IT Security Beginner 2.0: Certified Hacking Training
About This Course
New course edition: 2.0 (updated August, 2016)
Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.
Welcome to IT Secutiry Academy! IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You’re welcome to join us and start your training now.
About the training
Network and IT security is no joke. In a matter of seconds, hackers can access closed networks and view files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.
While this course includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these tactics to infiltrate networks or IT systems that are not your own.
Become a Certified Hacker by Covering the Following Topics:
- Security and Hacking Myths Debunked
- Beginner to Advanced IT Security
- Microsoft Windows Threats and WiFi Weaknesses
- Current Black-Hat Threats and Trends
- Designing More Secure Networks
- Encrypted Data, Identify Spoofing, and Windows Authorization
- IT Security Academy Exam Preparation
Boost Network Security and Identify Weaknesses
Certified hackers identify network security threats to prevent criminal hacking attempts. The best way to do this, is to understand how criminal hackers will evaluate and test your network for vulnerabilities.
Contents and Overview
This course is designed for anyone seeking a career in IT security, as well as programmers and technology enthusiasts who want to develop hacking and hacking prevention skills. A basic understanding of IT and infrastructure is recommended but not required.
With 129 lectures and over 17+ hours of content, you will start with the basics of IT security and progress to the advanced curriculum in a matter of days.
What are the requirements?
- General IT knowledge
- No programming skills needed on IT Sec Beginner course
What am I going to get from this course?
- IT security trends.
- Security myths.
- Learn about Wi-Fi network standards and protection.
- Get to know about Wi-Fi threats.
- Improve your grasp on Windows security.
- Understand what security boundaries are.
- Find out how to fight malware.
- Discover secret tips on access control in Windows.
- Learn how Windows authentication works.
- Prevent identity spoofing.
- Find out the mechanisms of Windows authorisation.
- Learn about Windows 7 security mechanisms.
- Get to know how to encrypt data in Windows.
- Wi-Fi network standards and protection.
- Wi-Fi network threats.
- How to prevent identity spoofing.
What is the target audience?
- Future IT Sec Professionals
- IT Students
- IT enthusiasts
|Section 1: IT Security Trends|
Introduction to Current Cyber Threats
Let’s look a few years back
Cyber crimes – an evolution not revolution
Current Cyber Threats – notes for the examination
Popular myths about IT security – origins
Myths #1 – you’ll never be hacked
Myths #2 – you don’t need any protection software or hardware
Myths #3 – IT security is always a priority
Popular Myths About Computer System Security – notes for the examination
Trends in IT Security
The birth of technology society
EXERCISE: How much info can you gather?
Analyzing sniffing software
Changing IT Security Trends – notes for the examination
Objective #1 – Data security – Introduction
Confidentiality of data
EXERCISE: Finding confidential data with search engines
Integrity of data
Data security – notes for the examination
|Section 2: Computer Network Security|
Network security – introduction
OSI MODEL #1 – Physical layer
OSI MODEL #2 – Data link layer
Threats: MAC spoofing
Threats: ARP Poisoning
EXERCISE: Data Link Layer Attack
OSI MODEL #3 – Network layer
TCP Tunnelling over ICMP
Network Protocols – notes for the examination
OSI MODEL #4 – Transport Layer
Threats: Enumerating Remote Computers
EXERCISE: Transport Layer Attack using METASPLOIT part 1
EXERCISE: Transport Layer Attack using METASPLOIT part 2
OSI MODEL #5 – Session Layer
Transport Protocols – notes for the examination
OSI MODEL #6 – Presentation Layer
OSI MODEL #7 – Application Layer
EXERCISE: Application Layer Attacks
Backtrack: Attack Demonstration
Man-in-the-Middle and Denial of Service Attacks
Modifying Transmitted Packets
Application Protocols – notes for the examination
|Section 3: Designing Secure Computer Networks|
Designing Computer Networks – introduction
IPv6 address notation
DMZ: demilitarized Zone
Subnetting – notes for the examination
Protocols and services: IP SEC
IP SEC: Phase 1
Network Address translation
Network access control: RADIUS
Protocols and Services – notes for the examination
|Section 4: Network administration|
Introduction to Monitoring Transmitted Data
Monitoring Transmitted Data – Basic informations
Intrusion detection systems
Why are firewalls and NDIS not enough?
Wireshark – Introduction to network analysis
How to use Wireshark?
Analyzing Captured data
How to analyze telnet protocol?
Monitoring transmitted data – notes for the examination
|Section 5: Wireless Networks Security|
WIFI security solutions – introduction
WIFI – working principles
Other wireless technologies
Threats and risks
Standards and Security Solutions – notes for the examination
Threats of WIFI networks
Client Attacks: Launching a rogue access point
Client Attacks: Evil twin
Client Attacks: Denial of service
EXERCISE: WPA attack
Wi-Fi Security Threats – notes for the examination
|Section 6: Operating Systems Security|
Operating systems security – introduction
EXERCISE: OS boundaries
Kernel Mode Code Signing
Java Virtual Machine and code access security
OS Security Boundaries – notes for the examination
EXERCISE: Vulnerability attacks
EXERCISE: Identifying suspicious processes
Demonstration: Process Explorer
EXERCISE: Removing malware
EXERCISE: Detecting rootkits
EXERCISE: Security evaluation
Malware – notes for the examination
|Section 7: Access Control|
Authentication and authorisation – Introduction
How secure is your password?
Authentication protocols and services
Authentication – notes for the examination
EXERCISE: Offline attacks
Using online cracking services
Identity Theft – notes for the examination
|Section 8: Windows Security|
Windows Security – what you’ll learn
User Account Control
Additional Security Features – ASLR and DEP
Techniques and Methods – notes for the examination
Encryption – key protection
BitLocker To Go Reader
File and folder encryption – EFS
Encryption – notes for the examination
|Section 9: Prepare for the examination|
Answer sample questions which you can find during the examination
|Section 10: Your BONUS|
BONUS: Examination – your voucher
The Certificate – see how it looks like
IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.
The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems’ security. Some of them took part in prominent international IT contests with great results.
We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.
- Lectures 0
- Quizzes 0
- Duration 50 hours
- Skill level All level
- Language English
- Students 13762
- Assessments Self