| Section 01: Fundamentals of Information Security | |||
| Introduction | 00:02:00 | ||
| Section Overview | 00:02:00 | ||
| Information and Assets | 00:06:00 | ||
| InfoSec Documents and its types | 00:05:00 | ||
| Definition of Information Security | 00:06:00 | ||
| CIA Triad – Overview | 00:02:00 | ||
| Confidentiality | 00:05:00 | ||
| Integrity | 00:05:00 | ||
| Availability | 00:06:00 | ||
| Vulnerability – What is it? | 00:05:00 | ||
| Vulnerability Assessment Types | 00:09:00 | ||
| Threat | 00:07:00 | ||
| Impact | 00:04:00 | ||
| Risk in Information Security | 00:06:00 | ||
| What is a Security Control? | 00:06:00 | ||
| Classification of Security Controls | 00:05:00 | ||
| Relationship between Information Security Aspects | 00:05:00 | ||
| Section 02: Networking Concepts for Information Security | |||
| What is a Network? | 00:04:00 | ||
| What is a LAN? | 00:03:00 | ||
| Router’s connecting LAN’s | 00:03:00 | ||
| Network Components | 00:07:00 | ||
| WAN and MPLS | 00:06:00 | ||
| Peer to Peer Architecture | 00:04:00 | ||
| Client to Server Architecture | 00:04:00 | ||
| Bus and Star Topology | 00:06:00 | ||
| Ring and Mesh Topology | 00:05:00 | ||
| PtoP and PtoM | 00:08:00 | ||
| Description of Address | 00:09:00 | ||
| What is an IP address? | 00:07:00 | ||
| Classes of IP address | 00:10:00 | ||
| Finding your own IP address using ipconfig | 00:03:00 | ||
| Finding your own MAC address using ipconfig all | 00:05:00 | ||
| Introduction to DNS | 00:03:00 | ||
| The many steps of Name Resoution | 00:06:00 | ||
| Why do we use UDP in DNS resolution? | 00:04:00 | ||
| HTTP | 00:04:00 | ||
| HTTPS | 00:05:00 | ||
| Section 03: Getting started with Information Security | |||
| What is Security? | 00:06:00 | ||
| What is Cyber Security? | 00:05:00 | ||
| History of Cyber Security | 00:07:00 | ||
| Scope and Career Insights | 00:06:00 | ||
| Section 04: Diving deep into Information Security | |||
| Types of Actors | 00:09:00 | ||
| Passive Attacks | 00:05:00 | ||
| Active Attacks | 00:05:00 | ||
| Security Organizations | 00:05:00 | ||
| Section 05: Hacking Terminology | |||
| Important Hacking Terms | 00:07:00 | ||
| Vulnerability Assessment Vs Penetration Testing | 00:09:00 | ||
| Information Security Methodologies | 00:07:00 | ||
| Types of Pen Testing | 00:06:00 | ||
| Phases of Penetration Testing | 00:04:00 | ||
| 10 Steps to follow | 00:04:00 | ||
| Section 06: Setting up your lab! | |||
| What is Linux OS? | 00:04:00 | ||
| What is KALI Linux? | 00:03:00 | ||
| Virtual Box Installation | 00:06:00 | ||
| Kali Linux Installation in Virtual Box | 00:12:00 | ||
| Install Metasploitable on Virtual Box | 00:09:00 | ||
| Install DVWA in Kali | 00:18:00 | ||
| Dark Web – Install TOR | 00:09:00 | ||
| Executing Basic Commands in Kali | 00:12:00 | ||
| Executing Advance Commands in Kali | 00:14:00 | ||
| Section 07: Information Gathering | |||
| What is Information Gathering? | 00:08:00 | ||
| Maltego – Part 1 | 00:07:00 | ||
| Maltego – Part 2 | 00:06:00 | ||
| HTTrack | 00:05:00 | ||
| The Harvester Tool | 00:02:00 | ||
| OSINT Framework | 00:05:00 | ||
| NS Lookup | 00:03:00 | ||
| RedHawk Tool | 00:05:00 | ||
| SHODAN Search Engine | 00:09:00 | ||
| Section 08: Scanning and Enumeration | |||
| What is Scanning? | 00:07:00 | ||
| Nmap | 00:05:00 | ||
| ZenMap GUI | 00:17:00 | ||
| What is Enumeration? | 00:03:00 | ||
| Types of Enumeration | 00:03:00 | ||
| Enumeration using Super Scan | 00:07:00 | ||
| Enumeration using HYENA | 00:06:00 | ||
| Section 09: Vulnerability Assessment | |||
| What is Vulnerability Assessment? | 00:04:00 | ||
| Phases of VA | 00:08:00 | ||
| Vulnerability Scoring Systems | 00:09:00 | ||
| Introduction to Nessus | 00:05:00 | ||
| Create and Configure Nessus Network Policy | 00:08:00 | ||
| Nessus Launch Scan and Analyze Results | 00:08:00 | ||
| Section 10: Hacking Web Servers | |||
| Introduction to Web Servers | 00:05:00 | ||
| Web Server Attacks | 00:05:00 | ||
| Web Server Pentesting | 00:04:00 | ||
| Countermeasures | 00:05:00 | ||
| Section 11: OWASP top 10 | |||
| OWASP Top 10 Vulnerabilities – Part 1 | 00:05:00 | ||
| OWASP Top 10 Vulnerabilities – Part 2 | 00:07:00 | ||
| Website Footpriniting – Part 1 | 00:05:00 | ||
| Website Footpriniting – Part 2 | 00:03:00 | ||
| Section 12: Command Execution Vulnerabilities | |||
| Hack Command Execution Vulnerabilities – Basic | 00:06:00 | ||
| Hack Command Execution Vulnerabilities – Advance | 00:07:00 | ||
| Section 13: File Upload Vulnerabilities | |||
| Configuring Burp Suite | 00:16:00 | ||
| File Upload Vulnerability – Low | 00:10:00 | ||
| File Upload Vulnerability – Medium | 00:07:00 | ||
| File Upload Vulnerability – High | 00:08:00 | ||
| Section 14: SQL Injection | |||
| What is SQL Injection? | 00:04:00 | ||
| Types of SQL Injection | 00:05:00 | ||
| Manual SQL Injection | 00:17:00 | ||
| Automating SQL Injection – SQLmap | 00:09:00 | ||
| SQL Injection – How to prevent? | 00:03:00 | ||
| Section 15: XSS - Cross Site Scripting | |||
| What is XSS? | 00:03:00 | ||
| Types of XSS | 00:06:00 | ||
| Exploiting XSS – Low | 00:11:00 | ||
| Exploiting XSS – Medium | 00:05:00 | ||
| Exploiting XSS – High | 00:11:00 | ||
| XSS Countermeasures | 00:04:00 | ||
| Section 16: CSRF | |||
| CSRF – Introduction | 00:06:00 | ||
| CSRF – Practical | 00:07:00 | ||
| Section 17: Password Cracking | |||
| What is a Brute force attack? | 00:05:00 | ||
| Password Cracking – Live practical | 00:18:00 | ||
| Web Application Penetration Testing | 00:09:00 | ||
| Web Application Countermeasures | 00:06:00 | ||
| Section 18: Denial of Service (DOS) | |||
| What is a DOS attack? | 00:03:00 | ||
| Types of DOS attack | 00:05:00 | ||
| What is Botnet? | 00:03:00 | ||
| Section 19: Social Engineering | |||
| What is Social Engineering? | 00:06:00 | ||
| Types of Social Engineering | 00:08:00 | ||
| Installing BeEF Framework | 00:09:00 | ||
| Getting User credentials using BeEF Framework | 00:11:00 | ||
| Section 20: Malware Threats | |||
| Introduction to Malware | 00:09:00 | ||
| What are Trojans? | 00:08:00 | ||
| Introduction to Viruses | 00:07:00 | ||
| Types of Viruses | 00:10:00 | ||
| Section 21: Bug Bounty X Information Security | |||
| Why do we need to fix the Vulnerabilities? | 00:05:00 | ||
| Hacker Sponsored Security | 00:03:00 | ||
| Bug Bounty Definition | 00:03:00 | ||
| Public or Private Bug Bounty Program | 00:04:00 | ||
| What is HackerOne? | 00:05:00 | ||
| Why organizations will hire you as a Bug Bounty Hunter? | 00:08:00 | ||
| Section 22: Network Security | |||
| Section Overview | 00:01:00 | ||
| What is Security filtering? | 00:04:00 | ||
| Access Control lists | 00:05:00 | ||
| MAC and Port filtering | 00:04:00 | ||
| Tunneling | 00:03:00 | ||
| VPN’s | 00:07:00 | ||
| SSL and SSL VPN’s | 00:06:00 | ||
| Generic Routing Encapsulation Protocol (GRE) | 00:04:00 | ||
| IPsec | 00:06:00 | ||
| Pretty good privacy | 00:06:00 | ||
| Remote Access Services | 00:05:00 | ||
| Other Remote Access Protocols | 00:06:00 | ||
| Introduction to Cryptography | 00:05:00 | ||
| What is Symmetric Encryption? | 00:03:00 | ||
| Symmetric Encryption Algorithms – DES and AES | 00:06:00 | ||
| What is Asymmetric Encryption? | 00:03:00 | ||
| RSA and Diffie Hellman Algorithms | 00:07:00 | ||
| What is Hashing? What is a HASH? | 00:07:00 | ||
| Public Key Infrastructure and Certificate Authority | 00:10:00 | ||
| What are Digital Signatures? | 00:09:00 | ||
| Transport Layer Security (TLS) Encryption | 00:04:00 | ||
| Managing Passwords | 00:05:00 | ||
| Password Managing Guidelines | 00:10:00 | ||
| Single sign on | 00:09:00 | ||
| AAA – Authentication, Authorization and Accounting | 00:08:00 | ||
| Section 23: Information Security Report (Vulnerability Assessment report) | |||
| Vulnerability Assessment Report | 00:08:00 | ||
| Components of a report | 00:14:00 | ||
| Assignment | |||
| Assignment -Complete Information Security | 00:00:00 | ||