Hacking Revealed
In the Hacking Revealed course from LearnKey, system administrators, network security analysts, and IT professionals, who desire a broader understanding of security, learn how to protect their networks from external attack. Expert instructor Dale Brice-Nash explains what motivates hackers and examines hacker tools. He will demonstrate potential system vulnerabilities, hacker methodologies, current exploits, and effective approaches to risk management. At the conclusion of this course, youll understand how to evaluate hacker threats and how to avoid them.
Benefits
Increase your earning potential with IT security credibility.
Enhance employment opportunities with in-demand IT security knowledge.
LearnKey courses incorporate the latest technology on security issues.
5 Sessions - 15 Hours of Interactive Training
Session 1
Section A: Introduction
· CD Tour
· Certifications
· Security Intro
· Resource Types
· Risk
Section B: Hacking Fundamentals
· Exploiting Weaknesses
· Exploit Process
· Threat/Vulnerability Types
· White-Hat vs. Black-Hat
· Persistent vs. Casual
· Motivations
Section C: Methodologies
· Overview
· Reconnaissance
· Scanning
· NMap Scan
· Enumeration
· Penetration
· System Elevation
· Network Elevation
Section D: Methodologies (cont.)
· Pilfer
· Expansion
· Housekeeping
· Common Tools
· Other Tools
Section E: Network Scanning Phases 1 & 2
· Overview
· Network Topology
· Network as a Target
· Discovery
· Scanning the Network
· Scanning Tools
Section F: Network Scanning Phases 3 & 4
· Enumerating
· Packet Analyzers
· CDP
· CDP Demo
· Weak Passwords
· Common Conventions
Session 2
Section A: Management/Physical Threats
· Device Management
· Design Errors
· SolarWinds
· Physical Security
· Physical Tools
Section B: Routers
· Router Components
· Routers & Domains
· Dynamic Routing
· Tools
· Attacks
· RIP
Section C: Bridges & Switches
· Concepts
· Root Bridges
· Vulnerabilities/Attacks
· ARP Poisoning
Section D: Firewalls
· Firewall Concepts
· Vulnerabilities
· Design Vulnerabilities
· Firewall Setup
· Firewall Traversal
Section E: Wireless
· Wireless Concepts
· WEP
· Management Console
· Wireless Security
· Wireless Modes
· Wireless Vulnerabilities
· Attacks
· Warchalking/WarDriving
Section F: W2K Hacking Phases 1 & 2
· Overview
· Discovery/Reconnaissance
· Scanning
Section G: Enumerating Servers
· Overview
· Database Servers
· Mail/IM Servers
· Network/Web Servers
· Syslog/IAS Servers
Session 3
Section A: Enumeration Strategies & Tools
· Tool Concepts
· Terminal Services
· General Banner Grabbing
· Assorted Tools
· Anonymous Connections
· Browser/Client
· Net Commands
· LDAP Query Tools
Section B: Using Enumeration Tools
· NetCat
· Cain & Abel
· Null Session
· DumpSec
Section C: Penetrating Windows 2000/NT
· Identification
· Weaknesses
· Default Configuration
· Default Accounts
· Account Management
· Inherent OS Weaknesses
· NetBIOS API
· Tools
Section D: Penetration Tools & Strategies
· LSA
· Sniffer
· Password Cracker
· Notepad Execution
Section E: Elevation on Windows 2000/NT
· Overview
· SAM Dump
· Tools/Vulnerabilities
· L0phtCrack
· SAM File
· Registry
Section F: Pilfering
· Permissions
· Use Data
· Targets
· More Targets
Section G: File Permission Auditing
· Folder Permissions
· Registry Permissions
· File Delete Child
· File Delete Child Process
Session 4
Section A: Expansion
· Scanning/Enumeration
· Authentication
· Relays & Proxies
· Service Accounts
· User Rights
· Account Policies
· Local Policies
Section B: Housekeeping
· Cleaning Up
· Reentry
· File Header
· Tools
· Strategies
Section C: Event Log Management
· Log Utilities
· Set Up Audits
· Audit Object Access
Section D: Terminal Server
· Vulnerabilities
· Detection Tools
· Monitoring Tools
· Attack Applications
· Pipeupadmin
Section E: IIS
· Evaluation
· Weaknesses
· Input Validation
· Permissions
· Application Analysis
· Tools
Section F: Exploiting IIS
· File Traversal
· View Results
Section G: Securing IIS
· Directory Structure
· IDS
· Internet Service Manager
· DLLs
· ISAPI Filters
· Directory Browsing
· Authentication
· Lockdown
Session 5
Section A: Securing Windows 2000/NT
· Analyze
· Best Practices
· Communication
· User Education
· Penetration Analysis
· Backups
· Tools
· Restriction
Section B: Baseline Security Analysis
· Security Analyzer
· Security Report
· Score & Templates
· Options
· Reports
Section C: UNIX Hacking Phases 1-3
· Versions
· Usage
· Discovery/Reconnaissance
· Scanning
· Enumeration
Section D: UNIX Hacking Phases 4-7
· Concepts
· Brute Force Attack
· Dir. Serv./Remoting
· Pilfer Points
· Expansion
· Housekeeping
· UNIX Resources
Section E: Security Policies
· Adapt to Security
· Security Plan
· Risk Assessmen
· Cost
· Personnel/Culture
Section F: Prevention Strategies
· Passive/Proactive Plan
· Testing & Documentation
· Fall Back Plan
· When it Happens!
· Discovery
· Reaction
In the Hacking Revealed course from LearnKey, system administrators, network security analysts, and IT professionals, who desire a broader understanding of security, learn how to protect their networks from external attack. Expert instructor Dale Brice-Nash explains what motivates hackers and examines hacker tools. He will demonstrate potential system vulnerabilities, hacker methodologies, current exploits, and effective approaches to risk management. At the conclusion of this course, youll understand how to evaluate hacker threats and how to avoid them.
Benefits
Increase your earning potential with IT security credibility.
Enhance employment opportunities with in-demand IT security knowledge.
LearnKey courses incorporate the latest technology on security issues.
5 Sessions - 15 Hours of Interactive Training
Session 1
Section A: Introduction
· CD Tour
· Certifications
· Security Intro
· Resource Types
· Risk
Section B: Hacking Fundamentals
· Exploiting Weaknesses
· Exploit Process
· Threat/Vulnerability Types
· White-Hat vs. Black-Hat
· Persistent vs. Casual
· Motivations
Section C: Methodologies
· Overview
· Reconnaissance
· Scanning
· NMap Scan
· Enumeration
· Penetration
· System Elevation
· Network Elevation
Section D: Methodologies (cont.)
· Pilfer
· Expansion
· Housekeeping
· Common Tools
· Other Tools
Section E: Network Scanning Phases 1 & 2
· Overview
· Network Topology
· Network as a Target
· Discovery
· Scanning the Network
· Scanning Tools
Section F: Network Scanning Phases 3 & 4
· Enumerating
· Packet Analyzers
· CDP
· CDP Demo
· Weak Passwords
· Common Conventions
Session 2
Section A: Management/Physical Threats
· Device Management
· Design Errors
· SolarWinds
· Physical Security
· Physical Tools
Section B: Routers
· Router Components
· Routers & Domains
· Dynamic Routing
· Tools
· Attacks
· RIP
Section C: Bridges & Switches
· Concepts
· Root Bridges
· Vulnerabilities/Attacks
· ARP Poisoning
Section D: Firewalls
· Firewall Concepts
· Vulnerabilities
· Design Vulnerabilities
· Firewall Setup
· Firewall Traversal
Section E: Wireless
· Wireless Concepts
· WEP
· Management Console
· Wireless Security
· Wireless Modes
· Wireless Vulnerabilities
· Attacks
· Warchalking/WarDriving
Section F: W2K Hacking Phases 1 & 2
· Overview
· Discovery/Reconnaissance
· Scanning
Section G: Enumerating Servers
· Overview
· Database Servers
· Mail/IM Servers
· Network/Web Servers
· Syslog/IAS Servers
Session 3
Section A: Enumeration Strategies & Tools
· Tool Concepts
· Terminal Services
· General Banner Grabbing
· Assorted Tools
· Anonymous Connections
· Browser/Client
· Net Commands
· LDAP Query Tools
Section B: Using Enumeration Tools
· NetCat
· Cain & Abel
· Null Session
· DumpSec
Section C: Penetrating Windows 2000/NT
· Identification
· Weaknesses
· Default Configuration
· Default Accounts
· Account Management
· Inherent OS Weaknesses
· NetBIOS API
· Tools
Section D: Penetration Tools & Strategies
· LSA
· Sniffer
· Password Cracker
· Notepad Execution
Section E: Elevation on Windows 2000/NT
· Overview
· SAM Dump
· Tools/Vulnerabilities
· L0phtCrack
· SAM File
· Registry
Section F: Pilfering
· Permissions
· Use Data
· Targets
· More Targets
Section G: File Permission Auditing
· Folder Permissions
· Registry Permissions
· File Delete Child
· File Delete Child Process
Session 4
Section A: Expansion
· Scanning/Enumeration
· Authentication
· Relays & Proxies
· Service Accounts
· User Rights
· Account Policies
· Local Policies
Section B: Housekeeping
· Cleaning Up
· Reentry
· File Header
· Tools
· Strategies
Section C: Event Log Management
· Log Utilities
· Set Up Audits
· Audit Object Access
Section D: Terminal Server
· Vulnerabilities
· Detection Tools
· Monitoring Tools
· Attack Applications
· Pipeupadmin
Section E: IIS
· Evaluation
· Weaknesses
· Input Validation
· Permissions
· Application Analysis
· Tools
Section F: Exploiting IIS
· File Traversal
· View Results
Section G: Securing IIS
· Directory Structure
· IDS
· Internet Service Manager
· DLLs
· ISAPI Filters
· Directory Browsing
· Authentication
· Lockdown
Session 5
Section A: Securing Windows 2000/NT
· Analyze
· Best Practices
· Communication
· User Education
· Penetration Analysis
· Backups
· Tools
· Restriction
Section B: Baseline Security Analysis
· Security Analyzer
· Security Report
· Score & Templates
· Options
· Reports
Section C: UNIX Hacking Phases 1-3
· Versions
· Usage
· Discovery/Reconnaissance
· Scanning
· Enumeration
Section D: UNIX Hacking Phases 4-7
· Concepts
· Brute Force Attack
· Dir. Serv./Remoting
· Pilfer Points
· Expansion
· Housekeeping
· UNIX Resources
Section E: Security Policies
· Adapt to Security
· Security Plan
· Risk Assessmen
· Cost
· Personnel/Culture
Section F: Prevention Strategies
· Passive/Proactive Plan
· Testing & Documentation
· Fall Back Plan
· When it Happens!
· Discovery
· Reaction
Kod:
Hacking Revealed -Session One
http://www.megaupload.com/?d=G4HLR7ZO
http://www.megaupload.com/?d=LT98U3ZB
http://www.megaupload.com/?d=E30IQSGV
http://www.megaupload.com/?d=CEBYXJ4E
Hacking Revealed -Session Two
http://www.megaupload.com/?d=VYZA2AE4
http://www.megaupload.com/?d=JTILTJMB
http://www.megaupload.com/?d=85S1SC1Z
http://www.megaupload.com/?d=15HKV8NR
http://www.megaupload.com/?d=KZPYPDTE
Hacking Revealed -Session Three
http://www.megaupload.com/?d=YJVG7R0L
http://www.megaupload.com/?d=GFTK3852
http://www.megaupload.com/?d=4VSKCQDF
http://www.megaupload.com/?d=VDS7Z98U
http://www.megaupload.com/?d=QPFPIIOA
Hacking Revealed -Session Four
http://www.megaupload.com/?d=8GBMOWSM
http://www.megaupload.com/?d=I1C4X43D
http://www.megaupload.com/?d=RHE2SUSD
http://www.megaupload.com/?d=EBQD438P
Hacking Revealed -Session Five
http://www.megaupload.com/?d=FBC6P9V0
http://www.megaupload.com/?d=QB3NDE6H
http://www.megaupload.com/?d=6ZDNL721
http://www.megaupload.com/?d=N2U52YCI