Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Professional Hacker +
Module 1: Introduction to Information Security
M.1.1.1 Introduction to Information Security and CIA Triad (8:56)
M.1.1.2 Types of hacker (2:33)
M.1.1.3 Essential Terms (6:52)
M.1.1.4 Penetration Testing Vs Ethical Hacking (2:30)
M.1.1.5 Different Types of Testing (5:05)
M.1.1.6 Careers_in_Information_Security (4:16)
M.1.1.7 Legislation_and_Regulations (11:49)
M.1.2.1 OSI Model (18:47)
M.1.2.2 TCP IP Model (6:46)
M.1.2.3 Transmission Control Protocol (TCP) (12:18)
M.1.2.4 User Datagram Protocol (UDP) (12:18)
M.1.2.5 IP Fragmentation and Reassembly (3:53)
M.1.2.6 IPv4 (15:16)
M.1.2.7 IPv6 (13:46)
M.1.2.8 Understanding ICMP (5:09)
M.1.2.9 Understanding ICMP Ping Message (1:38)
M.1.3.1 Routing (6:50)
M.1.4.1 Windows NT Architecture and Windows 10 Architecture (24:53)
M.1.4.2 File System (7:11)
M.1.4.3 SAM File and System Files (5:38)
M.1.4.4 Windows Registry (3:23)
M.1.4.5 Windows Registry (4:19)
M.1.4.6 Windows Commands (4:37)
M.1.4.7 Windows Basic Commands (7:54)
M.1.4.8 Windows Server 2016 Architecture (9:15)
M.1.4.9 Active Directory (21:48)
M.1.5.1 Introduction to Unix and Linux (10:46)
M.1.5.2 File System (13:31)
M.1.5.3 Linux Commands (7:04)
M.1.5.4 File Permissions (9:14)
M.1.5.5 Kali Linux Introduction (1:44)
M.1.5.6 Kali and Various Linux Commands (8:37)
M.1.5.7 Kali and Various Linux Commands (2:24)
M.1 Introduction to Information Security (PDF)
Module-2 Social Engineering and Reconnaissance
M.2.1.1 Social Engineering (29:31)
M.2.1.2 Reconnaissance (24:27)
M.2.1.2.A Reconnaissance (Lab) (4:09)
M.2.1.2.B Reconnaissance (Lab) (0:43)
M.2.1.2.C Reconnaissance (Lab) (1:52)
M.2 Social Engineering Reconnaissance (PDF)
Module-3 Network Scanning
M.3.1.1 Packet Crafting (3:31)
M.3.1.1.A Packet Crafting (Lab) (2:04)
M.3.1.1.B Packet Crafting (Lab) (3:40)
M.3.1.1.C Packet Crafting (Lab) (2:00)
M.3.1.1.D Packet Crafting (Lab) (1:00)
M.3.1.2 Network Mapper Nmap (12:17)
M.3.1.2.A Network Mapper(Nmap) (Lab) (4:42)
M.3.1.2.B Network Mapper(Nmap) (Lab) (4:03)
M.3.1.2.C Network Mapper(Nmap) (Lab) (0:55)
M.3.1.2.D Network Mapper(Nmap) (Lab) (2:34)
M.3 Network Scanning (PDF)
Module-4 Enumeration
M.4.1.1 Banner grabbing enumeration (23:51)
M.4.1.1.A Enumeration using Netcat Lab (Lab) (1:00)
M.4.1.1.B HTTP Lab (Lab) (1:50)
M.4.1.1.C SMTP Lab (Lab) (5:50)
M.4.1.1.D DNS Lab (Lab) (1:14)
M.4.1.1.E Automated Scanning Nessus Lab (Lab) (2:49)
M.4 Enumeration (PDF)
Module - 5 Exploitation
M.5.1.1 Hacking System password Cracking (46:55)
M.5.1.1.A Password Cracking Lab (Lab) (1:55)
M.5.1.1.B Password Cracking Lab (Lab) (1:10)
M.5.1.1.C Password Cracking Lab (Lab) (3:10)
M.5.1.1.D Password Cracking Lab (Lab) (2:02)
M.5.1.2 Metasploit Framework (10:36)
M.5.1.3 Linux Service Exploit (1:25)
M.5.1.4 Windows Service Exploitation (1:47)
M.5.1.5 Windows Msfvenom (1:33)
M.5 Exploitation (PDF)
Module- 6 WebAppSecurity
M.6.1.1 Introduction to Web Applications (2:28)
M.6.1.2 Case Studies (17:26)
M.6.1.3 Web Applications brief (7:41)
M.6.1.4 HTML and JavaScript (5:03)
M.6.2.1 Introduction to OWASP TOP 10 (3:25)
M.6.2.2 Injection and Error based Injection (9:10)
M.6.2.2.A Injection and Error based Injection (Lab) (6:14)
M.6.2.3 Authentication Bypass using SQL Injection (1:39)
M.6.2.3.A Authentication_Bypass_using_SQL_Injection (Lab) (3:20)
M.6.2.4 Blind Injection using SQLMap (5:05)
M.6.2.4.A Blind_Injection_using_SQLMap. (Lab) (2:45)
M.6.2.5 SQL Injection Mitigations Page (10:25)
M.6.2.6 Command Injection (7:02)
M.6.2.6.A Command Injection (Lab) (2:08)
M.6.2.7 Broken Authentication (5:52)
M.6.2.7.A Brute Force (Lab) (2:53)
M.6.2.7.B Brute Force (Lab) (3:22)
M.6.2.8 Session Management (8:39)
M.6.2.8.A Session Management (2:23)
M.6.2.9 A3 Sensitive Data Exposure (3:53)
M.6.2.9.A A3 Sensitive Data Exposure (Lab) (1:45)
M.6.2.10 A3 Insufficient Transport Layer Security (6:27)
M.6.2.10.A A3 Insufficient Transport Layer Security (1:12)
M.6.2.11 A4_XXE (9:30)
M.6.2.11.A A4_XXE (Lab) (2:10)
M.6.2.12 A5 Broken Access Control IDOR (5:45)
M.6.2.12.A A5 Broken Access Control IDOR (Lab) (1:08)
M.6.2.13 A5 Broken Access Control MFLAC (6:05)
M.6.2.13.A A5 Broken Access Control MFLAC (Lab) (0:52)
M.6.2.13.B A5 Broken Access Control MFLAC (Lab) (1:00)
M.6.2.13.C A5 Broken Access Control MFLAC (Lab) (2:36)
M.6.2.14 A6 Security Misconfiguration (6:42)
M.6.2.14.A A6 Security Misconfiguration (Lab) (1:55)
M.6.2.14.B A6 Security Misconfiguration (Lab) (1:00)
M.6.2.14.C A6 Security Misconfiguration (Lab) (1:35)
M.6.2.15 A7 Cross Site Scripting(XSS) (18:42)
M.6.2.15.A A7 Cross Site Scripting(XSS) (Lab) (3:24)
M.6.2.16 A8 Insecure Deserialization (4:56)
M.6.2.17 A9 Using components with Known Vulnerabilities (5:11)
M.6.2.17.A A9 Using components with Known Vulnerabilities (Lab) (2:03)
M.6.2.18 A10 Insufficient Logging and Monitoring (4:30)
M.6.3.1 Browser Based Vulnerabilties (2:58)
M.6.3.2 Clickjacking (3:01)
M.6.3.2.A Clickjacking (Lab) (2:16)
M.6.3.3 POODLE (3:57)
M.6.3.4 WebDav (3:58)
M.6.3.5 WASC (3:37)
M.6.3.6 Security Frameworks (15:05)
M.6.3.7 SDLC (22:04)
M.6.3.8 WAF (7:53)
M.6.3.9 Case Study Penetrating a Bank (3:27)
M.6.3.10 Content Spoofing (4:37)
M.6.3.11 Fingerprinting (1:46)
M.6.3.12 Advance Recon (0:51)
M.6 WebAppSecurity (PDF)
Module 7-Wireless Exploitation
M.7.1.1 Introduction and Terminologies (11:58)
M.7.1.2 WiFi Frames (5:26)
M.7.1.3 Wireless Hacking Methodology (2:28)
M.7.1.4 Authentication Methods and Types of WLAN Attacks (2:52)
M.7.1.5 WEP (4:40)
M.7.1.6 WPA_WPA-2 (4:38)
M.7.1.7 Differences in WEP WPA and WPA-2 (7:19)
M.7.1.8 Bypassing WPA2 using Aircrack-ng (4:29)
M.7.1.8.A Aircrack-ng Setup (Lab) (1:12)
M.7.1.8.B WPA2 Bypass Aircrack-ng (Lab) (2:43)
M.7.1.9 Evil Twin (1:31)
M.7.1.9.A Evil Twin (Lab) (3:15)
M.7.1.10 WPA3 and Wi-Fi Guideline (2:02)
M.7 Wireless Exploitation (PDF)
M.7 Wireless Exploitation MCQ Quiz
Quiz 15 Questions
Module - 8 Cryptography, Steganography & Malware
M.8.1.1 Introduction to Cryptography (4:22)
M.8.1.2 Types of Cryptography and Ciphers (7:47)
M.8.1.3 Public Key Infrastructure (8:16)
M.8.1.4 Disk Encryption (4:18)
M.8.1.5 Crypt Analysis (3:39)
M.8.1.6 Steganography (4:00)
M.8.1.7 Malware (8:34)
M.8.1.8 Malware Analysis (2:57)
M.8 Cryptography Stegnography Malware (PDF)
M.8 Cryptography Stegnography Malwares MCQ Quiz
Quiz 20 Questions
Module 9-Mobile Application Security
M.9.1.1 Android Application Basics (1:03)
M.9.1.2 Android Application Components (4:34)
