Course curriculum

  1. 1
    • CEH Review Guide

    • Computer Security Dictionary

    • 312-50v11 Exam Q&A

    • Download Quesitons And Answers Emulators

    • Installing And Running Kali On Your Windows 10 Computer

    • Download Kali Linux For Windows 10

    • Installing Kali Linux 2.0 as ISO image

    • Installing Kali Linux 2.0 as a Virtual Machine (VMware) Part 2

  2. 2
    • Introduction To Current Cyber Threats

    • Pre-History

    • Taking A Look Back In History

    • Cyber Crime Evolution

    • Popular Myths About IT Security

    • Myths #2 - Never Been Hacked

    • Myths 2 - You Don't Need Any Protection Software Or Hardware

    • Myths #3 - IT Security Is Always A Priority

    • Trends In IT Security

    • The Birth Of Technology Society

    • EXERCISE - How Much Info Can You Gather

    • Fake Identity

    • Online Privacy

    • Analyzing Sniffing Software

    • Cyber War

    • Objective #1 - Data Security - Introduction

    • Confidentiality Of Data

    • EXERCISE - Finding Confidential Data With Search Engines

    • Integrity Of Data

  3. 3
    • Introduction - Network Security

    • OSI Model #1 - Physical Layer

    • OSI Model #2 - Data Link Layer

    • Threats MAC Spoofing

    • Threats ARP Poisoning

    • EXERCISE - Data Link Layer Attack

    • OSI Model #3 - Network Layer

    • TCP Tunnelling Over ICMP

    • Threats Enumerating Remote Computers

    • EXERCISE - Transport Laywer Attack Using METASPLOIT

    • EXERCISE - Transport Layer Attack Using METASPLOIT PART 2

    • OSI Model 5 - Session Layer

    • OSI Model 6 - Presentation Layer

    • OSI Model 7 - Application Layer

    • Exercise Application Layer Attacks

    • Backtrack Attack Demonstration

    • Man-In-The-Middle And Denial Of Service Attacks

    • Modifying Transmitted Packets

    • Unencrypted Protocols

  4. 4
    • Designing Computer Networks - Introduction

    • Subnetting IPv4

    • Subnetting IPv6

    • IPv6 Address Notation

    • DMZ Demilitarized Zone

    • Protocols And Services IP SEC

    • Network Address Translation

    • Network Access Control RADIUS

  5. 5
    • Introduction To Monitoring Transmitted Data

    • Monitoring Transmitted Data - Basic Informations

    • Intrusion Detection Systems

    • Why Are Firewalls And NIDS Not Enough

    • Wireshark - Introduction To Network Analysis

    • How To Use Wireshark

    • Analyzing Captured Data

    • How To Analyze Telnet Protocol

    • Intrusion Detection

    • Scanning Computers

  6. 6
    • Wireless Networks

    • WIFI Security Solutions - Introduction

    • WIFI - Working Principles

    • Other Wireless Technologies

    • Threats And Risks

    • Ineffective Solutions

    • Authentication Methods

    • 802.11 WEP

    • 802.11i WEP

    • Threats Of WIFI Networks

    • Client Attacks Launching A Rogue Access Point

    • Client Attacks Evil Twin

    • Client attacks Denial Of Service

    • Exercise WPA Attack

  7. 7
    • Operating Systems Security - Introduction

    • Security Boundaries

    • Three Core

    • Exercise OS Boundaries

    • Process Isolation

    • Kernel Mode Code Signing

    • Java Virtual Machine And Code Access Security

    • Malware

    • Exercise - Vulnerability

    • Exercise Identifying Suspicious Process

    • Demonstration Process Explorer

    • Exercise - Detecting Rootkits

    • Exercise Security Evaluation

  8. 8
    • Authentication And Authorization - Introduction

    • Authentication Users

    • How Secure Is Your Password

    • Authentication Protocols And Services

    • LM Hash

    • Cached Credentials

    • KERBEROS

    • Identity Theft

    • Exercise Offline Attacks

    • Using Online Cracking Services

  9. 9
    • Windows Security - What You'll Learn

    • User Account Control

    • UAC Configuration

    • Additional Security Features - ASLR And DEP

    • PatchGuard

    • Encryption - Key Protection

    • Drive Encryption

    • BitLocker

    • BitLocker To Go Reader

    • File And Folder Encryption - EFS

    • Exercise EFS