IT Security Beginner 2.0: Certified Hacking Training

Get Certified Hacking Training now and gain voucher to Online Examination Center for free. New 2.0 version available!

IT Security Beginner 2.0: Certified Hacking Training

Price$99.00

SchoolUdemy
ScheduleOn Demand
LocationOnline
Duration17.5 hours
Credits0
Enroll
Rating
Reviews10
Popularity13314 Registered
In CertificateNo
Difficultyall level
EffortN/A
Course DetailsCourse FAQ

IT Security Beginner 2.0: Certified Hacking Training

Categories:
Software & IT

Network and IT security is no joke. In a matter of seconds, hackers can access closed networks and view files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.

While this course includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these tactics to infiltrate networks or IT systems that are not your own.

Become a Certified Hacker by Covering the Following Topics:

  • Security and Hacking Myths Debunked
  • Beginner to Advanced IT Security
  • Microsoft Windows Threats and WiFi Weaknesses
  • Current Black-Hat Threats and Trends
  • Designing More Secure Networks
  • Encrypted Data, Identify Spoofing, and Windows Authorization
  • IT Security Academy Exam Preparation

Boost Network Security and Identify Weaknesses

Certified hackers identify network security threats to prevent criminal hacking attempts. The best way to do this, is to understand how criminal hackers will evaluate and test your network for vulnerabilities.

Contents and Overview

This course is designed for anyone seeking a career in IT security, as well as programmers and technology enthusiasts who want to develop hacking and hacking prevention skills. A basic understanding of IT and infrastructure is recommended but not required.


With 45 lectures and over 13 hours of content, you will start with the basics of IT security and progress to the advanced curriculum in a matter of days. Upon completion, you will receive a voucher to earn your “IT Security Beginner Certificate” for free from The IT Security Academy Online Examination Center.

Course Details

IT Security Trends
online
chapter
On Demand
Introduction to Current Cyber Threats
online
lecture
On Demand
IT Prehistory
online
lecture
On Demand
Let’s look a few years back
online
lecture
On Demand
Cyber crimes - an evolution not revolution
online
lecture
On Demand
Current Cyber Threats - notes for the examination
online
lecture
On Demand
Popular myths about IT security - origins
online
lecture
On Demand
Myths #1 - you’ll never be hacked
online
lecture
On Demand
Myths #2 - you don’t need any protection software oraz hardware
online
lecture
On Demand
Myths #3 - IT security is always a priority
online
lecture
On Demand
Popular Myths About Computer System Security - notes for the examination
online
lecture
On Demand
Trends in IT Security
online
lecture
On Demand
The birth of technology society
online
lecture
On Demand
EXERCISE: How much info can you gathered?
online
lecture
On Demand
Fake identity
online
lecture
On Demand
Online privacy
online
lecture
On Demand
Analyzing sniffing software
online
lecture
On Demand
Cyber War
online
lecture
On Demand
Changing IT Security Trends - notes for the examination
online
lecture
On Demand
Objective #1 - Data security - Introduction
online
lecture
On Demand
Confidentiality of data
online
lecture
On Demand
EXERCISE: Finding confidental data with search engines
online
lecture
On Demand
Integrity of data
online
lecture
On Demand
Data security - notes for the examination
online
lecture
On Demand
Computer Network Security
online
chapter
On Demand
Network security - introduction
online
lecture
On Demand
OSI MODEL #1 - Physical layer
online
lecture
On Demand
OSI MODEL #2 - Data link layer
online
lecture
On Demand
Threats: MAC spoofing
online
lecture
On Demand
Threats: ARP Poisoning
online
lecture
On Demand
EXERCISE: Data Link Layer Attack
online
lecture
On Demand
OSI MODEL #3 - Network layer
online
lecture
On Demand
TCP Tunnelling over ICMP
online
lecture
On Demand
Network Protocols - notes for the examination
online
lecture
On Demand
OSI MODEL #4 - Transport Layer
online
lecture
On Demand
Threats: Enumerating Remote Computers
online
lecture
On Demand
EXERCISE: Transport Layer Attack
online
lecture
On Demand
METASPLOIT: Attack demonstration part 1
online
lecture
On Demand
METASPLOIT: Attack demonstration part 2
online
lecture
On Demand
OSI MODEL #5 - Session Layer
online
lecture
On Demand
Transport Protocols - notes for the examination
online
lecture
On Demand
OSI MODEL #6 - Presentation Layer
online
lecture
On Demand
OSI MODEL #7 - Application Layer
online
lecture
On Demand
EXERCISE: Application Layer Attacks
online
lecture
On Demand
Backtrack: Attack Demonstration
online
lecture
On Demand
Man-in-the-Middle and Denial of Service Attacks
online
lecture
On Demand
Modifying Transmitted Packets
online
lecture
On Demand
Unencrypted protocols
online
lecture
On Demand
Application Protocols - notes for the examination
online
lecture
On Demand
Designing Secure Computer Networks
online
chapter
On Demand
Designing Computer Networks - introduction
online
lecture
On Demand
Subnetting IPv4
online
lecture
On Demand
Subnetting IPv6
online
lecture
On Demand
IPv6 address notation
online
lecture
On Demand
DMZ: demilitarized Zone
online
lecture
On Demand
Subnetting - notes for the examination
online
lecture
On Demand
Protocols and services: IP SEC
online
lecture
On Demand
IP SEC: Phase 1
online
lecture
On Demand
Network Address translation
online
lecture
On Demand
Network access control: RADIUS
online
lecture
On Demand
Protocols and Services - notes for the examination
online
lecture
On Demand
Network administration
online
chapter
On Demand
Introduction to Monitoring Transmitted Data
online
lecture
On Demand
Monitoring Transmitted Data - Basic informations
online
lecture
On Demand
Intrusion detection systems
online
lecture
On Demand
Why are firewalls and NDIS not enough?
online
lecture
On Demand
Wireshark - Introduction to network analysis
online
lecture
On Demand
How to use Wireshark?
online
lecture
On Demand
Analyzing Captured data
online
lecture
On Demand
How to analyze telnet protocol?
online
lecture
On Demand
Intrusion detection
online
lecture
On Demand
Scanning computers
online
lecture
On Demand
Monitoring transmitted data - notes for the examination
online
lecture
On Demand
Wireless Networks Security
online
chapter
On Demand
Wireless Networks
online
lecture
On Demand
WIFI security solutions - introduction
online
lecture
On Demand
WIFI - working principles
online
lecture
On Demand
Other wireless technologies
online
lecture
On Demand
Threats and risks
online
lecture
On Demand
Ineffective solutions
online
lecture
On Demand
Authentication methods
online
lecture
On Demand
802.11 WEP
online
lecture
On Demand
802.11I WPA
online
lecture
On Demand
Standards and Security Solutions - notes for the examination
online
lecture
On Demand
Threats of WIFI networks
online
lecture
On Demand
Client Attacks: Launching a rogue access point
online
lecture
On Demand
Client Attacks: Evil twin
online
lecture
On Demand
Client Attacks: Denial of service
online
lecture
On Demand
EXERCISE: WPA attack
online
lecture
On Demand
Wi-Fi Security Threats - notes for the examination
online
lecture
On Demand
Operating Systems Security
online
chapter
On Demand
Operating systems security - introduction
online
lecture
On Demand
Security boundaries
online
lecture
On Demand
Three core
online
lecture
On Demand
EXERCISE: OS boundaries
online
lecture
On Demand
Process isolation
online
lecture
On Demand
Kernel Mode Code Signing
online
lecture
On Demand
Java Virtual Machine and code access security
online
lecture
On Demand
OS Security Boundaries - notes for the examination
online
lecture
On Demand
Malware
online
lecture
On Demand
EXERCISE: Vulnerability attacks
online
lecture
On Demand
EXERCISE: Identifying suspicious processes
online
lecture
On Demand
Demonstration: Process Explorer
online
lecture
On Demand
EXERCISE: Removing malware
online
lecture
On Demand
Rootkits
online
lecture
On Demand
EXERCISE: Detecting rootkits
online
lecture
On Demand
EXERCISE: Security evaluation
online
lecture
On Demand
Malware - notes for the examination
online
lecture
On Demand
Access Control
online
chapter
On Demand
Authentication and authorisation - Introduction
online
lecture
On Demand
Authentication users
online
lecture
On Demand
How secure is your password?
online
lecture
On Demand
Authentication protocols and services
online
lecture
On Demand
LM Hash
online
lecture
On Demand
Cashed Credentials
online
lecture
On Demand
KERBEROS
online
lecture
On Demand
Authentication - notes for the examination
online
lecture
On Demand
Identity Theft
online
lecture
On Demand
EXERCISE: Offline attacks
online
lecture
On Demand
Using online cracking services
online
lecture
On Demand
Identity Theft - notes for the examination
online
lecture
On Demand
Windows Security
online
chapter
On Demand
Windows Security - what you’ll learn
online
lecture
On Demand
User Account Control
online
lecture
On Demand
UAC configuration
online
lecture
On Demand
Additional Security Features - ASLR and DEP
online
lecture
On Demand
PatchGuard
online
lecture
On Demand
Techniques and Methods - notes for the examination
online
lecture
On Demand
Encryption - key protection
online
lecture
On Demand
Drive encryption
online
lecture
On Demand
BitLocker
online
lecture
On Demand
BitLocker To Go Reader
online
lecture
On Demand
File and folder encryption - EFS
online
lecture
On Demand
EXERCISE: EFS
online
lecture
On Demand
Encryption - notes for the examination
online
lecture
On Demand
Prepare yourself for the examination
online
chapter
On Demand
Answer sample questions which you can find during the examination
online
quiz
<p style=""> Here are sample questions which you can find during the examination. These are only 5 questions from our question base which contains hundreds of tasks, so prepare yourself well. </p> <p style=""> Good luck! </p> <p style=""> Robert, </p> <p style=""> IT Security Academy </p>
On Demand
Your BONUS
online
chapter
On Demand
BONUS: Examination - your voucher
online
lecture
On Demand
The Certificate - see how it looks
online
lecture
On Demand

