Table of contents
Getting Started
33mins
Lock icon
An Important Note About A Cloud Guru and Linux Academy Courses | 1m
Lock icon
About the Course | 7m
Lock icon
About the Author | 1m
Lock icon
Course Requirements | 4m
Lock icon
How to Get Help | 6m
Lock icon
About the Exam | 11m
Overview of Information Security
62mins
Lock icon
Chapter Introduction | 2m
Lock icon
Common Terms (Hack Value, Vulnerability, Exploit, Payload) | 7m
Lock icon
Zero Day Attack | 6m
Lock icon
Daisy Chaining | 8m
Lock icon
QUIZ SOLUTION: Overview of Information Security - Questions answered and explained | 8m
Lock icon
QUIZ: Overview of Information Security | 30m
Overview of Information Security Threats and Attacks
118mins
Lock icon
Chapter Introduction | 0m
Lock icon
Threats vs Attacks | 2m
Lock icon
Motives and Reasons Behind Cyber Security Attacks | 3m
Lock icon
What Are the Means by Which Hackers Gain Access to Systems and Networks? | 2m
Lock icon
Cloud Computing Threats | 6m
Lock icon
Advanced Persistent Threats | 2m
Lock icon
Viruses and Worms | 3m
Lock icon
Ransomware | 5m
Lock icon
Mobile Threats | 3m
Lock icon
Modern Age Information Warfare | 4m
Lock icon
Insider Attacks | 1m
Lock icon
Phishing | 2m
Lock icon
Web Application Threats | 2m
Lock icon
Classification of Threats: Network Threats | 2m
Lock icon
Clasification of Threats: Host Threats | 2m
Lock icon
Clasification of Threats: Application Threats | 3m
Lock icon
Classification of Attacks | 12m
Lock icon
Botnets | 3m
Lock icon
Laws, Standards, and Regulations | 12m
Lock icon
QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained | 9m
Lock icon
QUIZ: Information Security Threats and Attacks | 30m
History of Hacking
86mins
Lock icon
A Brief Look at the History of Hacking | 12m
Lock icon
Types of Hackers | 10m
Lock icon
What is Ethical Hacking? What is Its Purpose? | 3m
Lock icon
Scope of Ethical Hacking | 3m
Lock icon
Hacking Stages: Reconnaissance | 3m
Lock icon
Hacking Stages: Scanning | 2m
Lock icon
Hacking Stages: Gaining Access | 0m
Lock icon
Hacking Stages: Maintaining Access | 3m
Lock icon
Hacking Stages: Clearing Tracks | 3m
Lock icon
QUIZ SOLUTION: History of Hacking - Questions answered and explained | 12m
Lock icon
QUIZ: The History of Hacking | 30m
Protecting Information
231mins
Lock icon
Chapter Introduction | 5m
Lock icon
Information Assurance | 12m
Lock icon
EISA and Information security management program | 11m
Lock icon
Network Zoning | 14m
Lock icon
Defense in Depth | 12m
Lock icon
What Sort of Things Do Policies Regulate? | 15m
Lock icon
Workplace Security Policies and Examples | 12m
Lock icon
Physical Security Controls and Risk | 11m
Lock icon
Risk Management | 11m
Lock icon
Threat Modeling and Incident Management | 20m
Lock icon
UBA - User Behavior Analytics and Network Security Controls | 8m
Lock icon
Access Controls | 8m
Lock icon
Identification Authentication Authorization Accounting and IAM | 11m
Lock icon
Data Leakage | 9m
Lock icon
Data Backup | 21m
Lock icon
Data Recovery | 2m
Lock icon
QUIZ SOLUTION: Protecting Information - Questions answered and explained | 11m
Lock icon
QUIZ: Protecting Information | 30m
Penetration Testing
163mins
Lock icon
What Is Penetration Testing? | 3m
Lock icon
What Does a Good Penetration Test Consist of? | 11m
Lock icon
Why Do a Penetration Test | 11m
Lock icon
Pre-Attack Phase: Contracts | 2m
Lock icon
Audit vs Vulnerability Assessment vs Penetration Test | 2m
Lock icon
Red vs Blue Team! | 2m
Lock icon
Types of Penetration Testing | 7m
Lock icon
Pre-Attack Phase: Rules of Engagement | 2m
Lock icon
Pre-Attack Phase: Understanding your Client's requirements | 4m
Lock icon
Pre-Attack Phase: Scope of a Penetration Test | 6m
Lock icon
Pre-Attack Phase: Information Gathering | 6m
Lock icon
Pre-Attack Phase: Two Types of Information Gathering | 5m
Lock icon
Attack Phase | 1m
Lock icon
Attack Phase: Penetrating the Perimeter | 4m
Lock icon
Attack Phase: Target Acquisition | 3m
Lock icon
Attack Phase: Privilege Escalation | 3m
Lock icon
Attack Phase: Execute, Implant, Retract | 3m
Lock icon
Post-Attack Phase | 2m
Lock icon
Security Testing Methodologies | 7m
Lock icon
QUIZ SOLUTION: Penetration Testing - Questions answered and explained | 10m
Lock icon
QUIZ: Penetration Testing | 1h 0m
Footprinting Process
285mins
Lock icon
About Footprinting | 2m
Lock icon
Hacker State of Mind | 5m
Lock icon
Search Engine and Online Resources | 17m
Lock icon
Whois GeoIpLocation and DNS Interogation | 14m
Lock icon
Email Header Analysis | 16m
Lock icon
Getting an IP Address from an Email and More | 16m
Lock icon
Quick Look at a Website Certificate, Source Code and Traffic | 14m
Lock icon
How to Clone a Website and Extract Metadata from Files | 18m
Lock icon
Nmap and Traceroute | 19m
Lock icon
QUIZ SOLUTION: Footprinting - Questions answered and explained | 8m
Lock icon
QUIZ: Footprinting | 30m
Lock icon
Extract Data from a File | 1h 0m
Lock icon
Phishing Emails and GeoIP Lookup | 1h 0m
Reports and Countermeasures
84mins
Lock icon
Countermeasures and Best Practices | 11m
Lock icon
What Goes into a Footprinting Report? | 5m
Lock icon
QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained | 7m
Lock icon
QUIZ: Reports and Countermeasures | 1h 0m
Network Scanning Techniques
78mins
Lock icon
Banner Grabbing | 6m
Lock icon
Drawing and Mapping Out Network Topologies | 9m
Lock icon
Scanning for Vulnerabilities | 15m
Lock icon
Enumeration | 8m
Lock icon
QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained | 9m
Lock icon
QUIZ: Network Scanning Techniques | 30m
Password Cracking Techniques
159mins
Lock icon
Password Cracking, Crunch, and Some Basics | 17m
Lock icon
Using Hydra for online password cracking | 17m
Lock icon
Hashcat: Environment Setup | 16m
Lock icon
HashCat: Installation | 7m
Lock icon
HashCat: Let Us Crack Some Passwords! | 17m
Lock icon
HashCat: Results and Recap | 11m
Lock icon
QUIZ SOLUTION: Password Cracking Techniques - Questions answered and explained | 11m
Lock icon
QUIZ: Password Cracking Techniques | 1h 0m
Techniques for Creating and Maintaining Access to the Remote System
98mins
Lock icon
Reverse Shell and Remote Service Exploitation | 16m
Lock icon
Keylogger Intro and Environment Setup | 11m
Lock icon
Keylogger Source Code Download and Import | 4m
Lock icon
Keylogger Configuration | 7m
Lock icon
Keylogger Demo | 12m
Lock icon
Decrypting Keylogger Logs | 8m
Lock icon
QUIZ SOLUTION: Persistent Remote Access - Questions Answered and Explained | 8m
Lock icon
QUIZ: Persistent Remote Access | 30m
Hiding Malicious Programs
106mins
Lock icon
SandBox | 15m
Lock icon
How to Create a Safe Sandbox Environment | 13m
Lock icon
Anti-Malware Software Overview | 10m
Lock icon
Packing Malware | 11m
Lock icon
Rootkits | 7m
Lock icon
Hiding Files and Steganography | 12m
Lock icon
QUIZ SOLUTION: Hiding Malicious Programs - Questions Answered and Explained | 5m
Lock icon
QUIZ: Hiding Malicious Programs | 30m
Covering Tracks and Destroying Evidence
115mins
Lock icon
Log Files: Covering Your Tracks | 15m
Lock icon
QUIZ SOLUTION: Covering Tracks and Destroying Evidence - Questions Answered and Explained | 9m
Lock icon
QUIZ: Covering Tracks and Destroying Evidence | 30m
Lock icon
Examine Log Files and Remove Traces of Your Presence | 1h 0m
Spoofing Techniques
80mins
Lock icon
ARP Spoofing | 16m
Lock icon
MAC Address Spoofing | 12m
Lock icon
DHCP Starvation | 6m
Lock icon
QUIZ SOLUTION: Sniffing Techniques - Questions Answered and Explained | 15m
Lock icon
QUIZ: Sniffing Techniques | 30m
Attacking and Exploiting Wireless Networks
72mins
Lock icon
Capturing the WPA2 Handshake | 15m
Lock icon
Cracking WPA2 Passkey | 15m
Lock icon
QUIZ SOLUTION: Wireless Networks - Questions Answered and Explained | 10m
Lock icon
QUIZ: Wireless Networks | 30m
Tip, Tricks and Real Life Scenarios
98mins
Lock icon
Social Engineering | 17m
Lock icon
Well Known Social Engineering Attacks: A Retrospective | 11m
Lock icon
QUIZ SOLUTION: Social Engineering - Questions Answered and Explained | 9m
Lock icon
QUIZ: Social Engineering | 1h 0m
Firewalls
74mins
Lock icon
What Is a Firewall? How Does It Work? | 8m
Lock icon
Firewall Usage, Logging, and Configuration | 10m
Lock icon
Evading Firewall GeoIpBock | 17m
Lock icon
QUIZ SOLUTION: Firewalls - Questions answered and explained | 8m
Lock icon
QUIZ: Firewalls | 30m
Honeypots
65mins
Lock icon
How to Set Up a Honeypot | 13m
Lock icon
How to grab traffic from a Honeypot | 14m
Lock icon
QUIZ SOLUTION: Honeypots - Questions Answered and Explained | 7m
Lock icon
QUIZ: Honeypots | 30m
Let's Attack Web Servers and Web Applications!
70mins
Lock icon
OWASP - Open Web Application Security Project | 4m
Lock icon
XSS Cross Site Scripting | 12m
Lock icon
SQL Injections | 15m
Lock icon
QUIZ SOLUTION: Attacking Web Servers and Web Applications - Questions Answered and Explained | 7m
Lock icon
QUIZ: Attacking Web Servers and Web Applications | 30m
About Cryptography
25mins
Lock icon
Cryptography Basics | 8m
Lock icon
Cryptography Common Algorithms and Message Digest | 9m
Lock icon
PKI Public Key Infrastructure | 7m
Encryption, Decryption, Cryptanalysis and Attack Vectors
148mins
Lock icon
Cryptanalysis and Attack Vectors | 11m
Lock icon
Checksum and File Encryption | 12m
Lock icon
SSH RSA Demo | 13m
Lock icon
Storage Medium Encryption | 12m
Lock icon
QUIZ SOLUTION: Cryptography - Questions Answered and Explained | 8m
Lock icon
QUIZ: Cryptography | 30m
Lock icon
Encrypting Storage Devices | 1h 0m
Final
245mins
Lock icon
Final Practice Exam | 5m
Lock icon
Certified Ethical Hacker (CEH) Practice Exam | 4h 0m
Final SOLUTIONS
71mins
Lock icon
Final Practice Exam Question and Answer overview part 1 | 21m
Lock icon
Final Practice exam Question and Answer overview part 2 | 12m
Lock icon
Final Practice exam Question and Answer overview part 3 | 19m
Lock icon
Final Practice exam Question and Answer overview part 4 | 18m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon