Setup Menus in Admin Panel

This is where we develop your technical skills. You will learn security tools such as SPLUNK, Nessus and Wireshark. We will also teach you the practical side of ethical hacking. I hope you’re as excited as I am about that.

In this Phase, you will learn how to install, configure and utilize three popular security tools: SPLUNK, Nessus and Wireshark. After that we will have some fun by performing several hacking techniques. During the ethical hack labs, you will practice Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Tracks.

Course Curriculum

Chapter 4.0_Introduction to Phase 2: Security Engineering and Ethical Hacking Details FREE 00:00:00
Chapter 4.1 Introduction to Virtual Machines Details 00:06:00
4.1 Questions Unlimited
Chapter 4.2 VMware Installation Details 00:03:00
4.2 Lab Unlimited
Chapter 4.3 Kali Linux Installation Details 00:06:00
4.3 Lab Unlimited
Chapter 4.4 Windows 10 Installation Details 00:07:00
4.4 Lab Unlimited
Chapter 4.5 Introduction to Splunk Details 00:06:00
4.5 Questions Unlimited
Chapter 4.6 Splunk Installation and Splunk App Details 00:07:00
4.6 Lab Unlimited
Chapter 4.7 Introduction to Subnetting Details 00:06:00
4.7 Questions Unlimited
Chapter 4.8 Maping Your Lab Network Details 00:06:00
Chapter 4.9 Install Splunk Forwarders Part 1 Details 00:06:00
4.9 Lab Unlimited
Chapter 4.10 Install SPLUNK Forwarders Part 2 Details 00:08:00
4.10 Lab Unlimited
Chapter 4.11 Install SPLUNK Forwarders Part 4 Details 00:05:00
4.11 Lab Unlimited
Chapter 4.12 Searching with SPLUNK Details 00:06:00
4.12 Lab Unlimited
Chapter 4.13 Splunk Report and Dashboard Details 00:06:00
4.13 Lab Unlimited
Chapter 5
Chapter 5.1 Introduction to the OSI Model Using Real World Examples Details 00:06:00
5.1 Questions Unlimited
Chapter 5.2 Data Packets, 3 Way Handshake and ARP Details 00:05:00
5.2 Questions Unlimited
Chapter 5.3 Introduction to WireShark Details 00:04:00
5.3 Questions Unlimited
Chapter 5.4 Install Wireshark and start data capture Details 00:00:00
5.4 LAB 00:00:00
Chapter 5.5 Wireshark Filters and Windows Details 00:06:00
5.5 Lab Unlimited
Chapter 5.6 TCP Close Connection, TCP Flags & Intrusion Detection Details 00:05:00
5.6 Questions Unlimited
Chapter 5.7 Isolating Wireshark Traffic and Saving Files Details 00:06:00
5.7 Lab Unlimited
Chapter 5.8 Wireshark Flags SSL traffic Details 00:06:00
5.8 Lab Unlimited
Chapter 5.9 Detecting Attacks with Wireshark Intro to Nmap Details 00:05:00
5.9 Questions Unlimited
Chapter 5.10 Identifying a Host Discovery Scan on Wireshark Details 00:06:00
5.10 Lab Unlimited
CHAPTER 5.11 IDENTIFYING AN PORT SCAN ON WIRESHARK Details 00:06:00
5.11 Lab Unlimited
CHAPTER 5.12 IDENTIFYING AN PORT SCAN ON WIRESHARK PART 2 Details 00:06:00
5.12 Lab Unlimited
CHAPTER 5.13 IDENTIFYING A SERVICE SCAN ON WIRESHARK. Details 00:05:00
5.13 lab Unlimited
Chapter 5.14 Identifying an Aggressive Scan on Wireshark Details 00:06:00
5.14 Lab Unlimited
Chapter 6
Chapter 6.1 Introduction to Nessus Details 00:05:00
6.1 Questions Unlimited
Chapter 6.2 Host Discovery Scan with Nessus Details 00:07:00
6.2 Lab Unlimited
Chapter 6.3 Host Discovery Scan with Nessus Part 2 Details 00:03:00
6.3 Lab Unlimited
CHAPTER 6.4 BASIC NETWORK SCAN WITH NESSUS Details 00:06:00
6.4 Lab Unlimited
CHAPTER 6.5 Credential Network Scan with Nessus. Details 00:06:00
6.5 Lab Unlimited
CHAPTER 6.6 VULNERABILITY REPORT AND MANAGEMENT Details 00:06:00
6.6 Lab Unlimited
Chapter 6.7 WIN 2016 SERVER VM INSTALLATION. Details 00:06:00
6.7 Lab Unlimited
CHAPTER 6.8 AD INSTALLATION AND TROUBLESHOOTING A SLOW COMPUTER. Details 00:05:00
6.8 Lab Unlimited
CHAPTER 6.9 CREATING AD ACCOUNTS AND MACHINES Details 00:06:00
6.9 Lab Unlimited
Chapter 7
Chapter 7.1 Introduction to Ethical Hacking Details 00:05:00
7.1 Questions Unlimited
Chapter 7.2 Active Passive Recon and Scanning Details 00:05:00
7.2 Questions Unlimited
Chapter 7.3 Introduction to Netcraft Archive PIPL and HTTRACK Details 00:06:00
7.3 Lab Unlimited
Chapter 7.4 Introduction to Maltego Details 00:06:00
7.4 Lab Unlimited
Chapter 7.5 Introduction to NAT Details 00:06:00
7.5 Questions Unlimited
Chapter 7.6 Metagoofil and Email Tracker Details 00:06:00
7.6 Lab Unlimited
chapter 7.7 Nmap Basic Scan (Review) Details 00:05:00
7.7 Lab Unlimited
Chapter 7.8 Nmap Scripting Engine Details 00:05:00
7.8 Lab Unlimited
Chapter 7.9 Fun Hack x264 Details 00:04:00
7.9 Questions Unlimited
Chapter 7.10 How to Create a Computer Virus Details 00:06:00
7.10 Lab Unlimited
Chapter 8
Chapter 8.1 Intro to Metasploit, veil and Shellter Details 00:05:00
8.1 Questions Unlimited
Chapter 8.2 Backdoor Preparation OS Update and Veil Install Details 00:05:00
Chapter 8.3 Reverse TCP Exploit (backdoor) Using Veil and Mestasploit Details 00:06:00
8.3 Lab Unlimited
Chapter 8.4 Reverse TCP (Backdoor) exploit with AV off Details 00:04:00
8.4 Lab Unlimited
Chapter 8.5 Backdoor exploit with AV turned on Details 00:06:00
8.5 Lab Unlimited
Chapter 8.6 Meterpreter command examples after gaining access Details 00:06:00
8.6 Lab Unlimited
Chapter 8.7 Introduction to wireless technology Details 00:05:00
8.7 Questions Unlimited
Chapter 8.8 Hacking a Hidden SSID Details 00:06:00
8.8 Lab Unlimited
Chapter 9
Chapter 9.1 Intro to Persistence Connection and DHCP Details 00:05:00
9.1 Questions Unlimited
Chapter 9.2 Persistence Connection part 1 Details 00:04:00
9.2 Lab Unlimited
Chapter 9.3 Hacking Pep Talk and explanations Details 00:06:00
9.3 Lab Unlimited
Chapter 9.4 Persistence Connection using MOF Details 00:06:00
9.4 Lab Unlimited
Chapter 9.5 Intro to Cracking Wireless Security Protocols (WEP, WPA, WPA2) Details 00:05:00
9.5 Questions Unlimited
Chapter 9.6 Cracking Wireless (WPA2) Passwords Details 00:04:00
9.6 Lab Unlimited
Chapter 10
Chapter 10.1 Introduction to Covering Tracks Details 00:06:00
10.1 Questions Unlimited
Chapter 10.2 Clearing event logs Details 00:06:00
10.2 Lab Unlimited
Chapter 10.3 Combining your payload with Jpeg Details 00:05:00
10.3 Lab Unlimited
Chapter 10.4 Combining your payload with Excel Details 00:06:00
10.4 Lab Unlimited
Chapter 10.5 Phishing Wifi Password with Wifiphisher Details 00:06:00
10.5 Lab Unlimited
Chapter 10.6 Phishing Wifi Password with Wifiphisher Part 2 Details 00:06:00

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE
  • Full Subscription
  • UNLIMITED ACCESS
  • Course Certificate
14 STUDENTS ENROLLED

Advanced Course Search Widget

Recent Posts

Term : Taxonomy Mismatch: Selected Term does not exist in Taxonomy ! ..more..

X