Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Cybersecurity Expert (CCE)
Module 1: Fundamentals, Section 1
M.1.1 Introduction to Information Security
M.1.1.1 Introduction to CISC-CIA Triad (8:56)
M.1.1.2. Types of Hackers (2:33)
M1.1.3 Essential Terms (6:52)
M.1.1.4 Penetration Testing Vs Ethical Hacking (2:30)
M.1.1.5 Different Types of Testing (5:04)
M.1.1.6 Careers in Information Security (4:16)
M.1.1.7 Legislation and Regulations (11:49)
Module 1: Fundamentals, Section 2
M.1.2 Network Fundamentals
M.1.2.1 Introduction to Network Fundamentals (3:16)
M.1.2.2 Components of Data Communication (2:07)
M.1.2.3 Network Topology and Network Cables (17:43)
M.1.2.4 Computer Network Architecture (4:46)
M.1.2.5 Internet and Protocol (8:49)
M.1.2.6 OSI Model (18:47)
M.1.2.7 TCP IP Model (6:45)
M.1.2.8 Transmission Control Protocol (TCP) (12:18)
M.1.2.9 User Datagram Protocol (UDP) (12:18)
M.1.2.10 Understanding ICMP (5:09)
M.1.2.10.A Understanding ICMP Ping Message (Lab) (1:38)
M1.2.11 IP Fragmentation and Reassembly (3:53)
M.1.2.12 IPv4 (15:16)
M.1.2.13 IPv6 (13:46)
Module 1: Fundamentals, Section 3
M.1.3.1 Introduction to Subnetting and Supernetting (8:07)
M.1.3.2 Routing (6:49)
M.1.3.3 Router Security and Network Address Translation (7:10)
M.1.3.4 Switching and Port Security (5:45)
M.1.3.4.A Router and Switch Configuration using CPT (Lab) (7:20)
M.1.3.5 Virtual Local Area Network (VLAN) (5:14)
M.1.3.6 Virtual Private Network (VPN) (12:10)
M.1.3.7 Access Control Lists (4:40)
M.1.3.8 Firewall and IP tables (12:10)
M.1.3.9 IDS and IPS (7:01)
M.1.3.10 Packet Capture and Wireshark (10:33)
M.1.3.10.A Wireshark (Lab) (4:20)
M.1.3.10.B Understanding TCP IPV4 Headers Using Wireshark (Lab) (9:02)
M.1.3.10.C Understanding TCP IPV4 Headers Using Wireshark (Lab) (4:52)
M.1.3.10.D Understanding UDP Header Using Wireshark (Lab) (2:33)
M.1.3 Advanced Networking (PDF)
Module 1: Fundamentals, Section 4
M.1.4.1 Windows NT Architecture and Windows 10 Architecture (24:53)
M.1.4.2 File System (7:11)
M.1.4.3 File Permissions (4:01)
M.1.4.4 Memory Management (3:15)
M.1.4.5 SAM File and System Files (5:38)
M.1.4.6 Password Hashing (5:50)
M.1.4.7 Process and Threads (3:36)
M.1.4.8 Windows Registry (3:23)
M.1.4.8.A Windows Registry (Lab) (4:19)
M.1.4.9 Windows Commands (4:37)
M.1.4.9.A Windows Basic Commands (Lab) (7:54)
M.1.4.10 Windows Server 2016 Architecture (9:15)
M.1.4.11 Active Directory (21:48)
M.1.4.12 Kerberos (6:17)
M.1.4.13 Security Identifier (SID) (2:44)
M.1.4 Windows Fundamentals (PDF)
Module 1: Fundamentals, Section 5
M.1.5.1 Introduction to Unix and Linux (10:46)
M.1.5.2 File System (13:31)
M.1.5.3 Linux Commands (7:04)
M.1.5.4 File Permissions (9:14)
M.1.5.4.A Kali and Various Linux Commands (Lab) (8:37)
M.1.5.4.B Kali and Various Linux Commands (Lab) (2:24)
M.1.5.5 Kali Linux Introduction (1:44)
M.1.5 Linux Fundamentals (PDF)
Fundamentals Quiz
Test Your Learning: Easy
Test Your Learning: Medium
Test Your Learning: Difficult
Module 2: Network Security, Section 1
M.2.1.1 Reconnaissance (12:23)
M.2.1.1.A Reconnaissance (Lab) (4:09)
M.2.1.1.B Reconnaissance (Lab) (1:52)
M.2.1.1.C Reconnaissance (Lab) (1:30)
M.2.1.1.D Reconnaissance (Lab) (0:43)
M.2.1.2 Packet Crafting (3:30)
M.2.1.2.A Packet Crafting (Lab) (2:04)
M.2.1.2.B Packet Crafting (Lab) (3:40)
M.2.1.2.C Packet Crafting (Lab) (2:00)
M.2.1.2.D Packet Crafting (Lab) (1:00)
M.2.1.3 Network Mapper Nmap (12:16)
M.2.1.3.A Network Mapper, Nmap (Lab) (4:42)
M.2.1.3.B Network Mapper, Nmap (Lab) (4:03)
M.2.1.3.C Network Mapper, Nmap (Lab) (0:55)
M.2.1.3.D Network Mapper, Nmap (Lab) (2:34)
M.2.1.4 Testing a firewall (4:05)
M.2.1.5 Hacking Servers (5:19)
M.2.1.6 Netcat and Ncat (4:01)
M.2.1.6.A Netcat and Ncat (Lab) (2:00)
M.2.1.6.B Netcat and Ncat (Lab) (1:44)
M.2.1.7 Testing Common services and protocols (2:20)
M.2.1.7.A Testing Common services and protocols (Lab) (1:50)
M.2.1.7.B Testing Common services and protocols (Lab) (5:50)
M.2.1.8 DNS (4:30)
M.2.1.8.A DNS (Lab) (1:14)
M.2.1.9 SNMP (5:06)
M.2.1.10 VPN (7:03)
M.2.1.10.A VPN (Lab) (2:30)
M.2.1.11 Hacking Passwords (7:49)
M.2.1.11.A Hacking Passwords Using Hydra (Lab) (1:55)
M.2.1.11.B Hacking Passwords Using John the Ripper (Lab) (1:10)
M.2.1.11.C Hacking Passwords Using Crunch (Lab) (2:02)
M.2.1.11.D Hacking Passwords Using Mimikatz (Lab) (3:10)
M.2.1.12 Nessus (1:59)
M.2.1.12.A Nessus (Lab) (4:58)
M.2.1.12.B Nessus (Lab) (1:15)
M.2.1.13 Buffer Overflow (1:12)
M.2.1.14 Metasploit Framework (10:36)
M.2.1.14.A Metasploit Framework (Lab) (1:25)
M.2.1.15 Introduction to PowerShell (1:41)
M.2.1.16 MITM ARP Poisoning (4:02)
M.2.1.16.A MITMARP Poisoning (Lab) (2:15)
M.2.1.17 SYN Flood (1:42)
M.2.1.17.A Smurf Attack (Lab) (0:44)
M.2.1.17.B Fraggle Attack (Lab) (0:42)
M.2.1.18 Network Architecture Review (4:01)
M.2.1.18.A Network Architecture Review (Lab) (1:50)
M.2.1 Network Security (PDF)
Module 2: Network Security, Section 2
M.2.2.1 Introduction to Network Security & Terminologies (11:57)
M.2.2.2 Wi-Fi Frames (5:25)
M.2.2.3 Wireless Hacking Methodology (2:27)
M.2.2.4 Authentication Methods and Types of WLAN Attacks (2:52)
M.2.2.5 WEP (4:40)
M.2.2.6 WPA/WPA-2 (4:38)
M.2.2.7 Differences in WEP, WPA and WPA-2 (7:18)
M.2.2.8 Bypassing WPA2 using Aircrack-ng (4:29)
M.2.2.8.A Aircrack-ng Setup (Lab) (1:12)
M.2.2.8.B WPA2 Bypass Aircrack-ng (Lab) (2:43)
M.2.2.9 Evil Twin (1:30)
M.2.2.9.A Evil Twin (3:15)
M.2.2.10 WPA3 and Wi-Fi Guideline (2:01)
M.2.2 Wi-Fi Sec (PDF)
Network Security Quiz
Test Your Learning: Easy
Test Your Learning: Medium
Test Your Learning: Difficult
Module 3: Server Security, Section 1
M.3.1.1 Introduction to Database and Database Security (2:31)
M.3.1.2 Database Fundamentals (3:29)
M.3.1.3 Database Management Systems (DBMS) (2:56)
M.3.1.4 Understanding SQL Statements (1:25)
M.3.1.4.A Understanding DDL Statements (Lab) (0:52)
M.3.1.5 Understanding DML Statements (0:57)
M.3.1.5.A Understanding DML Statements (Lab) (0:25)
M.3.1.6 Understanding DCL Statements (1:26)
M.3.1.6.A Understanding DCL Statements (Lab) (1:57)
M.3.1.7 Stored Procedures (1:01)
M.3.1.7.A Stored Procedures (Lab) (0:52)
M.3.1.8 Views (1:11)
M.3.1.8.A Views (Lab) (0:26)
M.3.1.9 Introduction to Oracle (9:16)
M.3.1.10 Securing Oracle Parameters (0:22)
M.3.1.10.A Securing Oracle Parameters (Lab) (0:20)
M.3.1.10.B Securing Oracle Parameters (Lab) (0:10)
M.3.1.10.C Securing Oracle Parameters (Lab) (0:14)
M.3.1.10.D Securing Oracle Parameters (Lab) (0:12)
M.3.1.10.E Securing Oracle Parameters (Lab) (0:11)
M.3.1.10.F Securing Oracle Parameters (Lab) (0:11)
M.3.1.11 User and Profiles (0:55)
M.3.1.11.A User and Profiles (Lab) (0:55)
M.3.1.12 Roles and Privileges (4:01)
M.3.1.12.A Roles and Privileges (Lab) (0:45)
M.3.1.12.B Roles and Privileges (Lab) (0:20)
M.3.1.13 Oracle SID (0:13)
M.3.1.14 Using Tools (1:28)
M.3.1.15 Big Data (1:15)
M.3.1.16 Introduction to MongoDB (3:07)
M.3.1.16.A Introduction to MongoDB (Lab) (1:32)
M.3.1.17 Hadoop (2:13)
M.3.1 Database Security (PDF)
Module 3: Server Security, Section 2
M.3.2.1 Introduction to Windows Security (9:04)
M.3.2.2 Security Policies (14:26)
M.3.2.2.A Security Policies (Lab) (4:12)
M.3.2.3 Event Log (2:08)
M.3.2.3.A Event Log (Lab) (3:05)
M.3.2.4 Windows General Security Best Practices (10:43)
M.3.2.4.A Windows General Security Best Practices (Lab) (4:35)
M.3.2.4.B Windows General Security Best Practices (Lab) (3:37)
M.3.2.5 Windows Operating System Hardening (27:35)
M.3.2 Windows Security (PDF)
Module 3: Server Security, Section 3
M.3.3.1 Introduction to Linux Security (7:52)
M.3.3.1.A GRUB Security (Lab) (2:58)
M.3.3.2 Linux Security (20:10)
M.3.3.3 Linux Security Model (12:31)
M.3.3.4 Linux Operating System Hardening (3:40)
M.3.3 Linux Security (PDF)
Module 3: Server Security, Section 4
M.3.4.1 IIS Server Security (2:13)
M.3.4.1.A IIS Server Security (Lab) (5:27)
M.3.4.2 Apache Server Security (0:48)
M.3.4.2.A Apache Server Security (Lab) (5:32)
M.3.4 IIS & Apache (PDF)
Server Security Quiz
Test Your Learning: Easy
Test Your Learning: Medium
Test Your Learning: Difficult
Module 4: Web Application Security
M.4.1.1 Introduction to Web Applications (2:28)
M.4.1.2 Case Studies (17:26)
M.4.1.3 Web Applications Brief (7:41)
M.4.1.4 HTML and JavaScript (5:03)
M.4.1 Web Application Security - Introduction (PDF)
Module 4: Web Application Security, Section 2
M.4.2.1 Introduction to OWASP TOP 10 (3:25)
M.4.2.2.A.1 Injection and Error-based Injection (Lab) (9:10)
M.4.2.2.A Injection and Error-based Injection (Lab) (6:14)
M.4.2.3 Authentication Bypass using SQL Injection (1:39)
M.4.2.3.A Authentication Bypass using SQL Injection (Lab) (3:20)
M.4.2.4 Blind Injection using SQLMap (5:05)
M.4.2.4.A Blind Injection using SQLMap (Lab) (2:45)
M.4.2.5 SQL Injection Mitigations (10:25)
M.4.2.6 Command Injection (7:02)
M.4.2.6.A Command Injection (Lab) (2:08)
M.4.2.7.A2 Broken Authentication (5:52)
M.4.2.7.A Brute Force (Lab) (2:52)
M.4.2.7.B Brute Force (Lab) (3:22)
M.4.2.8 Session Management (8:39)
M.4.2.8.A Session Management (Lab) (2:23)
M.4.2.9.A3 Sensitive Data Exposure (3:53)
M.4.2.9.A.A3 Sensitive Data Exposure (Lab) (1:45)
M.4.2.10.A3 Insufficient Transport Layer Security (6:27)
M.4.2.10.A.A3 Insufficient Transport Layer Security (Lab) (1:11)
M.4.2.11 A4 XXE (9:30)
M.4.2.11.A.A4 XXE (Lab) (2:10)
M.4.2.12.A5 Broken Access Control IDOR (5:45)
M.4.2.12.A.A5 Broken Access Control IDOR (Lab) (1:08)
M.4.2.13.A5 Broken Access Control MFLAC (6:05)
M.4.2.13.A.A5 Broken Access Control MFLAC (Lab) (0:51)
M.4.2.13.B.A5 Broken Access Control MFLAC (Lab) (1:00)
M.4.2.13.C.A5 Broken Access Control MFLAC (Lab) (2:36)
M.4.2.14.A6 Security Misconfiguration (6:41)
M.4.2.14.A.A6 Security Misconfiguration (Lab) (1:55)
M.4.2.14.B.A6 Security Misconfiguration (Lab) (1:00)
M.4.2.14.C.A6 Security Misconfiguration (Lab) (1:35)
M.4.2.15.A7 Cross Site Scripting (XSS) (18:42)
M.4.2.15.A.A7 Cross Site Scripting (XSS) (Lab) (3:24)
M.4.2.16.A8 Insecure Deserialization (4:55)
M.4.2.17.A9 Using Components with Known Vulnerabilities (5:10)
M.4.2.17.A.A9 Using Components with Known Vulnerabilities (Lab) (2:03)
M.4.2.18.A10 Insufficient Logging and Monitoring (4:30)
M.4.2 Web Application Security OWASP10 (PDF)
Module 4: Web Application Security, Section 3
M.4.3.1 Browser-based Vulnerabilities (2:57)
M.4.3.2 Clickjacking (3:01)
M.4.3.2.A Clickjacking (Lab) (2:16)
M.4.3.3 POODLE (3:56)
M.4.3.4 WebDav (3:58)
M.4.3.5 WASC (3:37)
M.4.3.6 Security Frameworks (15:05)
M.4.3.7 SDLC (22:04)
M.4.3.8 WAF (7:53)
M.4.3.9 Case Study Penetrating a Bank (3:26)
M.4.3.10 Content Spoofing (3:24)
M.4.3.11 Fingerprinting (1:53)
M.4.3.12 Advanced Recon (0:51)
M.4.3 Web Application Security WAF (PDF)
Web Application Security Quiz
Test Your Learning: Easy
Test Your Learning: Medium
Test Your Learning: Difficult
Module 5: Digital Forensics And SOC, Section 1
M.5.1.1 Introduction to Digital Forensics (2:00)
M.5.1.2 Case Studies (2:24)
M.5.1.3 CERT, CERT-IN and Cyber Cells (2:45)
M.5.1.4 Legal Issues (3:43)
M.5.1.5 Chain of Custody (0:41)
M.5.1.6 Types of Cyber Crime (9:43)
M.5.1.7 The Basic Forensic Process and the 6 As of Forensics (9:51)
M.5.1.8 Forensics Tools and Techniques (3:00)
M.5.1 Introduction to Forensics (PDF)
Module 5: Digital Forensics And SOC, Section 2
M.5.2.1 Understanding the Hard Disk (36:27)
M.5.2.2 Disk Imaging (14:15)
M.5.2.2.A Disk Imaging (Lab) (1:50)
M.5.2.2.B Understanding the Hard Disk (Lab) (4:38)
M.5.2.3 Password Cracking (4:49)
M.5.2.4 Physical Protection of Evidence (1:31)
M.5.2.5 Log Analysis (2:57)
M.5.2 Disk Based and Log Analysis (PDF)
Module 5: Digital Forensics And SOC, Section 3
M.5.3.1 Introduction to Malware Analysis And Malware Types (3:41)
M.5.3.2 Techniques of Malware Analysis (8:22)
M.5.3.2.A Techniques of Malware Analysis (Lab) (5:25)
M.5.3.2.B Techniques of Malware Analysis (Lab) (1:12)
M.5.3.3 Virus Total (1:46)
M.5.3 Malware Analysis (PDF)
Module 5: Digital Forensics And SOC, Section 4
M.5.4.1 Email Forensics (8:28)
M.5.4.1.A Email Forensics (Lab) (2:45)
M.5.4.2 USB Forensics (3:30)
M.5.4.2.A USB Forensics (Lab) (1:46)
M.5.4.3 Memory Forensics (6:23)
M.5.4.4 Analyzing Stuxnet with Volatility (8:36)
M.5.4.4.A Analyzing Stuxnet with Volatility (Lab) (3:58)
M.5.4.4.B Analyzing Stuxnet with Volatility (Lab) (0:45)
M.5.4 Email USB and Memory Forensics (PDF)
Module 5: Digital Forensics And SOC, Section 5
M.5.5.1 Mobile Forensics and Tools and Techniques (5:42)
M.5.5.2 Mobile Forensics Challenges (3:01)
M.5.5.3 Mobile Forensics Methodology, Forensic Imaging and adb Commands (3:29)
M.5.5.3.A Mobile Forensics Methodology, Forensic Imaging and adb Commands (Lab) (2:02)
M.5.5 Mobile Forensics (PDF)
Module 5: Digital Forensics And SOC, Section 6
M.5.6.1 Introduction to Network Forensics (10:14)
M.5.6.1.A Introduction to Network Forensics (Lab) (6:10)
M.5.6.2 Wireless and SSL Forensics (2:19)
M.5.6.3 Internet History Browser Forensics (1:00)
M.5.6.3.A Internet History Browser Forensics (Lab) (1:35)
M.5.6 Network Forensics (PDF)
Module 5: Digital Forensics And SOC, Section 7
M.5.7.1 Windows Live Forensics (5:34)
M.5.7.1.A Windows Live Forensics (Lab) (4:05)
M.5.7.2 Linux Live Forensics (4:22)
M.5.7.2.A Linux Live Forensics (Lab) (2:57)
M.5.7 Live Forensics (PDF)
Module 5: Digital Forensics And SOC, Section 8
M.5.8.1 Incident Response (2:44)
M.5.8.2 Components of Incident Response and Incident Response Team (3:56)
M.5.8.3 Incident Response Methodology and Sysinternals (10:26)
M.5.8 Incident Response (PDF)
Digital Forensics and SOC Quiz
Test Your Learning: Easy
Test Your Learning: Medium
Test Your Learning: Difficult
Module 6: Compliance, Section 1
M.6.1.1 Agenda (1:33)
M.6.1.2 Introduction to ISMS (1:55)
M.6.1.3 Need for an ISMS and its Benefits (2:32)
M.6.1.4 ISO 27001 (6:46)
M.6.1.5 Understanding Controls (3:46)
M.6.1.6 Introduction to ISO 27001:2013 standard (2:38)
M.6.1.7 Understanding the structure of the standard (3:13)
M.6.1.8 ISO 27001:2013 Domains (2:55)
M.6.1.9 Overview of ISMS implementation (6:02)
M.6.1.10 Risk Assessment Treatment (4:35)
M.6.1.11 Documentation Review (4:13)
M.6.1.12 ISMS Training (5:06)
M.6.1.13 ISMS Documentation (4:22)
M.6.1.14 Audit (7:47)
M.6.1.15 Case Studies (5:19)
M.6.1 ISMS (PDF)
Module 6: Compliance, Section 2
M.6.2.1 Agenda (2:07)
M.6.2.2 Introduction to BCM (5:43)
M.6.2.3 Business Continuity Planning (3:49)
M.6.2.4 Issues in BCM (1:52)
M.6.2.5 Risk Control Options (3:50)
M.6.2.6 Disaster Recovery Plan (5:20)
M.6.2.7 Maintenance of BCM Plan (3:32)
M.6.2.8 Business Impact Analysis (5:59)
M.6.2.9 Backup Sites (8:24)
M.6.2.10 Backup Considerations and Backup Types (11:18)
M.6.2.11 ISO 22301 and ISO 22301 Requirements (11:36)
M.6.2.12 Mandatory Documents of ISO 22301 and Benefits (2:34)
M.6.2 BCM (PDF)
Module 6: Compliance, Section 3
M.6.3.1 Agenda (2:28)
M.6.3.2 Introduction to PCI DSS (2:50)
M.6.3.3 Common terms related to PCI DSS (1:12)
M.6.3.4 Entities Involved in Payment Card Transactions (2:10)
M.6.3.5 Data on Payment Card and Technologies (23:14)
M.6.3.6 Consequences of Compromised Payment Card Data (1:02)
M.6.3.7 Need and Application of PCI DSS (2:59)
M.6.3.8 Steps for Adhering to PCI DSS (0:51)
M.6.3.9 Compliance Requirements for PCI DSS (18:52)
M.6.3.10 Levels of PCI Compliance (2:02)
M.6.3.11 Do’s and Don’ts for Payment Card Security (6:02)
M.6.3.12 SAQ and QSA (5:09)
M.6.3.13 PA-DSS and its Requirements (16:46)
M.6.3.14 Pin Transaction Security (PTS) (1:36)
M.6.3.15 Payment Card Data Breaches and Myths (4:53)
M.6.3 PCIDSS (PDF)
Compliance Quiz
Test Your Learning: Easy
Test Your Learning: Medium
Test Your Learning: Difficult
M.1.2.6 OSI Model
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock