Cyber Security Awareness Training Course

1- Welcome to 1M Cyber Security!- 2- Greetings from your instructor Reza- 4- Who are The Hackers– 5- How Hard Is It To Get Hacked– 5- Targeted Email Phishing Part IV- 6-1- Targeted Email Phishing Part I– 6-2- Targeted Email Phishing Part II- 6-4- Targeted Email Phishing Part III- 7- Macro Malware– 8- Business Email […]

Ethical Hacking [CEHPrep] Mod Evading IDS Firewall

1 – Understanding Organizational Defenses_About IDS, Firewalls, and Honeypots. 1 – Understanding Organizational Defenses_Anomalous Behavior. 1 – Understanding Organizational Defenses_Evasion in the Real World. 1 – Understanding Organizational Defenses_Indicators of File System Intrusion. 1 – Understanding Organizational Defenses_Indicators of Network Intrusion. 1 – Understanding Organizational Defenses_Overview. 1 – Understanding Organizational Defenses_Summary. 2 – Firewalls_Application-level Gateway […]

Ethical Hacking [CEHPrep] Mod SQL INJECTION ATTACK

1 – Why SQL Injection Matters_Executing a SQL Injection Attack. 1 – Why SQL Injection Matters_Overview. 1 – Why SQL Injection Matters_SQL Injection in the Wild. 1 – Why SQL Injection Matters_Summary. 1 – Why SQL Injection Matters_The Impact of a Successful Attack. 1 – Why SQL Injection Matters_The Significance of SQL Injection. 2 – […]

Ethical Hacking [CEHPrep] Mod Cloud Security

1 – Cloud Computing Concepts_Cloud Deployment Models. 1 – Cloud Computing Concepts_From On-premise to Cloud. 1 – Cloud Computing Concepts_Is the Cloud Secure. 1 – Cloud Computing Concepts_Overview. 1 – Cloud Computing Concepts_Summary. 1 – Cloud Computing Concepts_The Characteristics of a Cloud Service. 1 – Cloud Computing Concepts_The NIST Cloud Computing Reference Architecture. 1 – […]

Ethical Hacking [CEHPrep] Mod ENUM

4.1 – Enumeration Explained & the Techniques Used_Enumeration Explained. 4.1 – Enumeration Explained & the Techniques Used_Introduction. 4.1 – Enumeration Explained & the Techniques Used_Know Your Ports and Services. 4.1 – Enumeration Explained & the Techniques Used_Summary. 4.1 – Enumeration Explained & the Techniques Used_The Techniques of Enumeration. 4.2 – Enumerating via Defaults & NetBIOS_Defaults […]

Ethical Hacking [CEHPrep] Mod DOS

1 – Understanding Denial of Service Attacks_Defining DoS Attacks. 1 – Understanding Denial of Service Attacks_Distributed Denial of Service Attacks. 1 – Understanding Denial of Service Attacks_Motivations for DDoS. 1 – Understanding Denial of Service Attacks_Overview. 1 – Understanding Denial of Service Attacks_Summary. 1 – Understanding Denial of Service Attacks_The Impact of DoS Attacks. 1 […]

Ethical Hacking [CEHPrep] Mod SCANNING

3.1 – Overview of Overview of Scanning . 3.1 – Overview of Summary. 3.1 – Overview of Types of Scanning. 3.1 – Overview of What Is Scanning. 3.1 – Overview of What Techniques Are Used. 3.1 – Overview of What Tools Are Used. 3.1 – Overview of What’s the Goal. 3.2 – Understanding the 3-way […]

Ethical Hacking [CEHPrep] Mod SYSTEM HACKING

5.1 – Understanding This Stage_Now, How Exactly Did We Get Here. 5.1 – Understanding This Stage_Summary. 5.1 – Understanding This Stage_The Three Goals and Five Phases. 5.1 – Understanding This Stage_Understanding This Stage. 5.1 – Understanding This Stage_What Are Our Goals. 5.2 – Phase 1 – Gaining Access – Cracking Passwords_Complexity. 5.2 – Phase 1 […]

Ethical Hacking [CEHPrep] Mod Social Engineering

9.1 – Humans _Computer-based Versus Human-based Social Engineering. 9.1 – Humans _Human Weaknesses That Enable Social Engineering. 9.1 – Humans _Overview. 9.1 – Humans _Social Engineering at Home and in Popular Culture. 9.1 – Humans _Social Engineering Through the Ages. 9.1 – Humans _Summary. 9.1 – Humans _The Soft Center That Social Engineering Exploits. 9.2 […]

Ethical Hacking [CEHPrep] Mod BoF (Buffer Overflow)

8.1 – What Are Buffer Overflows_How Do You Keep Buffers from Overflowing. 8.1 – What Are Buffer Overflows_Summary. 8.1 – What Are Buffer Overflows_What Are Buffer Overflows. 8.1 – What Are Buffer Overflows_What Happens After a Buffer Overflows. 8.1 – What Are Buffer Overflows_Why Do Buffers Overflow. 8.2 – Inside Buffer Overflows_Exploiting Heap Overflows. 8.2 […]