Table of contents
Course Overview
0mins
Lock icon
Course Overview | 0m
Comparing Different Types of Social Engineering Techniques
0mins
Lock icon
Module Overview | 0m
Lock icon
What Is Social Engineering? | 0m
Lock icon
Phishing | 0m
Lock icon
Types of Phishing | 0m
Lock icon
Vishing | 0m
Lock icon
SPAM | 0m
Lock icon
Dumpster Diving | 0m
Lock icon
Shoulder Surfing | 0m
Lock icon
Pharming | 0m
Lock icon
Tailgating | 0m
Lock icon
Hoaxes | 0m
Lock icon
Prepending | 0m
Lock icon
Impersonation | 0m
Lock icon
Identity Fraud | 0m
Lock icon
Invoice Scam | 0m
Lock icon
Credential Harvesting | 0m
Lock icon
Watering Hole Attack | 0m
Lock icon
Typo Squatting/URL Hijacking | 0m
Lock icon
Hybrid Warfare | 0m
Lock icon
Social Media and Influence Campaigns | 0m
Lock icon
Reasons for Effectiveness - Authority and Intimidation | 0m
Lock icon
Consensus and Social Proof | 0m
Lock icon
Familiarity/Liking | 0m
Lock icon
Trust | 0m
Lock icon
Scarcity / Urgency | 0m
Lock icon
Module Review | 0m
Analyzing Malware and Other Attacks
0mins
Lock icon
Module Overview | 0m
Lock icon
Indicators of Compromise (IOC) | 0m
Lock icon
Virus | 0m
Lock icon
Crypto-malware / Ransomware | 0m
Lock icon
Trojan | 0m
Lock icon
Worms | 0m
Lock icon
Potentially Unwanted Programs (PUP) | 0m
Lock icon
Fileless Virus | 0m
Lock icon
Botnets | 0m
Lock icon
Logic Bomb | 0m
Lock icon
Spyware | 0m
Lock icon
Keylogger | 0m
Lock icon
Rootkits | 0m
Lock icon
Backdoors | 0m
Lock icon
Spraying | 0m
Lock icon
Brute Force and Dictionary Attacks | 0m
Lock icon
Rainbow Tables | 0m
Lock icon
Known Plain Text / Ciphertext | 0m
Lock icon
Birthday Attack | 0m
Lock icon
Downgrade Attack | 0m
Lock icon
Physical Attacks, Malicious USB, and Skimming | 0m
Lock icon
Adversarial Artificial Intelligence (AI) | 0m
Lock icon
Supply Chain Attacks | 0m
Lock icon
Supply Chain Attack Example | 0m
Lock icon
Cloud-Based vs. On-prem Attacks | 0m
Lock icon
Module Review | 0m
Recognizing Application Attacks
0mins
Lock icon
Module Overview | 0m
Lock icon
Privilege Escalation | 0m
Lock icon
Cross Site Scripting (XSS) | 0m
Lock icon
SQL Injection | 0m
Lock icon
DLL Injection | 0m
Lock icon
LDAP Injection | 0m
Lock icon
XML Injection | 0m
Lock icon
Pointer Dereference | 0m
Lock icon
Directory Traversal / Command Injection | 0m
Lock icon
Buffer Overflow | 0m
Lock icon
Race Conditions | 0m
Lock icon
Time of Check | 0m
Lock icon
Secure Coding Concepts, Error Handling, and Input Validation | 0m
Lock icon
Replay Attacks | 0m
Lock icon
Integer Overflow | 0m
Lock icon
Cross Site Request Forgery (XSRF) | 0m
Lock icon
API Attacks | 0m
Lock icon
Resource Exhaustion | 0m
Lock icon
Memory Leak | 0m
Lock icon
SSL Stripping | 0m
Lock icon
Shimming | 0m
Lock icon
Refactoring | 0m
Lock icon
Pass the Hash | 0m
Lock icon
Module Review | 0m
Identifying Network Attacks
0mins
Lock icon
Module Overview | 0m
Lock icon
Rogue Access Points and Evil Twin | 0m
Lock icon
Bluejack and Bluesnarfing | 0m
Lock icon
Dissociation | 0m
Lock icon
Jamming | 0m
Lock icon
RFID | 0m
Lock icon
Near Field Communication (NFC) | 0m
Lock icon
IV Attack | 0m
Lock icon
On-path Attacks (Formerly MiTM) | 0m
Lock icon
On-path Attacks (Formerly MiTB) | 0m
Lock icon
ARP Poisoning | 0m
Lock icon
IP/MAC Spoofing | 0m
Lock icon
MAC Flooding | 0m
Lock icon
MAC Cloning | 0m
Lock icon
DNS Poisoning | 0m
Lock icon
Typo Squatting / URL Hijacking | 0m
Lock icon
Distributed Denial of Service (DDoS) | 0m
Lock icon
Smurf Attack (Amplification) | 0m
Lock icon
DDoS Attack Vectors | 0m
Lock icon
Malicious Code Execution | 0m
Distinguishing Threat Actors, Vectors, and Intelligence Sources
0mins
Lock icon
Module Review | 0m
Lock icon
Script Kiddies | 0m
Lock icon
Hacktivists | 0m
Lock icon
Organized Crime | 0m
Lock icon
Nation States / APT | 0m
Lock icon
Insiders | 0m
Lock icon
Competitors | 0m
Lock icon
Threat Actor Attributes | 0m
Lock icon
Attack Vectors | 0m
Lock icon
Use of Open Source Intelligence | 0m
Lock icon
Closed / Proprietary Intelligence | 0m
Lock icon
Vulnerability Databases | 0m
Lock icon
Public and Private Information Sharing | 0m
Lock icon
Dark Web | 0m
Lock icon
Indicators of Compromise (IOC) | 0m
Lock icon
Automate Indicator Sharing (AIS) | 0m
Lock icon
TAXII Layout | 0m
Lock icon
MITRE | 0m
Lock icon
Gathering and Correlating Information | 0m
Lock icon
Predictive Analysis | 0m
Lock icon
Threat Maps | 0m
Lock icon
Live Cyber Threat Map | 0m
Lock icon
File / Code Repositories | 0m
Lock icon
Research Sources | 0m
Understanding Vulnerabilities and Security Risks
0mins
Lock icon
Module Overview | 0m
Lock icon
Cloud-based vs. On-premises | 0m
Lock icon
New Threats / Zero Days | 0m
Lock icon
Mis-configuration / Weak Configuration | 0m
Lock icon
Shared Accounts (Improperly Configured) | 0m
Lock icon
Weak Configuration Considerations | 0m
Lock icon
Weak Cipher Suites and Implementations | 0m
Lock icon
Improper Certificate and Key Management | 0m
Lock icon
Secure Protocols | 0m
Lock icon
Default Configurations | 0m
Lock icon
Third-party Risks | 0m
Lock icon
Vendor Management | 0m
Lock icon
Vulnerable Business Processes | 0m
Lock icon
Outsourced Code Management | 0m
Lock icon
Improper or Weak Patch Management | 0m
Lock icon
Legacy Platforms | 0m
Lock icon
Impact Areas | 0m
Lock icon
Effects of Impacts | 0m
Defining Security Assessment Techniques
0mins
Lock icon
Module Overview | 0m
Lock icon
Specific Types of Threats | 0m
Lock icon
What Is Cyber Threat Intelligence? | 0m
Lock icon
Importance of Cyber Threat Intelligence | 0m
Lock icon
Threat Intelligence Classification | 0m
Lock icon
Strategic, Operational, and Tactical Intelligence | 0m
Lock icon
Gathering and Correlating Information | 0m
Lock icon
Stages of Risk Management | 0m
Lock icon
Risk Management Data Sources | 0m
Lock icon
Vulnerability Scanning | 0m
Lock icon
False Positive | 0m
Lock icon
False Positive Audits | 0m
Lock icon
False Negatives | 0m
Lock icon
Intrusive vs. Non-intrusive | 0m
Lock icon
Passively Test Security Controls | 0m
Lock icon
Credentialed vs. Non-credentialed | 0m
Lock icon
Identify Vulnerabilities and Lack of Security Controls | 0m
Lock icon
Identify Common Misconfigurations | 0m
Lock icon
Things to Remember | 0m
Lock icon
Common Vulnerabilities and Exposures (CVE) | 0m
Lock icon
CVSS | 0m
Lock icon
Security Information and Event Management (SEIM) | 0m
Lock icon
Security Orchestration, Automation, and Response | 0m
Defining Penetration Testing
0mins
Lock icon
Module Intro | 0m
Lock icon
Penetration Testing | 0m
Lock icon
Penetration Testing Steps | 0m
Lock icon
Known, Unknown, and Partially Known Environments | 0m
Lock icon
Rules of Engagement | 0m
Lock icon
Lateral Movement | 0m
Lock icon
Escalation of Privilege | 0m
Lock icon
Methods of Privilege Escalation | 0m
Lock icon
Persistence | 0m
Lock icon
Cleanup | 0m
Lock icon
Bug Bounty | 0m
Lock icon
Pivoting | 0m
Lock icon
Types of Reconnaissance | 0m
Lock icon
War Flying | 0m
Lock icon
War Driving | 0m
Lock icon
Red, Blue, Purple, and White Security Teams | 0m
Lock icon
Module Review | 0m
About the author
Christopher Rees
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
More Courses by Christopher R.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon