×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Access Control & Server Security
Operating Systems Security
1. Operating systems security - introduction (9:10)
2. Security boundaries (4:44)
3. Three core (7:15)
4. EXERCISE OS boundaries (7:54)
5. Process isolation (6:30)
6. Kernel Mode Code Signing (6:24)
7. Java Virtual Machine and code access security (4:17)
9. Malware (12:09)
10. EXERCISE Vulnerability attacks (10:26)
11. EXERCISE Identifying suspicious processes (6:54)
12. Demonstration Process Explorer (9:13)
13. EXERCISE Removing malware (8:38)
14. Rootkits (6:14)
15. EXERCISE Detecting rootkits (11:07)
16. EXERCISE Security evaluation (6:00)
Access Control
1. Authentication and authorisation - Introduction (1:57)
2. Authentication users (6:56)
3. How secure is your password (5:03)
4. Authentication protocols and services (8:25)
6. LM Hash (7:02)
7. Cached Credentials (4:29)
8. KERBEROS (11:30)
9. Identity Theft (9:13)
10. EXERCISE Offline attacks (12:22)
11. Using online cracking services (8:41)
Windows Security
1. Windows Security - what you’ll learn (1:17)
2. User Account Control (6:22)
3. UAC configuration (8:02)
4. Additional Security Features - ASLR and DEP (11:39)
5. PatchGuard (1:34)
7. Encryption - key protection (9:31)
8. Drive encryption (8:25)
9. BitLocker (7:57)
10. BitLocker To Go Reader (4:43)
11. File and folder encryption - EFS (7:30)
12. EXERCISE EFS (5:36)
Security Policies
1. Security policies – introduction (1:56)
2. What is security (3:53)
3. Information security (4:13)
4. Information security - level up (4:04)
5. Security issues (4:51)
6. Why are security solutions fallible (5:42)
7. Security policy issues (4:50)
8. Introduction to threat modelling and classification (5:14)
9. Threat modelling - STRIDE (4:06)
10. STRIDE Spoofing identity (5:03)
11. STRIDE Tampering with Data (4:28)
12. STRIDE Denial of Service (3:51)
Risk Management
1. Introduction to Risk Management (1:27)
2. Attack methods (6:42)
3. Local attacks (2:56)
4. Target scanning and enumeration techniques #1 (5:52)
5. Target scanning and enumeration techniques #2 (3:30)
6. Passive scanning (2:06)
8. Introduction to risk assessment (6:20)
9. DREAD Risk assessment model (4:50)
10. DREAD Exploitability (5:24)
11. EXERCISE Risk Assessment (7:17)
13. Introduction to Social Engineering and rogue software (4:19)
14. Manipulation tactics (9:01)
15. EXERCISE Social Engineering attacks (6:44)
16. SE with KALI BackTrack (7:06)
17. Rogue Software (2:28)
18. Fraud tools #1 (7:10)
19. Fraud tools #2 (6:32)
13. Introduction to Social Engineering and rogue software
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock