The Complete Cybersecurity Bootcamp (Video Collection) Pearson IT Certification
Focused View
26:12:00
8 View
00001 Learning objectives.mp4
00:36
00002 1.1 Reviewing the OSI Model.mp4
04:53
00003 1.2 Reviewing the TCP IP Network Models.mp4
01:28
00004 1.3 Surveying Common Networking Protocols - DHCP.mp4
02:58
00005 1.4 Surveying Common Networking Protocols - Routing Protocols.mp4
13:07
00006 1.5 Surveying Common Networking Protocols - ICMP.mp4
03:13
00007 1.6 Surveying Common Networking Protocols - DNS.mp4
09:07
00008 1.7 Identifying Networking Device Types.mp4
03:54
00009 1.8 Understanding IP Subnets.mp4
03:28
00010 1.9 Examining VLANs and Data Visibility.mp4
06:54
00011 Learning objectives.mp4
00:52
00012 3.1 Understanding Defense-in-Depth.mp4
04:08
00013 3.2 Identifying Threats Vulnerabilities and Exploits and Their Associated Risk.mp4
07:51
00014 3.3 Identifying Threat Actors.mp4
03:08
00015 3.4 Understanding Reverse Engineering.mp4
04:14
00016 3.5 Understanding Chain of Custody.mp4
06:55
00017 3.6 Examining Run Books.mp4
02:13
00018 3.7 Introducing PII and PHI.mp4
03:29
00019 3.8 Understanding Principle of Least Privilege.mp4
04:08
00020 3.9 Performing Risk Assessment.mp4
07:42
00021 Learning objectives.mp4
00:31
00022 4.1 Understanding Confidentiality Integrity and Availability.mp4
03:00
00023 4.2 Understanding Authentication Authorization and Accounting.mp4
03:09
00024 4.3 Examining the Access Control Process - Terminology and Data Classification.mp4
03:23
00025 4.4 Examining the Access Control Process - Data States and Policy Roles.mp4
06:02
00026 4.5 Examining the Access Control Process - Security and Access Control Classification.mp4
08:16
00027 4.6 Understanding Discretionary Access Control.mp4
04:21
00028 4.7 Understanding Mandatory Access Control.mp4
04:19
00029 4.8 Understanding Role Based Access Control.mp4
02:56
00030 4.9 Understanding Attribute Based Access Control.mp4
02:44
00031 Learning objectives.mp4
00:32
00032 6.1 Understanding the Basic Components of Cryptography.mp4
05:50
00033 6.2 Introducing Public Key Infrastructure.mp4
03:39
00034 6.3 Deciphering Encryption Algorithms.mp4
03:33
00035 6.4 Understanding Hashing Algorithms.mp4
05:58
00036 6.5 Examining Secure Socket Layer and Transport Layer Security.mp4
04:18
00037 6.6 Examining Digital Certificates.mp4
07:17
00038 Learning objectives.mp4
00:35
00039 7.1 Introducing VPNs and Why We Use Them.mp4
02:26
00040 7.2 Examining Remote Access VPNs.mp4
02:40
00041 7.3 Examining Site-to-Site VPNs.mp4
02:16
00042 7.4 Understanding IPsec Concepts Components and Operations.mp4
10:16
00043 7.5 Surveying Cisco VPN Solutions - Traditional IPsec DMVPN FlexVPN.mp4
12:37
00044 7.6 Surveying Cisco VPN Solutions - Clientless SSL and AnyConnect.mp4
07:10
00045 Learning objectives.mp4
00:29
00046 9.1 Examining Host-Based Intrusion Detection.mp4
03:34
00047 9.2 Exploring Antimalware and Antivirus.mp4
05:42
00048 9.3 Understanding Host-based Firewalls.mp4
04:03
00049 9.4 Exploring Application-level Whitelisting Blacklisting.mp4
07:20
00050 9.5 Exploring Systems-based Sandboxing.mp4
03:21
00051 Learning objectives.mp4
01:02
00052 12.1 Surveying Types of Vulnerabilities.mp4
12:39
00053 12.2 Understanding Passive Reconnaissance and Social Engineering.mp4
12:26
00054 12.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp4
11:43
00055 12.4 Understanding Privilege Escalation and Code Execution Attacks.mp4
02:04
00056 12.5 Understanding Backdoors and Man-in-the Middle Attacks.mp4
05:44
00057 12.6 Understanding Denial of Service Attacks.mp4
05:34
00058 12.7 Surveying Attack Methods for Data Exfiltration.mp4
02:32
00059 12.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp4
07:07
00060 12.9 Understanding Password Attacks.mp4
04:13
00061 12.10 Understanding Wireless Attacks.mp4
04:19
00062 12.11 Exploring Security Evasion Techniques.mp4
07:44
00063 Learning objectives.mp4
00:24
00064 1.1 Understanding Risk Analysis.mp4
03:29
00065 1.2 Understanding the Common Vulnerability Scoring System CVSS.mp4
10:10
00066 1.3 Interpreting Malware Analysis Tool Output.mp4
05:26
00067 Learning objectives.mp4
00:36
00068 5.1 Surveying Asset Management.mp4
12:40
00069 5.2 Surveying Configuration Management.mp4
12:05
00070 5.3 Surveying Mobile Device Management.mp4
15:18
00071 5.4 Surveying Patch Management.mp4
10:29
00072 5.5 Surveying Vulnerability Management.mp4
16:54
00073 5.6 Understanding Network and Host Antivirus.mp4
09:26
00074 5.7 Understanding SEIM and Log Collection.mp4
12:07
00075 Learning objectives.mp4
00:27
00076 8.1 Understanding Windows Forensics Basics.mp4
14:32
00077 8.2 Understanding Linux and MAC OS X Forensics Basics.mp4
13:00
00078 8.3 Examining Web Server Logs.mp4
06:06
00079 Learning objectives.mp4
00:34
00080 10.1 Introducing NetFlow.mp4
09:10
00081 10.2 Surveying Commercial and Open Source NetFlow Tools.mp4
06:52
00082 10.3 Understanding Flexible NetFlow.mp4
02:42
00083 10.4 Examining Firewall Logs.mp4
13:13
00084 10.5 Understanding Application Visibility and Control.mp4
02:03
00085 10.6 Examining Web and Email Content Filtering Logs.mp4
01:55
00086 10.7 Exploring Full Packet Capture.mp4
04:20
00087 10.8 Surveying IPS Events.mp4
04:38
00088 10.9 Surveying Host or Endpoint Events.mp4
04:42
00089 Learning objectives.mp4
00:44
00090 1.1 Introduction to NetFlow.mp4
04:43
00091 1.2 The Attack Continuum.mp4
03:30
00092 1.3 The Network as a Sensor and as an Enforcer.mp4
02:27
00093 1.4 What Is a Flow.mp4
04:35
00094 1.5 NetFlow Versus IP Accounting and Billing.mp4
01:50
00095 1.6 NetFlow for Network Security.mp4
12:42
00096 1.7 Traffic Engineering and Network Planning.mp4
01:39
00097 1.8 Introduction to IP Flow Information Export IPFIX.mp4
10:24
00098 1.9 Cisco Supported Platforms for NetFlow.mp4
02:03
00099 1.10 NetFlow Versions and History.mp4
03:56
00100 Learning objectives.mp4
00:42
00101 2.1 Introduction to Cisco Cyber Threat Defense.mp4
08:51
00102 2.2 Deployment Scenario - User Access Layer.mp4
01:31
00103 2.3 Deployment Scenario - Wireless LAN.mp4
00:57
00104 2.4 Deployment Scenario - Internet Edge.mp4
01:06
00105 2.5 Deployment Scenario - Data Center.mp4
03:36
00106 2.6 Deployment Scenario - NetFlow in Site-to-Site and Remote VPNs.mp4
04:04
00107 2.7 NetFlow Collection Considerations and Best Practices.mp4
04:05
00108 2.8 Determining the Flows per Second and Scalability.mp4
02:54
00109 Learning objectives.mp4
00:43
00110 4.1 Commercial NetFlow Monitoring and Analysis Software Packages.mp4
05:54
00111 4.2 NFdump.mp4
04:05
00112 4.3 NfSen.mp4
00:37
00113 4.4 SiLK.mp4
04:32
00114 4.5 Elasticsearch Logstash and Kibana Stack ELK - Overview and Architecture.mp4
04:10
00115 4.6 ELK - Installation and Configuration Files.mp4
08:34
00116 Learning objectives.mp4
00:34
00117 2.1 Examining Types of Evidence.mp4
07:40
00118 2.2 Surveying Windows Forensics - Application Processes Threads and Vulnerabilities.mp4
03:36
00119 2.3 Surveying Windows Forensics - Memory.mp4
05:55
00120 2.4 Surveying Windows Forensics - The Windows Registry.mp4
07:15
00121 2.5 Surveying Windows Forensics - Hard Drives FAT and NTFS.mp4
08:17
00122 2.6 Surveying Linux Forensics.mp4
11:18
00123 2.7 Understanding Evidence Collection.mp4
13:48
00124 2.8 Handling Evidence.mp4
04:38
00125 2.9 Examining Asset and Threat Actor Attribution.mp4
05:24
00126 Learning objectives.mp4
00:31
00127 3.1 Introducing Intrusion Analysis Fundamentals.mp4
08:12
00128 3.2 Examining Packet Captures.mp4
05:36
00129 3.3 Examining Protocol Headers.mp4
02:18
00130 3.4 Analyzing Security Device Data.mp4
05:22
00131 3.5 Differentiating False Positives False Negatives True Positives and True Negatives.mp4
02:50
00132 Learning objectives.mp4
00:25
00133 5.1 Scoping the Incident Response Plan and Process.mp4
11:34
00134 5.2 Understanding Information Sharing and Coordination.mp4
02:54
00135 5.3 Identifying the Incident Response Team Structure.mp4
01:51
00136 Learning objectives.mp4
00:27
00137 6.1 Analyzing Computer Incident Response Teams CSIRTs.mp4
08:25
00138 6.2 Analyzing Product Security Incident Response Teams PSIRTs.mp4
10:50
00139 6.3 Surveying Coordination Centers.mp4
03:40
00140 6.4 Analyzing Managed Security Service Providers Incident Response Teams.mp4
03:00
00141 Learning objectives.mp4
00:18
00142 8.1 Understanding Network Profiling.mp4
07:32
00143 8.2 Understanding Host Profiling.mp4
06:25
00144 Learning objectives.mp4
00:34
00145 9.1 Understanding Data Normalization.mp4
03:00
00146 9.2 Deconstructing Universal Data Formats.mp4
03:07
00147 9.3 Understanding the 5-tuple Correlation.mp4
02:09
00148 9.4 Performing DNS Analysis.mp4
01:31
00149 9.5 Performing Web Log Analysis.mp4
04:20
00150 9.6 Performing Deterministic and Probabilistic Analysis.mp4
01:59
00151 Learning objectives.mp4
00:34
00152 10.1 Identifying and Mitigating Reconnaissance.mp4
08:33
00153 10.2 Identifying and Mitigating Weaponization.mp4
02:34
00154 10.3 Identifying and Mitigating Delivery.mp4
02:05
00155 10.4 Identifying and Mitigating Exploitation.mp4
01:02
00156 10.5 Identifying and Mitigating Installation.mp4
02:50
00157 10.6 Identifying and Mitigating Command and Control.mp4
01:39
00158 10.7 Understanding Action on Objectives.mp4
02:18
00159 Learning objectives.mp4
00:48
00160 11.1 Introducing the Vocabulary for Event Recording and Incident Sharing VERIS.mp4
02:13
00161 11.2 Applying the VERIS Schema to Incident Handling.mp4
04:28
00162 11.3 Surveying the VERIS Incident Recording Tool and Other VERIS Resources.mp4
01:31
00163 Learning objectives.mp4
01:03
00164 1.1 Introducing Ethical Hacking and Pen Testing.mp4
03:55
00165 1.2 Getting Started with Ethical Hacking and Pen Testing.mp4
06:26
00166 1.3 Understanding the Legal Aspects of Penetration Testing.mp4
07:33
00167 1.4 Exploring Penetration Testing Methodologies.mp4
03:39
00168 1.5 Exploring Penetration Testing and other Cyber Security Certifications.mp4
08:19
00169 1.6 Building Your Own Lab - Overview.mp4
07:54
00170 1.7 Building Your Own Lab - VIRL and Operating System Software.mp4
09:20
00171 1.8 Understanding Vulnerabilities Threats and Exploits.mp4
02:54
00172 1.9 Understanding the Current Threat Landscape.mp4
07:06
00173 Learning objectives.mp4
00:31
00174 3.1 Understanding Passive Reconnaissance.mp4
04:55
00175 3.2 Exploring Passive Reconnaissance Methodologies - Discovering Host and Port Information.mp4
12:25
00176 3.3 Exploring Passive Reconnaissance Methodologies - Searching for Files.mp4
07:20
00177 3.4 Exploring Passive Reconnaissance Methodologies - Searching for Names Passwords and Sensitive Information.mp4
05:53
00178 3.5 Surveying Essential Tools for Passive Reconnaissance - SpiderFoot theHarvester and Discover.mp4
09:07
00179 3.6 Surveying Essential Tools for Passive Reconnaissance - Recon-ng.mp4
20:33
00180 Learning objectives.mp4
00:32
00181 4.1 Understanding Active Reconnaissance.mp4
02:26
00182 4.2 Exploring Active Reconnaissance Methodologies from an Ethical Hacker Perspective.mp4
01:59
00183 4.3 Surveying Essential Tools for Active Reconnaissance - Port Scanning and Web Service Review.mp4
12:41
00184 4.4 Surveying Essential Tools for Active Reconnaissance - Network and Web Vulnerability Scanners.mp4
06:02
00185 Learning objectives.mp4
00:39
00186 5.1 Understanding Web Applications.mp4
05:24
00187 5.2 Understanding Web Architectures.mp4
01:54
00188 5.3 Uncovering Web Vulnerabilities.mp4
08:24
00189 5.4 Testing Web Applications - Methodology.mp4
01:54
00190 5.5 Testing Web Applications - Reconnaissance.mp4
05:11
00191 5.6 Testing Web Applications - Mapping.mp4
05:44
00192 5.7 Testing Web Applications - Vulnerability Discovery.mp4
11:54
00193 5.8 Understanding the Exploitation of Web Applications.mp4
10:12
00194 5.9 Surveying Defenses to Mitigate Web Application Hacking.mp4
03:13
00195 Learning objectives.mp4
01:05
00196 8.1 Understanding the Reasons for and the Steps to Hacking a Network.mp4
05:56
00197 8.2 Reviewing Networking Technology Fundamentals - OSI and DoD Internet Models.mp4
05:02
00198 8.3 Reviewing Networking Technology Fundamentals - Forwarding Device Architecture and Communication.mp4
06:18
00199 8.4 Building an Internetwork Topology Using VIRL.mp4
05:42
00200 8.5 Hacking Switches - Reviewing Ethernet Fundamentals.mp4
15:10
00201 8.6 Hacking Switches - Demo.mp4
06:23
00202 8.7 Hacking Switches - ARP Vulnerabilities and ARP Cache Poisoning.mp4
06:47
00203 8.8 Reviewing Router Fundamentals.mp4
16:18
00204 8.9 Examining ICMP First Hop Redundancy and Routing Protocol Attacks.mp4
11:57
00205 8.10 Hacking the Management Plane.mp4
19:56
00206 8.11 Understanding Firewall Fundamentals and Levels of Inspection.mp4
10:45
00207 8.12 Performing Firewall Reconnaissance and Tunneling.mp4
05:50
00208 8.13 Surveying Essential Tools for Hacking Network Devices - Packet Capture.mp4
09:36
00209 8.14 Surveying Essential Tools for Hacking Network Devices - Switch and Router Hacking Tools.mp4
05:04
00210 8.15 Surveying Essential Tools for Hacking Network Devices - ARP Spoofing Tools.mp4
09:35
00211 8.16 Surveying Essential Tools for Hacking Network Devices - MiTM Tools.mp4
02:51
00212 8.17 Surveying Essential Tools for Hacking Network Devices - Linux Tools.mp4
03:52
00213 8.18 Using Network Device Hacking Tools to Perform a MiTM Attack.mp4
03:53
00214 Learning objectives.mp4
00:34
00215 9.1 Reviewing Wireless Technology Fundamentals.mp4
09:04
00216 9.2 Surveying Wireless Hacking Tools - Wireless Adapters.mp4
07:51
00217 9.3 Surveying Wireless Hacking Tools - Software.mp4
05:50
00218 9.4 Hacking WEP WPA and Other Protocols.mp4
13:03
00219 9.5 Understanding Hacking Wireless Clients.mp4
15:22
00220 Learning objectives.mp4
00:34
00221 10.1 Understanding Buffer Overflows.mp4
08:22
00222 10.2 Exploiting Buffer Overflows.mp4
06:30
00223 10.3 Overcoming Defenses for Buffer Overflow Vulnerabilities.mp4
02:41
00224 10.4 Understanding Fuzzing.mp4
03:25
00225 10.5 Creating a Fuzzing Strategy.mp4
07:47
00226 10.6 Exploring Mutation-based Generation-based and Evolutionary Fuzzers.mp4
05:20
00227 10.7 Surveying Tools to Find and Exploit Buffer Overflows.mp4
09:28
00228 Learning objectives.mp4
00:27
00229 6.1 Understanding Authentication and Authorization Mechanisms.mp4
02:57
00230 6.2 Understanding Authentication and Authorization Attacks.mp4
05:42
00231 6.3 Exploring Password Storage Mechanisms.mp4
02:55
00232 6.4 Understanding Password Storage Vulnerability.mp4
03:40
00233 6.5 Cracking Passwords with John the Ripper.mp4
12:52
00234 6.6 Cracking Passwords with hashcat.mp4
09:19
00235 6.7 Improving Password Security.mp4
02:12
00236 Learning objectives.mp4
00:33
00237 13.1 Understanding Social Engineering.mp4
15:23
00238 13.2 Exploring the Social Engineering Toolkit SET.mp4
08:38
00239 13.3 Exploring Maltego.mp4
07:51
00240 13.4 Surveying Social Engineering Case Studies.mp4
15:54
00241 Learning objectives.mp4
00:39
00242 15.1 Understanding Pen Test Reports and How They Are Used.mp4
01:42
00243 15.2 Planning and Organizing Your Report.mp4
06:57
00244 15.3 Understanding the Pen Test Report Format.mp4
03:10
00245 15.4 Exploring Risk Ratings.mp4
03:38
00246 15.5 Distributing Pen Test Reports.mp4
02:57
00247 Learning objectives.mp4
00:47
00248 2.1 Understanding Wireless Client Attacks and Their Motives.mp4
05:19
00249 2.2 Learning Packet Injection Attacks.mp4
01:54
00250 2.3 Eavesdropping and Manipulating Unencrypted Wi-Fi Communications.mp4
04:26
00251 2.4 Attacking Publicly Secure Packet Forwarding PSPF.mp4
03:24
00252 2.5 Attacking the Preferred Network List PNL.mp4
02:04
00253 Learning objectives.mp4
00:25
00254 3.1 Understanding Wireless Antennas.mp4
02:26
00255 3.2 Surveying Wi-Fi Devices Like the Pinneaple.mp4
06:19
00256 3.3 Building Your Own Lab.mp4
03:00
00257 Learning objectives.mp4
00:32
00258 4.1 Introducing the Aircrack-ng Suite.mp4
05:52
00259 4.2 Introducing Airmon-ng.mp4
01:45
00260 4.3 Understanding Airodump-ng.mp4
03:12
00261 4.4 Introducing Aireplay-ng.mp4
02:32
00262 4.5 Introducing Airdecap-ng.mp4
01:43
00263 4.6 Introducing Airserv-ng.mp4
02:34
00264 4.7 Introducing Airtun-ng.mp4
01:34
00265 Learning objectives.mp4
00:23
00266 5.1 Understanding WEP Fundamentals.mp4
01:46
00267 5.2 Learning How to Crack WEP.mp4
05:21
00268 Learning objectives.mp4
00:33
00269 6.1 Understanding WPA Fundamentals.mp4
02:20
00270 6.2 Surveying Attacks Against WPA2-PSK Networks.mp4
03:25
00271 6.3 Using coWPAtty.mp4
05:35
00272 6.4 Using Pyrit.mp4
02:46
00273 6.5 Exploring WPA Enterprise Hacking.mp4
02:49
00274 Learning objectives.mp4
00:26
00275 7.1 Using Kismet.mp4
03:59
00276 7.2 Using Wireshark.mp4
01:56
00277 7.3 Learning How to Hack Default Configurations.mp4
03:03
00278 Learning objectives.mp4
00:28
00279 8.1 Defining Evil Twin Attacks.mp4
01:19
00280 8.2 Performing Evil Twin Attacks.mp4
08:37
00281 8.3 Using Karmetasploit.mp4
03:17
00282 8.4 Exploring the WiFi Pineapple.mp4
14:07
00283 Learning objectives.mp4
00:39
00284 13.1 Understanding OWASP Mobile Device Vulnerabilities.mp4
04:32
00285 13.2 Wrestling with the BYOD Dilemma.mp4
02:10
00286 13.3 Understanding Mobile Device Management MDM.mp4
02:19
00287 13.4 Understanding Mobile Device Security Policies.mp4
01:49
00288 Learning objectives.mp4
00:32
00289 14.1 Exploring The Android Security Model.mp4
16:46
00290 14.2 Exploring Android Emulators and SDK.mp4
03:41
00291 14.3 Understanding Android Hacking Tools and Methodologies.mp4
16:11
00292 Learning objectives.mp4
00:25
00293 15.1 Introducing iOS Security.mp4
02:23
00294 15.2 Exploring Jailbraking iOS.mp4
02:52
00295 15.3 Surveying Tools for Dissasembling iOS Applications.mp4
01:27
00296 Learning objectives.mp4
00:26
00297 12.1 Understanding IoT Fundamentals.mp4
04:41
00298 12.2 Exploring ZigBee and IEEE 802.15.4.mp4
05:27
00299 12.3 Exploring INSTEON.mp4
05:00
00300 12.4 Exploring ZWave.mp4
12:04
00301 12.5 Exploring LoRA.mp4
06:52
00302 Learning objectives.mp4
00:26
00303 9.1 Understanding Bluetooth Vulnerabilities.mp4
02:09
00304 9.2 Surveying Tools for Bluetooth Monitoring.mp4
04:43
00305 Learning objectives.mp4
00:37
00306 10.1 Understanding NFC Vulnerabilities.mp4
03:14
00307 10.2 Exploring NFC Attacks and Case Studies.mp4
06:34
More details
User Reviews
Rating
average 0
Focused display
Category

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 307
- duration 26:12:00
- Release Date 2024/02/15