Video description
This is part two of the four-part series that prepares you to pass the International Council of E-Commerce Consultants Certified Ethical Hacker (CEH) exam. In this course, you'll gain hands-on experience with the techniques and tools used to compromise user devices and systems as part of sanctioned penetration testing exercises.
Designed for IT analysts or engineers with CCNA level knowledge of TCP/IP networking concepts; the course covers social engineering attacks, malware attacks and counter measures, Wi-Fi network penetration techniques using tools like Aircrack and Reaver, methods for hacking Android and iOS devices, and practices you can use to deploy Trojan viruses to better understand how attackers compromise systems.
- Learn about the techniques and tools used to conduct sanctioned penetration tests
- Explore the social engineering techniques hackers use to manipulate people
- Discover the methods hackers use to leverage malware to their advantage
- Learn about the session level methods used to attack apps and devices
- Understand how session level attacks can give you control over apps and devices
- Explore different methods for hacking wireless network environments
Table of contents
-
Introduction
- Welcome To The Course 00:01:40
- About The Author 00:01:11
-
Social Engineering
- Social Engineering - Hacking The Human Part - 1 00:05:14
- Social Engineering - Hacking The Human Part - 2 00:03:42
- Social Engineering - Social Engineering Techniques - Human Based 00:02:41
- Social Engineering Techniques - Computer-Mobile Based Part - 1 00:04:23
- Social Engineering Techniques - Computer-Mobile Based Part - 2 00:04:49
- Social Engineering Targets And Defense Strategies Part - 1 00:04:14
- Social Engineering Targets And Defense Strategies Part - 2 00:03:48
-
Leveraging Malware
- Malware Classification And Distribution Part - 1 00:04:14
- Malware Classification And Distribution Part - 2 00:03:29
- Building Trojans Part - 1 00:07:14
- Building Trojans Part - 2 00:02:45
- Building Trojans Part - 3 00:02:36
- How Hackers Deploy Trojans 00:06:06
- Types Of Trojans 00:02:03
- Trojan Toolkit Exploration 00:04:40
- Viruses Part - 1 00:04:20
- Viruses Part - 2 00:04:08
- Viruses Part - 3 00:08:34
- Virus Writing And Introduction To Worms Part - 1 00:05:58
- Virus Writing And Introduction To Worms Part - 2 00:05:40
- Malware Reverse Engineering 00:06:22
- Malware Detection Part - 1 00:05:42
- Malware Detection Part - 2 00:03:31
- Malware Countermeasures Part - 1 00:06:11
- Malware Countermeasures Part - 2 00:05:10
-
Session Manipulation
- Session Hijacking And Spoofing Part - 1 00:05:04
- Session Hijacking And Spoofing Part - 2 00:05:50
- Application Session Hijacking 00:05:25
- Network Level Session Hijacking 00:05:18
- Session Hijacking Tools Part - 1 00:05:47
- Session Hijacking Tools Part - 2 00:03:23
-
Wireless Hacking
- Covering The Spectrum 00:08:05
- Wireless Encryption 00:05:01
- Wi-Fi Attacks 00:02:46
- MitM Wi-Fi Attacks 00:04:07
- Cracking Wi-Fi Encryption 00:04:32
- Wireless Hacking Tools 00:02:11
- Bluetooth 00:03:32
- Wireless Countermeasures 00:02:56
- Wireless Intrusion Prevention Systems 00:03:29
- Wireless Pen Testing - Self Assessment 00:03:28
-
Mobile Pen Testing
- Mobile Attack Vectors 00:04:38
- Hacking Android Devices 00:05:08
- Hacking Ios 00:03:56
- Mobile Pen Testing 00:05:31
-
Conclusion
- Wrap Up And Thank You 00:00:31
Product information
- Title: Certified Ethical Hacker (CEH) - Hacking Users and Their Devices
- Author(s):
- Release date: April 2017
- Publisher(s): Infinite Skills
- ISBN: 9781491975756
You might also like
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …
video
Learning Path: Certified Ethical Hacker CEH Complete Video Course
Duration More Than 10 Hours of Video Instruction Overview Learn everything you need to know to …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
book
The Web Application Hacker's Handbook, 2nd Edition
The highly successful security book returns with a new edition, completely updated Web applications are the …