Section 01: Fundamentals of Information Security |
|
Introduction |
|
00:02:00 |
|
Section Overview |
|
00:02:00 |
|
Information and Assets |
|
00:06:00 |
|
InfoSec Documents and its types |
|
00:05:00 |
|
Definition of Information Security |
|
00:06:00 |
|
CIA Triad – Overview |
|
00:02:00 |
|
Confidentiality |
|
00:05:00 |
|
Integrity |
|
00:05:00 |
|
Availability |
|
00:06:00 |
|
Vulnerability – What is it? |
|
00:05:00 |
|
Vulnerability Assessment Types |
|
00:09:00 |
|
Threat |
|
00:07:00 |
|
Impact |
|
00:04:00 |
|
Risk in Information Security |
|
00:06:00 |
|
What is a Security Control? |
|
00:06:00 |
|
Classification of Security Controls |
|
00:05:00 |
|
Relationship between Information Security Aspects |
|
00:05:00 |
Section 02: Networking Concepts for Information Security |
|
What is a Network? |
|
00:04:00 |
|
What is a LAN? |
|
00:03:00 |
|
Router’s connecting LAN’s |
|
00:03:00 |
|
Network Components |
|
00:07:00 |
|
WAN and MPLS |
|
00:06:00 |
|
Peer to Peer Architecture |
|
00:04:00 |
|
Client to Server Architecture |
|
00:04:00 |
|
Bus and Star Topology |
|
00:06:00 |
|
Ring and Mesh Topology |
|
00:05:00 |
|
PtoP and PtoM |
|
00:08:00 |
|
Description of Address |
|
00:09:00 |
|
What is an IP address? |
|
00:07:00 |
|
Classes of IP address |
|
00:10:00 |
|
Finding your own IP address using ipconfig |
|
00:03:00 |
|
Finding your own MAC address using ipconfig all |
|
00:05:00 |
|
Introduction to DNS |
|
00:03:00 |
|
The many steps of Name Resoution |
|
00:06:00 |
|
Why do we use UDP in DNS resolution? |
|
00:04:00 |
|
HTTP |
|
00:04:00 |
|
HTTPS |
|
00:05:00 |
Section 03: Getting started with Information Security |
|
What is Security? |
|
00:06:00 |
|
What is Cyber Security? |
|
00:05:00 |
|
History of Cyber Security |
|
00:07:00 |
|
Scope and Career Insights |
|
00:06:00 |
Section 04: Diving deep into Information Security |
|
Types of Actors |
|
00:09:00 |
|
Passive Attacks |
|
00:05:00 |
|
Active Attacks |
|
00:05:00 |
|
Security Organizations |
|
00:05:00 |
Section 05: Hacking Terminology |
|
Important Hacking Terms |
|
00:07:00 |
|
Vulnerability Assessment Vs Penetration Testing |
|
00:09:00 |
|
Information Security Methodologies |
|
00:07:00 |
|
Types of Pen Testing |
|
00:06:00 |
|
Phases of Penetration Testing |
|
00:04:00 |
|
10 Steps to follow |
|
00:04:00 |
Section 06: Setting up your lab! |
|
What is Linux OS? |
|
00:04:00 |
|
What is KALI Linux? |
|
00:03:00 |
|
Virtual Box Installation |
|
00:06:00 |
|
Kali Linux Installation in Virtual Box |
|
00:12:00 |
|
Install Metasploitable on Virtual Box |
|
00:09:00 |
|
Install DVWA in Kali |
|
00:18:00 |
|
Dark Web – Install TOR |
|
00:09:00 |
|
Executing Basic Commands in Kali |
|
00:12:00 |
|
Executing Advance Commands in Kali |
|
00:14:00 |
Section 07: Information Gathering |
|
What is Information Gathering? |
|
00:08:00 |
|
Maltego – Part 1 |
|
00:07:00 |
|
Maltego – Part 2 |
|
00:06:00 |
|
HTTrack |
|
00:05:00 |
|
The Harvester Tool |
|
00:02:00 |
|
OSINT Framework |
|
00:05:00 |
|
NS Lookup |
|
00:03:00 |
|
RedHawk Tool |
|
00:05:00 |
|
SHODAN Search Engine |
|
00:09:00 |
Section 08: Scanning and Enumeration |
|
What is Scanning? |
|
00:07:00 |
|
Nmap |
|
00:05:00 |
|
ZenMap GUI |
|
00:17:00 |
|
What is Enumeration? |
|
00:03:00 |
|
Types of Enumeration |
|
00:03:00 |
|
Enumeration using Super Scan |
|
00:07:00 |
|
Enumeration using HYENA |
|
00:06:00 |
Section 09: Vulnerability Assessment |
|
What is Vulnerability Assessment? |
|
00:04:00 |
|
Phases of VA |
|
00:08:00 |
|
Vulnerability Scoring Systems |
|
00:09:00 |
|
Introduction to Nessus |
|
00:05:00 |
|
Create and Configure Nessus Network Policy |
|
00:08:00 |
|
Nessus Launch Scan and Analyze Results |
|
00:08:00 |
Section 10: Hacking Web Servers |
|
Introduction to Web Servers |
|
00:05:00 |
|
Web Server Attacks |
|
00:05:00 |
|
Web Server Pentesting |
|
00:04:00 |
|
Countermeasures |
|
00:05:00 |
Section 11: OWASP top 10 |
|
OWASP Top 10 Vulnerabilities – Part 1 |
|
00:05:00 |
|
OWASP Top 10 Vulnerabilities – Part 2 |
|
00:07:00 |
|
Website Footpriniting – Part 1 |
|
00:05:00 |
|
Website Footpriniting – Part 2 |
|
00:03:00 |
Section 12: Command Execution Vulnerabilities |
|
Hack Command Execution Vulnerabilities – Basic |
|
00:06:00 |
|
Hack Command Execution Vulnerabilities – Advance |
|
00:07:00 |
Section 13: File Upload Vulnerabilities |
|
Configuring Burp Suite |
|
00:16:00 |
|
File Upload Vulnerability – Low |
|
00:10:00 |
|
File Upload Vulnerability – Medium |
|
00:07:00 |
|
File Upload Vulnerability – High |
|
00:08:00 |
Section 14: SQL Injection |
|
What is SQL Injection? |
|
00:04:00 |
|
Types of SQL Injection |
|
00:05:00 |
|
Manual SQL Injection |
|
00:17:00 |
|
Automating SQL Injection – SQLmap |
|
00:09:00 |
|
SQL Injection – How to prevent? |
|
00:03:00 |
Section 15: XSS - Cross Site Scripting |
|
What is XSS? |
|
00:03:00 |
|
Types of XSS |
|
00:06:00 |
|
Exploiting XSS – Low |
|
00:11:00 |
|
Exploiting XSS – Medium |
|
00:05:00 |
|
Exploiting XSS – High |
|
00:11:00 |
|
XSS Countermeasures |
|
00:04:00 |
Section 16: CSRF |
|
CSRF – Introduction |
|
00:06:00 |
|
CSRF – Practical |
|
00:07:00 |
Section 17: Password Cracking |
|
What is a Brute force attack? |
|
00:05:00 |
|
Password Cracking – Live practical |
|
00:18:00 |
|
Web Application Penetration Testing |
|
00:09:00 |
|
Web Application Countermeasures |
|
00:06:00 |
Section 18: Denial of Service (DOS) |
|
What is a DOS attack? |
|
00:03:00 |
|
Types of DOS attack |
|
00:05:00 |
|
What is Botnet? |
|
00:03:00 |
Section 19: Social Engineering |
|
What is Social Engineering? |
|
00:06:00 |
|
Types of Social Engineering |
|
00:08:00 |
|
Installing BeEF Framework |
|
00:09:00 |
|
Getting User credentials using BeEF Framework |
|
00:11:00 |
Section 20: Malware Threats |
|
Introduction to Malware |
|
00:09:00 |
|
What are Trojans? |
|
00:08:00 |
|
Introduction to Viruses |
|
00:07:00 |
|
Types of Viruses |
|
00:10:00 |
Section 21: Bug Bounty X Information Security |
|
Why do we need to fix the Vulnerabilities? |
|
00:05:00 |
|
Hacker Sponsored Security |
|
00:03:00 |
|
Bug Bounty Definition |
|
00:03:00 |
|
Public or Private Bug Bounty Program |
|
00:04:00 |
|
What is HackerOne? |
|
00:05:00 |
|
Why organizations will hire you as a Bug Bounty Hunter? |
|
00:08:00 |
Section 22: Network Security |
|
Section Overview |
|
00:01:00 |
|
What is Security filtering? |
|
00:04:00 |
|
Access Control lists |
|
00:05:00 |
|
MAC and Port filtering |
|
00:04:00 |
|
Tunneling |
|
00:03:00 |
|
VPN’s |
|
00:07:00 |
|
SSL and SSL VPN’s |
|
00:06:00 |
|
Generic Routing Encapsulation Protocol (GRE) |
|
00:04:00 |
|
IPsec |
|
00:06:00 |
|
Pretty good privacy |
|
00:06:00 |
|
Remote Access Services |
|
00:05:00 |
|
Other Remote Access Protocols |
|
00:06:00 |
|
Introduction to Cryptography |
|
00:05:00 |
|
What is Symmetric Encryption? |
|
00:03:00 |
|
Symmetric Encryption Algorithms – DES and AES |
|
00:06:00 |
|
What is Asymmetric Encryption? |
|
00:03:00 |
|
RSA and Diffie Hellman Algorithms |
|
00:07:00 |
|
What is Hashing? What is a HASH? |
|
00:07:00 |
|
Public Key Infrastructure and Certificate Authority |
|
00:10:00 |
|
What are Digital Signatures? |
|
00:09:00 |
|
Transport Layer Security (TLS) Encryption |
|
00:04:00 |
|
Managing Passwords |
|
00:05:00 |
|
Password Managing Guidelines |
|
00:10:00 |
|
Single sign on |
|
00:09:00 |
|
AAA – Authentication, Authorization and Accounting |
|
00:08:00 |
Section 23: Information Security Report (Vulnerability Assessment report) |
|
Vulnerability Assessment Report |
|
00:08:00 |
|
Components of a report |
|
00:14:00 |
Assignment |
|
Assignment -Complete Information Security |
|
00:00:00 |