Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99/24.99
Lectures |
---|
1. Create A VeraCrypt Container to Protect Your Laptop or Desktop- 10m 48s |
2. Build a Manual Lab 01- 3m 48s |
3. Lab Legalities- 2m 44s |
4. Getting to Know Your Win2k VM- 5m 25s |
5. Getting to Know Your XPAttacker VM- 3m 4s |
6. Getting to Know You Win7 VM- 3m 57s |
7. Getting to Know Your Win2k3-AD- 1m 27s |
8. Getting to Know Your WebApp- 1m 31s |
9. Putting Our Lab Together Step By Step- 12m 30s |
10. Tying everying together in our Lab- 5m 44s |
Lectures |
---|
1. Introduction to Pentesting and Ethical Hacking- 31s |
2. Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro- 4m 58s |
3. Defintion of a Penetration Test- 1m 46s |
4. The Evolving Threat- 1m 49s |
5. The Vulnerabilty Lifecycle- 2m 16s |
6. Map.Norsecorp.com- 1m 56s |
7. Botnet Definition- 5m 12s |
8. Defense in Depth- 4m 47s |
9. MetaData- 3m 30s |
10. Types of PenTests- 4m 47s |
11. Types of Hackers- 1m 32s |
12. Common Definitions- 1m 43s |
13. Hacker vs- 5m 27s |
14. Penetration Testing Terminology- 3m 10s |
15. Essential Terminology- 3m 51s |
16. OSSTMM Methodology- 8m 43s |
17. Tools vs Technique- 4m 45s |
18. Things are not always as they seem- 1m 13s |
19. Calculating Risk & Formulas- 2m 48s |
20. Analyzing Findings- 45s |
21. Calculating SLE, ARO, ALE- 1m 6s |
22. Other Penetration Testing Methodologies- 3m 15s |
Lectures |
---|
1. Introduction to Footprinting- 43s |
2. What Information is Gathered by the Hacker- 5m 37s |
3. Methods of Obtaining Information And Physical Access- 1m 24s |
4. Social Access- 4m 27s |
5. Digital Access- 3m 2s |
6. Passive vs Active Reconnaissance- 2m 14s |
7. Footprinting Defined- 1m 32s |
8. Exercise: Footprinting Tool: Maltego- 2m 3s |
9. Most Powerful Hacking Tool on the Internet Today- 4m 16s |
10. Instructor Demonstration - The Power of Google -A- 5m 44s |
11. Instructor Demonstration - The Power of Google -B- 10m 16s |
12. Instructor Demo: GoogleAlerts- 4m 24s |
13. Removing Searchable Content- 4m 55s |
14. Internet Archive: The WayBack Machine- 6m 44s |
15. Domain Name Registration-WhoIs Information- 1m 20s |
16. Instructor Demonstation - CentralOps- 6m 14s |
17. DNS Databases- 3m 21s |
18. Traceroute Operation- 5m 30s |
19. InstructorDemonstration: Online Tools- 4m 19s |
20. Spokeo - No Refuge for the Wealthy- 4m 59s |
21. Netcraft, DoaminsbyProxy, Countermeasures- 8m 43s |
Lectures |
---|
1. Introduction to Linux- 24s |
2. Linux History - Linus + Minux = Linux- 2m 29s |
3. Linux GUI Desktops- 2m 9s |
4. Linux Shell Linux Bash Shell- 2m 31s |
5. Passwd & Shadow File Formats- 1m 52s |
6. InstructorDemo:User Account Management- 6m 20s |
7. Tarballs & Zips & Installing VMware Tools- 5m 30s |
8. Compiling Programs in Linux, Shell Shock, Poodle Vulnerability- 2m 44s |
9. Most Popular Linux Security Distribution- 1m 58s |
Lectures |
---|
1. Introduction to Port Scanning- 15s |
3. TCP/IP Stack- 6m 22s |
4. TCP 3-Way HandShake- 7m |
5. NMap ServiceVersion Detection And Demo- 1m 44s |
6. Instructor Demonstration-Engage, NmapScans- 1m 24s |
7. Hping3, NMap -O- 1m 32s |
8. Fuzzy Logic- 1m 30s |
9. Countermeasures: Scanning- 2m 21s |
Lectures |
---|
1. Intro to Enumeration- 17s |
2. Grabbing Banners- 4m 25s |
3. Shodan- 5m 20s |
4. ZoneTransfers- 5m 1s |
5. DNS Enumeration- 4m 26s |
6. SNMP Countermeasures, AD and AD Countermeasures- 4m 13s |
7. Null Sessions- 8m 40s |
Lectures |
---|
1. Intro Into Cryptography- 31s |
2. Beginings of Cryptography- 4m 36s |
3. Implementation, Stream Cipher, Block Cipher and the Enigima- 8m 54s |
4. Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange- 5m 7s |
5. Hashing, Hashing Collisions, Common Hash Algorithms- 9m 38s |
6. Ransomware- 3m 7s |
7. IPSec and SSH- 3m 46s |
8. PKI Applications, Quantum Crypto and VeraCrypt- 3m 27s |
Lectures |
---|
1. Introduction to Malware and How The Internet Makes Money- 23s |
2. Things that make the World Go Around - Well as far as the Internet is concerned- 9m 10s |
3. Trojans and Back Doors- 6m 17s |
4. Defining Malware: Viruses and Worms- 7m 14s |
5. Defining Malware: Spyware- 5m 35s |
6. Data Loss Prevention (DLP) and other Creepy things- 10m 31s |
7. Distributing Malware- 6m 19s |
8. Malware Capabilities- 5m 27s |
9. Auto Starting Malware- 1m 44s |
10. Tool: Netcat- 3m 41s |
11. Demo: NetCat Procedure- 10m 28s |
12. Executable Wrappers- 4m 22s |
13. Instructor Demo: Executeable Wrappers 1- 8m 51s |
14. Instructor Demo: Executeable Wrappers 2- 1m 53s |
15. Malware Avoiding Detection- 4m 33s |
16. Malware Countermeasures 1- 8m 10s |
17. Malware Countermeasures 2- 6m 39s |
Lectures |
---|
1. Introduction to System Hacking Introduction- 1m |
2. Types of Password Attacks, Keystroke Loggers- 5m 44s |
3. Password Guessing Online- 7m 44s |
4. Cracking Windows Passwords - A- 3m 25s |
5. Cracking Windows Passwords - B- 8m 32s |
6. Cracking Windows Passwords - C- 7m |
7. Cracking Windows Passwords - D- 8m |
8. Cracking Windows Passwords - E- 8m 25s |
9. Countermeasures: Stealing the Passwords, Syskey, Salting- 8m 41s |
10. Cloud Cracking Techniques- 1m 55s |
11. Generating Rainbow Tables, Free Rainbow Tables- 3m 17s |
12. Password Hash Insertion Attack- 9m 21s |
13. Demonstration MimiKatz- 10m 59s |
14. Privilege Escalation, Countermeasures- 5m 37s |
15. Covering Tracks, Disable Auditing, Clearing the Event Log- 3m 4s |
16. Alternate Data Streams Demonstration - A- 8m 7s |
17. Alternate Data Streams Demonstration - B- 11m 55s |
18. Alternate Data Streams Demonstration - C- 10m 39s |
19. Anonymizers - JAP- 3m 42s |
20. Steganography- 11m 41s |
21. Virtually Complete Secrecy, TOR- 11m 2s |
22. RootKits - Overview- 8m 39s |
23. RootKits - Frightening Demo- 13m 22s |
24. Root Kit Countermeasures, Tokens and Smart Cards- 11m 19s |
Lectures |
---|
1. Introduction to Advanced System Explotation- 1m |
2. How do Exploits Work?- 5m 8s |
3. Buffer Over Flows Introduction I do when Speaking at a Conference- 5m 59s |
4. Processors and Stacks- 10m 23s |
5. Basic Types of Buffer Overflows And Demo 01- 11m 12s |
6. Basic Types of Buffer Overflows And Demo 02- 9m 27s |
7. Basic Types of Buffer Overflows And Demo 03- 1m 37s |
8. Stages of Exploit Development- 7m 54s |
9. Buffer Overflow Prevention- 5m 8s |
10. The Metasploit Project- 5m 10s |
11. Core Impact Overview- 12m 54s |
Lectures |
---|
1. Introduction to Database Management Systems- 23s |
2. Overview of Databases, Types of Databases, Relations of Databases- 7m 16s |
3. View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties- 6m 40s |
4. SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info- 9m 21s |
5. Hardening SQL Server- 9m 21s |
6. SQL Injection Demo 1- 9m 54s |
7. SQL Injection Demo 2- 6m 10s |
8. SQL Injection Demo 3- 4m 3s |
Lectures |
---|
1. Introduction to WiFi and Mobile Hacking- 26s |
2. WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n - MIMO, 802.11ac,- 4m 9s |
3. 802.11n - MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets- 5m 44s |
4. XOR Basics, WEP Weaknesses- 3m 26s |
5. TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption- 3m 26s |
6. Kismet, Aircrack-ng, Aireplay- 2m 54s |
7. EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network- 2m 47s |
8. Exercise/Assignment; Cracking WPA/WPA2 Password Preparation- 12m 45s |
9. Exercise/Assignment; Cracking WPA/WPA2 Password - Solution- 5m 19s |
Lectures |
---|
1. Introduction to Sniffing- 17s |
2. Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer- 7m 34s |
3. TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing- 4m 16s |
4. Active Sniffing & Methods, Switch Table Flooding- 4m 22s |
5. Arp Cache Posioning- 6m |
6. Arp Cache Posioning Tools and Countermeasures- 5m 35s |
7. Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M- 6m 18s |
8. Exercise/Assignment Breaking SSL - Preparation- 9m 3s |
9. Exercise/Assignment Breaking SSL - Solution- 5m 19s |
Lectures |
---|
1. Introduction tp Firewalls, IDS and IPS WAF- 8s |
2. Firewall - Your First Line of Defense- 6m 35s |
3. IDS Your Second Line of Defense- 4m 55s |
4. Web Application Firewall and Evasion Techniques'- 7m 45s |
5. Behavioural Firewalls and IPS Systems- 3m 35s |
Lectures |
---|
1. Introduction to Web Application- 42s |
2. Common Security Threats, Need for Monitoring, SANS Seven MGT Errors- 6m 35s |
3. Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets- 5m 12s |
4. Logs Cancanolization and Other Attacks- 3m 36s |
5. Web App Scanner, HTTrack,HTTPrint, Proxies- 7m 7s |
6. Directory Traversal & Other Common Vulnerabilties- 9m 44s |
7. XSS Demo and Countermeasures- 8m 50s |
8. Common Ways to Attack Web Technologies, Cross Site Scripting (XSS)- 8m 50s |
9. Cross Site Request Forgery- 6m 3s |
10. Cookies and Session Management- 5m 19s |
11. OWASP Top 10- 7m 5s |
Lectures |
---|
1. So your Ready To Take Your Test 1?- 7m 16s |
Lectures |
---|
1. Backing Up our Veracrypt Storage Enclosure for Saftey- 5m 14s |
PassQueen does not provide real Microsoft exam questions. Similarly, PassQueen does not supply real Amazon exam questions. The materials offered by PassQueen lack real questions and answers of certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of PassQueen content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.
Other Pages
© 2025 All Rights Reserved passqueen.com.