312-50v10: Certified Ethical Hacker v10 Exam

312-50v10: Certified Ethical Hacker v10 Exam

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Build Your Lab - In the Future We will offer an Online Solution

  • 1. Create A VeraCrypt Container to Protect Your Laptop or Desktop
    10m 48s
  • 2. Build a Manual Lab 01
    3m 47s
  • 3. Lab Legalities
    2m 44s
  • 4. Getting to Know Your Win2k VM
    5m 25s
  • 5. Getting to Know Your XPAttacker VM
    3m 4s
  • 6. Getting to Know You Win7 VM
    3m 56s
  • 7. Getting to Know Your Win2k3-AD
    1m 27s
  • 8. Getting to Know Your WebApp
    1m 31s
  • 9. Putting Our Lab Together Step By Step
    12m 45s
  • 10. Tying everying together in our Lab
    5m 44s

Ethical Hacking Overview

  • 1. Introduction to Pentesting and Ethical Hacking
    31s
  • 2. Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro
    4m 58s
  • 3. Defintion of a Penetration Test
    1m 46s
  • 4. The Evolving Threat
    1m 49s
  • 5. The Vulnerabilty Lifecycle
    2m 15s
  • 6. Map.Norsecorp.com
    1m 56s
  • 7. Botnet Definition
    5m 12s
  • 8. Defense in Depth
    4m 47s
  • 9. MetaData
    3m 29s
  • 10. Types of PenTests
    4m 47s
  • 11. Types of Hackers
    1m 31s
  • 12. Common Definitions
    1m 43s
  • 13. Hacker vs
    5m 27s
  • 14. Penetration Testing Terminology
    3m 10s
  • 15. Essential Terminology
    3m 51s
  • 16. OSSTMM Methodology
    8m 42s
  • 17. Tools vs Technique
    4m 45s
  • 18. Things are not always as they seem
    1m 13s
  • 19. Calculating Risk & Formulas
    2m 48s
  • 20. Analyzing Findings
    44s
  • 21. Calculating SLE, ARO, ALE
    1m 6s
  • 22. Other Penetration Testing Methodologies
    3m 14s

FootPrinting - Reconnaissance and Information Gathering

  • 1. Introduction to Footprinting
    43s
  • 2. What Information is Gathered by the Hacker
    5m 37s
  • 3. Methods of Obtaining Information And Physical Access
    1m 24s
  • 4. Social Access
    4m 27s
  • 5. Digital Access
    3m 2s
  • 6. Passive vs Active Reconnaissance
    2m 14s
  • 7. Footprinting Defined
    1m 32s
  • 8. Exercise: Footprinting Tool: Maltego
    2m 3s
  • 9. Most Powerful Hacking Tool on the Internet Today
    4m 15s
  • 10. Instructor Demonstration - The Power of Google -A
    5m 44s
  • 11. Instructor Demonstration - The Power of Google -B
    10m 15s
  • 12. Instructor Demo: GoogleAlerts
    4m 24s
  • 13. Removing Searchable Content
    4m 55s
  • 14. Internet Archive: The WayBack Machine
    6m 43s
  • 15. Domain Name Registration-WhoIs Information
    1m 19s
  • 16. Instructor Demonstation - CentralOps
    6m 14s
  • 17. DNS Databases
    3m 20s
  • 18. Traceroute Operation
    5m 30s
  • 19. InstructorDemonstration: Online Tools
    4m 19s
  • 20. Spokeo - No Refuge for the Wealthy
    4m 59s
  • 21. Netcraft, DoaminsbyProxy, Countermeasures
    8m 43s

Linux Overview

  • 1. Introduction to Linux
    24s
  • 2. Linux History - Linus + Minux = Linux
    2m 29s
  • 3. Linux GUI Desktops
    2m 9s
  • 4. Linux Shell Linux Bash Shell
    2m 31s
  • 5. Passwd & Shadow File Formats
    1m 52s
  • 6. InstructorDemo:User Account Management
    6m 20s
  • 7. Tarballs & Zips & Installing VMware Tools
    5m 30s
  • 8. Compiling Programs in Linux, Shell Shock, Poodle Vulnerability
    2m 44s
  • 9. Most Popular Linux Security Distribution
    1m 58s

Detecting Live Systems - Port Scanning

  • 1. Introduction to Port Scanning
    15s
  • 3. TCP/IP Stack
    6m 22s
  • 4. TCP 3-Way HandShake
    5m 3s
  • 5. NMap ServiceVersion Detection And Demo
    1m 44s
  • 6. Instructor Demonstration-Engage, NmapScans
    8m 2s
  • 7. Hping3, NMap -O
    1m 32s
  • 8. Fuzzy Logic
    1m 30s
  • 9. Countermeasures: Scanning
    2m 20s

Enumernation - What Can We Get For Free?

  • 1. Intro to Enumeration
    17s
  • 2. Grabbing Banners
    4m 25s
  • 3. Shodan
    5m 20s
  • 4. ZoneTransfers
    5m
  • 5. DNS Enumeration
    4m 26s
  • 6. SNMP Countermeasures, AD and AD Countermeasures
    4m 13s
  • 7. Null Sessions
    8m 39s

Cryptography

  • 1. Intro Into Cryptography
    30s
  • 2. Beginings of Cryptography
    4m 36s
  • 3. Implementation, Stream Cipher, Block Cipher and the Enigima
    8m 54s
  • 4. Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange
    5m 7s
  • 5. Hashing, Hashing Collisions, Common Hash Algorithms
    9m 38s
  • 6. Ransomware
    3m 7s
  • 7. IPSec and SSH
    3m 46s
  • 8. PKI Applications, Quantum Crypto and VeraCrypt
    3m 27s

Malware - Sofware Goes Undercover

  • 1. Introduction to Malware and How The Internet Makes Money
    1m
  • 2. Things that make the World Go Around - Well as far as the Internet is concerned
    9m 10s
  • 3. Trojans and Back Doors
    6m 17s
  • 4. Defining Malware: Viruses and Worms
    7m 13s
  • 5. Defining Malware: Spyware
    5m 35s
  • 6. Data Loss Prevention (DLP) and other Creepy things
    10m 31s
  • 7. Distributing Malware
    6m 19s
  • 8. Malware Capabilities
    5m 27s
  • 9. Auto Starting Malware
    1m 44s
  • 10. Tool: Netcat
    3m 41s
  • 11. Demo: NetCat Procedure
    10m 28s
  • 12. Executable Wrappers
    4m 22s
  • 13. Instructor Demo: Executeable Wrappers 1
    8m 51s
  • 14. Instructor Demo: Executeable Wrappers 2
    1m 53s
  • 15. Malware Avoiding Detection
    4m 33s
  • 16. Malware Countermeasures 1
    8m 10s
  • 17. Malware Countermeasures 2
    6m 39s

System Hacking

  • 1. Introduction to System Hacking Introduction
    1m
  • 2. Types of Password Attacks, Keystroke Loggers
    5m 44s
  • 3. Password Guessing Online
    7m 44s
  • 4. Cracking Windows Passwords - A
    3m 25s
  • 5. Cracking Windows Passwords - B
    8m 32s
  • 6. Cracking Windows Passwords - C
    7m
  • 7. Cracking Windows Passwords - D
    8m
  • 8. Cracking Windows Passwords - E
    8m 25s
  • 9. Countermeasures: Stealing the Passwords, Syskey, Salting
    8m 41s
  • 10. Cloud Cracking Techniques
    1m 55s
  • 11. Generating Rainbow Tables, Free Rainbow Tables
    3m 17s
  • 12. Password Hash Insertion Attack
    9m 20s
  • 13. Demonstration MimiKatz
    10m 59s
  • 14. Privilege Escalation, Countermeasures
    5m 37s
  • 15. Covering Tracks, Disable Auditing, Clearing the Event Log
    3m 4s
  • 16. Alternate Data Streams Demonstration - A
    8m 7s
  • 17. Alternate Data Streams Demonstration - B
    11m 55s
  • 18. Alternate Data Streams Demonstration - C
    10m 38s
  • 19. Anonymizers - JAP
    3m 42s
  • 20. Steganography
    11m 41s
  • 21. Virtually Complete Secrecy, TOR
    11m 2s
  • 22. RootKits - Overview
    8m 39s
  • 23. RootKits - Frightening Demo
    13m 22s
  • 24. Root Kit Countermeasures, Tokens and Smart Cards
    11m 19s

Advanced Hacking and Explotiation Techniques

  • 1. Introduction to Advanced System Explotation
    1m
  • 2. How do Exploits Work?
    5m 8s
  • 3. Buffer Over Flows Introduction I do when Speaking at a Conference
    5m 59s
  • 4. Processors and Stacks
    10m 22s
  • 5. Basic Types of Buffer Overflows And Demo 01
    10m 53s
  • 6. Basic Types of Buffer Overflows And Demo 02
    11m 12s
  • 7. Basic Types of Buffer Overflows And Demo 03
    9m 27s
  • 8. Stages of Exploit Development
    1m 37s
  • 9. Buffer Overflow Prevention
    7m 54s
  • 10. The Metasploit Project
    5m 8s
  • 11. Core Impact Overview
    5m 9s

Attacking Databases

  • 1. Introduction to Database Management Systems
    23s
  • 2. Overview of Databases, Types of Databases, Relations of Databases
    7m 15s
  • 3. View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties
    6m 39s
  • 4. SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info
    9m 21s
  • 5. Hardening SQL Server
    9m 21s
  • 6. SQL Injection Demo 1
    9m 54s
  • 7. SQL Injection Demo 2
    6m 10s
  • 8. SQL Injection Demo 3
    4m 3s

Attacking Wireless Networks and Mobile Phones

  • 1. Introduction to WiFi and Mobile Hacking
    25s
  • 2. WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n - MIMO, 802.11ac,
    4m 8s
  • 3. 802.11n - MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets
    5m 44s
  • 4. XOR Basics, WEP Weaknesses
    3m 26s
  • 5. TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption
    7m 11s
  • 6. Kismet, Aircrack-ng, Aireplay
    2m 53s
  • 7. EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network
    2m 47s
  • 8. Exercise/Assignment; Cracking WPA/WPA2 Password Preparation
    12m 44s
  • 9. Exercise/Assignment; Cracking WPA/WPA2 Password - Solution
    5m 19s

Networks - Sniffing, ARP Poisioning, and Breaking SSL

  • 1. Introduction to Sniffing
    17s
  • 2. Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer
    7m 33s
  • 3. TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing
    4m 16s
  • 4. Active Sniffing & Methods, Switch Table Flooding
    4m 22s
  • 5. Arp Cache Posioning
    6m
  • 6. Arp Cache Posioning Tools and Countermeasures
    5m 35s
  • 7. Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M
    6m 18s
  • 8. Exercise/Assignment Breaking SSL - Preparation
    9m 3s
  • 9. Exercise/Assignment Breaking SSL - Solution
    5m 19s

Firewalls, IDS and IPS and some New Age Protection

  • 1. Introduction tp Firewalls, IDS and IPS WAF
    7s
  • 2. Firewall - Your First Line of Defense
    6m 35s
  • 3. IDS Your Second Line of Defense
    4m 55s
  • 4. Web Application Firewall and Evasion Techniques'
    7m 45s
  • 5. Behavioural Firewalls and IPS Systems
    3m 35s

Attacking Web Technologies

  • 1. Introduction to Web Application
    41s
  • 2. Common Security Threats, Need for Monitoring, SANS Seven MGT Errors
    6m 34s
  • 3. Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets
    5m 12s
  • 4. Logs Cancanolization and Other Attacks
    3m 36s
  • 5. Web App Scanner, HTTrack,HTTPrint, Proxies
    7m 7s
  • 6. Directory Traversal & Other Common Vulnerabilties
    9m 44s
  • 7. XSS Demo and Countermeasures
    8m 46s
  • 8. Common Ways to Attack Web Technologies, Cross Site Scripting (XSS)
    8m 50s
  • 9. Cross Site Request Forgery
    6m 3s
  • 10. Cookies and Session Management
    5m 19s
  • 11. OWASP Top 10
    7m 5s

So Your Ready To Take Your Test

  • 1. So your Ready To Take Your Test 1?
    7m 16s

Bonus Section

  • 1. Backing Up our Veracrypt Storage Enclosure for Saftey
    5m 14s