O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Ethical Hacking Pro Bundle

Video Description

Ethical hacking/cyber security is among the most in demand and high paying jobs in the world of IT. But... in order to get into this field you'll need to pass some certification exams - specifically these: EC-Council Certified Ethical Hacker v. 9 CompTIA Security+. Both of these certifications are included in this bundle. We've also included other topics that cyber security professionals need to know, such as Digital Forensics, Wireless Hacking and Incident Response. If you want to get into the field of cyber security, this is THE bundle that will prepare you to pass the certification exams that will lead to real life job interviews. Don't wait any longer. Enroll today.

Table of Contents

  1. CompTIA Security+ Certification_Network Security Domain
    1. Networking 101 00:14:07
    2. LAN Security 00:12:32
    3. Firewalls 00:02:54
    4. IDS - Video 00:08:42
    5. Transport Layer Security 00:03:38
    6. IPSec 00:07:04
    7. NAC 00:08:01
    8. Advanced IDS 00:05:44
    9. Advanced Perimeter Security 00:11:42
  2. CompTIA Security+ Certification_Compliance and Operational Security Domain
    1. Principles of Security 00:07:41
    2. Risk Management 00:17:02
    3. Physical Security 00:07:29
    4. Environmental Security 00:04:20
    5. Data Classification 00:13:43
    6. Operational Security 00:07:18
    7. Incident Response 00:08:40
    8. Change Management 00:04:01
    9. Disaster Recovery 00:09:06
    10. Malware 101 00:13:50
    11. Forensics 00:14:00
    12. Cyberattacks 00:17:16
    13. DNS Security 00:04:09
    14. Social Engineering 00:08:50
    15. Wireless Attacks 00:07:39
    16. Advanced Wireless Security 00:14:09
    17. Cross Site Scripting – XSS Attacks 00:08:32
    18. Buffer Overflows 00:23:18
    19. Security Testing Tools 00:09:24
    20. Security Information and Event Management 00:11:52
    21. Platform Hardening and Baselining 00:07:44
    22. Honeypots 00:05:59
    23. SW Vulnerability Assessment and Pen Testing 00:08:48
  3. CompTIA Security+ Certification_Applications, Data and Host Security Domain
    1. Application Design Flaws and Bugs 00:03:53
    2. Mobile Security and Device Management 00:09:23
    3. Key Management 00:16:55
    4. Virtualization and Cloud Security 00:28:40
    5. Securing Storage and Storage Platforms 00:18:42
    6. Information Lifecycle Management 00:05:17
    7. Hacking IoT 00:08:51
    8. Securing the Power Grid 00:03:56
  4. CompTIA Security+ Certification_Access Control and Identity Management Domain
    1. Access Controls 00:10:05
    2. Kerberos 00:12:51
    3. Single Sign On 00:13:40
    4. Identity Federation 00:06:53
    5. Id Governance 00:13:25
  5. CompTIA Security+ Certification_Cryptography Domain
    1. Encryption 00:07:14
    2. Advanced Cryptography 00:13:41
    3. Message Authentication Codes 00:05:40
    4. Crypto Algorithms 00:08:03
    5. A Note On Salting 00:07:00
    6. Public Key Infrastructure 00:09:36
    7. PKI Management 00:20:17
  6. Database Security for Cyber Professionals
    1. Database Core Security Part 1 00:05:00
    2. Database Core Security Part 2 00:05:03
    3. Database Core Security Part 3 00:05:03
    4. Database Core Security Part 4 00:07:51
    5. Platform Hardening 00:07:44
    6. MySQL Security Lab Build 00:08:02
    7. MySQL Architecture and Exploits 00:16:32
    8. Locking Down MySQL 00:35:08
    9. Oracle Exploitation and Security Best Practices 00:43:09
    10. PostgreSQL Architecture, Exploits and Hardening 00:19:30
    11. Storage Encryption 00:18:42
    12. Key Management 00:16:55
    13. Big Data 00:17:33
  7. Digital Forensics for Cyber Professionals_The Digital Forensics Field
    1. The Digital Forensics Field_Course Introduction 00:03:38
    2. Forensics HD and Branded with Title 00:14:00
  8. Digital Forensics for Cyber Professionals_Recovery and Reconstruction
    1. Recovering Deleted Files 00:17:02
    2. Windows RegistryE-Mail Reconstruction 00:08:29
    3. Deconstructing Files of Unknown Origin 00:05:21
  9. Digital Forensics for Cyber Professionals_Reversing and Malware Analysis
    1. Reverse Engineering Windows Executables 00:05:32
    2. Windows Live Response 00:13:12
    3. Linux Live Response 00:10:59
    4. Sandboxing and Malware Analysis 00:04:34
  10. Digital Forensics for Cyber Professionals_Forensics Tools and Storage
    1. CAINE 00:05:19
    2. USB Forensic Analysis 00:09:49
    3. Storage Encryption 00:18:42
    4. Windows Encrypting File System 00:07:37
  11. Ethical Hacking: Cryptography for Hackers
    1. Introduction 00:07:14
    2. Advanced Crypto 00:13:41
    3. Message Authentication Codes and Hashes 00:05:40
    4. Transport Layer Security 00:03:38
    5. Virtual Private Networking 00:45:01
    6. Windows Encryption 00:07:37
    7. Apache SSL 00:05:00
    8. Web Encoding 00:02:55
    9. Key Management 00:16:55
    10. Storage Encryption 00:18:42
  12. Ethical Hacking: Cyber Anonymity
    1. TOR 00:02:46
    2. Tortilla 00:02:08
    3. Private VPN’s 00:45:01
    4. Proxy Chains 00:02:12
    5. ARP Poisoning 00:02:38
    6. ICMP Tunneling 00:02:27
    7. Fragrouting 00:04:04
    8. E-Mail Privacy 00:10:28
    9. TAILS 00:04:23
    10. Data Privacy 00:25:05
    11. Storage Encryption 00:18:42
    12. Windows Encrypting File System 00:07:37
  13. Ethical Hacking: Hacking Applications
    1. Application Architecture and Security 00:07:56
    2. Hamster and Ferret 00:05:57
    3. Morpheus 00:04:22
    4. Heap Spraying Demonstration 00:04:30
    5. OWASP Zed Attack Proxy 00:12:13
    6. Persistent XSS Demo 00:01:53
    7. Buffer Overflow Demonstration 00:04:37
    8. Buffer Overflows Explained 00:23:18
    9. Hacking AJAX 00:09:26
  14. Ethical Hacking: Hacking Databases
    1. Database Security 00:20:11
    2. First Order SQL Injection 00:01:30
    3. Bodgeit Store – ZAP Data Collection for SQLMap 00:02:24
    4. Shodan 00:02:41
    5. MySQL Lab Buildout 00:07:23
    6. MySQL Security Architecture and Exploits 00:16:32
    7. MySQL Lockdown 00:35:08
    8. Operating System Hardening 00:07:44
    9. Big Data Security 00:17:33
  15. Ethical Hacking: Honeypots, IDS and FW's
    1. Intrusion Detection Systems 00:08:42
    2. Snort 00:26:04
    3. Advanced IDS 00:05:44
    4. Honeypots 00:05:59
    5. Honeydrive Installation 00:01:10
    6. Kippo SSH Honeypot 00:06:51
    7. Firewalls 00:02:54
    8. Advanced Perimeter Security 00:11:42
    9. LAN Security 00:12:32
    10. Threat Management 00:07:52
    11. DNSSec 00:04:09
  16. Ethical Hacking: Malware Development
    1. Malware 101 00:13:50
    2. Internet Worm Maker 00:03:19
    3. JPS Virus Maker 00:03:36
    4. Ghost Eye 00:02:44
    5. Custom Trojan 00:02:57
    6. Static Malware Analysis 00:13:16
    7. Sandboxing and Malware Analysis 00:04:34
    8. MSFVenom and Malware Payload Generation 00:03:21
  17. Ethical Hacking: Recon and Footprinting
    1. Website and E-Mail Footprinting 00:04:11
    2. Port Inspection with Netstat 00:03:04
    3. Nmap and Metasploit 00:02:32
    4. Maltego 00:05:25
    5. Who is and Nslookup 00:03:06
    6. Shodan and IoT Enumeration 00:03:23
    7. NTP Enumeration 00:01:17
    8. Probing SNMP 00:02:25
    9. Inspecting SMTP 00:00:35
    10. SMB Discovery 00:02:05
    11. Commonly used network ports and protocols 00:14:07
  18. Ethical Hacking: Social Engineering
    1. Introduction 00:08:50
    2. Paypal Phishing 00:02:26
    3. Browser Exploitation Framework (BeeF) 00:03:15
    4. Rubber Ducky 00:03:34
    5. Cyber Attacks 00:17:16
    6. HR and Personnel Security 00:10:12
  19. Ethical Hacking: Wireless Hacking
    1. Introduction 00:07:39
    2. Wireless Hacking with Aircrack and Reaver 00:07:47
    3. Man-in-the-Middle Attacks with Wi-Fi Pineapple 00:08:46
    4. Advanced Wireless Security 00:14:09
    5. Bluetooth Low Energy Hacks 00:10:43
    6. Ubertooth 00:15:00
    7. Software Defined Radio 00:05:36
    8. Kismac 00:02:08
    9. Pwning over Wireless with Metasploit 00:10:57
  20. Incident Response for Cyber Professionals
    1. Incident Response 00:08:40
    2. Cyber Attacks 00:17:16
    3. Virtualization and Cloud Security 00:28:40
    4. Malware 00:13:50
    5. Operational Security 00:07:18
    6. Disaster Recovery 00:09:06
    7. Platform Hardening and Baselining 00:07:44
    8. Advanced Perimeter Security 00:11:42
    9. Static Malware Analysis 00:13:16
    10. IDS 00:08:42
    11. Advanced IDS 00:05:44
    12. Snort and Bro 00:26:04
    13. Honeypots and Honeynets 00:05:59
    14. Firewalls 00:02:54
    15. Apache Security logging 00:04:42
    16. SIM 00:11:52
  21. Intro to EC-Council Certified Ethical Hacker - CEHv9
    1. Ethical Hacking - Vulnerability Assessment 00:09:26
    2. Footprinting with Maltego 00:05:25
    3. Cyber Attacks 00:17:54
    4. Wireless Hacking 00:08:29
    5. Incident Response 00:03:06
    6. Network Sniffing Tools - Wireshark 00:06:12
  22. Wireless Hacking for Cyber Professionals
    1. Advanced Wireless Security 00:14:09
    2. Wireless Security Course Vat 00:07:47
    3. Wifi Pineapple - Unbranded 00:08:46
    4. Bluetooth Hacking with Ubertooth 00:15:00
    5. Bluetooth-Low-Energy-Unbranded 00:10:43
    6. Bluetooth Scanning 00:07:04
    7. Software Defined Radio 00:05:36
    8. Hacking Over Wireless with Metasploit 00:10:57