Get $1 credit for every $25 spent!

The A to Z Cyber Security & IT Certification Training Bundle

Ending In:
Add to Cart - $39
Add to Cart ($39)
$1,437.68
97% off
wishlist
(59)
Courses
12
Lessons
879
Enrolled
583

What's Included

Product Details

Access
Lifetime
Content
15 hours
Lessons
85

Ethical Hacking From Scratch to Advanced Techniques

Get Paid to Hack Computer Networks When You Become a Certified Ethical Hacker

By Mohamed Atef | in Online Courses

You hear about it all the time: companies getting hacked, having their websites shut down or their customers' data compromised. When that happens, it's time to call in ethical hackers to break into network systems, evaluate their security, and propose solutions. After this course you'll be well on your way to being one of these hackers, paid generously to hack networks, apps, emails, social media accounts, and more!

  • Access 85 lectures & 15 hours of content 24/7
  • Understand how to bypass different security layers after getting proper approval
  • Learn how to compromise computers, crack passwords, crash systems & compromise applications
  • Run a buffer overflow from scratch
  • Stride towards a career in this fast-growing IT profession

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • Introduction to Ethical Hacking - 29:50
  • Setup your lab
    • Install VMWARE Player - 9:33
    • Install and configure the lab - 12:17
  • Start to use Linux
    • Linux - 19:39
  • Reconnaissance
    • What is Reconnaissance? - 24:41
    • What information you should look for? - 8:06
    • Tools and Technique - 4:36
    • Advanced Resonance technique - 7:29
    • Maltego - 2:23
  • Scanning
    • What is Scanning? - 2:17
    • NMAP - 24:13
    • Advanced technique of scanning - 13:45
    • Different types of scanning - 13:27
    • Enumeration - 15:06
  • Start Hacking
    • Define your Objective - 3:15
    • Password guessing and cracking - 15:09
    • Hydra and Xhydra - 12:10
    • Rambo table technique - 19:20
    • Advanced Password cracking technique - 10:49
  • Network Hacking
    • How to Hack a network? - 5:40
    • Sniffing - 30:13
    • Man in the Middle attack - 11:59
    • Cain and Able - 6:33
    • Ettercap - 5:44
    • DNS Poising - 15:58
    • SSL Stip - 10:47
  • Social Engineering
    • What is Social Engineering? - 5:24
    • Social Engineering Toolkit - 4:41
    • Phising - Credential Harvest - 13:11
    • Advanced Social engineering technique - 18:58
    • Fake Email (Spoofing) - 6:13
  • Vulnerability and Exploit
    • What is a Vulnerability and Exploit? - 4:15
    • Search for Vulnerability and its Exploit - 7:58
    • Exploit the Vulnerability - 10:28
    • Metasploit - 5:33
    • Fast Track - 9:41
    • Armitage - 8:29
  • Wireless Hacking
    • Wireless explanation - 4:23
    • Wireless network infrastructure - 17:26
    • Warless attacks - 2:33
    • WEP cracking - 20:48
    • WPA, WPA2 Cracking - 27:51
    • Advanced WPA2 Cracking technique using Reaver - 6:40
  • Buffer Overflow
    • What is Buffer Overflow? - 5:28
    • How to search for Buffer Overflow? - 14:04
    • How to Compromise a System through Buffer Overflow ? - 8:59
    • Buffer Overflow 1 - 48:26
    • Buffer Overflow 2 - 16:33
    • Buffer Overflow 3 - 26:05
    • Changing the Payload - 5:47
    • Another Demonstration - 6:28
    • Your Mission if you choose to accept it - 1:47
  • Web Application Hacking
    • What is Web Application Hacking? - 4:16
    • DVWA - 9:09
    • Hackthissite.org - 3:07
    • What is SQL Injection Attack? - 14:05
    • SQL Injection Attack 1 - 7:53
    • SQL Injection Attack 2
    • XSS Introduction - 2:58
    • Reflected XSS - 12:38
    • Stored XSS - 5:14
    • Affected website for testing - 3:27
    • Advanced web application Attack - 10:50
    • Major Web Application vulnerabilities - 3:01
    • Your Mission if you choose to accept it - 1:42
  • Cryptography
    • Cryptography (Part1) - 12:16
    • Cryptography (Part2) - 14:40
    • Steganography - 10:00
    • Hash - 7:57
  • Malicious Code
    • Malicious Code Analysis - 11:10
    • Types of Malicious Code - 14:51
    • Discovering Malicious Code - 8:32
    • Hiding your Malicious code - 6:51
    • File hash - 5:08
  • Denial of service
    • What is Denial of Service? - 3:38
    • Denial Service Attacks - 7:56
    • DOS Attack 1 - 9:09
    • DOS Attack 2 - 6:44
    • Ping of Death - 6:39
    • DDOS - 3:11
  • Bypassing Security
    • Bypassing different Security Technique - 10:43
  • Real Life Scenario
    • Real Life Scenario 1 - 18:19
    • Real Life Scenario 2 - 14:00
    • Real Life Scenario 3 - 7:27
    • How to manage penetration testing project - 6:32

View Full Curriculum


Access
Lifetime
Content
13 hours
Lessons
94

GSEC Certification: Security Essentials

Ace the GIAC Security Essentials Certification On Your First Sitting

By Mohamed Atef | in Online Courses

The GIAC Security Essentials Certification (GSEC) can help you stand out in the world of IT and security and maintain a lucrative career. This exam certifies that you demonstrate you're qualified for hands-on IT systems roles with respect to security tasks. This course will prepare you to ace the exam on your first try.

