Get $1 credit for every $25 spent!

The 2022 Ultimate Cybersecurity Analyst Preparation Bundle

Ending In:
Add to Cart - $29.99
Add to Cart ($29.99)
$1,600
98% off
wishlist
Courses
8
Lessons
462
Enrolled
1,129

What's Included

Product Details

Access
Lifetime
Content
1.0 hours
Lessons
22

CySA+ Cybersecurity Analyst Certification Preparation Course (2022)

Hone Your Expertise on Cybersecurity & Easily Pass the CompTIA CySA+ on Your First Try

By Chris Mall | in Online Courses

The main goal of this course is to make sure you are ready to pass the CompTIA CySA+ Certification Exam. It covers the four objective domains in the exam: Threat Management, Vulnerability Management, Cyber Incident Response, and Security Architecture and Tool Sets. This course will improve your security skills and prepare you to pass the certification on your first try.

4.8/5 average rating: ★ ★ ★ ★

  • Access 22 lectures & 1 hour of content 24/7
  • Take & pass the Cybersecurity Analyst exam and become CompTIA CySA+ Certified
  • Know what different types of cybersecurity tools are on the market and which to use in different scenarios
  • Properly assess the threats & vulnerabilities to your network and cloud
  • Set up a strong security architecture for your networks
  • Understand threat management concepts & how to conduct a cyber incident response
  • Understand proper security architecture for your enterprise networks & clouds
  • Learn skills to break into a career in information security analysis.
Dr. Chris Mall | Scratch, C#, GDPR, Java, Python, C++, Flutter, CySA+
4.5/5 Instructor Rating: ★ ★ ★ ★

Dr. Chris Mall holds a Ph.D. in Computer Science, Software Development and multiple information technology professional certifications, including CySA+, PRINCE2 Practitioner, and Information Technology Infrastructure Library ITIL v3. He also holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance, GDPR compliance and development of mobile applications in novel technologies like Google Flutter and Dart.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction to CompTIA CYSA+ & How It All Works
    • Introduction to CompTIA CYSA+ Preparation Course & How It All Works - 3:43
    • Introduction to CompTIA CYSA+ Exams - 7:21
  • Threat Management
    • CIA Triad - 5:23
    • Cybersecurity Risks and Threats - 6:42
    • Identify Threats - 3:01
  • Vulnerability Management
    • Identify Vulnerabilities - 2:28
    • Building a Secure Network: Network Access Control (NAC) - 7:51
  • Cyber Incident Response
    • Firewall & Network Perimeter Security - 7:20
    • Hardening System Configurations - 9:20
    • Penetration Testing - 7:56
    • Reverse Engineering - 2:46
  • Security Architecture and Tool Sets
    • Reconnaisance and Intelligence Gathering - 11:14
    • Vulnerability Management Platforms & Passive Footprinting - 3:18
    • Analyzing Passive Footprinting - 4:56
    • Gathering Organizational Intelligence - 3:17
    • Detecting Reconnaisance - 5:31
    • Requirements for Vulnerability Scanning - 3:01
    • Scan Targets - 2:41
    • Scan Frequency - 4:54
    • Maintain Vulnerability Scanners - 3:20
    • Remediation Workflows - 6:20
  • Last Revision Before the Exams
    • Last Revision Before the Exams

View Full Curriculum


Access
Lifetime
Content
6.0 hours
Lessons
23

PenTesting with OWASP ZAP: Mastery Course

Must-Have Tool Mastery for Hackers, PenTesters, Developers, Coders & Experienced Security Professionals

By Atul Tiwari | in Online Courses

The ZAP is a fine-grained tool that every penetration tester, hacker, and developer must have in their arsenal and hence required a solid understanding and training to perform security testing from its core. This course enables you to test web applications, automated testing, manual testing, fuzzing web applications, perform bug hunting and complete web assessment using ZAP.

4.1/5 average rating: ★ ★ ★ ★

  • Access 23 lecture & 6 hours of content 24/7
  • Uncover hidden bugs & vulnerabilities
  • Use ZAP & burp suite at the same time
  • Invoke hacking applications in ZAP
  • Know the hidden power of ZAP to assess web applications
  • Use ZAP for Bug bounty hunting
  • Use SQLmap, Nmap, Nikto, & all tools in kali linux with and in ZAP UI simultaneously
Atul Tiwari | Ethical Hacker, Security Evangelist, Penetration Tester
4.4/5 Instructor Rating: ★ ★ ★ ★

Atul Tiwari has more than 7 years of working experience in the information security field. He has trained more than 3,000 students in information security and penetration testing. With his expertise in web application penetration testing, Atul has performed penetration tests, security audits, and security analyses for private enterprise, governments, and security agencies to assist with cyber threats.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Intro About the ZAP
    • Things to know about OWASP ZAP - 23:34
    • ZAP course guide
  • Configuration of ZAP
    • Installing ZAP on multi platform - 18:44
    • Six elements of the ZAP - Desktop UI - 12:15
    • ZAP marketplace and add-ons - 9:10
    • Configuration of ZAP - 31:46
    • Scan policy manager - config - 24:49
    • ZAP attack modes - 15:46
  • Attacking the applications with ZAP
    • Automated attack under 5 minutes - 17:56
    • Spidering the target - 24:12
    • Fuzzing targets in action - 23:30
    • Active scanning attacks - 22:11
    • Break points and Requestor - 15:21
    • Setting breakpoints on GET request OWASP ZAP - 8:47
    • Authentication & session management in ZAP - 25:23
    • Forced browsing DIRs and Files using ZAP - 12:22
    • ZAP Scripting attacks & Recording Zest Script, Python, JavaScript - 24:13
    • Invoking applications into ZAP - 16:38
    • Invoking Burp suite into ZAP - Best strategy - 9:24
    • HUD mode - Heads-up display - 17:27
    • ZAP API testing - 15:14
    • Other useful tools add-ons inside zap - 29:02
    • Generating Reports in multiple format - 6:55

View Full Curriculum


Access
Lifetime
Content
8.0 hours
Lessons
32

Mastering Burp Suite Community Edition: Bug Hunters Perspective

Learn Burp Suite Community Edition to Use It Effectively as an Ethical Hacker, Web Security Tester, or Bug Bounty Hunter

By Atul Tiwari | in Online Courses

Bug bounty hunting is on the hype nowadays. Most security researchers are hunting for bugs and earning bounties in day-to-day life. It becomes crucial to know the right set of rules and know the right methodologies to hunt bugs. In most cases, researchers use the Burp suite community edition that gives fine-grained tools and strategies to assist in hunting and finding bugs on the target platforms. This course is perfectly focused on how Burp suites can be used effectively to enhance the hunter's ability to find more bugs.

4.5/5 average rating: ★ ★ ★ ★

  • Access 32 lectures & 8 hours of content 24/7
  • Walk through the Burp suite basics
  • Intercept proxy & site map configurations
  • Hunt & find bugs on target platforms
  • Enhance your hunter's ability to find more bugs
Atul Tiwari | Ethical Hacker, Security Evangelist, Penetration Tester
4.4/5 Instructor Rating: ★ ★ ★ ★

Atul Tiwari has more than 7 years of working experience in the information security field. He has trained more than 3,000 students in information security and penetration testing. With his expertise in web application penetration testing, Atul has performed penetration tests, security audits, and security analyses for private enterprise, governments, and security agencies to assist with cyber threats.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • HTML web applications understanding

Course Outline

  • Module 1
    • Labenvironmentsandburpinstallations - 13:30
    • Burpsuiteversionsandacademy - 6:57
    • BurpCAcertificateforSSLTLS - 8:56
    • Burpsuitewalkthough-Basics - 15:41
    • Interceptingproxyandsitemap_configs - 26:47
    • Interceptingmobiledevice_traffics - 12:15
    • Invisibleproxyingfornon-proxyaware_client - 11:38
    • Authenticationbypassandinformationdisclosure_LABs - 17:58
  • Module 2
    • BurpDashboardandlivetask - 16:20
    • BurpUserOptionsProjectOptionscustomisations - 21:51
    • Repeatermoduletestings - 19:06
    • BurpintruderConfigurations - 15:21
    • BurpIntruderattacktypes-_Attacks - 19:50
    • Usernamesgenerator - 9:30
    • Payloadprocessingand_bruteforcer - 9:07
    • Grep-Match_Grep-extractwithclustorbomb - 26:20
    • SomeBestpayloadstypeusedandhiddenformfields - 13:30
    • Unrestrictedfileupload-exetension_type - 5:30
    • Unrestrictedfileupload-content_type - 6:29
  • Module 3
    • MatchandReplacestrategyfor_automation - 15:47
    • UsingHotKeysforburpsuite - 15:08
    • BurpmacrosandsessionhandlingwithAnti-CSRF_token - 36:21
    • Burpsequenceranticsrftokenanalysis - 20:00
    • ComparingsitemapsforAccess_control - 15:45
    • InvokingBurpsuiteintoZAP-Best_strategy - 9:24
  • Module 4
    • ManualTestingmethods - 6:44
    • TurboIntruder-Knownfor_speed - 16:30
    • Bestusedextensionbyhunters - 15:58
    • Testingmethodlogiesinanutshell-XSS_attacks - 28:26
    • Burp_macros - 36:21
    • Resources for beginer Hunters - XSS Hunters - 15:49
    • Final Quiz MCQs

View Full Curriculum


Access
Lifetime
Content
9.0 hours
Lessons
73

Cyber Security Analyst & Enterprise Architecture

Prevent, Detect, & Combat Cybersecurity Threats and Improve Overall State of IT Security

By Stone River eLearning | in Online Courses

As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioral analytics skills covered by CSA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. This course prepares you for CompTIA CSA+ and validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.

4.2/5 average rating: ★ ★ ★ ★

  • Access 73 lectures & 9 hours of content 24/7
  • Configure & use threat detection tools.
  • Perform data analysis.
  • Interpret the results to identify vulnerabilities, threats, & risks to an organization.
  • Pass the CompTIA CSA+ on your first attempt

4.2/5 Instructor Rating: ★ ★ ★ ★

Stone River eLearning offers easy-to-understand online courses for everyday people. They are very passionate about teaching people topics that they are interested in - from technology to business, to education. Stone River eLearning offers high-quality courses that take you from beginner to expert in a matter of hours.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Course Introduction
    • Welcome Aboard - 4:03
    • Cyber Security Analyst - 9:12
    • Cyber Security Analyst Domain - 6:18
    • Cybersecurity Analyst Bootcamp Overview - 15:21
  • CySA Job Role
    • Cybersecurity Analysts Part 1 - 17:52
    • Cybersecurity Analysts Part 2 - 19:06
  • Reconnaissance Techniques
    • Reconnaissance Techniques part 1 - 16:14
    • Reconnaissance Techniques part 2 - 17:45
    • Reconnaissance Techniques part 3 - 19:48
    • Reconnaissance Techniques part 4 - 6:33
    • Social Engineering Toolset - 3:02
    • Netcraft - 2:18
    • Htrack - 2:44
    • Fireye - 2:56
    • NMAP - 2:23
    • Sysinternals - 1:58
    • Enhanced Migration Tool - 3:16
  • Security Appliances
    • Security Appliances Part 1 - 19:19
    • Security Appliances Part 2 - 8:18
    • Palo Alto Networks - 6:36
    • Fortinet - 4:46
  • Logging and Access
    • Logging and Analyst Part 1 - 19:39
    • Logging and Analyst Part 2 - 11:51
  • Managing Vulnerabilities
    • Managing Vulnerabilities Part 1 - 18:29
    • Managing Vulnerabilities Part 2 - 14:36
    • Microsoft Security Baseline - 0:57
    • Metasploit - 1:19
    • NIST SCAP - 1:47
    • Computer Security Resource Center - 1:06
  • Remediating Vulnerabilities
    • Remediating Vulnerabilities part 1 - 19:11
    • Remediating Vulnerabilities part 2 - 9:44
    • SANS Institute - 1:43
  • Secure Software Development
    • Software Development Security part 1 - 18:16
    • Software Development Security Part 2 - 14:37
    • Owasp - 0:38
    • Incident Response - 13:43
    • Computer Emergency Response team - 2:12
  • Computer Forensics
    • Forensics Tools Part 1 - 19:35
    • Forensics Tools Part 2 - 10:23
    • Guidance Encase - 1:08
  • Analyzing Analysis and Recovery
    • Incident Analysis And Recovery Part 1 - 19:15
    • Incident Analysis And Recovery Part 2 - 12:55
  • Secure Network Design
    • Secure Network Design - 15:39
    • Toms IT Pro - 2:12
  • Identity and Access Management (IAM)
    • Managing Identities and Access Part 1 - 19:16
    • Managing Identities and Access Part 2 - 12:43
    • Tripwire - 2:03
  • IT Security Frameworks
    • Security Frameworks and Policies Part 1 - 19:30
    • Security Frameworks and Policies Part 2 - 13:58
    • NIST Cybersecurity Framework - 1:34
  • Cloud Computing Security Tools
    • Top 10 Security Tools - 1:49
    • O365 Cloud Security - 2:17
    • MS Cloud Security Tools - 4:59
    • Okta - 1:34
    • Sophos - 2:01
    • Sophos Lab - 1:01
  • Department of Defense Requirements (DOD)
    • Dept of Defense Workforce - 1:35
    • Dept of Defense Workforce Directive (8570) - 2:02
    • Dept of Defence Security Technical Implementation Guides (STIG) - 3:03
    • Fedramp - 1:21
  • Taking the CySA Exam
    • CompTIA Certifications - 7:28
    • CompTIA Exam Preparations - 1:06
    • CompTIA Cybersecurity Roadmap - 3:39
  • CompTIA Continuing Education
    • CompTIA Certmetrics - 2:42
    • CompTIA Certifcation Renewal - 9:58
    • CompTIA Cybersecurity Hub - 1:25
  • Job Search Tips
    • Linked In Job Search - 5:59
    • Cleared Connections - 1:18
    • Dice - 1:28
    • Intelligence Careers - 2:48
  • Course Closeout
    • CSA Exam Registration - 8:49
    • Become a CompTIA Subject Matter Expert - 5:15
    • CYSA Practice Exams - 0:31

View Full Curriculum


Access
Lifetime
Content
11.0 hours
Lessons
107

Learn Social Engineering From Scratch

Hack Into Accounts & Personal Devices and Protect Yourself From Hackers

By iSecur1ty | in Online Courses

This course is focused on the practical side of penetration testing without neglecting the theory. In this course, you'll start with the basics of social engineering and elevate to an advanced enough level to be able to hack into all major operating systems, generate different types of Trojans, and deliver them using smart social engineering practices. Focused on the practical side of penetration testing, you'll first set up a lab before getting real practice with penetration testing that will help you build a career and protect yourself from malicious hacking.

4.6/5 average rating: ★ ★ ★ ★

  • Access 107 lectures & 11 hours of content 24/7
  • Learn how to gather information about your target
  • Generate evil files like backdoors, keyloggers, credential harvesters, & more for Windows, macOS, and Linux
  • Discover a number of social engineering methods to deliver Trojans to a target like creating fake websites
  • Interact with the systems you've compromised by accessing the file system, escalating your privileges, & more
  • Protect yourself & your systems from these attacks
iSecur1ty | Leading Provider of Ethical Hacking & Cyber Security Training
4.6/5 Instructor Rating: ★ ★ ★ ★

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty. iSecur1ty is a leading provider of ethical hacking and cyber security training, we teach hacking and security to help people become ethical hackers so they can test and secure systems from black-hat hackers.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • Teaser - Hacking An Android Phone & Accessing The Camera - 5:36
    • Introduction to Social Engineering - 3:14
    • Course Overview - 4:16
  • Preparation - Creating a Penetration Testing Lab
    • Lab Overview & Needed Software - 7:48
    • Installing Kali 2020 As a Virtual Machine Using a Ready Image - 10:34
    • Installing Windows As a Virtual Machine - 3:22
    • Installing Ubuntu As a Virtual Machine - 7:05
  • Preparation - Linux Basics
    • Basic Overview Of Kali Linux - 5:10
    • The Linux Terminal & Basic Linux Commands - 9:07
    • Creating & Using Snapshots - 5:36
  • Information Gathering
    • Introduction - 1:52
  • Information Gathering - Gathering Info About A Company/Website
    • Maltego Overview - 6:02
    • Discovering Domain Info & Emails Associated With Target - 7:24
    • Discovering Information About Hosting Company, Support Team Emails & Admin Email - 6:56
    • Discovering Files, Links, Websites & Other Companies Related To Target - 5:12
    • Using The Gathered Info To Build An Attack Stratigy
  • Information Gathering - Gathering Info About A Person
    • Discovering Websites, Links & Social Networking Accounts - 9:28
    • Discovering Twitter Friends & Associated Accounts - 4:57
    • Discovering Emails Of The Target's Friends - 4:39
    • Analysing The Gathered Info & Building An Attack Stratigy - 8:41
  • Windows Evil Files
    • Introduction - 2:14
  • Windows Evil Files - Generating Undetectable Backdoors
    • Installing Veil Framework - 7:49
    • Veil Overview & Payloads Basics - 7:20
    • Generating An Undetectable Backdoor Using Veil 3 - 9:44
    • Listening For Incoming Connections - 7:25
    • Hacking A Windows 10 Machine Using The Generated Backdoor - 7:12
    • Installing The Fat Rat - 6:18
    • Generating An Undetectable Backdoor Using TheFatRat - 11:29
    • Introduction to Empire - 6:21
    • Creating An Empire Listener - 6:50
    • Crating a Windows Powershell Stager & Hacking Windows 10 - 7:29
    • Modifying Backdoor Source To Bypass All Anti-virus Programs - 8:13
  • Windows Evil Files - Spying
    • Introduction to Keyloggers - 6:34
    • Creating A Remote Keylogger - 9:02
    • Using a Keylogger to Capture Key Strikes Including Passwords - 7:31
    • Password Recovery Basics - 7:31
    • Recovering Saved Passwords From Local Machine - 3:18
    • Recovering Saved Passwords From A Remote Machine
  • Windows Evil Files - Enhancing Evil Files
    • Bypassing All Anti-Virus Programs By Modifying Hex Vales - 10:35
    • Creating The Perfect Spying Tool - 6:49
  • Windows Evil Files - Converting Evil File To A Trojan
    • Download & Execute Payload - 6:18
    • Embedding Evil Files With Any File Type Like An Image Or PDF - 10:14
    • Running Evil Files Silently In The Background - 9:13
    • Changing Trojan's Icon - 8:50
    • Spoofing File Extension from .exe to anything else (pdf, png ..etc) - 11:33
    • Download & Execute Payload (Method 2) - 6:20
    • Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2) - 6:44
    • Embedding backdoor In A Legitimate Microsoft Office Document - 8:45
    • Embedding Any Evil File In A Legitimate Microsoft Office Document - 10:20
  • Mac OS X Evil Files
    • Introduction - 3:11
    • Hacking Mac OS X Using A Meterpreter Backdoor - 12:04
    • Hacking Mac OS X Using An Empire Stager - 6:35
    • Converting Basic Backdoor To An Executable - 3:33
    • Embedding A Normal File With Backdoor - 9:20
    • Generating a Basic Trojan For Max OS X - 6:49
    • Changing Trojan's Icon - 6:34
    • Configuring The Trojan To Run Silently - 6:14
    • Embedding Backdoor In A Legitimate Microsoft Office Document - 6:10
  • Linux Evil Files
    • Hacking Into Linux-Like Systems Using One Command - 8:56
    • More Advanced Linux Backdoor - 6:35
    • Generating A Persistant Remote Keylogger - 4:39
    • Using A Remote Keylogger To Capture Key Strikes Including Passwords - 9:58
    • Recovering Saved Passwords From A Local Machine - 7:12
    • Execute & Report Payload - 6:57
    • Recovering Saved Passwords From A Remote Machine - 6:53
    • Embedding Evil Code In A Legitimate Linux Package - Part 1 - 12:37
    • Embedding Evil Code In A Legitimate Linux Package - Part 2 - 4:59
    • Backdooring a Legitimate Android App - 12:14
  • Delivery Methods
    • Introduction - 1:51
    • mail delivery - setting up an stmp server - 7:33
    • mail delivery - spoofing emails - 13:45
    • Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files - 10:10
    • Creating A Replica Of Any Website / Login Page - 6:03
    • Stealing Login Info Using Fake A Login Page - 9:00
    • BeEF Overview & Basic Hook Method - 7:08
    • Injecting BeEF's Hook In Any Webpage - 4:57
    • Luring Target Into Accessing Evil URL Without Direct Interaction - 10:44
    • Basic BeEF Commands - 4:24
    • Stealing Credentials/Passwords Using A Fake Login Prompt - 2:17
    • Hacking Windows 10 Using A Fake Update - 4:43
    • Hacking Mac OS X Using A Fake Update - 4:29
    • Hacking Linux Using A Fake Update - 4:45
  • Using The Above Attacks Outside The Local Network
    • Overview of the Setup - 5:55
    • Ex1 - Generating a Backdoor That Works Outside The Network - 5:26
    • Configuring The Router To Forward Connections To Kali - 7:00
    • Ex2 - Using BeEF Outside The Network - 5:50
  • Post Exploitation
    • Introduction - 2:11
    • Upgrading Basic Shell Access To A Meterpreter/Empire Access - 9:07
    • Automatically Execute Commands When A Reverse Shell Is Spawned - 6:03
  • Post Exploitation - Meterpreter
    • Meterpreter Basics - 6:22
    • File System Commands - 5:10
    • Maintaining Access Basic Methods - 5:07
    • Maintaining Access - Using a Reliable & undetectable Method - 6:53
    • Spying - Capturing Key Strikes & Taking Screen Shots - 2:40
    • Pivoting - Theory (What is Pivoting?) - 7:07
    • Pivoting - Exploiting Devices on The Same Network As The Target Computer - 8:11
    • Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More - 8:43
  • Post Exploitation - Empire
    • Basics Of Empire Agents - 6:30
    • File System Commands - 6:43
    • Upload & Execute Shell Commands - 4:33
    • Injecting Backdoor Process In System Processes - 9:40
    • Stealing root Password & Escalating Privileges On OS X - 7:16
    • Maintaining Access On OS X - 5:36
  • Security
    • Detecting Fake/Spoofed Emails - 6:08
    • How to Protect Against BeEF & Other Browser Exploits - 4:17
    • Detecting Trojans Manually - 5:32
    • Detecting Trojans Using a Sandbox - 3:16

View Full Curriculum


Access
Lifetime
Content
1.0 hours
Lessons
8

Cyber Security Certifications Practice Questions 2022

The Latest Exam Practice Questions to Pass CISSP, CISA, CISM, & Ethical Hacker Exams in 2022

By Mohamed Atef | in Online Courses

Put your newly gained & refreshed expertise to test with the latest exams practices questions that you need to pass the most valuable Cyber Security Certification CISSP, CISA, CISM, and Ethical Hacker Exams in 2022. This course gives you updated questions to give you more accuracy and familiarity with the cyber security certification exams. You'll get online exam simulators, all questions with explanations.

  • CISSP: 15 online exam simulators (1,200 questions with explanation)
  • Ethical Hacker Exams. 4 online exam simulators (600 questions with explanation)
  • CISM. 4 online exam simulators (620 questions with explanation)
  • CISA. 7 online exam simulators (800 questions with explanation)

Mohamed Atef | 4.6/5 Instructor Rating: ★ ★ ★ ★

Mohamed Atef is an ICT consultant, senior penetrating testing specialist and certified instructor with more than 20 years of experience deliver professional and academic courses and 2 books published.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Certified Information System Security Professional - CISSP 2020
    • Student Feedback - 1:04
    • Latest CISSP Practice Questions
  • Certified Information System Auditor - CISA 2020
    • Student Feedback - 1:00
    • Latest CISA Practice Questions
  • Certified Information Security Manager - CISM 2020
    • Student Feedback - 0:52
    • Latest CISM Practice Questions
  • Ethical Hacker Exams
    • Student Feedback - 1:02
    • Latest Ethical Hacker Exams Questions

View Full Curriculum


Access
Lifetime
Content
5.0 hours
Lessons
86

Ethical Hacking with Metasploit: Exploit & Post Exploit

Learn Ethical Hacking from Scratch with Metasploit, Exploit Vulnerabilities & Become a White Hat Hacker

By Oak Academy | in Online Courses

This monster course covers hacking's fundamental building blocks, penetration testing (Kali Linux), gaining control using Metasploit, and application development. You don’t need to have previous knowledge about all. This course will take you from a beginner to a more advanced level. You will learn how to install the tools, terminology, and how devices communicate with each other. You'll also learn how to scan vulnerabilities with Nessus and gain full access to computer systems via discovering the weaknesses and vulnerabilities. New tools are released every day, and it’s crucial to stay on top of the latest knowledge for being a better security specialist. You will always have up-to-date content for this course at no extra charge.

4.8/5 average rating: ★ ★ ★ ★

  • Access 86 lectures & 5 hours of content 24/7
  • Become an expert in using Metasploit for ethical hacking & network security
  • Set up a lab environment to practice hacking
  • Install Kali Linux, a penetration testing operating system
  • Install Windows & vulnerable operating systems as virtual machines for testing
  • Learn Linux commands & how to interact with the terminal
  • Gain control over computer systems using server-side attacks
  • Gather password hashes, crack passwords, take screenshots, log keystrokes & more
  • Use backdoors to persist on the victim machine
Oak Academy | Long Live Tech Knowledge
4.4/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • 1 - Course Introduction & Overview - 0:59
  • Setting Up The Laboratory - Windows & Mac
    • 2 - Virtualisation Platforms - 1:29
    • 3 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 4 - Lab's Architecture Diagram - 1:25
    • 5 - Using VirtualBox vs VMware
    • 6 - Install & Run Oracle VM VirtualBox - 5:02
    • 7 - Installing Kali using the VMware Image - Step 1 - 3:13
    • 8 - Installing Kali using the VMware Image - Step 2 - 4:47
    • 9 - Installing Kali using the VMware Image - Step 3 - 4:30
    • 10 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 11 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 12 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 13 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 14 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 15 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 16 - Installing Kali using the ISO file for VirtualBox - Step 1 - 1:26
    • 17 - Installing Kali using the ISO file for VirtualBox - Step 2 - 6:49
    • 18 - Installing Kali using the ISO file for VirtualBox - Step 3 - 4:23
    • 19 - Installing Metasploitable - 4:11
    • 20 - Free Windows Operating Systems on VMware Fusion - 5:54
    • 21 - Free Windows Operating Systems on Oracle VM VirtualBox - 2:55
    • 22 - Windows Systems as Victim - 0:59
    • 23 - Configuring NAT Network in Oracle VM VirtualBox - 1:07
    • 24 - Checking Lab Network Connectivity - 2:58
  • Vulnerability Scanning
    • 25 - Introduction to Vulnerability Scanning - 2:10
    • 26 - Nessus® Home vs Nessus® Essentials
    • 27 - Downloading Nessus - 1:40
    • 28 - Installing Nessus - 3:41
    • 29 - Aggressive Scan with Nessus: Start - 4:24
    • 30 - Aggressive Scan with Nessus: Results - 7:17
    • 31 - Aggressive Scan with Nessus: Results with Windows Targets - 2:45
  • Exploitation
    • 32 - Concept and The Terminology - 6:13
    • 33 - Exploit Databases - 1:56
    • 34 - Manuel Exploitation - 5:50
    • 35 - Exploitation Frameworks - 3:36
  • Exploitation with Metasploit
    • 36 - Introduction to MSF - 1:22
    • 37 - Metasploit Framework - 5:01
    • 38 - Msfconsole - 2:13
    • 39 - Msfconsole Initialisation - 2:16
    • 40 - Msfconsole Exploit Search & Ranking - 3:37
    • 41 - Running Msfconsole - 8:14
    • 42 - Meterpreter - 0:54
    • 43 - Running Meterpreter - 2:12
    • 44 - Meterpreter on a Linux System - Basics - 8:36
    • 45 - Meterpreter on a Windows System - Basics - 5:51
  • Hacking Using No Vulnerability:Pass the Hash
    • 46 - Pass the Hash - 4:00
    • 47 - Pass the Hash: Metasploit PsExec - 3:49
    • 48 - Exploit A Machine and Gather Password Hashes - 2:15
    • 49 - Pass The Hash: Try Hashes on The Other Systems - 10:25
  • Post-Exploitation & Persistence
    • 50 - Post-Exploitation - 3:28
    • 51 - What is “Persistence” - 1:28
    • 52 - Meterpreter’s Persistence module - 8:55
    • 53 - Removing the Backdoor - 5:00
    • 54 - Running Meterpreter’s Persistence Module on Windows 8 - 2:56
    • 55 - Next Generation Persistence: Step 1 - 4:41
    • 56 - Next Generation Persistence: Step 2 - 4:32
  • Post Modules and Extensions: Part 1
    • 57 - Meterpreter for Post - Exploitation - 1:37
    • 58 - Meterpreter Core Commands - 1:45
    • 59 - Meterpreter Core Extension - Session Command - 2:31
    • 60 - Meterpreter Core Extension - Migrate Command - 3:34
    • 61 - Meterpreter Core Extension - Channel Command - 2:43
    • 62 - Meterpreter Stdapi Extension - 1:05
    • 63 - Meterpreter Stdapi Extension - File System Commands - 5:19
    • 64 - Meterpreter Stdapi Extension - System Commands - 4:13
    • 65 - Meterpreter Stdapi Extension - User Interface & Webcam Commands - 4:08
  • Post Modules and Extensions: Part 2
    • 66 - Meterpreter Incognito Extension - 3:26
    • 67 - Meterpreter Mimikatz Extension - 3:53
    • 68 - Metasploit Post-Exploitation Modules - 2:01
    • 69 - Gathering Modules - 1:21
    • 70 - Managing Modules - 6:51
  • Password Cracking: Introduction
    • 71 - Password Cracking - 3:06
    • 72 - Password Hash Examples: Windows Hashes - 3:30
    • 73 - Linux Hashes - 2:33
    • 74 - Password Cracking Classification - 2:11
  • Password Cracking: Tools in Action
    • 75 - Password Cracking Tools - 0:08
    • 76 - Online Cracking With HYDRA - 10:01
    • 77 - Cain & Abel - Introduction - 1:01
    • 78 - Cain & Abel - Step 1: Install & First Run - 2:39
    • 79 - Cain & Abel - Step 2: Gathering Hash Dumps - 4:40
    • 80 - Cain & Abel - Step 3: Importing Hash Files - 4:31
    • 81 - Cain & Abel - Step 4: Dictionary Attack - 4:19
    • 82 - Cain & Abel - Step 5: Brute Force Attack - 3:32
    • 83 - Cracking Tool: John The Ripper - 7:28
  • Collecting Sensitive Data
    • 84 - File Shares and End User Computers - 7:27
    • 85 - Real World Examples - 1:40
    • 86 - Summary - 1:48

View Full Curriculum


Access
Lifetime
Content
10.0 hours
Lessons
111

TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-002)

Learn the Basics of Cloud Computing & Prepare for the CompTIA Cloud+ Certification Exam

By Total Seminars | in Online Courses

Are you looking to get into the exciting world of hackers, cybersecurity, threat hunting, and digital forensics? Do you find the idea of gathering and analyzing intelligence to detect and combat hackers intriguing? Then this is the course for you! This course is aimed at the aspirational junior analyst looking to step up in their career. However, if your tech skills don't include cybersecurity, you can also gain a great deal of knowledge from this course to help launch yourself towards a career in cybersecurity.

4.6/5 average rating: ★ ★ ★ ★

  • Access 111 lectures & 10 hours of content 24/7
  • Leverage intelligence & threat detection techniques
  • Analyze & interpret data
  • Identify & address vulnerabilities
  • Suggest preventative measures
  • Effectively respond to & recover from incidents
  • Analyze the results of network reconnaissance & recommend or implement countermeasures
  • Secure a corporate environment

Total Seminars | 4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI, and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars website.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with PCs and networks
  • Knowledge on CompTIA Network+ and/or CompTIA Server+

Course Outline

  • Chapter 1: The Importance of Threat Data and Intelligence
    • Intelligence Sources and Confidence Levels - 7:57
    • Threat Indicators and Actors - 7:59
    • Threat Trends - 6:50
    • Intelligence Cycle and ISACs - 6:15
    • Chapter 1: The Importance of Threat Data and Intelligence Quiz
  • Chapter 2: Threat Intelligence in Support of Organizational Security
    • Attack Frameworks - 6:15
    • Threat Research - 11:09
    • Threat Modeling and Intelligence Sharing - 5:33
    • Chapter 2: Threat Intelligence in Support of Organizational Security Quiz
  • Chapter 3: Vulnerability Assessment Tools
    • Vulnerability Identification - 7:25
    • Scanning Parameters and Criteria - 9:13
    • Scanning Special Considerations - 5:36
    • Validation - 3:26
    • Remediation and Mitigation - 7:49
    • Inhibitors to Remediation - 6:58
    • Chapter 3: Vulnerability Assessment Tools Quiz
  • Chapter 4: Threats and Vulnerabilities Associated with Specialized Technology
    • Web Applications Scanners, Part 1 - 9:34
    • Web Applications Scanners, Part 2 - 5:12
    • Scanning - 5:45
    • Configuring and Executing Scans - 7:42
    • Vulnerability Scanning - 9:46
    • Reverse Engineering - 7:37
    • Enumeration - 6:21
    • Wireless Assessment Tools - 7:39
    • Cloud Assessment Tools - 3:35
    • Chapter 4: Threats and Vulnerabilities Associated with Specialized Technology Quiz
  • Chapter 5: Threats and Vulnerabilities Associated with Specialized Technology
    • Mobile and IoT - 9:48
    • Embedded and Firmware Systems (RTOS, SoC, and FPGA) - 9:18
    • Access and Vehicles Risk - 8:01
    • Automation and Control Risk - 10:03
    • Chapter 5: Threats and Vulnerabilities Associated with Specialized Technology Quiz
  • Chapter 6: Threats and Vulnerabilities Associated with Operating in the Cloud
    • Cloud Models - 6:38
    • Remote Service Invocation (FaaS, IaC, API) - 9:32
    • Cloud Vulnerabilities - 6:10
    • Chapter 6: Threats and Vulnerabilities Associated with Operating in the Cloud
  • Chapter 7: Mitigating Controls for Attacks and Software Vulnerabilities
    • Injection and Overflow Attacks - 9:25
    • Authentication Attacks - 6:33
    • Exploits - 8:08
    • Application Vulnerabilities, Part 1 - 7:37
    • Application Vulnerabilities, Part 2 - 6:57
    • Chapter 7: Mitigating Controls for Attacks and Software Vulnerabilities Quiz
  • Chapter 8: Security Solutions for Infrastructure Management
    • Network Architecture and Asset Management - 8:50
    • Protecting Your Territory - 4:49
    • Identity and Access Management - 11:17
    • Encryption and Active Defense - 8:26
    • Chapter 8: Security Solutions for Infrastructure Management Quiz
  • Chapter 9: Software Assurance Best Practices
    • Platforms - 7:00
    • SOA and DevSecOps - 8:44
    • Secure Software Development - 7:43
    • Best Coding Practices - 4:08
    • Chapter 9: Software Assurance Best Practices Quiz
  • Chapter 10: Hardware Assurance Best Practices
    • Trusted Hardware - 9:43
    • Hardware Encryption - 4:28
    • Hardware Security - 7:44
    • Chapter 10: Hardware Assurance Best Practices Quiz
  • Chapter 11: Data Analysis in Security Monitoring Activities
    • Data Analytics - 9:44
    • Endpoint Security - 7:32
    • Recon Results, Part 1 - 13:01
    • Recon Results, Part 2 - 4:47
    • Impact Analysis - 4:30
    • Collective Tools - 8:53
    • Query Writing - 6:43
    • E-mail Analysis, Part 1 - 9:30
    • E-mail Analysis, Part 2 - 7:56
    • Chapter 11: Data Analysis in Security Monitoring Activities Quiz
  • Ch12: Implement Configuration Changes to Existing Controls to Improve Security
    • Permissions - 8:50
    • Firewalls - 7:30
    • Intrusion Prevention Rules - 5:16
    • DLP and Endpoint Detection - 4:57
    • Chapter 12: Implement Configuration Changes to Existing Controls to Improve Security Quiz
  • Chapter 13: The Importance of Proactive Threat Hunting
    • Threat Hunting and the Hypothesis - 6:26
    • Threat Hunting Process - 7:14
    • Results and Benefits - 4:54
    • Chapter 13: The Importance of Proactive Threat Hunting Quiz
  • Chapter 14: Compare and Contrast Automation Concepts and Technologies
    • Workflow and Scripting - 7:27
    • API and Malware Signature Creation - 7:46
    • Threat Feeds and Machine Learning - 6:02
    • Protocols, Standards, and Software Engineering - 5:15
    • Chapter 14: Compare and Contrast Automation Concepts and Technologies Quiz
  • Chapter 15: The Importance of the Incident Response Process
    • IR Roles and Responsibilities - 7:38
    • IR Active Preparation - 9:41
    • Chapter 15: The Importance of the Incident Response Process Quiz
  • Chapter 16: Appropriate Incident Response Procedures
    • Incident Response Process - 6:36
    • Chapter 16: Appropriate Incident Response Procedures Quiz
  • Chapter 17: Analyze Potential Indicators of Compromise
    • Network Symptoms - 3:30
    • Host Symptoms - 8:03
    • Application Symptoms - 4:22
    • Chapter 17: Analyze Potential Indicators of Compromise Quiz
  • Chapter 18: Utilize Basic Digital Forensics Techniques
    • Digital Forensics - 9:33
    • Seizure and Acquisitions - 4:52
    • Forensics Acquisition Tools - 8:52
    • Mobile, Virtualization, and Cloud - 5:51
    • Forensics Analysis, Part 1 - 4:24
    • Forensics Analysis, Part 2 - 7:46
    • Packet Capture - 11:36
    • Chapter 18: Utilize Basic Digital Forensics Techniques Quiz
  • Chapter 19: The Importance of Data Privacy and Protection
    • Data Privacy and Security - 6:13
    • Nontechnical Controls - 8:47
    • Technical Controls - 7:48
    • Chapter 19: The Importance of Data Privacy and Protection Quiz
  • Chapter 20: Security Concepts in Support of Organizational Risk Mitigation
    • Business Impact Analysis - 4:30
    • Risk Identification - 5:18
    • Risk Calculation and Communication - 6:10
    • Training - 3:59
    • Supply Chain Assessment - 4:12
    • Chapter 20: Security Concepts in Support of Organizational Risk Mitigation Quiz
  • Chapter 21: The Importance of Frameworks, Policies, Procedures, and Controls
    • Frameworks - 13:01
    • Policies and Procedures - 4:29
    • Controls and Procedures - 7:39
    • Verification - 6:11
    • Chapter 21: The Importance of Frameworks, Policies, Procedures, and Controls Quiz

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.