.12 Lab Unlimited
Chapter 4.13 Splunk Report and Dashboard Details 00:06:00
4.13 Lab Unlimited
Chapter 5
Chapter 5.1 Introduction to the OSI Model Using Real World Examples Details 00:06:00
5.1 Questions Unlimited
Chapter 5.2 Data Packets, 3 Way Handshake and ARP Details 00:05:00
5.2 Questions Unlimited
Chapter 5.3 Introduction to WireShark Details 00:04:00
5.3 Questions Unlimited
Chapter 5.4 Install Wireshark and start data capture Details 00:00:00
5.4 LAB 00:00:00
Chapter 5.5 Wireshark Filters and Windows Details 00:06:00
5.5 Lab Unlimited
Chapter 5.6 TCP Close Connection, TCP Flags & Intrusion Detection Details 00:05:00
5.6 Questions Unlimited
Chapter 5.7 Isolating Wireshark Traffic and Saving Files Details 00:06:00
5.7 Lab Unlimited
Chapter 5.8 Wireshark Flags SSL traffic Details 00:06:00
5.8 Lab Unlimited
Chapter 5.9 Detecting Attacks with Wireshark Intro to Nmap Details 00:05:00
5.9 Questions Unlimited
Chapter 5.10 Identifying a Host Discovery Scan on Wireshark Details 00:06:00
5.10 Lab Unlimited
CHAPTER 5.11 IDENTIFYING AN PORT SCAN ON WIRESHARK Details 00:06:00
5.11 Lab Unlimited
CHAPTER 5.12 IDENTIFYING AN PORT SCAN ON WIRESHARK PART 2 Details 00:06:00
5.12 Lab Unlimited
CHAPTER 5.13 IDENTIFYING A SERVICE SCAN ON WIRESHARK. Details 00:05:00
5.13 lab Unlimited
Chapter 5.14 Identifying an Aggressive Scan on Wireshark Details 00:06:00
5.14 Lab Unlimited
Chapter 6
Chapter 6.1 Introduction to Nessus Details 00:05:00
6.1 Questions Unlimited
Chapter 6.2 Host Discovery Scan with Nessus Details 00:07:00
6.2 Lab Unlimited
Chapter 6.3 Host Discovery Scan with Nessus Part 2 Details 00:03:00
6.3 Lab Unlimited
CHAPTER 6.4 BASIC NETWORK SCAN WITH NESSUS Details 00:06:00
6.4 Lab Unlimited
CHAPTER 6.5 Credential Network Scan with Nessus. Details 00:06:00
6.5 Lab Unlimited
CHAPTER 6.6 VULNERABILITY REPORT AND MANAGEMENT Details 00:06:00
6.6 Lab Unlimited
Chapter 6.7 WIN 2016 SERVER VM INSTALLATION. Details 00:06:00
6.7 Lab Unlimited
CHAPTER 6.8 AD INSTALLATION AND TROUBLESHOOTING A SLOW COMPUTER. Details 00:05:00
6.8 Lab Unlimited
CHAPTER 6.9 CREATING AD ACCOUNTS AND MACHINES Details 00:06:00
6.9 Lab Unlimited
Chapter 7
Chapter 7.1 Introduction to Ethical Hacking Details 00:05:00
7.1 Questions Unlimited
Chapter 7.2 Active Passive Recon and Scanning Details 00:05:00
7.2 Questions Unlimited
Chapter 7.3 Introduction to Netcraft Archive PIPL and HTTRACK Details 00:06:00
7.3 Lab Unlimited
Chapter 7.4 Introduction to Maltego Details 00:06:00
7.4 Lab Unlimited
Chapter 7.5 Introduction to NAT Details 00:06:00
7.5 Questions Unlimited
Chapter 7.6 Metagoofil and Email Tracker Details 00:06:00
7.6 Lab Unlimited
chapter 7.7 Nmap Basic Scan (Review) Details 00:05:00
7.7 Lab Unlimited
Chapter 7.8 Nmap Scripting Engine Details 00:05:00
7.8 Lab Unlimited
Chapter 7.9 Fun Hack x264 Details 00:04:00
7.9 Questions Unlimited
Chapter 7.10 How to Create a Computer Virus Details 00:06:00
7.10 Lab Unlimited
Chapter 8
Chapter 8.1 Intro to Metasploit, veil and Shellter Details 00:05:00
8.1 Questions Unlimited
Chapter 8.2 Backdoor Preparation OS Update and Veil Install Details 00:05:00
Chapter 8.3 Reverse TCP Exploit (backdoor) Using Veil and Mestasploit Details 00:06:00
8.3 Lab Unlimited
Chapter 8.4 Reverse TCP (Backdoor) exploit with AV off Details 00:04:00
8.4 Lab Unlimited
Chapter 8.5 Backdoor exploit with AV turned on Details 00:06:00
8.5 Lab Unlimited
Chapter 8.6 Meterpreter command examples after gaining access Details 00:06:00
8.6 Lab Unlimited
Chapter 8.7 Introduction to wireless technology Details 00:05:00
8.7 Questions Unlimited
Chapter 8.8 Hacking a Hidden SSID Details 00:06:00
8.8 Lab Unlimited
Chapter 9
Chapter 9.1 Intro to Persistence Connection and DHCP Details 00:05:00
9.1 Questions Unlimited
Chapter 9.2 Persistence Connection part 1 Details 00:04:00
9.2 Lab Unlimited
Chapter 9.3 Hacking Pep Talk and explanations Details 00:06:00
9.3 Lab Unlimited
Chapter 9.4 Persistence Connection using MOF Details 00:06:00
9.4 Lab Unlimited
Chapter 9.5 Intro to Cracking Wireless Security Protocols (WEP, WPA, WPA2) Details 00:05:00
9.5 Questions Unlimited
Chapter 9.6 Cracking Wireless (WPA2) Passwords Details 00:04:00
9.6 Lab Unlimited
Chapter 10
Chapter 10.1 Introduction to Covering Tracks Details 00:06:00
10.1 Questions Unlimited
Chapter 10.2 Clearing event logs Details 00:06:00
10.2 Lab Unlimited
Chapter 10.3 Combining your payload with Jpeg Details 00:05:00
10.3 Lab Unlimited
Chapter 10.4 Combining your payload with Excel Details 00:06:00
10.4 Lab Unlimited
Chapter 10.5 Phishing Wifi Password with Wifiphisher Details 00:06:00
10.5 Lab Unlimited
Chapter 10.6 Phishing Wifi Password with Wifiphisher Part 2 Details 00:06:00

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

About Us

A comprehensive online course unlike any out there in the industry. We teach you information security from the ground up. Our training program takes you from learning theories and concept to real world scenarios that you can visualize and apply. In addition to the on-demand learning, you also have the option to receive one on one mentorship online. Our mentors will help you gain experience by engaging with real-world projects.

X