IT Security: Hacking Techniques for IT Professionals 2.0

Best Hacking Training Program you can participate. Covers CISSP and CEH program. Get Hacking Academy Certificate. v. 2.0

IT Security: Hacking  Techniques for IT Professionals 2.0

Price$99.00

SchoolUdemy
ScheduleOn Demand
LocationOnline
Duration14.5 hours
Credits0
Enroll
Rating
Reviews10
Popularity6410 Registered
In CertificateNo
Difficultyintermediate level
EffortN/A
Course DetailsCourse FAQ

IT Security: Hacking Techniques for IT Professionals 2.0

Categories:
Software & IT

IT Security Beginner: Certified Hacking Training.

BONUS:

Finishing this course you will get free voucher for IT Security Academy Online Examination Center where you can archive IT Security Beginner Certificate.

——

This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security.

Training is starting with IT Security current threat and trends. Afterwards we are discussing popular security myths. Great part of the training relates to Network security.

We will start with local networks, talk about protocols and theirs vulnerabilities. You will learn how to design secure computer networks and subnets. You will become real network administrator.

Next you will discover why wireless networks could be so dangerous. You will learn standards, protocols and security solutions. Wi-Fi networks are an integral part of our lives, but not everyone realizes that if it is inadequately protected, your enterprise or home network can disclose your confidential passwords and give attackers easy access to the machines you’re administrating.

Topics covered include core issues related to effectively securing the most popular Microsoft OS: identity theft, authentication, authorization, encryption. We identify typical mistakes and guide you towards achieving good OS protection.

Course Details

Security Policies
online
chapter
On Demand
Security policies - introduction
online
lecture
On Demand
What is security?
online
lecture
On Demand
Information security
online
lecture
On Demand
Information security - level up
online
lecture
On Demand
Security issues
online
lecture
On Demand
Why are security solutions fallible?
online
lecture
On Demand
Security policy issues
online
lecture
On Demand
Introduction to threat modelling and classification
online
lecture
On Demand
Threat modelling - STRIDE
online
lecture
On Demand
STRIDE: Spoofing identity
online
lecture
On Demand
STRIDE: Tampering with Data
online
lecture
On Demand
STRIDE: Denial of Service
online
lecture
On Demand
Threat Modelling and Classification - notes for the examination
online
lecture
On Demand
Risk Managment
online
chapter
On Demand
Introduction to Risk Management
online
lecture
On Demand
Attack Methods
online
lecture
On Demand
Local attacks
online
lecture
On Demand
Target scanning and enumeration techniques #1
online
lecture
On Demand
Target scanning and enumeration techniques #2
online
lecture
On Demand
Passive scanning
online
lecture
On Demand
Attack Methodologies - notes for the examination
online
lecture
On Demand
Introduction to risk assessment
online
lecture
On Demand
DREAD: Risk assessment model
online
lecture
On Demand
DREAD: Exploitability
online
lecture
On Demand
EXERCISE: Risk Assessment
online
lecture
On Demand
Risk Assessment - notes for the examination
online
lecture
On Demand
Introduction to Social Engineering and rogue software
online
lecture
On Demand
Manipulation tactics
online
lecture
On Demand
EXERCISE: Engineering attacks
online
lecture
On Demand
SE with BackTrack
online
lecture
On Demand
Rogue Software
online
lecture
On Demand
Fraud tools #1
online
lecture
On Demand
Fraud tools #2
online
lecture
On Demand
Social Engineering and Rogue Software - notes for the examination
online
lecture
On Demand
Defence in Depth
online
chapter
On Demand
Introduction to Defence in depth
online
lecture
On Demand
How to use Defence in depth model?
online
lecture
On Demand
DiD: OS and LAN layers
online
lecture
On Demand
DiD: Perimeter and Physical Access Layers
online
lecture
On Demand
DiD: Demonstration
online
lecture
On Demand
Automated attack targeting a service
online
lecture
On Demand
Automated user-targeting attack
online
lecture
On Demand
The Defence in Depth Model - notes for the examination
online
lecture
On Demand
Introduction to Immutable laws of security - Law #1
online
lecture
On Demand
Law #2
online
lecture
On Demand
Law #3
online
lecture
On Demand
Law #4
online
lecture
On Demand
Law #5
online
lecture
On Demand
Law #6
online
lecture
On Demand
Law #7
online
lecture
On Demand
Law #8
online
lecture
On Demand
Law #9
online
lecture
On Demand
Law #10
online
lecture
On Demand
Laws for administrators
online
lecture
On Demand
Immutable Laws of Security - notes for the examination
online
lecture
On Demand
Disaster Recovery
online
chapter
On Demand
Introduction to Disaster Recovery
online
lecture
On Demand
How to reduce losses?
online
lecture
On Demand
Ensuring continous availability
online
lecture
On Demand
Threat discovery #1
online
lecture
On Demand
Threat discovery #2
online
lecture
On Demand
Audit users and keep control accounts
online
lecture
On Demand
High risk users
online
lecture
On Demand
Collecting and analysing evidence
online
lecture
On Demand
Forensics example
online
lecture
On Demand
CONFICKER: CASE STUDY
online
lecture
On Demand
How to reduce losses - notes for the examination
online
lecture
On Demand
Application Security
online
chapter
On Demand
Introduction to Application Security
online
lecture
On Demand
Attacks on applications
online
lecture
On Demand
SQL Injection
online
lecture
On Demand
EXERCISE: Analyze the application
online
lecture
On Demand
Blind SQL Injection
online
lecture
On Demand
Automated SQL Injection
online
lecture
On Demand
Cross-site scripting - XSS
online
lecture
On Demand
Application Attacks - notes for the examination
online
lecture
On Demand
Program security assessment
online
lecture
On Demand
Unsafe applications
online
lecture
On Demand
Program Security Assessment - notes for the examination
online
lecture
On Demand
Application Security - Configuration and Managment
online
chapter
On Demand
Here’s what you’ll learn in this module
online
lecture
On Demand
Managing applicaltions
online
lecture
On Demand
Software updates
online
lecture
On Demand
MS Update
online
lecture
On Demand
System Center Configuration Manager
online
lecture
On Demand
Blocking applications
online
lecture
On Demand
Software restrictions policies
online
lecture
On Demand
EXERCISE: Application control rules
online
lecture
On Demand
Isolating applications
online
lecture
On Demand
How to protect users without interrupting their work - notes for the examination
online
lecture
On Demand
Cryptography
online
chapter
On Demand
Introduction to cryptography
online
lecture
On Demand
History of ciphers
online
lecture
On Demand
Symmetric and asymmetric ciphers
online
lecture
On Demand
Symmetric-key algorithms
online
lecture
On Demand
Block ciphers
online
lecture
On Demand
Data encryption standard
online
lecture
On Demand
DES-X
online
lecture
On Demand
Advanced encryption standards
online
lecture
On Demand
Block cipher modes
online
lecture
On Demand
Stream Ciphers - RC4
online
lecture
On Demand
Asymmetric-key algorithms
online
lecture
On Demand
RSA
online
lecture
On Demand
ELGAMAL
online
lecture
On Demand
HASH functions
online
lecture
On Demand
Digital signature
online
lecture
On Demand
Hybrid Schemes
online
lecture
On Demand
Symmetric and Asymmetric Ciphers - notes for the examination
online
lecture
On Demand
Public Key Infrastructure
online
chapter
On Demand
Introduction to cryptology
online
lecture
On Demand
Public key infrastructure
online
lecture
On Demand
Implementing public key infrastructure
online
lecture
On Demand
What will PKI allow you?
online
lecture
On Demand
EXERCISE: Certificates
online
lecture
On Demand
Certificate life cycle
online
lecture
On Demand
Planning the PKI
online
lecture
On Demand
PKI Administration
online
lecture
On Demand
Public Key Infrastructure - Trust but verify - notes for the examination
online
lecture
On Demand
Prepare yourself for the examination
online
chapter
On Demand
Answer sample questions which you can find during the examination
online
quiz
<p style=""> Here are sample questions which you can find during the examination. These are only 5 questions from our question base which contains hundreds of tasks, so prepare yourself well. </p> <p style=""> Good luck! </p> <p style=""> Robert, </p> <p style=""> IT Security Academy </p>
On Demand
Your BONUS
online
chapter
On Demand
BONUS: Examination - your voucher
online
lecture
On Demand
Certificate - see how it looks
online
lecture
On Demand

FAQ

Q. How long do I have access to the course materials?

A. You can view and review the lecture materials indefinitely, like an on-demand channel.

Q. What is the refund policy on the course?

A. We like to keep our users happy, so we have a 30-day no questions asked refund policy. Send an email to [email protected] for refund requests.

Q. Can I take my courses with me wherever I go?

A. Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!


Reviews of IT Security: Hacking Techniques for IT Professionals 2.0

  1. Posted by Brennero Pardo| March 19, 2016

    La información del curso es muy buena. Te enteras de los metodos de ataque y la forma en que son entregados. El uso de herramientas actuales como BackTrack, ahora Kali Linux, te abren un mundo para poder hacer ataques. Hasta el momento hay una sola clase practica, espero que sigan habiendo más ya que el curso se vuelve interesante

  2. Posted by Michel Dansereau| March 01, 2016

    The pace of lectures seems slow to me.

  3. No certificate
    Posted by Dirk Gaastra| February 05, 2016

    The content is professional, but the creator has abandoned this course. He promised a certificate, but his website is broken so nobody can actually get it.

  4. Hacking techniques for IT Pros
    Posted by Laken Oyedokun| September 14, 2015

    Excellent

  5. Not nad as an introduction
    Posted by Jorge Hazael Pérez Moysén| August 21, 2015

    But the exam is based on material not covered by the course, as a general knowledge course is fine.

  6. Not Worth It
    Posted by James Herman| July 24, 2015

    Numerous errors and grammatical issues on the slides, instructor delivers information in a monotone voice, information is extremely basic for IT security.

  7. very nice
    Posted by Aleksandar Krštenić| July 18, 2015

    Very nice

  8. Exam and course information do not match
    Posted by Will Booth| June 12, 2015

    As of 13/06/2015 the information provided in the course does not match up to what was asked for on the exam. There were multiple questions that were not covered anywhere in the first version of this course.

  9. Basics of Information Security
    Posted by Ravi Prakash Mundra| April 25, 2015

    This course provides a good overview on Information Security Concepts an principal.Can be called as mini Security +

Course provided by: Udemy