Video description
This is part two of the four-part series that prepares you to pass the International Council of E-Commerce Consultants Certified Ethical Hacker (CEH) exam. In this course, you'll gain hands-on experience with the techniques and tools used to compromise user devices and systems as part of sanctioned penetration testing exercises.
Designed for IT analysts or engineers with CCNA level knowledge of TCP/IP networking concepts; the course covers social engineering attacks, malware attacks and counter measures, Wi-Fi network penetration techniques using tools like Aircrack and Reaver, methods for hacking Android and iOS devices, and practices you can use to deploy Trojan viruses to better understand how attackers compromise systems.
- Learn about the techniques and tools used to conduct sanctioned penetration tests
- Explore the social engineering techniques hackers use to manipulate people
- Discover the methods hackers use to leverage malware to their advantage
- Learn about the session level methods used to attack apps and devices
- Understand how session level attacks can give you control over apps and devices
- Explore different methods for hacking wireless network environments
Chad Russell (CISSP, CCNP, MCSE) has been in the cyber security industry for over 15 years working for companies such as Oracle, Microsoft, and SAP. He conducts security risk assessments for customers throughout North America, teaches cyber security at Vatterott College, and holds a Bachelor of Computer Science degree from Excelsior College.
Table of Contents
Introduction
Welcome To The Course
00:01:40
About The Author
00:01:11
Social Engineering
Social Engineering - Hacking The Human Part - 1
00:05:14
Social Engineering - Hacking The Human Part - 2
00:03:42
Social Engineering - Social Engineering Techniques - Human Based
00:02:41
Social Engineering Techniques - Computer-Mobile Based Part - 1
00:04:23
Social Engineering Techniques - Computer-Mobile Based Part - 2
00:04:49
Social Engineering Targets And Defense Strategies Part - 1
00:04:14
Social Engineering Targets And Defense Strategies Part - 2
00:03:48
Leveraging Malware
Malware Classification And Distribution Part - 1
00:04:14
Malware Classification And Distribution Part - 2
00:03:29
Building Trojans Part - 1
00:07:14
Building Trojans Part - 2
00:02:45
Building Trojans Part - 3
00:02:36
How Hackers Deploy Trojans
00:06:06
Types Of Trojans
00:02:03
Trojan Toolkit Exploration
00:04:40
Viruses Part - 1
00:04:20
Viruses Part - 2
00:04:08
Viruses Part - 3
00:08:34
Virus Writing And Introduction To Worms Part - 1
00:05:58
Virus Writing And Introduction To Worms Part - 2
00:05:40
Malware Reverse Engineering
00:06:22
Malware Detection Part - 1
00:05:42
Malware Detection Part - 2
00:03:31
Malware Countermeasures Part - 1
00:06:11
Malware Countermeasures Part - 2
00:05:10
Session Manipulation
Session Hijacking And Spoofing Part - 1
00:05:04
Session Hijacking And Spoofing Part - 2
00:05:50
Application Session Hijacking
00:05:25
Network Level Session Hijacking
00:05:18
Session Hijacking Tools Part - 1
00:05:47
Session Hijacking Tools Part - 2
00:03:23
Wireless Hacking
Covering The Spectrum
00:08:05
Wireless Encryption
00:05:01
Wi-Fi Attacks
00:02:46
MitM Wi-Fi Attacks
00:04:07
Cracking Wi-Fi Encryption
00:04:32
Wireless Hacking Tools
00:02:11
Bluetooth
00:03:32
Wireless Countermeasures
00:02:56
Wireless Intrusion Prevention Systems
00:03:29
Wireless Pen Testing - Self Assessment
00:03:28
Mobile Pen Testing
Mobile Attack Vectors
00:04:38
Hacking Android Devices
00:05:08
Hacking Ios
00:03:56
Mobile Pen Testing
00:05:31
Conclusion
Wrap Up And Thank You
00:00:31