M.9.1.3 Setting Up Android Testing Environment (1:00)
M.9.1.4 ADB and its Commands (1:46)
M.9.1.4.A ADB and its Commands (Lab) (1:38)
M.9.1.4.B ADB and its Commands (Lab) (1:30)
M.9.1.4.C ADB and its Commands (Lab) (1:40)
M.9.1.4.D ADB and its Commands (Lab) (1:50)
M.9.1.5 Application Signing in Android (2:39)
M.9.1.5.A Application Signing in Android (1:56)
M.9.1.6 APK File Basics (1:47)
M.9.1.6.A APK File Basics (Lab) (1:20)
M.9.1.6.B APK File Basics (Lab) (2:37)
M.9.1.7 Mobile-OWASP Top 10 Improper Platform Usage (0:31)
M.9.1.7.A Mobile-OWASP Top 10 Improper Platform Usage (Lab) (3:35)
M.9.1.8 Mobile OWASP Top 10 Insecure Data Storage (0:38)
M.9.1.8.A Mobile OWASP Top 10 Insecure Data Storage (Lab) (2:28)
M.9.1.9 Mobile OWASP Top 10 Insecure Communication (0:17)
M.9.1.9.A Mobile OWASP Top 10 Insecure Communication (Lab) (1:56)
M.9.1.10 Mobile OWASP Top 10 Insecure Authentication (0:18)
M.9.1.10.A Mobile OWASP Top 10 Insecure Authentication (Lab) (1:44)
M.9.1.11 Mobile OWASP Top 10 Insufficient Cryptography (0:22)
M.9.1.11.A Mobile OWASP Top 10 Insufficient Cryptography (Lab) (4:31)
M.9.1.12 Mobile OWASP Top 10 Insecure Authorization (0:19)
M.9.1.12.A Mobile OWASP Top 10 Insecure Authorization (Lab) (1:28)
M.9.1.13 Mobile OWASP Top 10 Poor Code Quality (0:18)
M.9.1.13.A Mobile OWASP Top 10 Poor Code Quality (Lab) (1:44)
M.9.1.14 Mobile OWASP Top 10 Code Tampering and Reverse Engineering (1:10)
M.9.1.14.A Mobile OWASP Top 10 Code Tampering and Reverse Engineering (Lab) (5:16)
M.9.1.15 Mobile OWASP Top 10 Extraneous Functionality (0:23)
M.9.1.15.A Mobile OWASP Top 10 Extraneous Functionality (Lab) (1:44)
M.9.1.16 Mobile Application Security Testing (8:21)
M.9.1.16.A Mobile Application Security Testing (Lab) (3:03)
M.9.1.16.B Mobile Application Security Testing (Lab) (2:05)
M.9.1.16.C Mobile Application Security Testing (Lab) (4:20)
M.9.1.17 Other Vulnerabilities Client Side Injections (1:04)
M.9.1.17.A Other Vulnerabilities Client Side Injections (Lab) (2:36)
M.9.1.18 Other Vulnerabilities Logging Based Vulnerabilities (0:54)
M.9.1.19 Other Vulnerabilities Bypassing SSL Pinning (1:45)
M.9.1.19.A Other Vulnerabilities Bypassing SSL Pinning (Lab) (3:10)
M.9.1.20 Other Vulnerabilities Leaking Content Provider (1:07)
M.9.1.20.A Other Vulnerabilities Leaking Content Provider (Lab) (4:30)
M.9.1.21 Exploiting Android with Metasploit Framework (0:35)
M.9 MobileSecurity (PDF)
Module -10 Cloud Security
M.10.1.1 Introduction to Cloud Security (1:47)
M.10.1.2 Virtualiztion (0:54)
M.10.1.3 Service and Deployment Models (3:45)
M.10.1.4 Cloud taxonomy (2:02)
M.10.1.5 OWASP TOP 10 for Cloud (10:23)
M.10.1.6 Cloud Security Best Practices (3:30)
M.10 Cloud Security
M.10 Cloud Security MCQ Quiz
Quiz 10 Questions
Module - 11 - IoT
M.11.1.1 Introduction to IoT (3:00)
M.11.1.2 Application and Benefits of IoT (6:15)
M.11.1.3 Issues with IoT (1:26)
M.11.1.4 Basic Architecture of IoT (3:19)
M.11.1.5 Frameworks and Platform for IoT (3:17)
M.11.1.6 IoT Attack Surface (8:23)
M.11.1.7 IoT Attack Surface Hardware (2:51)
M.11 Internet of Things
M.11 Internet of Things MCQ
Quiz 10 Questions
M.8 Cryptography Stegnography Malware (PDF)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock