Companies Home Search Profile

White Hat Hacking v10 Online Training

Focused View

Keith Barker

19:56:33

134 View
  • 1. Build and Configure your White Hat Hacking Lab .mp4
    02:27
  • 2. Building a LAB Concepts .mp4
    05:50
  • 3. Building a LAB Networking .mp4
    09:04
  • 4. Deploy a Kali Linux VM .mp4
    14:00
  • 5. Adding Metasploitable to Your Lab .mp4
    09:50
  • 6. Adding Windows to Your Lab .mp4
    14:01
  • 7. Configure a Static IP on Kali .mp4
    03:49
  • 8. Ethics and Hacking .mp4
    07:01
  • 9. Hacking Vocabulary .mp4
    05:02
  • 10. InfoSec Concepts .mp4
    05:12
  • 11. Attack Categories, Types, and Vectors .mp4
    04:17
  • 12. Five Phases of Hacking .mp4
    05:29
  • 13. Footprinting and Reconnaissance Concepts .mp4
    09:29
  • 14. Search Engine Tools .mp4
    07:23
  • 15. Hacking Using Google .mp4
    11:20
  • 16. Website Recon Tools .mp4
    08:25
  • 17. Metagoofil Metadata Tool .mp4
    03:30
  • 18. Email Headers for Footprinting .mp4
    04:42
  • 19. Using WHOIS for Recon .mp4
    04:05
  • 20. DNS Tools .mp4
    09:40
  • 21. Network Scanning Overview .mp4
    03:53
  • 22. Network Scanning Methodology .mp4
    07:17
  • 23. Port Discovery .mp4
    09:10
  • 24. Stealth Idle Scanning.mp4
    09:10
  • 25. OS and Application Fingerprinting .mp4
    09:48
  • 26. Vulnerability Scanning .mp4
    07:27
  • 27. Network Mapping Tools .mp4
    04:31
  • 28. NMAP .mp4
    36:31
  • 29. Scapy .mp4
    23:16
  • 30. Hping3 .mp4
    28:24
  • 31. Proxy Servers .mp4
    08:17
  • 32. Using Public Proxy Services .mp4
    05:08
  • 33. Shellshock .mp4
    05:00
  • 34. Enumeration Concepts .mp4
    05:27
  • 35. NetBIOS Enumeration .mp4
    07:10
  • 36. SNMP Enumeration Concepts .mp4
    08:44
  • 37. SNMP Enumeration Tools .mp4
    07:27
  • 38. LDAP Enumeration Concepts .mp4
    04:23
  • 39. LDAP Enumeration Example .mp4
    06:34
  • 40. NTP Enumeration .mp4
    06:38
  • 41. SMTP Enumeration .mp4
    08:05
  • 42. System Hacking Overview .mp4
    08:57
  • 43. Password Cracking Concepts .mp4
    10:43
  • 44. Password Attack Example MITM and Sniffing .mp4
    12:02
  • 45. Rainbow Crack Lab Setup .mp4
    08:39
  • 46. Rainbow Crack Demonstration .mp4
    08:09
  • 47. Password Reset Hacking .mp4
    07:03
  • 48. DHCP Starvation .mp4
    10:47
  • 49. Remote Access .mp4
    14:52
  • 50. NTFS Alternate Data Streams Exploit .mp4
    08:34
  • 51. Steganography with OpenPuff .mp4
    07:38
  • 52. Steganography with SNOW .mp4
    05:44
  • 53. Covering Tracks .mp4
    06:45
  • 54. Malware Overview .mp4
    10:02
  • 55. Spyware .mp4
    08:27
  • 56. Buffer Overflow .mp4
    13:04
  • 57. Trojan Overview .mp4
    10:44
  • 58. Creating a Trojan .mp4
    11:47
  • 59. Virus Overview .mp4
    12:36
  • 60. Virus Creation .mp4
    08:12
  • 61. Detecting Malware .mp4
    17:29
  • 62. Malware Analysis .mp4
    09:26
  • 63. File Verification via Hash .mp4
    08:53
  • 64. Sniffing Overview .mp4
    12:25
  • 65. CAM Table Attack and Port Security .mp4
    09:40
  • 66. DHCP Snooping .mp4
    11:18
  • 67. Dynamic ARP Inspection (DAI) .mp4
    08:33
  • 68. Social Engineering Concepts .mp4
    05:49
  • 69. Social Engineering Phases .mp4
    04:23
  • 70. Social Engineering Prevention .mp4
    03:21
  • 71. DoS and DDoS Overview .mp4
    09:35
  • 72. DoS and DDoS Prevention .mp4
    07:34
  • 73. Session Hijacking Overview .mp4
    11:29
  • 74. Reducing the Risk of Session Hijacking .mp4
    05:02
  • 75. Firewall Evasion .mp4
    13:02
  • 76. Firewall ACL Example .mp4
    15:03
  • 77. NAT and PAT Fundamentals .mp4
    11:46
  • 78. IDSIPS Evasion .mp4
    17:12
  • 79. Honeypots .mp4
    12:13
  • 80. Hacking Web Servers .mp4
    10:11
  • 81. OWASP Broken Web Application Project .mp4
    11:24
  • 82. Web App Vulnerabilities WordPress .mp4
    08:59
  • 83. SQL Introduction .mp4
    09:04
  • 84. SQL Injection .mp4
    16:33
  • 85. Wireless Hacking Overview .mp4
    11:47
  • 86. Wireless Topologies and Vocabulary .mp4
    19:57
  • 87. Standards and Regulations .mp4
    15:00
  • 88. RF Fundamentals .mp4
    20:23
  • 89. Antenna Fundamentals .mp4
    13:09
  • 90. WLAN Frame Types .mp4
    21:46
  • 91. WLAN Frame Flow .mp4
    15:04
  • 92. Uncovering Hidden SSIDs .mp4
    12:03
  • 93. Bypassing MAC Address Filters .mp4
    14:26
  • 94. Breaking WPA2 Wireless .mp4
    10:07
  • 95. Rogue Wireless Access Points .mp4
    23:59
  • 96. Wireless Mis-Association Attacks .mp4
    15:39
  • 97. MITM Using Wireless Bridging .mp4
    16:15
  • 98. Protecting Wireless .mp4
    06:29
  • 99. Using an Android VM .mp4
    03:31
  • 100. Malware for Mobile .mp4
    11:16
  • 101. Mobile Device Risks .mp4
    05:41
  • 102. Improving Mobile Security .mp4
    06:22
  • 103.Cloud Computing Overview .mp4
    09:02
  • 104. Cloud Computing Security Concerns .mp4
    06:30
  • 105. Cloud Computing Security Benefits .mp4
    07:26
  • 106. IoT Security Overview .mp4
    05:37
  • 107. IoT Web, Cloud, and Mobile Interfaces .mp4
    05:44
  • 108. Symmetrical Encryption Concepts .mp4
    09:39
  • 109. Hashing Concepts for Data Integrity .mp4
    04:00
  • 110. Asymmetrical Encryption Concepts .mp4
    03:48
  • 111. Control Types .mp4
    03:54
  • 112. Multifactor Authentication .mp4
    03:48
  • 113. CIA Confidentiality, Integrity, and Availability .mp4
    02:33
  • 114. Quantifying Risk .mp4
    05:41
  • 115. Separation of Duties .mp4
    05:55
  • 116. Centralized Identity Management .mp4
    06:34
  • 117. Kerberos and Single Sign On (SSO) .mp4
    07:22
  • 118. Backups and Media Management .mp4
    04:18
  • 119. Operations Security Controls .mp4
    05:31
  • 120. Physical Security Controls .mp4
    04:44
  • 121. Incident Response .mp4
    03:17
  • 122. VPNs .mp4
    04:32
  • 123. Disaster Recovery Planning .mp4
    04:57
  • 124. Pen Testing Tips .mp4
    10:15
  • 125. Useful Tools .mp4
    11:27
  • 126. Case Study for Security .mp4
    20:34
  • 127. Additional Resources .mp4
    04:26
  • white hat-v10.zip
  • Description


    In this intermediate White Hat Hacking training, Keith Barker prepares security professionals to become penetration and vulnerability testers.

    Demand for security professionals is at an all-time high — and that’s particularly true for pen testers. With this security training, you'll learn how to scan networks for vulnerabilities, use Kali Linux to (legally) hack into systems, and write reports on how you did it.

    More details


    Security professionals who take this White Hat Hacking course will have the skills they need to advance into pen tester roles — and get one of the several offensive security certifications.

    For anyone who manages security training, this White Hat Hacking training can be used for penetration and vulnerability exam prep, upskilling security professionals, or to create training plans for network or security professionals.

    White Hat Hacking v10: What You Need to Know

    While this White Hat Hacking training doesn’t map to a certification, it covers these security topics that are valuable to aspiring pen testers and more:

    • Kali Linux VM and its benefits and uses for penetration testing
    • Ethical hacking: vocabulary, concepts, and strategies, as well as attack categories, types, and vectors
    • Hacker’s tools: search engine, website recon, metagoofil metadata tool, DNS tools, WHOIS, and more
    • Network Scanning: overview, methodology, port discovery, stealth idle scanning, vulnerability scanning, and network mapping
    • Network technologies: SNMP, NetBios, LDAP, NTP, SMTP, proxy services
    • Password cracking: overview, concepts, MITM and sniffing, with demonstration in the lab
    • Malware: spyware, buffer overflow, trojans, viruses, detection, analysis, remedies
    • Web application security: OWASP, SQL injection, man-in-the-middle, session hijacking
    • Cloud computing security, mobile security, Wi-Fi security, and other special topics

    Who Should Take White Hat Hacking v10 Training?

    This White Hat training is considered expert-level security training, which means it was designed for experienced security professionals. This White Hat Hacking v10 course is valuable for new IT professionals with at least a year of experience with pen testing as well as experienced security professionals looking to validate their security skills.

    New or aspiring security professionals. Network security professionals are in high demand these days. Those who are skilled in penetration testing can command a respectable income. Even those with no experience in ethical hacking techniques will gain a lot from our White Hat Hacking v10 training. It’s a great way to develop or accelerate a career as an IT security specialist.

    Experienced security professionals. Penetration testers tend to learn a lot on their own. But there is only so much that you can get by self-study. Even experienced pen testers can pick up valuable new information and skills from our White Hat Hacking v10 course. Our coverage of the latest threats and vulnerabilities will help ethical hackers no matter how long they have been in the business.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Keith Barker
    Keith Barker
    Instructor's Courses

    The best part of being a trainer is making a difference in the life of a student. When a motivated learner and the correct training meet at the right time, the results are amazing.

    Keith Barker discovered a love for computers and networking in 1984 and began his IT career in 1985 at Electronic Data Systems (EDS). He has worked with companies including Paramount Pictures, Blue Cross, and several government agencies. Keith loves to teach and spends most of his time creating fun and useful videos for CBT Nuggets.

    Certifications: Cisco CCIE (2x), CISSP, Network+, Security+, VMware, Palo Alto, Check Point

    Areas of expertise: Networking and Security

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 127
    • duration 19:56:33
    • Release Date 2023/07/17