  • Access 94 lectures & 13 hours of content 24/7
  • Build a GSEC lab
  • Explore networking concepts & defense in depth
  • Get an introduction to ethical hacking
  • Discuss internet & OS security technologies

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • 0. Introduction - 0:35
    • 1. Your Instructor - 2:00
    • 2.GSEC Exam - 4:33
    • 3. Course Ouline - 6:16
  • Build GSEC lab
    • 4.Lab Requirement - 1:51
    • 5.Download the requirement - 10:04
    • 6.Setup the Lab Part 1 - 8:32
    • 7.Setup your lab Part 2 - 4:51
    • 8.Setup the lab Part 3 - 10:01
    • 9.Setup the lab Part 4 - 5:41
  • Networking Concepts
    • 10.Introduction - 1:55
    • 11.Network Basics - 12:07
    • 12.Internet Protocol – IP - 16:12
    • 13.OSI Model Part 1 - 14:42
    • 14.OSI Model Part 2 - 14:14
    • 15. TCPIP Model - 2:49
    • 16.Default Gateway - 7:10
    • 17.Demonstration - 11:47
    • 18.Network Architecture Components - 17:09
    • 19.Types of Network - 5:12
    • 20.TCP Commands - 9:02
    • 21.Resources 2 - 1:10
  • Defense in Depth
    • 22.Defense in Depth - 4:16
    • 23.Important Definitions Part 1 - 12:28
    • 24. Important Definitions Part 2 - 4:42
    • 25.Due Care and Due Diligence - 8:42
    • 26.Compliance - 8:50
    • 27.Security Documents - 15:35
    • 28.Security Document Types - 5:17
    • 29. Policy Sample - 3:14
    • 30.The Relationship Between Security Document Types - 3:08
    • 31.Access Control - 6:43
    • 32.Authorization - 19:22
    • 33.Authentication - 18:50
    • 34. Single Sign on SSO - 12:59
    • 35.Access Control Attack - 1:43
    • 36.Password Hacking techniques - 8:43
    • 37.Default Password - 5:28
    • 38.Important tool 2 - 14:32
    • 39.Cain in Action - 18:22
    • 40.Xhydra - 7:33
    • 41.Ncrack - 8:44
    • 42. Web application vulnerability - 0:58
    • 43. DVWA - 9:14
    • 44.Hackthissite - 3:11
    • What is SQL Injection - 14:09
    • SQL Injection attack 1 - 7:57
    • 47. SQL Injection attack 2 - 14:06
    • 48. XSS Introduction - 3:03
    • 49. Reflected XSS - 12:43
    • 50.Stored XSS - 5:18
    • 51.Major Web Application vulnerabilities - 3:06
  • Internet Security Technologies
    • 52.Introduction - 3:11
    • 53..Introduction to Maleware - 5:16
    • 54.Types of Malware - 10:11
    • 55.Create a virus - 6:25
    • 56.Creating a Virus using a Tool - 2:44
    • 57.Can I Bypass the AV - 4:25
    • 58.Introduction to Denail of Service - 13:30
    • 59.Denial of Service Attack Demonstration 1 - 11:01
    • 60.Denial of Service Attack Demonstration 2 - 9:14
    • 61.Denial of Service Attack Demonstration 3 - 6:49
    • 62.What is Buffer Overflow - 5:32
    • 63.How to search for Buffer Overflow - 14:09
    • 64.Buffer Overflow Part 1 - 48:31
    • 65.Buffer Overflow Part 2 - 16:37
    • 66. Buffer Overflow Part 3 - 26:09
    • 67.IDS, Firewalls, Honeypots - 2:45
    • 68.Honeypots - 10:12
    • 69.Firewalls - 12:06
    • 70..Intrusion Detection System - IDS - 4:22
    • 71. What is Social Engineering - - 5:28
    • 72.Fake Email - Spoofing - 6:17
    • 73.Social Engineering Toolkit - 4:45
    • 74.Phising Credential Harvest - - 13:16
    • 75.Advanced Social engineering technique - 19:03
    • 76.Network Scanning Overview - 5:21
    • 77.Important Scanning Defination - 13:18
    • 79.Network Scanning Methology - 2:55
    • 80.Identifying Live system - 6:40
    • 81.Port Scanning - 9:29
    • 82.Advanced Scanning Techniques - 7:23
  • OS Security
    • 83.OS Security - 1:11
    • Introduction 2 - 0:56
    • 1. Securing Passwords 2 - 9:23
    • 2. Securing Operating Systems 2 - 9:34
    • 3. Firewalls 2 - 10:56
    • 4. Securing Network Switches 2 - 8:51
    • 5. Securing Network Routers 2 - 7:46
    • 6. Securing Wireless Networks 2 - 9:28
    • 7. IDS, IPS, and Honeypots 2 - 10:56
    • 8. Antiviruses 2 - 9:03
    • 9. Encryption 2 - 5:12
    • 10. Physical Security 2 - 7:08

View Full Curriculum


Access
Lifetime
Content
2 hours
Lessons
19

The Art of Exploitation Course

Learn How to Exploit from Scratch

By Mohamed Atef | in Online Courses

The Art of Exploitation is one of the most sophisticated attacks in ethical hacking. In this course, students will learn from scratch how to find a vulnerability or weakness in any system and perform this complex attack.

  • Access 19 lectures & 2 hours of content 24/7
  • Learn basic ethical hacking skills
  • Understand vulnerabilities & how to exploit them
  • Discuss buffer overflow

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • 1- Art Of Exploitation Introduction - 1:54
  • Vulnerability and Exploit
    • 2- What is a Vulnerability and Exploit - 4:20
    • 3- Search for Vulnerability and its Exploit - 8:03
    • 4. Exploit the Vulnerability - 10:33
    • 5- Metasploit - 5:39
    • 6- Fast Track - 9:46
    • 7- Armitage - 8:35
  • Buffer Overflow
    • 8- What is Buffer Overflow - 5:33
    • 9- How to search for Buffer Overflow part 2 - 7:40
    • 10 How to search for Buffer Overflow part 2 - 6:23
    • 11- Buffer Overflow Part 1 - 10:12
    • 12- Buffer Overflow Part 2 - 11:42
    • 13- Buffer Overflow Part 3 - 11:35
    • 14- Buffer Overflow Part 4 - 15:48
    • 15- Buffer Overflow Part 5 - 16:37
    • 16- Buffer Overflow Part 6 - 13:27
    • 17- Buffer Overflow Part 7 - 12:51
    • 18- Another Buffer Overflow Example - 6:33
    • 19- Buffer Overflow Exercise - 1:51

View Full Curriculum


Access
Lifetime
Content
1 hours
Lessons
17

SQL Injection

Master SQL Injection Attacks

By Mohamed Atef | in Online Courses

A SQL Injection is a form of attack that takes advantage of an improperly filtered user and takes the input acquired to manipulate a database. When this attack is used, an unauthorized person can access the database of a website and extract the data from that source. It's a must-know attack for any ethical hacker and in this course, you'll cover it from A to Z.

  • Access 17 lectures & 1 hour of content 24/7
  • Learn what SQL Injection is & how it works
  • Explore the different types of SQL Injection

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Requirements

  • Internet required

Course Outline

  • Learn SQL Injection
    • 1. Course Outline - 2:36
    • 2. Introduction to SQL Injection - 11:29
    • 3. What is SQL Injection - 11:29
    • 4. Setup your lab - 11:29
    • 5. Is the Site Infected with SQLI - 11:20
    • 6. The amazing SQLMAP - 11:21
    • 7. Live Example - 11:21

View Full Curriculum


Access
Lifetime
Content
21 hours
Lessons
151

The Complete Ethical Hacking Certification Course

Master Ethical Hacking, Kali Linux, Cyber Security, System Hacking, Penetration Testing & Get Certified

By Mohamed Atef | in Online Courses

Welcome to the world's most advanced ethical hacking course, covering 18 of the most current security domains any ethical hacker worth their salt needs to know. This course covers over 270 attack technologies commonly used by hackers, showing you how to defeat each. By the end of this course, you'll have in-demand ethical hacking skills and be fully prepared to take important exams.

  • Access 151 lectures & 21 hours of content 24/7
  • Learn key issues plaguing the information security world, incident management process, & penetration testing
  • Explore various types of foot-printing, foot-printing tools, & countermeasures
  • Discover network scanning techniques & scanning countermeasures
  • Discuss enumeration techniques & enumeration countermeasures
  • Understand system hacking methodology, steganography, steganalysis attacks, & covering tracks
  • Examine different types of Trojans, Trojan analysis, & Trojan countermeasures
  • Understand viruses, virus analysis, computer worms, malware analysis procedure, & countermeasures
  • Learn social engineering techniques, identify theft, & social engineering countermeasures
  • Demystify DoS/DDoS attack techniques, botnets, DDoS attack tools, & DoS/DDoS countermeasures

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • CEH v10 - 11:16
    • 1.Introduction - 6:31
    • CEH v10 - Course Outline - 11:16
    • 2.Is PT EH a real job - 4:16
    • 3.CEH Exam - 6:00
  • Build your lab
    • 4.Build your virtual lab - 7:15
    • 5.Download Windows ISO Images - 9:38
    • 6.Configure Windows VM - 13:48
    • 7.Download Kali Linux - 10:01
    • 8.Configure Kali Linux - 5:41
    • 9.Download OWASBWA and Metasploitable - 11:36
  • Get Familiar with Kali Linux
    • 10.Get Familiar with Kali Linux - 12:34
    • 11.File Management - 8:58
    • 12. Find,Locate - 6:40
  • Important Definations
    • 13.Essential Terminology - 13:19
    • CIA - 4:01
  • Footprinting and Reconnaissance
    • 15.Footprinting Introduction - 7:28
    • 16.Footprinting and Reconnaissance - 14:12
    • 17.Email Harvest - 9:51
    • 18. Google Hacking - 10:36
    • 19.Metagoofil - 10:18
    • 20.People Search Engine - 6:13
    • 21.Maltego (Intelligence Tool) - 8:38
    • 22.Internet Archives and Alerts - 7:04
  • Network Scanning
    • 23.Network Scanning Overview - 5:21
    • 24.Important Scanning Defination - 13:18
    • 25. Network Scanning Methology - 2:55
    • 26.Identifying Live system - 6:40
    • 27.Port Scanning - 14:23
    • 28.Advanced Scanning Techniques - 7:23
    • 29.Get more information about your victim - 7:15
    • 30.NMAP NSE Scripts - 1:40
    • 31.Zenmap - 5:43
    • 32.Netcat - 7:59
    • 33.Grabbing Banner - 2:24
    • 34.Network Mapping - 11:41
    • 35.Vulnerability Scanning - 13:51
  • Hiding your Identity
    • 36.Proxy Server - 9:29
    • 37.Configure a local proxy - 10:38
    • 38.Using Public Proxy - 8:28
  • Enumeration
    • 39.Enumeration Overview - 3:16
    • 40. NetBios Enumeration - 13:50
    • 41.SNMP Enumeration - 15:04
    • 42. DNS Enumeration - 4:31
    • 43.DNS Zone Transfer - 6:19
    • 44.Enum4Linux - 3:05
  • System Hacking
    • 45. Introduction to System Hackin - 8:23
    • 46.Password Hacking techniques - 8:50
    • 47.Default Password - 5:40
    • 48.Important Tool - 14:33
    • 49.Cain in Action - 18:22
    • 50. Xhydra - 7:33
    • 51.SSH Cracking - 3:29
    • 52.Ncrack - 8:44
    • 53.Ncrack different OS - 4:07
    • 54.The right world list - 4:30
    • 55.Crunch - 6:04
    • 56.The most amazing and effect wordlsit - 6:22
    • 57. Password Reset Hack - 15:57
    • 58.Offline Password attack - 5:58
  • Malware Threats
    • 59.Introduction to Maleware - 5:12
    • 60.Types of Malware - 10:11
    • 61.Create a virus - 6:25
    • 62.Creating a Virus using a Tool - 2:45
    • 63.Creating a Trojan 1 (R) - 16:40
    • 64.64. Creating a Trojan 2. (R) - 8:14
    • 64.1 Using the Meterpreter Sessions - 9:27
    • 64.2 Can I Bypass the AV - 4:27
  • Sniffring
    • 65. Introduction to Sniffring - 9:33
    • 65.1 MITM Attack (Proof of Concept) - 13:07
    • 66. Enable Routing - 3:37
    • 67.MITM Attack using Ettercap and Xplico - 9:07
    • 68. Start Xplico - 1:46
    • 69. Ettercap and Xplico attack - 9:34
    • 70. DNS Spoofing 2 - 10:58
    • 71. DNS Spoofing attack - 10:07
  • Cryptography
    • 72. Cryptography Basics - 12:15
    • 73. Symmetric Encryption - 7:43
    • 74. Asymmetric Encryption - 8:43
    • 75. Digital Signature - 3:14
    • 76. Hash - 5:21
    • 77. Steganography - 10:18
    • 78. Cryptography Attacks - 4:23
  • Social Engineering
    • 79. Introduction to Social Engineering - 3:13
    • 80. Social Engineering Proof of Concept - 10:02
    • 81. Phishing Attack - 16:17
    • 82. How far you can go with SE - 7:40
    • 83.Vishing Attack using Fake Call - 5:51
    • 84. Vishing using Fake SMS - 4:53
    • 85. Important Countermeasures - 8:29
    • 86. Other SET Attack - 9:11
  • Denial Of Service
    • 87.Introduction to Denail of Service - 13:31
    • 88.Denial of Service Attack Demonstration 1 - 10:58
    • 89. Denial of Service Attack Demonstration 2 - 9:14
    • 90. Denial of Service Attack Demonstration 3 - 6:48
    • 91. Distributed Denial of Service (DDOS) - 5:57
  • Hacking Web Server
    • 92. Hacking web server - 15:44
    • 93.Hacking an Apache Server - 11:07
    • 94 . Hacking a Windows Server - 5:42
    • 95.Practice - 1:32
    • 96.Working with Exploit - 4:34
    • 97.MetaSploit - 7:30
    • 98. Armitage - 2:49
    • 99. Armitage in Action - 7:48
    • 100.Armitage Example 2 - 7:38
  • SQL Injection
    • 101.SQL Injection Introduction - 2:28
    • 102.What is SQL Injection - 9:52
    • 103.Setup your web application lab - 9:54
    • 104.Is the site infected with SQLI - 4:47
    • 105.The amazing SQLMAP - 10:27
    • 106.Live Example - 7:04
  • Important Definition for the Exam
    • 107.Risk Assessment - 16:31
    • 108.Information Asset Register - 4:50
    • 109.Policy and Procedure - 4:13
    • 110.Security in Layers - 3:17
  • Hacking Mobile Platform
    • 111.Introduction to Mobile Hacking - 2:18
    • 112.Setting up Your Android Platform - 3:07
    • 113.Creating a Fake APP-1 - 8:05
    • 114.Creating a Fake APP-2 - 12:04
    • 115.Android attack using Armitage - 4:09
    • 116.Stagefright Attack - 9:05
  • Buffer Overflow
    • 117.1Introduction to Buffer Overflow - 13:27
    • 117.How to search for Buffer Overflow - 14:09
    • 118. Buffer overflow 1.2 - 48:31
    • 119. Buffer overflow 2 - 16:37
    • 120.Buffer Overflow 3 - 26:09
    • 121.Another Buffer Overflow Demonstration - 6:33
    • 122.Practice - 1:51
  • Cloud Computing
    • 123.Introduction to Cloud Computing - 3:03
    • 124.IaaS vs PaaS vs SaaS - 2:25
    • 125.SaaS - 4:24
    • 126.PaaS - 2:04
    • 127.IaaS - 1:59
    • 128.Cloud Deployment - 0:49
    • 129.Private Cloud - 3:03
    • 130.Public Cloud - 8:04
    • 131.Hybrid Cloud - 1:30
    • 132.NIST SP 800 -145 - 1:45
  • Evading IDS, Firewalls and Honeyhots
    • 133.Introduction to Evading IDS, Firewalls, Honeypots - 2:50
    • 134.Honeypots - 10:12
    • 135.Firewalls - 12:06
    • 136.Access Control List - ACL - 3:24
    • 137.Standard Access Control list - 8:18
    • 138.Intrusion Detection System - IDS - 4:23
  • Hacking Wireless Network
    • 139.Introduction to Wireless - Part 1 - 26:04
    • 140.Introduction to Wireless - Part 2 - 8:05
    • 141.WEP cracking - 20:52
    • 142.WPA WPA2 Cracking - 27:56
    • 143.Advanced WPA.WPA2 attacks - 6:44
  • Attack Remote Target
    • 146.Port Forwarding - 9:29
    • 147.Hacking Remotely Demonstration - 11:43
  • Physical Security
    • 148.What is Physical Security - 11:03
  • Operations Security
    • 149.Operations Security Control Methods - 9:11
  • Vulnerability Analysis
    • 148. VA vs PT - 11:26
    • 149. Nessus - 13:21
    • 150. Vulnerability Asessment - 11:27
    • 151. Nessus VA Report - 13:19
    • 152. Nessus VA Report 2 - 11:24
    • 154. Nexpose VA - 11:25
    • 153. OWASP ZAP VA - 11:28
  • IoT Security
    • 155. What is IoT - 10:16
    • 156. IoT Implementation - 10:16
    • 157. IoT Hardware 2 - 10:16
    • 158. IoT Software - 10:16
    • 159. Self Driving Vehicles - SDV - 10:16
    • 160. Anatomy of an IoT Attack - 10:16
    • 161. IoT Attack Demonstration 2 - 10:16

View Full Curriculum


Access
Lifetime
Content
17 hours
Lessons
143

CISSP Exam Preparation Training Course

How to Get CISSP Certified & Start Making the Big Bucks

By Mohamed Atef | in Online Courses

This CISSP® preparation training course focuses solely on the eight domains of knowledge as determined by (ISC)2. Each domain of knowledge is dissected into its critical components, and those components are then discussed in terms of their relationship with one another and with other areas of information security.

  • Access 143 lectures & 17 hours of content 24/7
  • Learn how to implement an information security management system in any organization
  • Get qualified to pass the CISSP exam on your first try

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Requirements

  • Internet required

Course Outline

  • Introduction
    • 1. Introduction - 1:51
    • 2. What is CISSP Certificate - 5:47
    • 3. Course Outline - 5:18
    • 4. Latest CISSP Curriculum - 4:33
    • 5. Course Materials and Resources 2 - 5:19
    • 6. Course flow and follow up - 7:22
    • 7. Important communication channel - 2:49
  • Security and Risk Management
    • 8. Introduction to Security and Risk Management - 4:11
    • 9. Important Definitions - 12:28
    • 10. Important Definitions 2 - 4:42
    • 11. Governance Requirements - 5:22
    • 12. Due Care and Due Diligence - 8:42
    • 13. Question - 3:09
    • 14. Compliance - 8:50
    • 15. Important Document - 6:47
    • 16. Ethics - 9:12
    • 17. Question - 3:00
    • 18. Security Document 2 - 15:35
    • 19.Security Document Types - 5:18
    • 20. Policy Sample - 3:14
    • 21. The Relationship Between Security Document Types - 3:09
    • 22. Risk Management - 7:51
    • 23. Risk Management Part 2 - 11:09
    • 24. Asset Evaluation - 18:33
    • 25. Exam Question - 4:03
    • 26. Rsa Archer - 4:41
    • 27. ARIS GRC - 1:41
    • 28. Business Continuity Plans - 1:16
    • 34. Exam Quiz - 8:12
    • 31. MTD - RTO- RPO - 11:44
    • 32. Disaster Recovery Plan -DRP - 3:34
    • 33. Alternatives Sites - 8:10
    • 37. Employment Policies -Part 2 - 10:29
    • 36. Employment Policies - 2:20
    • 35. The Need of Personnel Security - 8:39
    • 38. Termination - 1:40
    • 29. Business Continuity Plans - BCP - 14:21
    • 30. Business Impact Analysis- BIA - 10:15
    • 39. Security Awareness - 7:02
    • Domain Evaluation - 5:34
  • Asset Security
    • 40. Introduction to Asset Security - 5:35
    • 41. Asset Management - 10:38
    • 42. Information Asset List - 12:40
    • 43. Classification - 8:10
    • 44. Labeling - 4:44
    • 45. DLP - 2:55
    • 46. DLP - Data Classification - 3:37
    • 47. Klassify - Data Labeling 2 - 2:50
    • 48. Privacy - 13:02
    • 49. Retention - 12:12
    • 50. Data Security Control - 8:01
    • Domain Evaluation - 5:34
  • Security Architecture and Engineering
    • 51. Introduction to Security Architecture and Engineering - 3:52
    • 52. Security Engineering Lifecycle - 4:14
    • 53. NISP SP 14-27 - 11:36
    • 54. Trusted Computing Base - 9:22
    • 54.1 TCB Vulnerability - 9:48
    • 55. Security Models - 17:08
    • 56. TCSEC - 5:51
    • 57. ITSEC - 6:14
    • 58. Security Architecture Questions - 3:18
    • 59. Enterprise Security Architecture - 5:06
    • 60. Virtualization - 9:51
    • 61. Fault Tolerance - 6:32
    • 62. Server Fault Tolerance Techniques - 2:06
    • 63. New Technology - 6:28
    • 64. Spoofing Number - 5:52
    • 65. Spoofing Email - 7:04
    • 66. Cryptography - 16:31
    • 67. Alternative Ciphers - 7:56
    • 68. Symmetric Encryption - 12:43
    • 69. Asymmetric Encryption - 13:52
    • 70. Hash - 6:10
    • 71. Physical Security - 7:44
    • 72. Physical Access barriers - 9:49
    • 73. Power Issue - 3:15
    • 74. Fire - 5:33
    • Domain Evaluation - 5:34
  • Communications and Network Security
    • 75. The OSI Model - 17:27
    • 76. TCP-IP Model - 2:50
    • 77. Network Architecture Components - 17:09
    • 78. Firewall - 10:43
    • 79. Network Types and Topolgies - 8:42
    • 80. Remote Access Technology - 18:34
    • 81. Wireless Network - 7:20
    • 82. Network Attacks - 9:03
    • 83. Remote Access Security Mechanisms - 2:17
    • 84. RAID - 7:00
    • 85. Backup - 6:00
    • 86. Network Questions - 1:21
    • Domain Evaluation - 5:34
  • Identity and Access Management
    • 87. Access Control - 6:50
    • 88. Authorization - 19:23
    • 89. Authentication - 18:50
    • 90. Single Sign on SSO - 13:10
    • 91. Central Administration (RADUIS) - 4:16
    • 92. Access Control Attack - 17:15
    • 93. Instrusion Detection System (IDS) - 6:58
    • 94. Access Control Inportant exam area - 4:15
    • 95. Access Control Questions - 8:02
    • Domain Evaluation - 5:34
  • Cloud Security
    • 96. Introduction to Cloud Security - 2:50
    • 97. NIST 800-145 - 1:55
    • 98. IaaS vs PaaS vs SaaS - 2:25
    • 99. SaaS - 4:25
    • 100. PaaS - 2:04
    • 101. IaaS - 1:59
    • 102. Storage Architecture - 1:25
    • 103. Data Life Cycle Security - 4:27
    • 104. Hypervisor - 4:49
    • 105. Virtualization Security - 5:26
    • 106. Perimeter Security - 6:05
  • Security Assessment and Testing
    • 107. Introduction Security Assessment and Testing - 11:20
    • 108. Test Output - 4:33
    • 109. Vulnerability asessment - Part 1 - 2:16
    • 110. Vulnerability asessment -Part 2 - 3:16
    • 112. Nessus VA - 13:25
    • 113. Nessus VA- Part 2 - 14:05
    • 114. Nessus VA Report - 5:20
    • 115. OWASP ZAP - VA - 5:06
    • 116. Nexpose VA - 5:05
    • 117. Penetration testing - 8:33
    • 118. Reconnaissance Demo -Maltego 2 - 7:59
    • 119. Scanning Demo -Zenmap - 5:06
    • 120. Exploitation Demo -MetaSploit 2 - 14:33
    • 121. Event Log Review 2 - 7:19
    • 122. NIST 800-92 - 2:56
    • 123. SIEM Solution - 6:16
    • 124. SIEM Solution Demo - Qradar - 3:09
    • 125. Code Review - 5:20
    • 126. Security KPI's - 6:57
    • Domain Evaluation - 5:34
  • Security Operations
    • 127. Introduction to Security Operation 2 - 1:40
    • 128. Security Operation 2 - 9:53
    • Domain Evaluation - 5:34
  • Software Development Security
    • 129. The System Life Cycle - 6:45
    • 130. Software development Methods - 6:42
    • 132. Change Control Process - 3:07
    • 133. Security Consideration - 1:54
    • 134. Software Control - 2:50
    • 135. Introduction to SQL Injection 2 - 11:26
    • 136. What is SQL Injection - 11:26
    • Domain Evaluation - 5:34

View Full Curriculum


Access
Lifetime
Content
8 hours
Lessons
68

Penetration Testing & Ethical Hacking Project from A to Z

How to Manage Penetration Testing & Ethical Hacking Projects from Scratch

By Mohamed Atef | in Online Courses

There are plenty of ethical hacking and penetration testing courses online today, making learning these skills easy. But how can you utilize this knowledge and these skills into a real business or project? This course combines both technical and business elements to help you become a professional ethical hacker or penetration tester.

  • Access 68 lectures & 8 hours of content 24/7
  • Learn how to start a penetration testing project in any organization
  • Write a proposal for any company
  • Plan for a real project
  • Discuss the professional tools you should use in a project
  • Conduct the full phases of a project
  • Manage the finding & recommended solutions, and write a final report
  • Understand service fees

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • Introduction - 14:35
    • is there a real Ethical Hacking Jobs? - 4:04
    • Penetration Testing Standard - 7:13
    • Reports and Documentation - 6:49
    • Instructor Support - 1:49
    • Course Flow - 6:03
  • Setup your lab
    • Install VMWARE Player - 8:11
    • Download OS Images - 9:52
    • Download Kali Linux - 5:24
    • Download OWASBWA and Metasploitable - 4:57
    • Bad Store - 5:40
    • Configure Linux VM - 8:35
    • Update your Kali VM - 4:33
    • Configure Windows VM - 13:37
    • Configure Legacy OS Virtual machine - 9:33
  • Penetration Testing Project
    • Penetration Testing Project - 5:22
    • Compliance - 5:11
    • VA vs PT - 7:27
    • RFP (Request for Proposal) - 11:36
    • Types of PT - 3:30
    • Social Engineering PT - 3:08
  • Tools and Utility
    • PT and VA Tools - 4:43
    • Nessus - 13:24
    • Nexpose 1 - 11:22
    • Nexpose 2 - 5:07
    • OWASP ZAP - 5:06
    • Metaspolit Pro - 14:09
    • Metasploit community - 5:11
  • Let's Start the project
    • Identifying your scope - 2:51
    • Start the project - 9:55
  • Identification of the Target
    • Whois Information - 11:43
    • Email Harvesting - 9:03
    • GHDB - 2:33
    • Introduction to Maltego - 1:40
    • Maltego - 8:12
    • People Search Engine - 2:46
  • Port Scaning
    • NMAP - 9:42
    • Zenmap - 5:48
  • Enumeration
    • Enumeration - 2:19
    • DNS Enumeration - 4:31
    • DNS Zone Transfer - 6:19
    • SMB Enumeration - 6:19
    • Enum4Linux - 3:06
    • Windows Enumeration - 15:11
  • Vulnerability Management
    • Vulnerability asessment - 3:16
    • Nessus VA Report - 14:05
    • Nessus Report 2 - 5:20
    • OWASP ZAP VA - 14:42
    • Nexpose VA - 11:56
  • Penetration Testing Project initiation
    • Penetration testing - 5:22
    • MetaSploit PT 1 - 14:33
    • MetaSploit PT 2 - 7:18
    • MetaSploit Pro 3 - 8:22
    • Metasploit community - 7:34
    • Armitage - 7:48
  • SQL Injection
    • SQL Injection Introduction - 2:28
    • What is SQL Injection ? - 9:53
    • Is the site infected with SQLI ? - 4:47
    • The amazing SQLMAP - 10:27
    • Live Example - 7:04
  • Social Engineering Campaign
    • Social Engineering Campaign - 4:16
    • Social Engineering Toolkit (SET) - 5:08
    • Credential Harvest - 11:15
    • Social Engineering using MetaSploit Pro - 8:34
  • Managing the finding
    • Finding and Solutions - 4:07
    • Patches - 1:40
    • Writing the report - 2:35
  • Services Fees
    • Penetration Testing Fees - 3:51

View Full Curriculum


Access
Lifetime
Content
4 hours
Lessons
60

Certified Cloud Security Professional: CCSP

Pass the CCSP Exam On Your First Try

By Mohamed Atef | in Online Courses

Cloud computing is essential to organizations, which makes understanding its information security risks and mitigation strategies even more critical. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with the right cloud security knowledge and skills to be successful. They need CCSPs. Backed by the two leading non-profits focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)², the CCSP credential denotes professionals with deep-seated knowledge and competency derived from hands-on experience with cyber, information, software and cloud computing infrastructure security. CCSPs help you achieve the highest standard for cloud security expertise and enable your organization to benefit from the power of cloud computing while keeping sensitive data secure.

  • Access 60 lectures & 4 hours of content 24/7
  • Explore the 5 domain of the CSSP exam
  • Pass the CCSP exam on your first try

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • Welcome - 0:42
    • Introduction - 3:26
  • Domain 1: Architectural Concepts and Design Requirements
    • Domain 1: Architectural Concepts and Design Requirements - 1:40
    • NIST SP 800 -145 - 1:50
    • Managed Service Provider - 1:47
    • Why Cloud Computing ? - 5:02
    • IaaS vs PaaS vs SaaS - 2:20
    • SaaS - 4:20
    • PaaS - 1:59
    • IaaS
    • Cloud Deployment - 0:44
    • Public Cloud - 8:00
    • Private Cloud - 2:58
    • Hybrid Cloud - 1:25
    • Community Cloud - 2:13
    • Select the right solution - 6:08
  • Domain 2: Cloud Data Security
    • Introduction to Cloud Data Security - 0:26
    • Storage Architecture - 1:20
    • Data Life Cycle Security - 4:22
    • Information Rights Management - 1:38
    • IMR Demonstration
    • Data Loss Preventions (DLP) - 1:44
    • DLP Demonstration - 14:55
    • Database Security - 1:14
    • Data Encryption - 5:26
    • Managment Control - 8:01
    • Event Managment - 3:30
  • Domain 3: Cloud Platform and Infrastructure Security
    • Introduction to Platform and Infrastructure security - 0:52
    • Hypervisor - 4:44
    • Virtualization Security - 5:21
    • Perimeter Security - 6:00
  • Domain 4: Cloud Application Security
    • Introduction to Cloud Application Security - 2:10
    • Software Development Life Cycle - SDLC - 4:31
    • OWASP Top 10 - 3:48
    • What is SQL Injection Attack - 9:48
    • SQL Injection attack - 2:23
    • Cross Site Scripting - 6:49
    • Software Defense - 6:13
    • Cryptography on the Cloud - 8:38
    • Common Computer Architecture - 4:51
    • Access Management - 10:46
    • Cloud Threats - 3:49
    • BCP and DRP - 3:47
    • Business Continuity Plans - 14:32
    • Disaster Recovery Plans - 3:29
    • MTD-RTO-RPO - 11:39
    • VA and PT - 7:27
  • Domain 5: Operations K2:M2
    • Introduction to Operations - 0:37
    • Physical Security - 5:27
    • HR Security - 5:37
    • Network Secuirty - 4:20
    • ntroduction to Risk - 9:17
    • Risk - 11:59
    • Asset Evaluation - 18:28
  • Domain 6: Legal and Compliance
    • Domain 6: Introduction - 1:00
    • Incident Response - 8:37
    • Computer Forensic - 4:18
    • Type of Evidencee - 0:53
    • Types of Law - 6:49
    • Liability - 3:52

View Full Curriculum


Access
Lifetime
Content
6 hours
Lessons
53

CISM: Certified Information Security Manager

Pass the CISM Exam On Your First Try

By Mohamed Atef | in Online Courses

The CISM certification from ISACA is a program developed for information security managers, information security professionals, and individuals who are planning to move to information security management. This CISM program will endow you with the skills needed to work as an information security manager and help you clear the CISM exam on your first attempt to receive a globally-recognized certificate.

  • Access 53 lectures & 6 hours of content 24/7
  • Cover the 4 information security domains
  • Learn through real-life scenarios & a library of templates
  • Pass the CISM exam on your first try

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • Introduction - 9:39
    • Course Outline - 8:01
    • Course Structure - 5:44
    • Course Material and Exam Practice Question
  • Background
    • Background needed - 4:40
    • GRC - 10:35
    • Senior Managment and GRC - 7:23
    • Senior Managment and Risk - 6:38
    • Organization Structure - 5:23
  • Domain 1 : Information Security Governance
    • Introduction to Information Security Governances - 13:33
    • Business Goals and Objective - 4:53
    • Security Program Overview - 5:48
    • CIA Triad - 5:40
    • Information Security Components - 4:00
    • Information Security Governace Output - 2:48
    • Define Roles and Responsibilities - 3:49
    • GRC - 1:18
    • Governace of Third party - 1:28
    • Information Security Governance Overview - 4:09
    • Establish, monitor, evaluate and report metrics - 5:50
  • Domain 2 : Information Risk Management and Compliance
    • What is Risk ? - 11:59
    • Asset Evaluation - 18:28
    • Information Asset Register - 7:58
    • Classification Schemes - 4:34
    • Risk Register - 3:20
    • Alignment of Risk Assessment and BIA - 4:03
    • Business Impact Analysis - BIA - 10:09
    • Ethics Issues in a Computing Environment - 5:29
    • Control Types - 2:56
    • Control Catagory - 3:51
    • Evaluate information security controls - 3:53
  • Domain 3 : Information Security Program Development and Management
    • Establish and maintain the information security program - 5:18
    • Information Security Program Element - 3:03
    • Access Control - 6:45
    • Authorization - 19:19
    • Authentication - 18:46
    • Intrusion Detection Systems - 6:53
    • Network Architecture Components - 17:04
    • Firewall - 10:38
    • Cryptography - 16:26
    • Symetric Encryptian - 12:38
    • Asymetric Encryptian - 13:47
    • Hashing - 6:05
  • Domain 4 : Information Security Incident Management
    • Information Security Incident Managment - 10:06
    • Incident Repsonse Team - 6:50
    • Incident Report - 4:11
    • BCP- DRP - 1:24
    • Business Continuity Plans - 14:32
    • Business Impact Analysis - 10:09
    • MTD-RTO-RPO - 11:39
    • Disaster Recovery Plans - 3:29
    • Alternative Sites - 8:05
  • Get Ready for the Exam
    • Get Ready for the Exam - 5:08

View Full Curriculum


Access
Lifetime
Content
8 hours
Lessons
70

CISA: Certified Information Systems Auditor

Pass the CISA Exam On Your First Try

By Mohamed Atef | in Online Courses

Certified Information Systems Auditor (CISA) is a globally recognized certification for information system auditors. In this course, you'll learn how to audit information systems while preparing to pass the CISA exam on your first attempt. You'll gain audit experience, knowledge, and skills needed to assess vulnerabilities and follow compliance.

  • Access 70 lectures & 8 hours of content 24/7
  • Explore the process of auditing information systems
  • Discuss governance & management of IT
  • Cover information systems acquisition, development, implementation, operations, maintenance, & support
  • Protect information

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • Introduction - 11:14
    • What is CISA Certification ? - 8:16
    • Course flow - 4:15
    • Course Material and Exam Pratice Question
    • Case Study - 5:24
    • ISO 27001 - 8:38
    • Important Defination - 2:31
    • IS Auditor - 8:11
    • ITAF Standard - 7:46
    • Types of External Audits - 4:08
    • Compensating Controls - 3:47
  • Background
    • Background needed - 4:40
    • GRC- Governance, Risk, Compliance - 10:35
    • Senior Management and GRC - 7:23
    • Senior Management and Risk - 6:38
    • Organization Structure - 5:23
  • Domain 1: The Process of Auditing Information Systems
    • The process of Audit IS - 9:13
    • IS Audit Report and Presentation samples - 4:54
    • Information Asset Register - 6:08
    • Audit Risk Assessment - 12:26
    • Audit Planing and management - 7:20
    • Document Control - 3:18
    • Scenario 1 - 44:08
    • Business process - 7:12
    • Law and regulation - 2:16
    • Evidence - 5:52
    • Sampling - 3:53
    • Reporting and Communication - 7:08
  • Domain 2: Governance and Management of IT
    • Governance and Management of IT - 14:30
    • IT Governance - 3:02
    • Information System Strategy - 4:49
    • IT Organization - 2:51
    • Maintenance of Policies and Procedures - 5:00
    • Policy and Procedures Resources - 5:24
    • Legal Compliance - 8:34
    • Quality Management system - 1:55
    • Mutarity Models - 3:18
    • CMMI - Capability Maturity Model Integrated - 1:34
    • Process optmization - 3:52
    • IT Investment Practices - 5:30
    • IT Supplier Selection - 5:11
    • Make or Buy decision - 18:08
    • Business Continuity Plan - 14:32
    • Business Impact Analysis - 10:09
  • Domain 3: Information Systems Acquisition, Development and Implementation
    • Information Systems Acquisition, Development and Implementation - 9:24
    • Project Governance - 2:28
    • Important PM Defination - 2:31
    • Types of Organization - 6:40
    • Project Managment - 4:54
    • Architecture - 5:32
    • Procurment Managment - 1:05
    • Plan Procurment Managment - 18:08
    • Requirment Managment - 4:22
    • Change Managment - 3:22
  • Domain 4: Information Systems Operations, Maintenance and Support
    • Information Systems Operations, Maintenance and Support - 6:47
    • Service Level Management - 5:05
    • Hardware Software and Knowledge statment - 7:28
    • Licences Managment - 3:11
    • Capacity Managment - 2:45
    • Incident Mamagment - 5:31
    • Incident Report Form - 5:29
    • Backup - 5:55
    • Disaster Recovery Plan - DRP - 3:29
    • Alternative Sites - 8:05
  • Domain 5: Protection of Information Assets
    • Protection of Information Assets - 7:09
    • Access Control - 19:19
    • Network Security - 17:04
    • Cryptography - 16:26
    • Physical Access barrier - 9:44
    • Operation Security - 4:04

View Full Curriculum


Access
Lifetime
Content
10 hours
Lessons
66

CompTIA Security+ Certification

Study to Pass the CompTIA Security+ Certification Exam

By Mohamed Atef | in Online Courses

This course is targeted towards aspiring information security professionals who aren't sure where to start. Beginning with basic security fundamentals, this course elevates through more advanced topics, ultimately providing you with the knowledge you need to pass the globally-recognized CompTIA Security+ certification exam.

  • Access 67 lectures & 10.5 hours of content 24/7
  • Cover basic security fundamentals, threats, & vulnerabilities
  • Explore network security
  • Dive into host & application security
  • Discuss risk management & business continuity planning
  • Study to ace the CompTIA Security+ certification exam on the first attempt

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • Introduction - 12:17
  • Security Fundamentals
    • Information Security Life Cycle 1 - 14:09
    • Information Security Control - 5:00
    • Access Control Introduction - 6:45
    • Authentication - 18:46
    • Access Control - 19:19
    • Cryptography Fundamentals - 1:37
    • Information Security Life Cycle 2 - 6:49
    • Asymetric Encryptian - 13:47
    • Cryptography - 16:26
    • Symetric Encryptian - 12:38
    • Steganography - 7:51
    • Hashing - 6:05
    • Policy - 2:38
  • Identifying Security Threats and Vulnerabilities
    • Social Engineering - 12:19
    • Fake Email - 6:13
    • Phising Credential Harvest - 13:11
    • Security Awarness - 6:37
    • Maleware - 12:30
    • Types of Malicious Code - 14:51
    • Software attack - 4:24
    • Password guessing and cracking - 15:09
    • Rambow table technique - 19:20
    • Application Attack - 4:42
    • What is SQL Injection Attack - 14:05
    • XSS Introduction - 2:58
    • Network Basic - 12:02
    • Network Attack - 3:34
    • IP - 16:07
    • OSI Model Part 1 - 14:39
    • OSI Model Part 2 - 14:10
    • What is Scanning - 2:17
    • Sniffiring 1 - 15:19
    • Sniffiring 2 - 14:53
    • Man in the Middle attack - 11:59
    • Wireless Threats - 2:41
    • Wireless Attack - 2:34
    • Wireless Network - 7:15
    • WEP cracking - 20:48
  • Managing Data, Application, and Host Security
    • Managing Data Security - 12:32
    • Permissions - 4:28
    • Data Policies - 6:23
    • Manage Application security - 8:53
    • Validate application input - 4:26
    • Managing devices and host security - 4:36
    • Operating System - 10:34
    • Trused Computing base - 9:17
    • Logging - 3:12
    • Microsoft Baseline Security Analyizer - 4:44
    • Mobile device security - 4:33
  • Implementing Network Security
    • Implementing Network Security - 4:04
    • IDS - 6:53
    • Firewall - 10:38
  • Implementing Compliance and Operational Security
    • Physical Security - 5:31
    • Lialibilty - 3:52
    • Security awarness - 4:22
  • Risk Managment
    • Introduction to Risk - 6:17
    • Asset Evaluation - 18:28
    • Vulnerability Assessment Tools (Nessus) - 13:45
  • Troubleshooting and Managing Security Incidents
    • Incident Report Form - 5:29
    • Information Security Incident Managment - 10:06
  • Business Continuity and Disaster Recovery Planning
    • BCP - 14:32
    • BIA - 10:09
    • MTD-RTO-RPO - 11:39
    • DRP - 3:29
    • Alternative Sites - 8:05

View Full Curriculum


Access
Lifetime
Content
9 hours
Lessons
53

CompTIA CSA+ & Certified Cyber Security Analyst

Pass One of CompTIA's Most Coveted Certification Exams

By Mohamed Atef | in Online Courses

The CompTIA Cybersecurity Analyst, or CSA+, is a CompTIA certification focusing on the knowledge and skills required to configure and use threat-detection tools, perform data analysis, and interpreting the results with the end goal of securing an organization. This course will prepare you to pass this coveted certification exam.

  • Access 53 lectures & 9 hours of content 24/7
  • Discuss threat management
  • Learn how to manage vulnerabilities
  • Respond to incidents appropriately
  • Cover security architectures

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • 1. Introduction - 3:17
  • Threat Management
    • 2- Threat Managment Introduction - 3:18
    • 3. Footprinting - 14:12
    • 4. Email Harvest - 9:51
    • 5. Google Hacking - 10:36
    • 6. MetaGoofil - 10:18
    • 7.People Search Engine - 6:13
    • 8. Internet Archives and Alerts - 7:04
    • 9. Maltego - 8:40
    • 10. Using Maltego - 8:14
    • 11. Related Entities in Maltego - 3:51
    • 12. More Maltego - 6:05
    • 13.Important Scanning Defination - 13:19
    • 14 .Identifying Live system - 6:41
    • 15. Port Scanning - 14:23
    • 16.Advamced Scanning Techniques - 7:23
    • 17.Network Mapping - 11:41
  • Vulnerability Management
    • 18. Vulnerability Management Introduction - 11:29
    • 19.Penetration Testing Standards - 11:29
    • 20.VA vs PT - 11:29
    • 21. Types ot PT - 11:29
    • 22.Social Engineering PT - 11:29
    • 23.Vulnerability Assessment - 11:29
    • 24.Nessus Report 1 - 13:25
    • 25.Nessus Report 2 - 11:29
    • 26.OWASP ZAP VA - 11:29
    • 27. Nexpose VA-1 - 11:29
    • 28.Nexpose VA-2 - 11:29
    • 29.Penetration Testing - 11:29
    • 30.MetaSploit Pro 1 - 14:32
    • 31.MetaSploit Pro 2 - 11:29
    • 32.MetaSploit Pro 3 - 11:29
    • 33.MetaSploit Community - 11:29
    • 34.Armitage - 11:20
    • 35.SQL Injection Introduction - 11:20
    • 36. What is SQL Injection - 11:20
    • 37.Is The Site Infected with SQL Injection - 11:20
    • 38.The Amazing SQLMAP - 11:20
    • 39.Live Example - 11:20
  • Cyber Incident Response
    • 40. Incident Management 2 - 11:25
    • 41. Incident Response Team - 11:25
    • 42. Incident Report - 11:25
    • 43. BCP - DRP - 11:25
    • 44. Business Continuity Plan - 14:36
    • 45. Business Impact Analysis 2 - 11:25
    • 46. MTR - RTO - RPO - 11:44
    • 47. Disaster Recovery Plan - 11:25
    • 48. Alternative Sites - 11:25
  • Security Architecture
    • 49. Common Security Architecture Frameworks - 12:17
    • 50. Trusted Computing Base - 11:16
    • 51. Security Models - 17:08
    • 52. TCSEC - 11:16
    • 53. ITSEC - 11:16

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 15 days of purchase. Once your license is redeemed, all sales are final.