Hacking In Practice: Ethical Hacking Mega Course

3 Reviews
650 Enrolled
23 Hours
You save 87% -

236 Lessons (23h)

  • Introduction to cyber threats
    Introduction to Current Cyber Threats4:46
    IT Prehistory4:41
    Let’s look a few years back4:42
    Cyber crimes – an evolution not revolution4:25
    Current Cyber Threats – notes for the examination
  • IT security popular myths
    Popular myths about IT security – origins5:33
    Myths #1 – you’ll never be hacked5:55
    Myths #2 – you don’t need any protection software or hardware5:11
    Myths #3 – IT security is always a priority1:13
    Popular Myths About Computer System Security – notes for the examination
  • IT security trends
    Trends in IT Security3:44
    The birth of technology society3:16
    EXERCISE: How much info can you gather?3:59
    Fake identity5:03
    Online privacy6:14
    Analyzing sniffing software3:33
    Cyber War8:23
    Changing IT Security Trends – notes for the examination
  • Data security
    Objective #1 – Data security – Introduction6:58
    Confidentiality of data5:33
    EXERCISE: Finding confidential data with search engines6:05
    Integrity of data7:04
    Data security – notes for the examination
  • Security policies
    Security policies – introduction1:56
    What is security?3:53
    Information security4:13
    Information security – level up4:04
    Security issues4:50
    Why are security solutions fallible?5:42
    Security policy issues4:50
    Introduction to threat modelling and classification5:14
    Threat modelling – STRIDE4:06
    STRIDE: Spoofing identity5:03
    STRIDE: Tampering with data4:28
    STRIDE: Denial of Service3:51
    Threat Modelling and Classification – notes for the examination
  • Risk management
    Introduction to Risk Management1:27
    Attack Methods6:42
    Local attacks2:56
    Target scanning and enumeration techniques #15:52
    Target scanning and enumeration techniques #23:30
    Passive scanning5:36
    Attack Methodologies – notes for the examination
    Introduction to risk assessment6:20
    DREAD: Risk assessment model4:50
    DREAD: Exploitability5:24
    EXERCISE: Risk Assessment7:17
    Risk Assessment – notes for the examination
    Introduction to Social Engineering and rogue software4:19
    Manipulation tactics9:01
    EXERCISE: Social Engineering attacks6:44
    SE with KALI / BackTrack7:06
    Rogue Software2:28
    Fraud tools #17:10
    Fraud tools #26:32
    Social Engineering and Rogue Software – notes for the examination
  • Defence in depth
    Introduction to Defence in depth1:32
    How to use Defence in depth model?5:45
    DiD: OS and LAN layers6:39
    DiD: Perimeter and Physical Access Layers6:06
    DiD: Demonstration2:48
    Automated attack targeting a service5:23
    Automated user-targeting attack4:31
    The Defence in Depth Model – notes for the examination
    Introduction to Immutable laws of security – Law #14:35
    Law #22:56
    Law #32:23
    Law #41:52
    Law #53:28
    Law #62:07
    Law #71:11
    Law #81:43
    Law #93:57
    Law #100:48
    Laws for administrators5:59
    Immutable Laws of Security – notes for the examination
  • Disaster recovery
    Introduction to Disaster Recovery1:33
    How to reduce losses?5:24
    Ensuring continous availability4:08
    Threat discovery #14:28
    Threat discovery #23:40
    Audit users and keep control accounts5:18
    High risk users3:23
    Collecting and analysing evidence7:13
    Forensics example3:52
    How to reduce losses – notes for the examination
  • Computer network security - network protocols
    Network security – introduction5:44
    OSI MODEL #1 – Physical layer5:45
    OSI MODEL #2 – Data link layer4:46
    Threats: MAC spoofing5:54
    Threats: ARP Poisoning6:38
    EXERCISE: Data Link Layer Attack7:32
    OSI MODEL #3 – Network layer6:58
    TCP Tunnelling over ICMP7:39
    Network Protocols – notes for the examination
  • Transport protocols
    OSI MODEL #4 – Transport Layer6:04
    Threats: Enumerating Remote Computers3:40
    EXERCISE: Transport Layer Attack using METASPLOIT – part 15:27
    EXERCISE: Transport Layer Attack using METASPLOIT – part 25:13
    OSI MODEL #5 – Session Layer3:33
    Transport Protocols – notes for the examination
  • Application protocols
    OSI MODEL #6 – Presentation Layer6:52
    OSI MODEL #7 – Application Layer3:48
    EXERCISE: Application Layer Attacks6:03
    KALI / Backtrack: Attack Demonstration3:34
    Man-in-the-Middle and Denial of Service Attacks2:49
    Modifying Transmitted Packets4:45
    Unencrypted protocols2:58
    Application Protocols – notes for the examination
  • Designing secure computer networks
    Designing Computer Networks – introduction2:18
    Subnetting IPv63:18
    Subnetting IPv47:01
    IPv6 address notation6:46
    DMZ: DeMilitarized Zone6:28
    Subnetting – notes for the examination
    Protocols and services: IP SEC9:33
    IP SEC: Phase 17:27
    Network Address Translation12:18
    Network access control: RADIUS10:04
    Protocols and Services – notes for the examination
  • Network administration and monitoring
    Introduction to Monitoring Transmitted Data1:07
    Monitoring Transmitted Data – Basic information8:03
    Intrusion detection systems7:43
    Why are firewalls and NDIS not enough?5:41
    Wireshark – Introduction to network analysis6:29
    How to use Wireshark?8:27
    Analyzing captured data5:43
    How to analyze telnet protocol?8:09
    Intrusion detection7:48
    Scanning computers7:47
    Monitoring transmitted data – notes for the examination
  • Wireless networks security
    Wireless Networks1:16
    WIFI security solutions – introduction5:44
    WIFI – working principles5:48
    Other wireless technologies2:56
    Threats and risks4:38
    Ineffective solutions4:11
    Authentication methods8:31
    802.11 WEP7:06
    802.11 WPA6:24
    Standards and Security Solutions – notes for the examination
    Threats of WIFI networks5:58
    Client Attacks: Launching a rogue access point7:03
    Client Attacks: Evil twin4:51
    Client Attacks: Denial of service9:17
    EXERCISE: WPA attack3:24
    Wi-Fi Security Threats – notes for the examination
  • Operating systems security
    Operating systems security – introduction9:10
    Security boundaries4:44
    Three core7:15
    EXERCISE: OS boundaries7:54
    Process isolation6:30
    Kernel Mode Code Signing6:24
    Java Virtual Machine and code access security4:17
    OS Security Boundaries – notes for the examination
    EXERCISE: Vulnerability attacks10:26
    EXERCISE: Identifying suspicious processes6:54
    Demonstration: Process Explorer9:13
    EXERCISE: Removing malware8:38
    EXERCISE: Detecting rootkits11:07
    EXERCISE: Security evaluation6:00
    Malware – notes for the examination
  • Access control
    Authentication and authorisation – Introduction1:57
    Authentication - users6:56
    How secure is your password?5:03
    Authentication protocols and services8:25
    LM Hash7:02
    Cached Credentials4:29
    Authentication – notes for the examination
    Identity Theft9:13
    EXERCISE: Offline attacks12:22
    Using online cracking services8:41
    Identity Theft – notes for the examination
  • Windows security
    Windows Security – what you’ll learn1:17
    User Account Control6:22
    UAC configuration8:02
    Additional Security Features – ASLR and DEP11:39
    Techniques and Methods – notes for the examination
    Encryption – key protection9:31
    Drive encryption8:25
    BitLocker To Go Reader4:43
    File and folder encryption – EFS7:30
    Encryption – notes for the examination
  • Application security
    Introduction to Application Security8:18
    Attacks on applications10:18
    SQL Injection8:10
    EXERCISE: Analyze the application13:31
    Blind SQL Injection9:33
    Automated SQL Injection11:44
    Cross-site scripting – XSS10:10
    Program security assessment5:10
    Unsafe applications10:11
    Application Attacks – notes for the examination
    Program Security Assessment – notes for the examination
  • Application security - Configuration and management
    Here’s what you’ll learn in this module1:05
    Software updates2:39
    MS Update6:53
    System Center Configuration Manager2:46
    Managing applications8:26
    Blocking applications7:35
    Software restrictions policies5:57
    EXERCISE: Application control rules12:11
    Isolating applications6:30
    How to protect users without interrupting their work – notes for the examination
  • Cryptography
    Introduction to cryptography9:42
    History of ciphers10:57
    Symmetric and asymmetric ciphers6:13
    Symmetric-key algorithms5:49
    Block ciphers6:01
    Data encryption standard6:51
    Advanced encryption standards5:28
    Block cipher modes7:16
    Stream Ciphers – RC43:40
    Asymmetric-key algorithms8:11
    HASH functions5:56
    Digital signature5:56
    Hybrid Schemes6:24
    Symmetric and Asymmetric Ciphers – notes for the examination
  • Public Key Infrastructure
    Introduction to cryptology2:12
    Public key infrastructure6:10
    Implementing public key infrastructure5:39
    What will PKI allow you?6:29
    EXERCISE: Certificates8:37
    Certificate life cycle6:24
    Planning the PKI8:33
    PKI Administration7:29
    Public Key Infrastructure – Trust but verify – notes for the examination

Explore Today's Cyber Threats & Shut Them Down with 20+ Hours of Practical Training

IT Security Academy


IT Security Academy is a company that associates IT Security Professionals. Now it's proud to share its knowledge online. Certified experts have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.


With a few lines of code, cybercriminals can access protected networks, view encrypted files, and even steal identities online—if there's not an ethical hacker standing in their way. This extensive course contains over 20 hours of practical training designed to help you thwart these criminals as a certified professional. You'll start with an introduction to cyber threats and IT security myths. Then you'll move on to security policies, risk management, disaster recovery, and even get a free voucher for the ISA CISS examination when you complete the course, setting you up to validate your skills right away.

  • Access 236 lectures & 23 hours of content 24/7
  • Follow step-by-step instructions for advanced hacking techniques
  • Familiarize yourself w/ current cyber threats & hacking trends
  • Explore designing more secure networks
  • Dive into encrypted data, identify spoofing, and windows authorization
  • Get a free voucher for the ISA CISS examination upon completion


Important Details

  • Length of time users can access this course: lifetime
  • Access options: web and mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner
  • A basic understanding of IT and infrastructure is recommended but not required
  • Note: While this comprehensive hacking training includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. It is not recommended to use these techniques to infiltrate networks or IT systems without permission and consent


  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...