SECURITY

This section is intended to provide an introduction to networking commands, which can be used to set up a firewall and display general information about a network. Such as checking the connectivity to hosts, mapping devices and configuring the interfaces used by these devices to connect to the network.

INTRODUCTION

Web Security Basics

01 - What is Web Security
02 - Why Security is Important
03 - What is a Hacker
04 - Threat Models
05 - Total Security is Unachievable
06 - Least Privilege
07 - Simple Is More Secure
08 - Never Trust Users
09 - Expect The Unexpected
10 - Defense In Depth
11 - Security Through Obscurity
12 - Deny & Allow Lists
13 - Map Points & Data Passageways
14 - Regulate Requests
15 - Validate Input
16 - Sanitize Data
17 - Label Variables
18 - Keep Code Private
19 - Keep Credentails Private
20 - Keep Error Messages Vague
21 - Smart Logging
22 - Types Of Credential Attacks
23 - Strong Passwords
24 - URL Manipulation
25 - SQL Injection
26 - Cross-Site Scripting (XSS)
27 - Cross-Site Request Forgery
28 - Cross-Site Request Protection
29 - Cookie Visibility & Theft
30 - Session Hijacking
31 - Session Fixation
32 - Remote Code Execution
33 - File Upload Abuse
34 - Denial Of Service

SYSTEM HARDENING

Linux Security & Hardening Essential Training

01 - Welcome
02 - General Security
03 - Is Linux Secure
04 - What Makes Linux Secure
05 - Security Guidelines & Principles
06 - Section Summary General Security
07 - Physical Security
08 - Physical Security Concepts
09 - Single User Mode Security
10 - Single User Mode & Blank Passwords
11 - Single User Mode And Blank Password
12 - Disk Encryption
13 - Encrypt A New Device Part 01
14 - Encrypt A New Device Part 02
15 - Encrypt An Existing Device
16 - Disable Control Alt Delete
17 - Section Summary Physical Security
18 - Account Security
19 - Introduction To PAM
20 - PAM Configuration Example
21 - Password Security
22 - Account Security Demo 01 UID 0
23 - Control Account Access
24 - Security By Account
25 - Account Security Demo 02
26 - Account Security Demo 03 Sudo
27 - Network Security
28 - Network Security Part 01
29 - Network Security Part 02
30 - Secure SSHd Part 01
31 - Secure SSHd Part 02
32 - Linux Firewall Fundementals
33 - Configure The Firewall Through The Command Line
34 - Firewall Rule Specifications
35 - Example Firewall Rules
36 - Linux Firewall Demo
37 - TCP Wrappers Part 01
38 - TCP Wrappers Part 02
39 - File System Security
40 - Introduction To File And Directory Permissions
41 - File And Directory Permissions Part 01
42 - File And Directory Permissions Part 02
43 - Special Modes Part 01
44 - Special Modes Part 02
45 - File Attributions
46 - File Attributes Demo
47 - ACLS
48 - ACLS Demo
49 - Rootkits
50 - Rootkit Hunter Demo

RECONNAISSANCE

Ethical Hacking Footprinting & Reconnaissance

01 - Footprinting & Reccaissance
02 - Using Competitive Inelligence
03 - Search Engines & Google Hacking
04 - Getting Social
05 - Using Anywho, Spokeo and Yansi
06 - Tracking Online Reputation
07 - Footprinting Websites & Email
08 - Mirroring Websties
09 - Mirror Website Challange
10 - Mirror Website Solution
11 - Monitoring Websites
12 - Investigating Email
13 - OSINT Tools
14 - Challenge Understanding Email Headers
15 - Solution Understanding Email Headers
16 - Footprinting Using DNS
17 - Domain Name Generators
18 - Understanding ICMP
19 - Using Ping And Tracert
20 - Analyzing The Path
21 - Nslookup And Dig
22 - Footprinting Countermeasures
23 - Footprinting Pen Testing And Reports

PEN TESTING

Penetration Testing Essential Training

01 - Overview
02 - Nmap Refresher
03 - Netcat Refresher
04 - Capturing Packets With TCP Dump
05 - Netstat, Nbtstat and Arp
06 - Scripting With Powershell
07 - Extending Powershell With Nishang
08 - Refreshing Your Bash Skills
09 - Controlling Flow In A Script
10 - Python Refresher
11 - Using The System Functions
12 - Using The Network Functions
13 - Working With Websites
14 - Driving Metasploit Through Python
15 - Accessing Sqlite Databases
16 - Using Scapy To Work With Packets
17 - A Kali Refresher
18 - Fuzzing With Spike
19 - Information Gathering With Sparta
20 - Adding The Trity Tools To Kali
21 - A Refresher On Metasploit
22 - Exploiting With Armitage
23 - Scanning Targets With Openvas
24 - Approaching Web Testing
25 - Testing Websites With Burpesuite
26 - Identifying Web Vulnerabilities
27 - Fingerprinting Webservers
28 - Exploiting A Targer
29 - Understanding Code Injection
30 - Understanding Buffer Overflows
31 - Finding Exploit Code