Opening Section
  • Orientation
  • Purpose of this Course
Build Your Lab - In the Future We will offer an Online Solution
  • Create A VeraCrypt Container to Protect Your Laptop or Desktop
  • Utilities, Cheat Sheets, Various Items You really only Want to Download Once
  • Build a Manual Lab 01
  • Lab Legalities
  • Housekeeping
  • Getting to Know Your XPAttacker VM
  • Getting to Know Your Win2k VM
  • Getting to Know You Win7 VM
  • Getting to Know Your Win2k3-AD
  • Getting to Know Your WebApp
  • Putting Our Lab Together Step By Step
  • Tying everything together in our Lab
Ethical Hacking Overview
  • Introduction to Pentesting and Ethical Hacking
  • Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro
  • Defintion of a Penetration Test
  • The Evolving Threat
  • The Vulnerabilty Lifecycle
  • Map.Norsecorp.com
  • Botnet Definition
  • Defense in Depth
  • MetaData
  • Types of PenTests
  • Types of Hackers
  • Common Definitions
  • Hacker vs. Penetration Tester
  • Penetration Testing Terminology
  • Essential Terminology
  • OSSTMM Methodology
  • Tools vs Technique
  • Things are not always as they seem
  • Calculating Risk & Formulas
  • Analyzing Findings
  • Calculating SLE, ARO, ALE
  • Other Penetration Testing Methodologies
  • Section Quiz - Ethical Hacking Overview 1
  • Section Quiz - Ethical Hacking Overview 2
  • Section Quiz - Ethical Hacking Overview 3
FootPrinting - Reconnaissance and Information Gathering
  • Introduction to Footprinting
  • What Information is Gathered by the Hacker
  • Methods of Obtaining Information And Physical Access
  • Social Access
  • Digital Access
  • Passive vs Active Reconnaissance
  • Footprinting Defined
  • Exercise: Footprinting Tool: Maltego
  • Most Powerful Hacking Tool on the Internet Today
  • Instructor Demonstration - The Power of Google -A
  • Instructor Demonstration - The Power of Google -B
  • Instructor Demo: GoogleAlerts
  • Removing Searchable Content
  • Internet Archive: The WayBack Machine
  • Domain Name Registration-WhoIs Information
  • Instructor Demonstation - CentralOps
  • DNS Databases
  • Traceroute Operation
  • InstructorDemonstration: Online Tools
  • Spokeo - No Refuge for the Wealthy
  • Netcraft, DoaminsbyProxy, Countermeasures
  • Section Quiz - FootPrinting - Reconnaissance and Information Gathering 1
  • Section Quiz - FootPrinting - Reconnaissance and Information Gathering 2
Linux Overview
  • Introduction to Linux
  • Linux History - Linus + Minux = Linux
  • Linux GUI Desktops
  • Linux Shell Linux Bash Shell
  • Passwd & Shadow File Formats
  • InstructorDemo:User Account Management
  • Tarballs & Zips & Installing VMware Tools
  • Compiling Programs in Linux, Shell Shock, Poodle Vulnerability
  • Most Popular Linux Security Distribution
  • Section Quiz - Linux
Detecting Live Systems - Port Scanning
  • Introduction to Port Scanning
  • Introduction to Port Scanning
  • TCP/IP Stack
  • TCP 3-Way HandShake
  • NMap ServiceVersion Detection And Demo
  • Instructor Demonstration-Engage, NmapScans
  • Hping3, NMap -O
  • Fuzzy Logic
  • Countermeasures: Scanning
  • NMap Assignment
  • Section Quiz - Port Scanning 1
  • Section Quiz - Port Scanning 2
  • Section Quiz - Port Scanning 3
Enumeration - What Can We Get For Free?
  • Intro to Enumeration
  • Grabbing Banners
  • Shodan
  • ZoneTransfers
  • SNMP Enumeration.
  • SNMP Countermeasures, AD and AD Countermeasures
  • Null Sessions
  • Section Quiz - Enumeration