FAQ

Q. How long do I have access to the course materials?

A. You can view and review the lecture materials indefinitely, like an on-demand channel.

Q. What is the refund policy on the course?

A. We like to keep our users happy, so we have a 30-day no questions asked refund policy. Send an email to [email protected] for refund requests.

Q. Can I take my courses with me wherever I go?

A. Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!


Reviews of IT Security Beginner 2.0: Certified Hacking Training

  1. Posted by Vincent De Almeida| March 24, 2016

    Very interesting could be a bit more in-depth as some topics are brushed over.

  2. Posted by Robin Smith| March 12, 2016

    Insightful and illuminating.

  3. Posted by Dennis Thurston| March 08, 2016

    Great content and presentation.

  4. Posted by Mr Nermin Kuc| February 28, 2016

    I am not a fan of Windows C&A as a tool for MITM...otehrwise, all else is good and very informative.

  5. Posted by Maximilian Meurer| February 27, 2016

    Amazing Course! From my opinion : it's probably not the best Course to start with,... but if you have some basic understanding (network+ niveau is more then enough) and you are hungry for solid it-sec and it-sec related network-theorie : i can really recommand this course! the autor provides really useful informations (on protocol level / not just the introduction stuff) and a lot of relevant best practise tipps (for securing the network). the course is exactly what i was searching for. *thumbsup*

  6. Posted by Travis J. Wolfsberger| February 23, 2016

    interesting information

  7. Posted by Nick Perricci| February 17, 2016

    Very good course. Compressive content covered very well. I especially liked that the instructor told you when a topic would be covered in more detail later. It is helpful to know what to expect.

  8. Fantastic quality.
    Posted by Scott Sanderson| January 14, 2016

    I really enjoyed this course. The information was well presented, easy to understand and very informative. Thanks heaps.

  9. This is Quality Training!
    Posted by David Fergins| November 19, 2015

    This guy is great! Excellent training materials, in-depth training, smooth transitions between various topics; lots of background, etc. He really takes you to the limits of hacking and network defending.

  10. OK...
    Posted by Ross McPherson| October 24, 2015

    It doesn't really tell you why you need to be learning this, how to install the programs he has, and yea..

Course provided by: Udemy