Get $1 credit for every $25 spent!

The 2022 Premium IT Asset & Risk Management Certification Prep Bundle

Ending In:
Add to Cart - $59
Add to Cart ($59)
$2,200
97% off
wishlist
Courses
11
Lessons
1,400

What's Included

Product Details

Access
Lifetime
Content
1.0 hours
Lessons
35

IT Asset Management (ITAM) — Hardware Asset Management

Expand Your Skills on Hardware Asset Management, From Risk Reduction to Audits, & More

By Magine Solutions | in Online Courses

In this course, you will learn everything about Hardware asset management, its importance, and its role, in today's emerging world. This course is ideal for beginners and IT professionals who are interested in exploring the hardware asset management world. You will also learn to understand these concepts by looking at case studies to strengthen the theoretical concepts.

4.2/5 average rating: ★ ★ ★ ★
  • Access 35 lectures & 1 hour of content 24/7
  • Understand IT asset management
  • Know the benefits of ITAM
  • Expand your current skills on hardware asset management
  • Monitor risk reduction, audit, & look for a cost-effective and efficient return of investment
  • Keep track of all IT assets throughout their lifecycle & Tracking IT assets usage
"Really great course when it comes to a more illustrative explanation and implementation of Hardware Asset Management. Thank you very much!" – Sauve W.
Magine Solutions Team | This is Our World!
4.6/5 average rating: ★ ★ ★ ★

At Magine Solutions, the whole team believes that high-quality education should be available to everyone. That’s why the team is committed to working hard every day to promote online education in a new way. The team wants you and your friends and classmates to also get the best possible experience from this revolutionary approach by joining us today!

With knowledgeable and experienced teachers with years of experience in the field, your learning will be at an advanced level. Whether you’re looking to learn more about the latest trends in marketing or how to use new software, Magine's courses offer hands-on instruction and practical advice for today’s most pressing industry issues.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Your First Program
  • Introduction To IT Asset Management
    • Short Introduction to the course - 2:11
    • Introduction to IT Asset Management - 2:41
    • Benefits of IT Asset Management - 5:05
    • Need of ITAM - 3:47
    • Policy, Process, and Procedure - 2:34
    • Types of ITAM - 2:46
    • HAM PROMO - 2:18
  • Introduction To IT Hardware Asset Management
    • Definition and Explanation of HAM - 5:18
    • Scope of HAM - 1:33
    • Device Management Responsibility - 1:33
  • ITAM Processes
    • Discovery of assets and tracking of hardware and software metrics - 2:41
    • Keep track of all IT assets throughout their lifecycle, Tracking IT assets usage - 2:50
    • Equipment Loan Tracking, Asset tracking, & Asset access tracking - 2:39
    • Taking Charge of Warranties & Software Licenses Management - 1:47
    • IT Asset Tagging - 3:23
    • GPS tracking - 2:00
    • Service catalogue in IT assets - 4:08
    • Configuration Management Database and Consumable Management - 4:33
  • Asset Life Cycle Management
    • What is Asset Life Cycle Management - 2:53
    • Stages Of Asset Life Cycle - 3:30
    • Planning - 2:04
    • Acquisition - 2:22
    • Deployment - 2:14
    • Operations - 2:18
    • Maintenance - 2:45
    • Disposal - 2:39
    • Benefits of Asset Lifecycle Management - 2:08
  • A Quick Review of HAM Customization
    • A Quick Review of HAM Customization - 4:31
  • HAM Security
    • Protecting Your Computer Assets - 4:18
    • Best practices in HAM - 2:46
    • IT Asset Management Security vs Cybersecurity Asset Management (Case Study) - 1:34
    • Cyber Security Asset Management Concerns - 4:01
    • IT Asset Management Vs. Cyber Security Asset Management - 5:04
  • Relationship Between Hardware Asset Management and Software Asset Management
    • Similarities - 1:56
    • Differences - 3:16

View Full Curriculum


Access
Lifetime
Content
2.0 hours
Lessons
39

Microsoft SQL Server Backup & Recovery Course

Manage & Safeguard Your Database with MS SQL Server Backup & Restore Strategy

By Oak Academy | in Online Courses

One of the most important roles of a database administrator is to constantly protect the integrity of the databases and maintain the ability to recover quickly in case of failure. In light of this, it’s critically important to have a backup-and-recovery strategy in place in order to be ready for an emergency. SQL is the standard language for Relation Database System. All relational database management systems like SQL Server, MySQL, MS Access, Oracle, Sybase, and others use SQL as the standard database language. SQL is used to communicate with a database.

In this SQL - MS SQL course, you will make an excellent introduction to SQL with MS Management Studio which allows to manage databases and retrieve data from the database with a graphical interface. You are going to start to learn from the basics and step by step we will be building our knowledge on SQL MS SQL.

4.5/5 average rating: ★ ★ ★ ★
  • Access 39 lectures & 2 hours of content 24/7
  • Configure backup & carry out restores of SQL Server databases and instances
  • Discuss the backup logs & differential backup, and implement them in your backup strategy
  • Learn to protect the integrity of the databases
  • Maintain the ability to recover quickly in case of a failure
  • Improve your knowledge on SQL, SQL server, Microsoft SQL server, & more
"Excellent course I learned a lot about database security." – Denis V.
Oak Academy | Long Live Tech Knowledge
4.5/5 average rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic Database and SQL Knowledge
  • Basic computer knowledge

Course Outline

  • Introduction to Microsoft SQL
    • 1- What is a Database? What is a Backup? - 1:33
    • 2- Project Files and Course Documents
    • 3- FAQ about MS SQL
  • Setting Up The Laboratory for MS Sql
    • 5- Download Windwos Server 2019 - 1:07
    • 6- Add Virtual Machine and Install Windows Server 2019 - 9:17
    • 8- Download and Install SQL Server Management Studio - 3:22
  • Why Should We Take Backup?
    • 10- What is Backup and Backup Types? (Full, Differential, Transaction Log Backup) - 5:23
    • Ms sql Quiz 1
  • Check in-1 for Ms SQL
    • 11- Check in-1 for Microsoft sql - 0:58
  • What Is Recovery Model?
    • 12- What Is Recovery Model And Types? ( Full, Bulk Logged, Simple ) - 8:47
  • What Should Be The Backup Strategy?
    • 13- What Should Be The Backup Strategy? - 1:09
  • Full Recovery Model and .bak File
    • 14- Let's Do The First Backup(Full Recovery Model - Full Backup With .bak File) - 6:02
    • 15- Differential Backup With .bak File - 7:40
    • 16- Transaction Log Backup With .bak File - 5:43
    • ms sql sql server Quiz 2
  • Restored Full Recovery Model -.bak File
    • 17- Restore Full Backup With .bak File - 4:54
    • 18- Restore Differential Backup With .bak File - 1:53
    • 19- Restore Transaction Log Backup With .bak File - 4:18
  • Full Recovery Model-Backup Device
    • 20- Full Backup With .bak File - 3:31
    • 21- Differential Backup With .bak File - 3:34
  • sql, sql server, microsoft sql server Check in-2
    • 23- sql Check in-2 - 1:06
  • Restored Full Recovery Model-Backup Device
    • 24- Restore Full Backup With Backup Device - 3:40
    • 25- Restore Differential Backup With Backup Device - 2:26
    • 26- Restore Transaction Log Backup With Backup Device - 2:47
  • Simple Recovery Model-.bak File
    • 27- Full Backup With .bak File - 6:30
    • 28- Differential Backup With .bak File - 4:51
    • ms sql ms sql server ms sql server Quiz 3
  • Restored Simple Recovery Model-.bak File
    • 29- Restore Full Backup With .bak File - 3:13
    • 30- Restore Differential Backup With .bak File - 1:44
  • Simple Recovery Model-Backup Device
    • 32- Differential Backup With .bak File - 4:10
  • Restored Simple Recovery Model-Backup Device
    • 34- Restore Differential Backup With Backup Device - 2:07
  • Bulk Logged Recovery Model-.bak File
    • 35- Full Backup With .bak File - 6:21
    • 36- Differential Backup With .bak File - 4:16
  • Restored Bulk Logged Recovery Model-.bak File
    • 38- Restore Differential Backup With .bak File - 1:51
  • Bulk Logged Recovery Model-Backup Device
    • 39- Full Backup With .bak File - 3:03
    • 40- Differential Backup With .bak File - 3:36
  • Restored Bulk Logged Recovery Model-Backup Device
    • 41- Restore Full Backup With Backup Device - 3:49
    • 42- Restore Differential Backup With Backup Device - 2:03
  • Sql from Scratch Check in-3
    • 45- Check in-3 - 1:09

View Full Curriculum


Access
Lifetime
Content
14.0 hours
Lessons
188

Full Ethical Hacking & Penetration Testing Course | Ethical

Become an Ethical Hacker & Master Ethical Hacking, Penetration Testing, Web Hacking, and Metasploit

By Oak Academy | in Online Courses

Penetration testing skills make you a more marketable IT tech. Understanding how to exploit servers, networks, and applications means that you will also be able to better prevent malicious exploitation. From website and network hacking, to pen testing in Python and Metasploit, Oak Academy has this course for you. At the end of this course, you will both have the knowledge and a practical skillset about using network scanning, finding vulnerabilities in systems, and learning the general competencies of ethical hackers.

4.4/5 average rating: ★ ★ ★ ★
  • Access 188 lectures & 14 hours of content 24/7
  • Figure out what the security issues are that are currently in the field
  • Learn testing methodologies & types
  • Be able to better prevent malicious exploitation
  • Get your first job in IT security, become a white hat hacker, or prepare to check the security of your own home network
"Practical examples included...and clear explanations good for beginners" – Klutse A.
Oak Academy | Long Live Tech Knowledge
4.5/5 average rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Ethical Hacking - Setting Up the Laboratory
    • 1- Virtualbox Download and Install - 5:02
    • 2- FAQ regarding Ethical Hacking
    • 3- FAQ regarding Penetration Testing on Udemy:
    • 4- Kali ISO Download - 1:43
    • 5- Kali ISO Install - 7:21
    • 6- Kali VirtualBox Image Download and Install - 2:37
    • 7- Installing Metasploitable 2 - 3:43
    • 8- Installing Metasploitable 3: VM Creation with Vagrant - 6:21
    • 9- Downloading and Installing Free Windows 7 and Windows 10 - 2:58
    • 10- Nat Network Create and Settings - 3:14
    • 11- Connection Test - 6:36
    • 12- Updates for Kali Linux 2021.3
  • Passive Information Collection
    • 13- Passive Scan - ARP Tables - 6:20
  • Information Gathering Through the Internet
    • 14- Introduction - 6:00
    • 15- Using Search Engines & Google Hacking to Gather Information - 3:36
    • 16- Search Engine Tool: SearchDiggity - 3:15
    • 17- Shodan - 2:50
    • 18- Gathering Information About the People - 2:52
    • 19- Web Archives - 1:53
    • 20- FOCA Fingerprinting Organisations with Collected Archives - 6:45
    • 21- The Harvester & Recon-NG - 3:15
  • Active Information Collection ( Nmap )
    • 22- What is Nmap? - 3:44
    • 23- Nmap First Scan - 4:47
    • 24- What is Subnet? - 4:15
    • 25- Interpretation of Nmap Results - 2:04
    • 26- Scanning Specific IPs or Specific Targets With Nmap - 1:57
    • 27- Nmap IP List Creation - 4:07
    • 28- Nmap Random Scan and Exclude Ips - 4:17
    • 29- Print the Nmap Results to the File - 6:23
    • 30- Check In -1 - 0:47
    • 31- What Is the OSI Model and How Does It Work? - 5:18
    • 32- What Is TCP-IP - 8:57
    • 33- Domain Name System Service-DNS - 4:19
    • 34- What is Port? Nmap Port Scan - 3:34
    • 35- Scanning Top 20, Top 100 Ports With Nmap - 4:43
    • 36- Scanning Specific Ports With Nmap - 6:00
    • 37- Nmap Syn Scanning - 3:20
    • 38- Nmap TCP Scan - 2:46
    • 39- Namp UDP Scan - 4:12
    • 40- Nmap ACK Scan - 1:53
    • 41- Nmap Fin-Xmas-Null Scan - 3:26
    • 42- Nmap Fast Scan - 1:12
    • 43- Nmap Open Ports Scan - 1:23
    • 44- Nmap No PORT Scan - 2:15
    • 45- Nmap PING and noPING Scan - 3:19
    • 46- Check-2 - 1:13
    • 47- Nmap Verbose Command - 2:14
    • 48- Nmap With Service and Version Detection - 3:52
    • 49- Nmap Operating System Detection - 2:30
    • 50- Nmap Timing Templates - 3:36
    • 51- Bypass of IPS & IDS Systems With Nmap - 10:57
    • 52- Nmap Script Engine (NSE) - 10:59
    • 53- Nmap Script Engine Example - 1 - 2:53
    • 54- Nmap Script Engine Example - 2 - 0:58
    • 55- Writing an NSE Script - 9:52
    • 56- The Check-3 - 0:22
  • Using Nessus
    • 57- Introduction to Nessus - 1:57
    • 58- Downloading Nessus - 1:40
    • 59- Installing Nessus - 3:41
    • 60- Creating Policy - 5:39
    • 61- Scanning - 7:06
    • 62- Reporting - 2:20
    • 63- Lab Exercise - 2 - 2:47
    • 64- An Aggressive Scan with Nessus: Start - 4:23
    • 65- An Aggressive Scan with Nessus: Results - 7:17
    • 66- An Aggressive Scan with Nessus: Results with Windows Targets - 2:45
  • Using Maltego
    • 67- Maltego - Visual Link Analysis Tool - 7:09
  • Social Engineering
    • 68- Terminologies Part 1 - 5:19
    • 69- Terminologies Part 2 - 6:08
    • 70- Creating Malware and Terminologies - 3:36
    • 71- MSFvenom Part 1 - 14:08
    • 72- MSFvenom Part 2 - 2:25
    • 73- Veil Installation - 2:36
    • 74- Veil in Action - 5:12
    • 75- TheFatRat Installation - 4:19
    • 76- TheFatRat in Action - 11:07
    • 77- TheFatRat: Overcoming a Problem - 0:46
    • 78- Embedding Malware in PDF - 4:04
    • 79- Embedding Malware in WORD - 9:21
    • 80- Embedding Malware in Firefox Add-on - 7:02
    • 81- Empire Installation - 4:07
    • 82- Empire in Action Part 1 - 8:12
    • 83- Empire in Action Part 2 - 4:23
    • 84- Exploiting Java Vulnerabilities - 2:24
    • 85- Social Engineering Toolkit - 6:33
    • 86- Sending Fake Emails - Phishing - 1:11
    • 87- Vishing - Voice Phishing - 3:40
  • Network Attacks
    • 88- What is “Protocol” - 5:36
    • 89- Reference Models - 0:24
    • 90- OSI Reference Model - 13:43
    • 91- OSI vs TCP/IP - 2:32
    • 92- Demonstration using Wireshark - 7:59
    • 93- Standards & Protocols - 3:50
    • 94- Ethernet: Principles, Frame & Headers - 4:06
    • 95- ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets - 6:10
    • 96- ARP Hand-On Practices - 3:14
    • 97- VLANs – Virtual Local Area Networks - 4:03
    • 98- WLANs – Wireless Local Area Networks - 7:01
    • 100- Internet Protocol - IP - 2:49
    • 101- IPv4 Adressing System - 1:56
    • 102- IPv4 Packet Header - 2:56
    • 103- IPv4 Subnetting: Classful Networks - 2:35
    • 104- IPv4 Subnetting: Subnet Mask - 2:59
    • 105- IPv4 Subnetting: Understanding - 3:09
    • 106- IPv4 Shortage - 1:41
    • 107- Private Networks - 3:59
    • 108- Private Networks - Demonstration - 3:01
    • 109- NAT – Network Address Translation - 4:30
    • 110- IPv6, Packet Header & Addressing - 8:30
    • 111- DHCP - How the Mechanism Works - 9:23
    • 114- Introduction to Transport Layer - 2:39
    • 115- TCP – Transmission Control Protocol - 6:59
    • 119- DNS – Domain Name System - 5:56
    • 121- HTTPS - 1:56
    • 122- Checklist - What We Have Learned - 1:26
    • 124- Setting Up the Laboratory - 1:29
    • 126- Download & Install - 3:30
    • 128- GNS3 Environment - 2:56
    • 130- Attach Kali (or another VM) to the GNS3 Network - 6:31
    • 131- Configuring Switch & Router (Cisco) and creating VLANs - 5:14
    • 132- MitM: Listening to the traffic - 1:45
    • 133- Sniffing - 1:03
    • 134- TCPDump - 5:23
    • 135- Wireshark: Capturing the Traffic - 8:34
    • 136- Wireshark: Following Stream - 2:40
    • 137- Wireshark: Summarise Network - 6:19
    • 140- MAC Flood: Switching - 3:55
    • 141- MAC Flood: Using Macof Tool - 7:09
    • 142- MacFlood - Countermeasures - 1:13
    • 143- ARP Spoof - 3:40
    • 144- ARP Cache Poisoning using Ettercap - 10:35
    • 147- DHCP Starvation - Scenario - 3:59
    • 148- DHCP Starvation Demonstration with Yersinia - 8:33
    • 149- VLAN Hopping - 2:04
    • 150- VLAN Hopping: Switch Spoofing - 1:39
    • 151- VLAN Hopping: Double Tagging - 3:17
    • 152- Reconnaissance: Finding Open Ports & Services Using NMAP - 5:15
    • 153- Password Cracking - 2:06
    • 158- Weaknesses of network devices - 3:15
    • 159- Password Creation Methods of Cisco Routers - 7:49
    • 160- Identity Management - 0:52
  • Wi-Fİ Hacking And Tools
    • 163- Hardware and Software Requiments - 7:02
    • 166- Basic Terminologies and Concepts - 4:50
    • 167- Wireless Operating Modes - 6:11
    • 168- MAC Frame Structure - 2:58
    • 169- Wireless Packet Types - 5:21
    • 170- Wireshark: Analysing Packet Types - 6:32
    • 172- Wireless Encryption Protocols: WEP vs. WPA - 3:58
    • 173- WPA 4-Way Handshake - 5:45
    • 182- Wifi Pumpkin 3 - 7:30
    • 185- Fluxion: Captive Portal Attack - 5:28
    • 187- WEP Cracking - Fake Authentication Attack - 3:50
    • 191- WEP Cracking - Fragmentation Attack - 5:09
    • 194- WPA/WPA2 Cracking - Aircrack-ng - 3:56
    • 200- WPS Cracking - Wifite 2: PIN Attack - 3:50
  • Using Metasploit Framework
    • 201- What is a Penetration Test? - 3:19
    • 203- Importance of Penetration Testing - 3:15
    • 206- Penetration Testing Execution Standard - 5:39
    • 211- The Architecture of MSF - 1:43
    • 217- Metasploit Editions - 4:02
    • 226- Using Databases in MSF 2 - 3:14
    • 234- HTTP Enumeration - 6:02
    • 240- Vulnerability Scanning with Nessus Home - 6:56
    • 244- PHP CGI Argument Injection (phpcgiarg_injection) - 3:08
    • 245- MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption - 3:55
    • 250- WinRM Script Exec Remote Code Execution (winrmscriptexec) - 4:00
    • 256- Privilege Escalation - 8:23
    • 259- Pass The Hash with Metasploit - 5:46
    • 261- Extracting Cleartext Passwords - 9:47
    • 272- MSFvenom - 7:06
    • 274- MSFVenom: Using Custom Executable Template - 5:31
    • 276- Cleaning Events and Security Management Logs - 3:35
    • 277- Deceiving File System Using Timestomp - 6:06
  • Using Meterpreter
    • 279- Meterpreter Basics on Linux - 8:36
    • 281- Basic Meterpreter Commands 1 - 6:10
    • 283- Basic Meterpreter Commands 3 - 4:46
    • 288- Meterpreter Python / Powershell Extension - 8:06
    • 289- Meterpreter Backdoor and Persistency Modules - 9:34
  • Web Attacks
    • 293- Types of Security Testing - 9:43
    • 295- Laws and Ethic - 2:52
    • 298- Modern Web Applications - 3:05
    • 309- Core Technologies: Session State and Cookies - 3:34
    • 329- Attacking Insecure CAPTCHA Implementations - 8:39
    • 341- Definition - 3:02
    • 355- Command Injection Introduction - 5:35
    • 357- XML/XPATH Injection - 14:07
    • 362- Druppal SQL Injection: Drupageddon (CVE-2014-3704) - 7:49
    • 364- SQLite Manager: PHP Remote Code Injection - 2:55

View Full Curriculum


Access
Lifetime
Content
15.0 hours
Lessons
292

CompTIA Security+ (SY0-601) Complete Course & CompTIA Lab

CompTIA Security+ Topics & Sample Questions Required for the CompTIA Security SY601 Exam

By Oak Academy | in Online Courses

Prepare for the CompTIA Security+ certification with real-world cybersecurity. You’ll get step-by-step video tutorials along with hands-on exercises and practice tests that mirror real-world problems you’ll encounter in a typical IT security job. Everything you need to pass the CompTIA Security+(SY0-601) is here. This course walks you through all the things you need to pass the CompTIA Security + (SY601) exam, step by step. As you follow the course, you will hear the same terms in different lessons. This is because many terms in the field of Security can be used in relation to each other in different subjects.

During the course, sample questions were given at the end of each section. These questions are generally similar to questions that were previously found in the CompTIA Security + exam.

4.4/5 average rating: ★ ★ ★ ★
  • Access 292 lectures & 15 hours of content 24/7
  • Assess the cybersecurity posture of an enterprise environment
  • Recommend & implement appropriate cybersecurity solutions
  • Monitor & secure hybrid environments
  • Operate with an awareness of applicable laws & policies
  • Identify, analyze & respond to cybersecurity events and incidents
  • Utilize appropriate data sources to support an investigation
  • Use mitigation techniques or controls to secure an environment
  • Compare various types of controls
"A well organized course from Oak Academy that is a must have for anyone who plans to get into the Cybersecurity field by completing this examination. This is also a practical course with labs that is suitable for beginners to understand those advanced and complex topics more easily!" – Colin D.
Oak Academy | Long Live Tech Knowledge
4.5/5 average rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with PCs and networks

Course Outline

  • CompTIA Security+ (SY0-601) Complete Course & Exam Lab Introduction
    • 1- CompTIA Security+ (SY0-601) Complete Course & Exam Lab Introduction - 11:34
    • 2- FAQ CompTIA Security Plus (SY0-601) Course | Comptia Security+
  • Basic Security Concepts
    • 3- What is Security? - 2:22
    • 4- Privacy-Integrity-Availability - 3:15
    • 5- Encryption and Access Control - 2:54
    • 6- 3 A Rule (Authentication, Authorization and Accounting) - 3:52
    • 7- Threat - 3:45
    • 8- What is a Hacker? - 6:27
    • 9- What is Attack? What are the Stages? - 3:19
    • 10- Single Point Of Failure (SPOF) - 3:13
    • 11- Introducing Basic Risk Concepts - 3:22
    • Quiz
    • Quiz
    • Quiz
  • Identity Management
    • 12- What is Identity Management? - 2:14
    • 13- KERBEROS & NTLM&LDAP - 7:31
    • 14- Single Sign-On - 11:02
    • 15- Smart Cards - 2:58
    • 16- Tokens or Key Fobs - 5:20
    • 17- Biometric Methods - 7:36
    • 18- Dual-Factor and Multifactor Authentication - 1:38
    • 19- PAP / CHAP / MS-CHAP - 2:46
    • 20- RADIUS - 6:26
    • Quiz
    • Quiz
    • Quiz
  • Summary-1
    • 21- Summary-1 - 3:26
  • Users
    • 22- Create a User In Comptia - 3:03
    • 23- Managing Accounts-1 - 11:44
    • 24- Managing Accounts-2 - 9:20
    • 25- Passwords - 9:18
    • 26- Password Policy - 9:02
    • Quiz
    • Quiz
    • Quiz
  • Comparing Access Control Models
    • 27- Comparing Access Control Models - 2:19
    • 28- Role-Based Access Control - 3:15
    • 29- Establishing Access with Group-Based Privileges - 4:42
    • 30- Rule Based and Discretionary Access Control - 5:39
    • 31- Mandatory Access Control - 2:46
    • 32- Establishing Access Attribute-Based Access Control - 6:07
    • Quiz
    • Quiz
    • Quiz
  • Virtualization
    • 33- What is Virtualization? - 3:46
    • 34- Virtualization Technologies - 2:55
    • 35- Benefits of Virtualization - 5:00
    • 36- Security Issues of Virtualization - 3:50
    • 37- Create Lab Download and Install VirtualBox - 5:02
    • 38- Install Virtual Kali Linux-1 - 1:43
    • 39- Install Virtual Kali Linux-2 - 6:46
    • 40- Install Virtual Kali Linux-3 - 5:24
    • 41- OWASP Broken Web Applications - 4:30
    • 42- Configuring NAT Network in Oracle VM VirtualBox - 1:07
    • Quiz
    • Quiz
    • Quiz
  • Network Technologies
    • 43- Basic Network Concepts - 15:38
    • 44- Domain Name Services(DNS) - 9:47
    • 45- What is the port? How does it work? - 5:10
    • 46- What is the Network Address - 7:05
    • 47- Combining the IP Address and the Port - 4:37
    • 48- Switches - 5:03
    • 49- Bridge - 3:07
    • 50- Routers - 9:29
    • 51- Understanding NAT and PAT - 2:37
    • 52- Network Separation - 3:16
    • 53- Proxy Servers - 7:13
    • 54- Types of Using Network Technologies-1 - 9:14
    • 55- Types of Using Network Technologies-2 - 8:26
    • Quiz
    • Quiz
    • Quiz
  • Wireless Networks
    • 56- Reviewing Basic Wireless Network Information - 6:29
    • 57- Wireless Cryptographic Protocols - 7:38
    • 58- Authentication Protocols for Wireless Networks - 6:24
    • Quiz
    • Quiz
    • Quiz
  • Summary-2
    • 59- Summary-2 - 3:02
  • Network Security Technologies
    • 60- Firewalls - 9:28
    • 61- Network Access Control - 9:27
    • 62- Implementing a Secure Network - 5:15
    • Quiz
    • Quiz
    • Quiz
  • Intrusion Detection Systems
    • 63- Understanding IDSs and IPSs - 4:46
    • 64- Detection Methods - 11:49
    • 65- Honeypots - 4:42
    • Quiz
    • Quiz
    • Quiz
  • Virtual Private Network(VPN) Technologies
    • 66- Using VPNs for Remote Access - 3:54
    • 67- VPN Tunnel Protocols - 6:18
    • 68- Site-to-Site VPNs - 2:36
    • Quiz
    • Quiz
    • Quiz
  • Security Threats
    • 69- Understanding Threat Actors - 12:36
    • 70- Viruses - 2:10
    • 71- Logic Bombs - 3:21
    • 72- Trojans
    • 73- Ransomware - 3:24
    • 74- Spyware - 3:03
    • 75- Bots and Botnets - 4:17
    • 76- Unified Threat Management(UTM) - 5:55
    • Quiz
    • Quiz
    • Quiz
  • Securing Wireless Networks
    • 77- Disable SSID Broadcasting or Not - 1:26
    • 78- Enable MAC Filtering - 1:53
    • Quiz
    • Quiz
    • Quiz
  • Understanding Wireless Attacks
    • 79- Disassociation Attacks - 1:58
    • 80- WPS and WPS Attacks - 1:50
    • 81- Rogue AP - 2:14
    • 82- Evil Twin - 2:08
    • 83- Jamming Attacks - 3:47
    • 84- Bluetooth Attacks - 2:51
    • 85- RFID Attacks - 2:40
    • 86- Wireless Replay Attacks - 1:49
    • 87- Rogue Access Points-Airbase-ng - 5:46
    • 88- Rogue Access Points-Evil-Twin-Attack - 6:42
    • 89- Cracking-WEP-Preparing-Attacks - 2:49
    • 90- Cracking-WEP-Fake-Authentication-Attack - 3:50
    • 91- Cracking-WEP-ChopChop-Attack - 3:47
    • 92- Cracking-WPA-Aircrack-ng - 3:56
    • 93- Cracking-WPA-John-the-Ripper - 4:09
    • Quiz
    • Quiz
    • Quiz
  • Summary-3
    • 94- Summary-3 - 2:44
  • Network Attacks
    • 95- Network Attacks - 3:39
    • 96- SYN Flood Attack - 2:55
    • 97- MAC Flood Attacks - 2:53
    • 98- MAC Flood Using Macof - 7:09
    • 99- Man-in-the-Middle Attacks - 1:33
    • 100- ARP Poisoning Attacks - 3:49
    • 101- DNS Attacks - 6:17
    • Quiz
    • Quiz
  • Password Attacks
    • 102- Brute Force&Dictionary Attacks - 3:32
    • 104- Cain & Abel_ A Dictionary Attack - 3:36
    • 105- Password Hashes - 4:53
    • 106- Cain and Abel_ Gathering Hashes - 4:43
    • 107- Birthday Attacks - 4:50
    • 108- Replay Attacks - 3:25
    • 109- Hijacking and Related Attacks - 5:59
    • 110- Driver Manipulation - 2:07
    • Quiz
    • Quiz
    • Quiz
  • Zero-Day Attacks
    • 111- Zero-Day Attacks - 4:19
    • Quiz
    • Quiz
    • Quiz
  • Code Attacks
    • 112- Code Reuse and SDKs - 4:31
    • 113- Code Quality and Testing - 2:51
    • 114- Development Life-Cycle Models - 3:42
    • 115- Secure DevOps - 3:19
    • 116- Version Control and Change Management - 2:17
    • 117- Provisioning and Deprovisioning - 1:48
    • Quiz
    • Quiz
    • Quiz
  • Web Server Attacks
    • 118- Web Servers - 2:07
    • 119- SQL Injection Attacks - 4:32
    • 120- Protecting Against SQL Injection Attacks - 2:38
    • 121- SQL Injection - Part I - 4:20
    • 122- SQL Injection - Part II - 4:41
    • 123- SQL Injection - Part III - 5:20
    • 124- DLL Injection - 2:24
    • 125- Cross-Site Scripting - 6:40
    • 126- Classification of Web Attacks - 1:36
    • 127- Zed Attack Proxy (ZAP)_ A Web App Vulnerability Scanner - 3:06
    • 128- XSS (Cross Site Scripting) - Stored and DOM Based XSS - 7:01
    • 129- Cross Site Request Forgery (CSRF) - 5:12
    • 130- Path Traversal_ File - 5:41
    • Quiz
    • Quiz
    • Quiz
  • Social Engineering Attacks
    • 131- Social Engineering - 4:09
    • 132- Shoulder Surfing - 1:06
    • 133- Tricking Users with Hoaxes - 1:18
    • 134- Tailgating and Mantraps - 1:12
    • 135- Dumpster Diving - 1:26
    • 136- Watering Hole Attacks - 1:06
    • 137- Spam - 2:04
    • 138- Phishing - 6:24
    • 139- Whaling - 2:45
    • 140- Vishing - 3:08
    • 143- Social Engineering Toolkit (SET) for Phishing - 6:33
    • Quiz
    • Quiz
    • Quiz
  • Summary-4
    • 144- Summary-4 - 3:32
  • Memory Buffer Vulnerabilities
    • 145- Memory Leak - 2:41
    • 146- Buffer Overflow Attacks - 4:16
    • 147- Pointer Dereference - 2:07
    • 148- Compiled Versus Runtime Code - 1:20
    • 149- Proper Input Validation - 4:07
    • 150- Side Input Validation - 3:20
    • 151- Avoiding Race Conditions - 2:13
    • 152- Proper Error Handling - 2:14
    • 153- Cryptographic Techniques - 1:43
    • Quiz
    • Quiz
    • Quiz
  • Preventing Attacks
    • 154- Protecting Systems from Malware - 2:05
    • 155- Antivirus and Anti-Malware Software - 8:22
    • 156- Advanced Malware Tools - 3:31
    • 157- Educating Users - 1:53
    • 158- Implementing Defense in Depth - 3:35
    • Quiz
    • Quiz
    • Quiz
  • Server Security
    • 159- Implementing Secure Systems - 4:11
    • 160- Operating systems - 4:12
    • 161- Secure Operating System Configurations - 6:33
    • 162- Resiliency and Automation Strategies - 4:56
    • 163- Change Management Policy - 7:09
    • 164- Secure Staging and Deployment - 5:26
    • 165- Peripherals - 4:10
    • 166- EMI and EMP - 7:46
    • 167- Hardware Security Module - 2:26
    • 168- Cloud Deployment Models - 5:29
    • 169- Cloud Services - 6:20
    • 170- Security Responsibilities with Cloud Models - 1:52
    • Quiz
    • Quiz
    • Quiz
  • Mobile Devices
    • 171- Deploying Mobile Devices Securely - 2:14
    • 172- Deployment Models - 8:35
    • 173- Mobile Device Management - 9:26
    • 174- Unauthorized Software - 5:03
    • 175- Hardware Control - 2:42
    • 176- Unauthorized Connections - 2:32
    • Quiz
    • Quiz
    • Quiz
  • Exploring Embedded Systems
    • 177- Exploring Embedded Systems - 7:06
    • 178- Understanding Stuxnet - 2:13
    • 179- Real-Time Operating Systems - 3:16
    • Quiz
  • Summary-5
    • 180- Summary-5 - 4:13
  • Data Security
    • 181- Protecting Data - 11:24
    • 182- Data Loss Prevention - 5:31
    • Quiz
    • Quiz
    • Quiz
  • Database Security
    • 184- Normalization - 5:26
    • 186- Database Security - 0:57
    • Quiz
    • Quiz
    • Quiz
  • Risk Management
    • 187- Understanding Risk Management - 2:39
    • 188- Risk Management - 2:45
    • 189- Threats and Threat Assessments - 4:22
    • 190- Vulnerabilities - 2:03
    • 191- Risk Assessment - 13:06
    • 192- Risk Registers - 5:51
    • Quiz
    • Quiz
  • Checking for Vulnerabilities
    • 194- Password Crackers - 1:59
    • 196- Hydra_ Cracking the Password of a Web App - 10:01
    • 197- Password Cracking with Cain & Aibel - 1:01
    • 198- Network Scan Types - 2:50
    • 204- Nmap with Version Detection - 5:58
    • 205- Nmap with Operating System Detection - 7:10
    • 206- Active Scan with Hping - 8:30
    • 210- Introduction to Vulnerability Scan - 9:19
    • 211- Introduction to Nessus - 1:57
    • 212- Nessus_ First Scan - 7:07
    • Quiz
    • Quiz
    • Quiz
  • Penetration Tests
    • 213- Penetration Tests - 2:45
    • 214- Passive & Active Reconnaissance - 2:02
    • 215- Initial Exploitation - 3:45
    • Quiz
  • Physical Security Precautions
    • 219- Comparing Physical Security Controls - 3:28
    • 223- Using Hardware Locks - 2:56
    • 224- Asset Management - 2:33
    • Quiz
  • Summary-6
    • 226- Summary-6 - 1:59
  • Single Point of Failure
    • 227- Single Point of Failure - 1:46
  • Business Continuity Plans
    • 231- Comparing Business Continuity Elements - 6:09
    • 235- Disaster Recovery - 8:11
  • Examination of Logs
    • 237- Other Logs-SIEM - 7:12
  • Cryptography and PKI
    • 245- HMAC - 2:49
    • 249- Providing Confidentiality with Encryption - 8:16

View Full Curriculum


Access
Lifetime
Content
2.0 hours
Lessons
48

CompTIA ITF+ Fundamentals Exam Essentials

Perform Tasks Commonly Performed by Advanced End-Users & Entry-Level IT Professionals Alike

By Oak Academy | in Online Courses

CompTIA IT Fundamentals (ITF+) is an introduction to basic IT knowledge and skills that helps professionals decide if a career in IT is right for them. It also helps organizations prepare non-technical teams for digital transformation. And in this course, you will focus on the essential IT skills and knowledge needed to perform tasks commonly performed by advanced end-users and entry-level IT professionals alike. Pass the exam and be one of the in-demand professionals in the field.

4.5/5 average rating: ★ ★ ★ ★
  • Access 48 lectures & 2 hours of content 24/7
  • Be familiar with computer hardware & software, databases, networking security, and software development
  • Gain basic IT knowledge & skills
  • Perform tasks commonly performed by advanced end-users & entry-level IT professionals alike
  • Pass the CompTIA IT Fundamentals exam
"Wonderful. It is a recommendation." – Ziyaaddin Y.
Oak Academy | Long Live Tech Knowledge
4.5/5 average rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction to IT Fundamentals and Comptia IT Fundamentals Exam Essensials
    • 1- History of Computer - 1:40
    • 2- FAQ about IT Fundamentals, Comptia IT Fundamentals, comptia itf, itf certificate
    • 3- What is a Computer - 1:25
    • 4- Benefits of Using Computer - 0:37
    • 5- Types of Computer - 1:07
  • Components of Computer
    • 6- Input Processing - Output Cycle - 6:27
    • 7- Computer Inputs - 0:57
    • 8- What is Processing - 1:18
    • 9- Cyper Attacks to CPU - 1:04
    • 10- What is Storing - 0:53
    • 11- Output - 1:25
    • 12- Computer Components - 2:54
    • 13- Input Devices - 2:28
  • Storage Devices
    • 14- Primary and Secondary Memory - 4:22
    • 15- Primary and Secondary Memory - 1:18
    • 16- SRAM and DRAM - 1:28
    • 17- ROM - 1:12
    • 18- PROM, EPROM, EEPROM - 1:04
    • 19- Storage Devices - 2:19
    • 20- Network attached storage - 1:40
    • 21- Cloud_Storage - 1:16
  • Processing Devices
    • 22- PU - 3:00
    • 23- GPU - 2:46
    • 24- Motherboard - 1:14
    • 25- Output Devices - 0:38
  • IoT & Mobile
    • 26- What is IoT - 3:24
    • 27- Where does IoT Exist in Our Lives - 1:47
    • 28- How does IoT work - 0:47
    • 29- Connection Standarts - 9:06
    • 30- IoT Security - 7:04
    • 31- Mobile Security Threats - 8:02
  • Network Components
    • 32- Network Interface Card - 2:06
    • 33- What is Hub - 1:22
    • 34- What is Switch - 1:46
    • 35- How does switch work - 2:21
    • 36- What is Router - 1:33
    • 38- Modem Types - 2:59
    • 39- Wireless Access Point (WAP) - 1:06
  • Operating Systems
    • 41- Functions Of Operating Systems - 10:25
    • 42- Kinds of Operating System - 1:47
    • 44- Windows and MacOS - 3:28
    • 45- Virtualbox Virtualization Software - 3:13
  • Libraries and Virtualization
    • 49- Functions of Virtualization - 1:06
    • 50- Security of the Virtualization - 3:01
    • 53- What is a Library 2 - 4:21
  • Programming Languages
    • 55- Types of Programming - 9:19
  • Cloud Computing
    • 56- Characteristics of Cloud Computing - 9:19
    • 59- Cloud Service Modules 2 - 6:26

View Full Curriculum


Access
Lifetime
Content
16.0 hours
Lessons
312

CompTIA Security Plus (SY0-601) Course | CompTIA Security+

All the Things You Need to Know Anything About CompTIA Security

By Oak Academy | in Online Courses

Every internet-connected person is affected by issues pertaining to cybersecurity. As a result, cybersecurity professionals are increasingly in-demand. This course walks you through all the things you need to pass the CompTIA Security + (SY601) exam, step by step. You can pass the CompTIA Security + exam by studying the topics covered throughout the course. During the course, sample questions were given at the end of each section in CompTIA. These questions are generally similar to questions that were previously found in the CompTIA Security + exam.

4.4/5 average rating: ★ ★ ★ ★
  • Access 312 lectures & 16 hours of content 24/7
  • Pass the CompTIA Security+ certification exam with confidence
  • Understand computer security, its functions, & its components
  • Perform basic security configurations
  • Become an effective security technician in a business environment
"I’m now more exposed and educated on cybercrime. I learnt a lot of things I didn’t know existed. Thanks." – Adebisi D.
Oak Academy | Long Live Tech Knowledge
4.5/5 average rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Intro to CompTIA Security Plus (SY0-601) Course | Comptia Security+
    • 1- Introduction to comptia security + - 11:34
    • 2- New LectureFAQ about CompTIA Security Plus (SY0-601) Course | Comptia Security+
  • Basic Security Concepts
    • 3- What is Security? - 2:22
    • 4- Privacy-Integrity-Availability - 3:15
    • 5- Encryption and Access Control - 2:54
    • 6- 3 A Rule (Authentication, Authorization and Accounting) - 3:52
    • 7- Threat - 3:45
    • 8- What is a Hacker? - 6:27
    • 9- What is Attack? What are the Stages? - 3:19
    • 10- Single Point Of Failure (SPOF) - 3:13
    • 11- Introducing Basic Risk Concepts - 3:22
    • Quiz in CompTIA Security+(SYo-601)
    • Quiz
    • Quiz
  • Identity Management
    • 12- What is Identity Management? - 2:14
    • 13- KERBEROS & NTLM&LDAP - 7:31
    • 14- Single Sign-On (SSO) - 11:02
    • 15- Smart Cards - 2:58
    • 16- Tokens or Key Fobs - 5:20
    • 17- Biometric Methods - 7:36
    • 18- Dual-Factor and Multifactor Authentication - 1:38
    • 19- PAP / CHAP / MS-CHAP - 2:46
    • 20- RADIUS - 6:26
    • Quiz
    • Quiz
    • Quiz
  • Summary-1 in CompTIA Security +
    • 21- Summary-1 in comptia security plus - 3:26
  • Users in CompTIA
    • 22- Create a User in comptia - 3:03
    • 23- Managing Accounts - 1 - 11:44
    • 24- Managing Accounts - 2 - 9:20
    • 25- Passwords - 9:18
    • 26- Password Policy - 9:02
    • Quiz
    • Quiz
    • Quiz
  • Comparing Access Control Models
    • 27- Comparing Access Control Models - 2:19
    • 28- Role-Based Access Control - 3:15
    • 29- Establishing Access with Group-Based Privileges - 4:42
    • 30- Rule Based and Discretionary Access Control - 5:39
    • 31- Mandatory Access Control - 2:46
    • 32- Establishing Access - 6:07
    • Quiz
    • Quiz
  • Virtualization
    • 33- What is Virtualization? - 3:46
    • 34- Virtualization Technologies - 2:55
    • 35- Benefits of Virtualization - 5:00
    • 36- Security Issues of Virtualization - 3:50
    • Quiz
    • Quiz
    • Quiz
  • Network Technologies
    • 37- Basic Network Concepts - 15:38
    • 38- Domain Name Services(DNS) - 9:47
    • 39- What is the port? How does it work? - 5:10
    • 40- What is the Network Address - 7:05
    • 41- Combining the IP Address and the Port - 4:37
    • 42- Switches - 5:03
    • 43- Bridge - 3:07
    • 44- Routers - 9:29
    • 45- Understanding NAT and PAT - 2:37
    • 46- Network Separation - 3:16
    • 47- Proxy Servers - 7:13
    • 48- Types of Using Network Technologies - 1 - 9:12
    • 49- Types of Using Network Technologies - 2 - 8:26
    • Quiz
    • Quiz
    • Quiz
  • Wireless Networks
    • 50- Reviewing Basic Wireless Network Information - 6:29
    • 51- Wireless Cryptographic Protocols - 7:38
    • 52- Authentication Protocols for Wireless Networks - 6:24
    • Quiz
    • Quiz
    • Quiz
  • Summary-2
    • 53- Summary-2 - 3:02
  • Network Security Technologies
    • 54- Firewalls - 9:28
    • 55- Network Access Control - 9:27
    • 56- Implementing a Secure Network - 5:15
    • Quiz
    • Quiz
    • Quiz
  • Intrusion Detection Systems
    • 57- Understanding IDSs and IPSs - 4:46
    • 58- Detection Methods - 11:49
    • 59- Honeypots - 4:42
    • Quiz
    • Quiz
    • Quiz
  • Virtual Private Network(VPN) Technologies
    • 60- Using VPNs for Remote Access - 3:54
    • 61- VPN Tunnel Protocols - 6:18
    • 62- Site-to-Site VPNs - 2:36
    • Quiz
    • Quiz
    • Quiz
  • Security Threats
    • 63- Understanding Threat Actors - 12:36
    • 64- Viruses - 2:10
    • 65- Logic Bombs - 3:21
    • 66- Trojans - 5:30
    • 67- Ransomware - 3:24
    • 68- Spyware - 3:03
    • 69- Bots and Botnets - 4:17
    • 70- Unified Threat Management(UTM) - 5:55
    • Quiz
    • Quiz
    • Quiz
  • Securing Wireless Networks
    • 71- Disable SSID Broadcasting or Not - 1:26
    • 72- Enable MAC Filtering - 1:53
    • Quiz
    • Quiz
    • Quiz
  • Understanding Wireless Attacks
    • 73- Disassociation Attacks - 1:58
    • 74- WPS and WPS Attacks - 1:50
    • 75- Rogue AP - 2:14
    • 76- Evil Twin - 2:08
    • 77- Jamming Attacks - 3:47
    • 78- Bluetooth Attacks - 2:51
    • 79- RFID Attacks - 2:40
    • 80- Wireless Replay Attacks - 1:49
    • Quiz
    • Quiz
    • Quiz
  • Summary-3
    • 81- Summary-3 - 2:44
  • Network Attacks
    • 82- Network Attacks - 3:39
    • 83- SYN Flood Attack - 2:55
    • 84- MAC Flood Attacks - 2:53
    • 85- Man-in-the-Middle Attacks - 1:33
    • 86- ARP Poisoning Attacks - 3:49
    • 87- DNS Attacks - 6:17
    • Quiz
    • Quiz
    • Quiz
  • Password Attacks
    • 88- Brute Force Attacks - 3:32
    • 89- Password Hashes - 4:53
    • 90- Birthday Attacks - 4:50
    • 91- Replay Attacks - 3:25
    • 92- Hijacking and Related Attacks - 5:59
    • 93- Driver Manipulation - 2:07
    • Quiz
    • Quiz
    • Quiz
  • Zero-Day Attacks
    • Quiz
    • Quiz
    • Quiz
  • Code Attacks
    • 95- Code Reuse and SDKs - 4:31
    • 96- Code Quality and Testing - 2:51
    • 97- Development Life-Cycle Models - 3:42
    • 98- Secure DevOps - 3:19
    • 99- Version Control and Change Management - 2:17
    • 100- Provisioning and Deprovisioning - 1:48
    • Quiz
    • Quiz
    • Quiz
  • Web Server Attacks
    • 101- Web Servers - 2:07
    • 102- SQL Injection Attacks - 4:32
    • 103- Protecting Against SQL Injection Attacks - 2:38
    • 104- DLL Injection - 2:24
    • 105- Cross-Site Scripting - 6:40
    • Quiz
    • Quiz
    • Quiz
  • Social Engineering Attacks
    • 106- Social Engineering - 4:09
    • 107- Shoulder Surfing - 1:06
    • 108- Tricking Users with Hoaxes - 1:18
    • 109- Tailgating and Mantraps - 1:12
    • 110- Dumpster Diving - 1:26
    • 111- Watering Hole Attacks - 1:06
    • 112- Spam - 2:04
    • 113- Phishing - 6:24
    • 114- Whaling - 2:45
    • 115- Vishing - 3:08
    • 116- Beware of Email from Friends - 2:00
    • 117- Why Social Engineering Works - 9:31
    • Quiz
    • Quiz
    • Quiz
  • Summary-4
    • 118- Summary-4 - 3:32
  • Memory Buffer Vulnerabilities
    • 119- Memory Leak - 2:41
    • 120- Buffer Overflow Attacks - 4:16
    • 121- Pointer Dereference - 2:07
    • 122- Compiled Versus Runtime Code - 1:20
    • 123- Proper Input Validation - 4:07
    • 124- Side Input Validation - 3:20
    • 125- Avoiding Race Conditions - 2:13
    • 126- Proper Error Handling - 2:14
    • 127- Cryptographic Techniques - 1:43
    • Quiz
    • Quiz
    • Quiz
  • Preventing Attacks
    • 128- Protecting Systems from Malware - 2:05
    • 129- Antivirus and Anti-Malware Software - 8:22
    • 130- Advanced Malware Tools - 3:31
    • 131- Educating Users - 1:53
    • 132- Implementing Defense in Depth - 3:35
    • Quiz
    • Quiz
    • Quiz
  • Server Security
    • 133- Implementing Secure Systems - 4:11
    • 134- Operating systems - 4:12
    • 136- Resiliency and Automation Strategies - 4:56
    • 137- Change Management Policy - 7:09
    • 138- Secure Staging and Deployment - 5:26
    • 139- Peripherals - 4:10
    • 140- EMI and EMP - 7:46
    • 141- Hardware Security Module - 2:26
    • 142- Cloud Deployment Models - 5:29
    • 143- Cloud Services - 6:20
    • Quiz
    • Quiz
    • Quiz
  • Mobile Devices
    • 145- Deploying Mobile Devices Securely - 2:14
    • 146- Deployment Models - 8:35
    • 148- Unauthorized Software - 5:03
    • 149- Hardware Control - 2:42
    • 150- Unauthorized Connections - 2:32
    • Quiz
    • Quiz
    • New Lecture
  • Exploring Embedded Systems
    • 151- Exploring Embedded Systems - 7:06
    • 152- Understanding Stuxnet - 2:13
    • 153- Real-Time Operating Systems - 3:16
  • Summary-5
    • 154- Summary-5 - 4:13
  • Data Security
    • 155- Protecting Data - 11:24
    • 156- Data Loss Prevention - 5:31
    • Quiz
    • Quiz
  • Database Security
    • 157- Database Concepts - 2:47
    • 160- Database Security - 0:57
    • Quiz
    • Quiz
  • Risk Management
    • 161- Understanding Risk Management - 2:39
    • 162- Risk Management - 2:45
    • 163- Threats and Threat Assessments - 4:22
    • 164- Vulnerabilities - 2:03
    • 165- Risk Assessment - 13:06
    • 166- Risk Registers - 5:51
    • Quiz
    • Quiz
    • Quiz
  • Checking for Vulnerabilities
    • 167- Checking for Vulnerabilities - 1:52
    • 168- Password Crackers - 1:59
    • 169- Network Scanners - 5:23
    • 170- Wireless Scanners / Cracker - 3:17
    • 171- Banner Grabbing - 0:47
    • 172- Vulnerability Scanning - 11:23
    • Quiz
    • Quiz
  • Penetration Tests
    • 173- Penetration Tests - 2:45
    • 174- Passive & Active Reconnaissance - 2:02
    • 176- White, Gray and Black Box Testing - 3:00
    • 177- Intrusive and Non-Intrusive Testing - 1:22
    • 178- Passive Versus Active Tools - 11:41
    • Quiz
    • Quiz
  • Physical Security Precautions
    • 179- Comparing Physical Security Controls - 3:28
    • 181- Preventing Tailgating with Mantraps - 2:00
    • 182- Increasing Physical Security with Guards - 8:20
    • 183- Using Hardware Locks - 2:56
    • 184- Asset Management - 2:33
    • 185- Implementing Environmental Controls - 14:02
    • Quiz
    • Quiz
  • Summary-6
    • 186- Summary-6 - 1:59
  • Single Point of Failure
    • 187- Single Point of Failure - 1:46
    • 188- Disk Redundancies - 4:24
    • 190- Backup - 15:18
    • Quiz
    • Quiz
  • Business Continuity Plans
    • 191- Comparing Business Continuity Elements - 6:09
    • 192- Impact - 3:54
    • 193- Recovery Time Objective - 4:55
    • 194- Recovery Sites - 5:53
    • 195- Disaster Recovery - 8:11
    • Quiz
    • Quiz
    • Quiz
  • Examination of Logs
    • 196- Monitoring Logs for Event Anomalies - 8:43
    • 197- OtherLogs-SIEM - 7:12
    • 198- Continuous Monitoring - 6:08
    • Quiz
    • Quiz
    • Quiz
  • Controls
    • 200- Control Goals - 10:53
    • 199- Understanding Control Types - 7:12
    • Quiz
    • Quiz
  • Cryptography and PKI
    • 201- Introducing Cryptography Concepts - 3:08
    • 203- MD5 - 0:54
    • 204- SHA - 2:55
    • 205- HMAC - 2:49
    • 206- Hashing Files - 2:56
    • 207- Digital Signatures, Certificates and Non-repudiation - 2:52
    • 208- Hashing Messages - 4:35
    • 209- Providing Confidentiality with Encryption - 8:16
    • 210- Block Versus Stream Ciphers - 4:09
    • 211- Symmetric Encryption - 1:55
    • 214- Certificates - 3:58
    • 216- Using Cryptographic Protocols - 1:49
    • 219- Recovery Agent - 1:08
    • 220- Comparing Certificate Types - 4:37
    • 221- Certificate Formats - 3:10
    • Quiz
    • Quiz
    • Quiz
  • Protecting Email
    • 222- Protecting Email - 1:51
    • Quiz
    • Quiz
    • Quiz
  • Secure Web Page
    • Quiz
    • Quiz
  • Risk Mitigation Methods
    • 225- Exploring Security Policies - 1:14
    • 226- Personnel Management Policies - 10:41
    • 228- NDA - 4:40
    • 229- Policy Violations and Adverse Actions - 1:37
    • Quiz
  • Summary-7
    • 235- Summary-7 - 1:41

View Full Curriculum


Access
Lifetime
Content
20.0 hours
Lessons
299

Ethical Hacking & Penetration Testing Bootcamp with Linux

A Theoretical & Practical Approach on Ethical Hacking and Penetration Testing Plus Linux Basics

By Oak Academy | in Online Courses

Whether you want to get your first job in IT security, become a white hat hacker, or prepare to check the security of your own home network, this ethical hacking course offers practical and accessible ethical hacking lectures to help keep your networks safe from cybercriminals.

is focused on the practical side of penetration testing and ethical hacking but I also will share with you the theory side of each attack and Linux basics. Before jumping into Penetration Testing or other practices with Ethical Hacking tools you will first learn how to set up a lab and install needed software on your machine. In this course, you will have a chance to keep yourself up to date and equip yourself with a range of Ethical Hacking skills.

4.7/5 average rating: ★ ★ ★ ★
  • Access 299 lectures & 20 hours of content 24/7
  • Learn Kali Linux fundamentals
  • Learn how to use basic commands
  • Learn how Linux File hierarchy
  • Set the network of Linux
  • Install packages from package managers & source code
  • Manage services, processes, & monitoring
"This is an amazing course. The presentation is superbly crystal clear with the exact right level of detail. It covers everything you'll need, with spot-on walkthroughs." – Gary W.
Oak Academy | Long Live Tech Knowledge
4.5/5 average rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Ethical Hacking and Penetration Testing Bootcamp with Linux Documents
    • 1- FAQ about Ethical Hacking
    • 2- FAQ about Penetration Test
    • 3- FAQ about Linux
  • Intoduction to Linux
    • 4- What is Linux - 1:34
    • 5- Distributions - 1:22
    • 6- Pieces of Linux - 2:57
    • 7- Shell - 2:04
    • 8- Linux Signs - 0:59
    • 9- Linux Desktop Enviroments - 1:53
    • 10- Linux File Hierarchy - 2:57
  • About Kali Linux
    • 11- Kali Linux History - 1:54
    • 12- Kali Linux GUI - 3:19
  • Installing Kali Linux
    • 13- Virtual Platforms - 1:29
    • 14- Enabling Virtualization (VT-x or AMD-V) in BIOS
    • 15- Labs Architecture Diagram - 1:23
    • 16- Using VirtualBox vs VMware
    • 17- VirtualBox Install & Run - 4:53
    • 18- Installing Kali From VMware File for VMware - Step 1 - 3:30
    • 19- Installing Kali From VMware File for VMware - Step 2 - 4:47
    • 20- Installing Kali From VMware File for VMware - Step 3 - 4:30
    • 21- Installing Kali From ISO File for VMware - Step 1 - 1:26
    • 22- Installing Kali From ISO File for VMware - Step2 - 6:48
    • 23- Installing Kali From ISO File for VMware - Step 3 - 2:41
    • 24- Installing Kali From ISO File for Virtualbox - Step1 - 1:34
    • 25- Installing Kali From ISO File for VirtualBox - Step2 - 6:49
    • 26- Installing Kali From OVA File for VirtualBox - Step 1 - 3:05
    • 27- Installing Kali From OVA File for VirtualBox - Step 2 - 6:44
    • 28- Installing Kali From OVA File for VirtualBox - Step 3 - 4:11
    • 29- OWAS Installation - 5:24
    • 30- Free Windows Operating Systems on VMware - 5:45
    • 31- Free Windows Operating Systems on Oracle VM VirtualBox - 2:46
    • 32- Windows Systems as Victim - 0:59
    • 33- Metasploitable2 Installation - 3:12
    • 34- Configuring NAT Network in Oracle VM VirtualBox - 1:07
  • Basic Linux Commands - 1
    • 35- Command Parameters - 2:19
    • 36- List Files - "ls" Command - 4:34
    • 37- Print Working Directory - "pwd" Command - 0:55
    • 38- Change Directory - "cd" Command - 2:11
    • 39- Change Directory - "cd" Command - 2:18
    • 40- Concatenate Files - "cat" Command - 2:16
    • 41- Display Output - "echo" Command - 1:34
    • 42- View the File with "more" Command - 2:22
    • 43- View the File with "less" Command - 1:23
    • 44- Print First Lines with "head" Command - 1:15
    • 45- Print Last Lines with "tail" Command - 1:39
    • 46- Global Regular Expression Print - "grep" Command - 3:35
    • 47- Unix Name - "uname" Command - 0:47
    • 48- Output Redirection - 2:37
    • 49- Output Redirection : Pipe “|” - 2:17
  • Basic Linux Commands - 2
    • 50- Make Directory - "mkdir" Command - 1:22
    • 51- Create File & Modify Date - "touch" Command - 1:20
    • 52- Remove Files or Directories - "rm" Command - 2:07
    • 53- Copy and Move Files or Directories - "cp" & "mv" Command - 1:58
    • 54- Find Files and Directories - "find" Command - 2:24
    • 55- Cut Parts of Lines - "cut" Command - 2:51
    • 56- Change Ownership of a Given File - "chown" Command - 1:32
  • Configuring Kali Linux
    • 57- Configuring Services - 3:42
    • 58- User Management in Linux - 2:38
  • Package management
    • 59- Package Management Concepts - 3:25
    • 60- Foremost Linux Package Managers - 2:32
    • 61- Repository (a.k.a. Repo) - 0:49
    • 62- “apt-get” Package Manager - 6:08
    • 63- Debian packages "dpkg" - 2:26
    • 64- Install from Source Code - 4:35
  • Monitoring
    • 65- System Monitoring - 6:59
    • 66- Status of Network - 1:49
    • 67- Firewall or Packet Filtering Creating Rules - 5:52
  • Introduction to Penetration Testing (Pentest +)
    • 68- Content of the Penetration Testing - 2:34
    • 69- Definition of "Penetration Test" - 2:13
    • 70- Penetration Test Types - 0:28
    • 71- Security Audits - 4:41
    • 72- Vulnerability Scan - 2:45
    • 73- Terms: Asset, Threat, Vulnerability, Risk, Exploit - 3:08
    • 74- Penetration Test Approaches - 2:44
    • 75- Planning a Penetration Test - 4:24
    • 76- Penetration Test Phases - 7:00
    • 77- Legal Issues & Testing Standards - 4:18
    • Quiz - Introduction to Penetration Test
  • Network Fundamentals
    • 78- Attention for Ethical Hackers
    • 79- Content of the Section - 1:07
    • 80- Basic Terms of Networking - 5:36
    • 81- Reference Models - 0:24
    • 82- TCPIP (Networking) Basics - 13:43
    • 83- OSI Reference Model vs. TCPIP Reference Model - 2:32
    • 84- Network Layers in Real World - 7:59
    • 85- Layer 2- Data Link Layer - 3:50
    • 86- Layer 2: Ethernet - Principles, Frames & Headers - 4:06
    • 87- Layer 2: ARP - Address Resolution Protocol - 6:10
    • 88- Layer 2: Analysing ARP Packets - 3:14
    • 89- Layer 2: VLANs (Virtual Local Area Networks) - 4:03
    • 90- Layer 2: WLANs (Wireless Local Area Networks) - 7:01
    • 91- Layer 3 - Network Layer - 1:36
    • 92- Layer 3: IP (Internet Protocol) - 2:49
    • 93- Layer 3: IPv4 Addressing System - 1:56
    • 94- Layer 3: IPv4 Packet Header - 2:56
    • 95- Layer 3: Subnetting - Classful Networks - 2:35
    • 96- Layer 3: Subnetting Masks - 2:59
    • 97- Layer 3: Understanding IPv4 Subnets - 3:09
    • 98- Layer 3: IPv4 Address Shortage - 1:41
    • 99- Layer 3: Private Networks - 3:59
    • 100- Layer 3: Private Networks - Demonstration - 3:01
    • 101- Layer 3: NAT (Network Address Translation) - 4:30
    • 102- Layer 3: IPv6, Packet Header & Addressing - 8:30
    • 103- Layer 3: DHCP - How the Mechanism Works - 9:23
    • 104- Layer 3: ICMP (Internet Control Message Protocol) - 2:02
    • 105- Layer 3: Traceroute - 9:50
    • 107- Layer 4: TCP (Transmission Control Protocol) - 6:59
    • 108- Layer 4: TCP Header - 2:27
    • 109- Layer 4: UDP (User Datagram Protocol) - 3:56
    • 110- Layer 5-7 - Application Layer - 0:55
    • 111- Layer 7: DNS (Domain Name System) - 5:56
    • 112- Layer 7: HTTP (Hyper Text Transfer Protocol) - 3:09
    • 113- Layer 7: HTTPS - 1:56
    • 114- Summary of Network Fundamentals - 1:23
    • Quiz - Network Fundamentals
  • Network Scan in Ethical Hacking
    • 115- Content of the Section - 0:35
    • 116- Network Scan Types - 2:50
    • 117- Passive Scan with Wireshark - 6:35
    • 118- Passive Scan with ARP Tables - 6:20
    • 119- Active Scan with Hping - 4:26
    • 120- Hping for Another Purpose DDoS - 4:03
  • NMAP: The Network Mapper
    • 121- Introduction to Nmap - 4:14
    • 122- Ping Scan - 4:59
    • 123- TCP/IP (Networking) Basics - 9:26
    • 124- TCP/IP Model on an Example - 5:19
    • 125- TCP & UDP Protocols Basics - 7:11
    • 126- Introduction to Port Scan - 1:12
    • 127- SYN Scan - 6:07
    • 128- Details of the Port Scan - 8:15
    • 129- TCP Scan - 7:11
    • 130- UDP Scan - 4:11
    • 131- Version Detection in Nmap - 7:10
    • 132- Operating System Detection - 5:58
    • 133- Input Output Management in Nmap - 8:28
    • 134- Nmap Scripting Engine Introduction - 3:40
    • 135- Nmap Scripting Engine: First Run - 7:43
    • 136- Nmap Scripting Engine First Example - 2:21
    • 137- Nmap Scripting Engine: Second Example - 2:48
    • 138- Nmap Aggressive Scan
    • 139- How to Bypass Security Measures in Nmap Scans - 6:07
    • 140- Timing of the Scans - 5:45
    • 141- Some Other Types of Scans: XMAS, ACK, etc. - 2:55
    • 142- Idle (Zombie) Scan - 7:44
    • Quiz - Network Scan and Nmap
  • Vulnerability Scan and Introduction to Nessus
    • 143- Introduction to Vulnerability Scan - 9:19
    • 144- Introduction to Nessus - 1:57
    • 145- Nessus® Home vs Nessus® Essentials
    • 146- Nessus: Download - 1:40
    • 147- Nessus: Install & Setup - 3:42
    • 148- Nessus: Creating a Custom Policy - 5:39
    • 149- Nessus: First Scan - 7:07
    • 150- An Aggressive Scan - 4:23
    • 151- Results of an Aggressive Scan - 7:17
    • 152- Results of an Aggressive Scan with Windows Systems - 2:45
    • 153- Nessus: Report Function - 2:21
  • Exploitation (Gaining Session)
    • 154- Content of the Exploitation - 0:43
    • 155- Exploitation Terminologies - 6:13
    • 156- Exploit Databases - 1:56
    • 157- Manual Exploitation - 5:39
    • 158- Exploitation Frameworks - 3:36
    • 159- Metasploit Framework (MSF): Introduction - 1:22
    • 160- Architecture of Metasploit Framework - 5:01
    • 161- Introduction to MSF Console - 2:13
    • 162- MSF Console: Initialisation - 2:16
    • 163- MSF Console: Search Function & Ranking of the Exploits - 3:37
    • 164- MSF Console: Configure & Run an Exploit - 7:46
    • 166- Running the First Exploit in Meterpreter - 2:12
    • 167- Meterpreter Basics on Linux - 8:36
    • 168- Meterpreter Basics on Windows - 5:51
    • 169- Pass the Hash: Hack Even There is No Vulnerability - 4:00
    • 170- Pass the Hash: Preparation - 3:49
    • 171- Pass the Hash: Gathering Some Hashes - 2:15
    • 172- Pass the Hash: Try Other Assets - 10:25
  • x
    • 173- Introduction to Post-Exploitation - 3:28
    • 174- Persistence: What is it? - 1:28
    • 175- Persistence Module of Meterpreter - 8:55
    • 176- Removing a Persistence Backdoor - 5:00
    • 177- Persist on a Windows 8 Using Meterpreter's Persistence Module - 2:56
    • 178- Another Way of Persistence: Persistence Exe - I - 4:40
    • 179- Another Way of Persistence: Persistence Exe - II - 4:32
    • 180- Meterpreter for Post-Exploitation - 1:37
    • 181- Meterpreter for Post-Exploitation: Core Extension - 1:45
    • 182- Meterpreter for Post-Exploitation: Core Extension - Session Commands - 2:31
    • 183- Meterpreter for Post-Exploitation: Core Extension - Channel Command - 2:43
    • 184- Meterpreter for Post-Exploitation: Core Extension - Migrate Commands - 3:34
    • 186- Meterpreter for Post-Exploitation: Stdapi Extension - File System Commands - 5:19
    • 187- Meterpreter for Post-Exploitation: Stdapi Extension - System Commands - 4:13
    • 188- Meterpreter for Post-Exploitation: Stdapi Extension - User Interface Commands - 4:08
    • 189- Meterpreter for Post-Exploitation: Incognito Extension - 3:26
    • 190- Meterpreter for Post-Exploitation: Mimikatz Extension - 3:53
    • 192- Post Modules: Gathering Modules - 1:21
    • Quiz - Exploitation and Post Exploitation
  • Password Cracking in Ethical Hacking
    • 194- Introduction to Password Cracking - 3:06
    • 195- Password Hashes of Windows Systems - 3:30
    • 196- Password Hashes of Linux Systems - 2:33
    • 197- Classification of Password Cracking - 2:11
    • 198- Password Cracking Tools - 0:08
    • 199- Hydra: Cracking the Password of a Web App - 10:01
    • 200- Password Cracking with Cain & Abel - 1:01
    • 201- Cain & Abel - Step 1: Install & First Run - 2:39
    • 202- Cain & Abel: Gathering Hashes - 4:40
    • 203- Cain & Abel: Importing Hashes - 4:31
    • 204- Cain & Abel: A Dictionary Attack - 4:19
    • 205- Cain & Abel: A Brute Force Attack - 3:32
    • 206- John the Ripper - 7:28
    • New Lecture
  • Information Gathering Over the Internet
    • 207- Content of the Section - 5:51
    • 208- Search Engine Tool: SearchDiggity - 3:59
    • 209- Using Search Engines to Gather Information - 3:36
    • 210- Shodan - 2:50
    • 211- Gathering Information About the People - 2:52
    • 212- Web Archives - 1:53
    • 213- FOCA - Fingerprinting Organisations with Collected Archives - 6:45
    • 214- Fingerprinting Tools The Harvester and Recon-NG - 3:22
    • 215- Maltego - Visual Link Analysis Tool - 4:38
  • Web Application Penetration Testing
    • 216- Content of the Penetration Testing - 1:12
    • 217- Basic Terminologies - I - 5:35
    • 218- Basic Terminologies - II - 7:03
    • 219- Intercepting HTTP Traffic with Burp Suite - 3:46
    • 220- Intercepting HTTPS Traffic with Burp Suite - 2:50
    • 221- Classification of Web Attacks - 1:36
    • 222- Zed Attack Proxy (ZAP): A Web App Vulnerability Scanner - 3:06
    • 223- ZAP: Installation & Quick Scan - 6:25
    • 224- ZAP: As a Personal Proxy - 4:40
    • 225- ZAP: Intercepting the HTTPS Traffic - 2:17
    • 226- ZAP: An Advanced Scan - Scanning a Website that Requires to Login - 14:46
    • 227- Information Gathering and Configuration Flaws - I - 5:09
    • 228- Information Gathering and Configuration Flaws - II - 4:26
    • 229- Input & Output Manipulation - 7:42
    • 230- XSS (Cross Site Scripting) - Reflected XSS - 4:05
    • 231- XSS (Cross Site Scripting) - Stored and DOM Based XSS - 7:01
    • 232- BeEF - The Browser Exploitation Framework - 5:39
    • 233- SQL Injection - Part I - 4:20
    • 234- SQL Injection - Part II - 4:41
    • 235- SQL Injection - Part III - 5:20
    • 236- Authentication - 5:36
    • 237- Authentication Attacks - 5:13
    • 238- Hydra: Cracking the Password of a Web App - 10:01
    • 239- Authorization Flaws - 5:18
    • 240- Path Traversal Attack Demo - 3:40
    • 241- Session Management - 3:03
    • 242- Session Fixation & Demo - 4:22
    • 243- Cross Site Request Forgery (CSRF) - 5:12
  • Social Engineering & Phishing Attacks
    • 244- Content of the Section ( Social Engineering & Phishing Attacks ) - 0:51
    • 248- Social Engineering Terms - 5:19
    • 246- Social Engineering Terminologies - II - 6:08
    • 247- Creating Malware - Terminologies - 3:36
    • 248- MSF Venom - Part I - 14:08
    • 249- MSF Venom - Part II - 2:25
    • 250- Veil to Create Malware - 2:36
    • 251- Veil in Action - 5:12
    • 252- TheFatRat to Create Malware - 4:19
    • 253- TheFatRat in Action - 11:07
    • 254- TheFatRat - Overcoming a Problem - 0:46
    • 255- Embedding Malware in PDF Files - 4:04
    • 256- Embedding Malware in Word Documents - 9:21
    • 257- Embedding Malware in Firefox Add-ons - 7:02
    • 258- Empire Project - Installation - 4:07
    • 259- Empire in Action - Part I - 8:12
    • 260- Empire in Action - Part II - 4:23
    • 262- Social Engineering Toolkit (SET) for Phishing - 6:33
    • 263- Sending Fake Emails for Phishing - 1:11
  • Network Layer & Layer 2 Attacks
    • 265- Content of the Section (Network Layer & Layer 2 Attacks) - 1:15
    • 266- GNS3 - Graphical Network Simulator - 3:30
    • 267- GNS3: Setting Up the First Project - 7:57
    • 268- GNS3: Tool Components - 2:56
    • 269- GNS3: Building the Network - 15:45
    • 270- GNS3: Attaching VMware VMs (Including Kali) to the Network - 6:31
    • 271- GNS3: Configuring Switch & Router (Cisco) and creating VLANs - 5:13
    • 272- Introduction to Network Security - 1:45
    • 273- Sniffing - 1:03
    • 274- Sniffing Network with TCPDump - 5:23
    • 275- TCPDump in Action - 8:59
    • 276- Wireshark to Sniff the Network Traffic - 8:34
    • 277- Wireshark: Following Stream - 2:40
    • 278- Wireshark: Summarise Network - 6:19
    • 279- Active Network Devices: Router, Switch, Hub - 4:44
    • 280- How to Expand Sniffing Space? - 5:13
    • 282- MAC Flood Using Macof - 7:09
    • 283- MAC Flood Countermeasures - 1:13
    • 284- ARP Spoof - 3:40
    • 285- ARP Cache Poisoning using Ettercap - 10:35
    • 286- DHCP Starvation & DHCP Spoofing - 3:36
    • 287- DHCP Mechanism - 6:15
    • 288- DHCP Starvation - Scenario - 3:59
    • 290- VLAN Hopping - 2:04
    • 291- VLAN Hopping: Switch Spoofing - 1:39
    • 292- VLAN Hopping: Double Tagging - 3:17
  • Penetration Testing & Auditing Active Network Devices
    • 293- Reconnaissance: Finding Open Ports & Services Using NMAP - 5:05
    • 295- Online SSH Password Cracking With Hydra - 7:58
    • 297- Compromising SNMP: Finding Community Names Using NMAP Scripts - 3:06
    • 298- Compromising SNMP: Write Access Check Using SNMP-Check Tool - 2:18
    • 299- Compromising SNMP: Grabbing SNMP Configuration Using Metasploit - 5:53
    • 300- Weaknesses of the Network Devices - 3:15
    • 303- ACLs (Access Control Lists) in Cisco Switches & Routers - 5:12
    • 304- SNMP Protocol Security - 4:07
  • Other Attacks in ethical hacking, certified ethical hacking, Ethical Intelligenc
    • 305- Bypassing Cross Origin Resource Sharing - 9:04
    • 306- XML External Entity Attack - 8:02
    • 307- Attacking Unrestricted File Upload Mechanisms - 7:05

View Full Curriculum


Access
Lifetime
Content
8.0 hours
Lessons
128

CompTIA A+, CompTIA A 220-1001 Exam, & A+ Certification Prep

Master the Basics of Working with Hardware, Networks, & Computer Systems

By Oak Academy | in Online Courses

Enroll in this CompTIA A+ certification course to prepare for your exam. This certification is the internationally-recognized industry standard — and it’s the first step to getting a great job in IT support. Find out from real-world experts how to troubleshoot everything from networks to mobile devices to the basics (and more) of operating systems. CompTIA A+ certified professionals are proven, problem solvers. They support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world.

4.5/5 average rating: ★ ★ ★ ★

  • Access 128 lectures & 8 hours of content 24/7
  • Test your knowledge of PC hardware, mobile device hardware, operating systems, security, cloud computing, & troubleshooting hardware
  • Learn about computers & its components
  • Learn about storage & processing devices
  • Validate your knowledge of wired & wireless networks
"Excellent course from start to finish." – Denis V.
Oak Academy | Long Live Tech Knowledge
4.5/5 average rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • About computer
    • 1- History Of Computer - 1:40
    • 2- FAQ about CompTIA, CompTIA A+, CompTIA A 220-1001 Exam and A+ Certification
    • 3- What is a Computer - 1:25
    • 4- Benefits of Using Computer - 0:37
    • 5- Types of Computer - 1:07
  • Components of Computer
    • 6- Input Processing - Output Cycle - 6:27
    • 7- Computer Inputs - 0:57
    • 8- What is Processing - 1:18
    • 9- Cyper Attacks to CPU - 1:04
    • 10- What is Storing - 0:53
    • 11- Output - 1:25
    • 12- Computer Components - 2:54
    • 13- Input Devices - 2:28
  • Storage Devices
    • 14- Primary and Secondary Memory - 4:22
    • 15- RAM - 1:18
    • 16- SRAM and DRAM - 1:28
    • 17- ROM - 1:12
    • 18- PROM, EPROM, EEPROM - 1:04
    • 19- What is Flash Memory, Magnetic Storage Devices, Optical Storage Devices - 2:19
    • 20- Network attached storage - 1:40
    • 21- Cloud Storage - 1:16
  • Processing Devices
    • 22- CPU - 3:00
    • 23- GPU - 2:46
    • 24- Motherboard - 1:14
    • 25- Output Devices - 0:38
  • IoT & Mobile
    • 26- What is IoT - 3:24
    • 27- Where does IoT Exist in Our Lives - 1:47
    • 28- How does IoT work - 0:47
    • 29- Connection Standarts - 9:06
    • 30- IoT Security - 7:04
    • 31- Mobile Security Threats - 8:02
  • Network Fundamentals
    • 32- Attention for Ethical Hackers
    • 33- Content of the Network Fundamentals - 1:07
    • 34- Basic Terms of Networking - 5:36
    • 35- Reference Models - 0:24
    • 36- TCP/IP (Networking) Basics - 13:43
    • 37- OSI Reference Model vs. TCP/IP Reference Model - 2:32
    • 38- Network Layers in Real World - 7:59
    • 39- Layer 2 - Data Link Layer - 3:50
    • 40- Layer 2: Ethernet - Principles, Frames & Headers - 4:06
    • 41- Layer 2: ARP - Address Resolution Protocol - 6:10
    • 42- Layer 2: Analysing ARP Packets - 3:14
    • 43- Layer 2: VLANs (Virtual Local Area Networks) - 4:03
    • 44- Layer 2: WLANs (Wireless Local Area Networks) - 7:01
    • 45- Layer 3 - Network Layer - 1:36
    • 46- Layer 3: IP (Internet Protocol) - 2:49
    • 47- Layer 3: IPv4 Addressing System - 1:56
    • 48- Layer 3: IPv4 Packet Header - 2:56
    • 49- Layer 3: Subnetting - Classful Networks - 2:35
    • 50- Layer 3: Subnetting Masks - 2:59
    • 51- Layer 3: Understanding IPv4 Subnets - 3:09
    • 52- Layer 3: IPv4 Address Shortage - 1:41
    • 53- Layer 3: Private Networks - 3:59
    • 54- Layer 3: Private Networks - Demonstration - 3:01
    • 55- Layer 3: NAT (Network Address Translation) - 4:30
    • 56- Layer 3: IPv6, Packet Header & Addressing - 8:30
    • 57- Layer 3: DHCP - How the Mechanism Works - 9:23
    • 58- Layer 3: ICMP (Internet Control Message Protocol) - 2:02
    • 59- Layer 3: Traceroute - 9:50
    • 60- Layer 4 - Transport Layer - 2:39
    • 61- Layer 4: TCP (Transmission Control Protocol) - 6:59
    • 62- Layer 4: TCP Header - 2:27
    • 63- Layer 4: UDP (User Datagram Protocol) - 3:56
    • 64- Layer 5-7 - Application Layer - 0:55
    • 65- Layer 7: DNS (Domain Name System) - 5:56
    • 66- Layer 7: HTTP (Hyper Text Transfer Protocol) - 3:09
    • 67- Layer 7: HTTPS - 1:56
    • 68- GNS3 - Graphical Network Simulator - 3:30
    • 69- GNS3: Setting Up the First Project - 7:57
    • 70- GNS3: Tool Components - 2:56
    • 71- GNS3: Building the Network - 15:45
    • 72- GNS3: Attaching VMware VMs (Including Kali) to the Network - 6:31
    • 73- GNS3: Configuring Switch & Router (Cisco) and creating VLANs - 5:13
    • 74- Active Network Devices: Router, Switch, Hub - 4:44
    • 75- Wireless Access Point (WAP) - 1:06
    • 76- Summary of Network Fundamentals - 1:23
  • Wi-fi Network Fundamentals
    • 77- IEE-802.11 - 3:54
    • 78- Basic Terminologies Concepts - 4:50
    • 79- Wireless Operating Modes - 6:11
    • 80- MAC Frame Structure - 2:58
    • 81- Wireless Packet Types - 5:21
    • 82- Wireless Encryption Protocols: WEP vs. WPA - 3:58
    • 83- WPA 4-Way Handshake - 5:45
    • 84- WPA2 Personal and Enterprise - 3:16
    • 85- Wireshark: WEP and WPA - 1:10
    • 86- Wi-Fi Protected Setup (WPS) - 3:49
  • Operating Systems
    • 87- Functions Of Operating Systems - 10:25
    • 88- Kinds of Operating System - 1:47
    • 89- Linux Systems - 5:12
  • Linux Fundamentals
    • 90- What is Linux? - 1:34
    • 91- Distributions - 1:22
    • 92- Pieces of Linux - 2:57
    • 93- Shell - 2:04
    • 94- Linux Signs: $, #, %, ~ - 0:59
    • 96- Linux File Hierarchy - 2:57
    • 97- Configuring Services - 3:42
    • 98- User Management - 2:38
    • 99- Package Management Concepts - 3:25
    • 100- Foremost Linux Package Managers - 2:32
    • 101- Repository (a.k.a. Repo) - 0:49
    • 102- “apt-get” Package Manager - 6:08
    • 103- Debian packages "dpkg" - 2:26
    • 104- Install From Source Code - 4:35
    • 105- System Monitoring - 6:59
    • 106- Status of Network - 1:49
  • Libraries and Virtualization
    • 107- What is a Library - 1 - 4:48
    • 108- What is Virtualization - 1:06
    • 109- Types of Virtualization - 1:36
    • 110- Functions of Virtualization - 1:06
    • 111- Security of the Virtualization - 3:01
    • 112- Virtualization Lab Exercise - 1 - 8:20
    • 113- Virtualization Lab Exercise - 2 - 12:35
    • 114- What is a Library - 2 - 4:21
  • Programming Languages
    • 116- Types of Programming - 9:19
  • Database Fundamentals
    • 118- RDBMS(Relational Database Management System) - 2:24
    • 119- What is SQL/Query? - 2:47
    • 120- Insert Data To Table - 10:06
    • 121- Update Data In A Table - 5:42
    • 122- Delete Data and AdventureWorks - 6:17
  • Cloud Computing
    • 123- Characteristics of Cloud Computing - 9:19
    • 124- What is Cloud Computing - 3:38
    • 125- Cloud Service Modules - 1 - 7:31
    • 126- Cloud Service Modules - 2 - 6:26
  • Security
    • 127- What is Security - 2:22
    • 128- Privacy-Integrity-Availability - 3:15
    • 129- Encryption and Access Control - 2:54
    • 130- A Rule (Authentication, Authorization and Accounting) - 3:52
    • 132- What is Attack? What are the Stages? - 3:19
  • Social Engineering
    • 133- Terminologies Part 1 - 5:19
    • 134- Terminologies Part 2 - 6:08
    • 135- Sending Fake Emails - Phishing - 1:11
    • 136- Vishing - Voice Phishing - 3:40

View Full Curriculum


Access
Lifetime
Content
3.0 hours
Lessons
19

CCNA (200-301): Ethernet Switching & Wireless Networks

Be a Network Analyst or Engineer by Proving Your Knowledge & Skills on Network Fundamentals

By Oak Academy | in Online Courses

The CCNA is a tough test, but it isn’t impossible. With expert instruction from top-rated instructors, you can ace every section of the CCNA. Whether you need help understanding LAN switching and routing, or advice on mastering the fundamentals of networking, “CCNA (200-301) - Ethernet Switching and Wireless Networks” has a beginner-friendly course to help you.

5.0/5 average rating: ★ ★ ★ ★ ★
  • Access 19 lectures & 3 hours of content 24/7
  • Test your knowledge & skills in networking fundamentals
  • Learn routing & switching, network access, IP connectivity, IP services, security basics, and automation & programmability
  • Learn how to build simple LANs, troubleshooting routers & switches, IP addressing & subnetting, IPv4 & IPv6 routing
  • Address allocation using Dynamic Host Configuration Protocol (DHCP)
  • Access control lists (ACLs)
"This is a good Cisco wireless networks course that is necessary for networking students and professionals who planned to achieve Cisco CCNA (200-301) qualification as a professional networking qualification." – Sasika P.
Oak Academy | Long Live Tech Knowledge
4.5/5 average rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Cisco CCNA (200-301) Ethernet Switching
    • 1- FAQs About CCNA (ccna, networking, ccna 200-301, network, cisco ccna, cisco)
    • 2- Types of Switches - 12:12
    • 3- Layer 2 Switch vs Layer 3 Switch - 8:41
    • 4- What is CDP - 7:16
    • 5- What is LLDP - 8:19
    • 6- VLAN and Its Types - 6:09
    • 7- VLAN Configuration - 4:50
    • 8- Trunks - 15:52
    • 9- Spanning Tree Protocol – STP - 9:59
    • 10- STP Attacks Root Guard and BPDU Guard - 9:49
    • 11- EtherChannel - 8:15
  • CCNA (200-301) Wireless Networks
    • 12- What is Wireless LAN - 7:50
    • 13- Wi-Fi Channels - 5:03
    • 14- Wi-Fi Standards - 14:53
    • 15- Wireless Transmission Part 1 - 16:07
    • 16- Wireless Transmission Part 2 - 10:10
    • 17- Wireless Security Protocols - 24:33
    • 18- WLC Configuration - 12:32
  • Extra
    • 19- CCNA (200-301) | Ethernet Switching and Wireless Networks

View Full Curriculum


Access
Lifetime
Content
3.0 hours
Lessons
28

ISO 31000:2018 — Enterprise Risk Management (ERM)

Everything You Need to Learn About ERM & How to Implement Them in Your Organization

By Magine Solutions | in Online Courses

In this course, you will learn everything about ISO 31000:2018 — Enterprise Risk Management (ERM) in today's emerging world. This course is ideal for beginners and professionals who are interested in exploring the Risk Management world. The ideal student for this course is anyone who wants to learn about Enterprise Risk Management (ERM) or an existing professional who wishes to expand on their current skills. This course will also help out the personnel in the corporate sector who are intending to monitor and implement a risk management system and are looking for a cost-effective and efficient return on investment, ultimately wanting to increase profit.

4.6/5 average rating: ★ ★ ★ ★
  • Access 28 lectures & 3 hours of content 24/7
  • Get an introduction to risk management
  • Understand what exactly is meant by the term "risk"
  • Compare "risk" & "issue"
  • Learn the 8 principles of risk management from ISO 310000:2018
  • Build a risk ledger
  • Analyze risk
  • Understand probability & impact matrix
"This has helped me so much! I learned so much about risk management. I am not a full beginner at risk management but I found this really understanding and fun. So I will recommend this to anyone who is new or has some experience." – Gos C.
Magine Solutions Team | This is Our World!
4.6/5 average rating: ★ ★ ★ ★

At Magine Solutions, the whole team believes that high-quality education should be available to everyone. That’s why the team is committed to working hard every day to promote online education in a new way. The team wants you and your friends and classmates to also get the best possible experience from this revolutionary approach by joining us today!

With knowledgeable and experienced teachers with years of experience in the field, your learning will be at an advanced level. Whether you’re looking to learn more about the latest trends in marketing or how to use new software, Magine's courses offer hands-on instruction and practical advice for today’s most pressing industry issues.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction
    • Course Introduction - 1:04
    • Introduction to Risk Management - 7:36
    • Clarity of Risk - 2:54
    • Definition of Risk Management - 11:58
    • Risk Appetite and Risk Tolerance - 3:19
    • Risk vs. Issue - 5:14
  • Principles and Benefits of Risk Management
    • 8 Principles of Risk Management - 14:26
    • Benefits and Application of Risk Management - 5:48
  • Step By Step Guide To Risk Management
    • Overview: Step by Step Guide to Risk Management - 1:31
    • Risk Management Planning - 10:26
  • Risk Identification
    • Risk identification - 3:33
    • Risk identification(Ishikawa Diagram) - 7:24
    • Risk identification(Flowchart) - 7:19
    • Risk identification(SWOT Analysis) - 6:35
  • Risk Ledger and Risk Matrix
    • Risk Ledger - 5:42
    • Analyze Risk - 4:34
    • Probability and Impact Matrix - 12:45
    • Probability Table - 10:17
  • Risk Response To Opportunities and Threats
    • Risk response to opportunities - 13:26
    • Risk response to threats - 14:04
  • Conclusion
    • Monitoring and controlling risks - 5:10
    • Risk Register - 5:11
    • Risk based thinking - 8:00
    • FMEA - 8:41
    • 27. Overview walk through - 2:21
  • Case-Studies
    • Case Study # 1 PizzaBites - 5:20
    • Case Study # 2 - 5:47
    • Case Study # 3 - 4:52

View Full Curriculum


Access
Lifetime
Content
2.0 hours
Lessons
12

CCNA (200-301): Network Services

Understand Basic Networking Concepts & Perform Basic Cybersecurity Tasks

By Oak Academy | in Online Courses

The CCNA is a tough test, but it isn’t impossible. With expert instruction from top-rated instructors, you can ace every section of the CCNA. Whether you need help understanding network services, “CCNA (200-301) - Network Services” has a beginner-friendly course to help you. The CCNA exam tests your knowledge and skills in networking fundamentals such as routing and switching, network access, IP connectivity, IP services, security basics, and automation and programmability.

5.0/5 average rating: ★ ★ ★ ★ ★
  • Access 12 lectures & 2 hours of content 24/7
  • Understand what the DHCP Theory is
  • Configure the Cisco IOS DHCP Server
  • Learn what NAT Theory is & configure the NTP
  • Learn what SNMP, Syslog, FTP, & TFTP are
"This is a great course for students who plans to complete the Cisco Network Associate examination. This course provides an in-depth understanding of the subject." – Sasika P.
Oak Academy | Long Live Tech Knowledge
4.5/5 average rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Network Services in Cisco CCNA
    • 1- What is DHCP Theory in CCNA? - 22:51
    • 2- FAQ About CCNA (200-301) - Network Services, Cisco CCNA
    • 3- How to Configure the Cisco IOS DHCP Server Part 1
    • 4- How to Configure the Cisco IOS DHCP Server Part 2 - 16:19
    • 5- What is NAT Theory in Cisco CCNA - 15:57
    • 6- How to Configure the NAT in CCNA - 26:35
    • 7- What is NTP Theory in CCNA - 10:24
    • 8- How to Configure the NTP in Cisco CCNA - 14:14
    • 9- What is QoS - 17:35
    • 10- Traffic Topologies in CCNA - 19:47
    • 11- What are SNMP and Syslog in CCNA - 15:03
    • 12- What are FTP and TFTP in Cisco CCNA - 15:07

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
×
Your Ad Blocker Is On!
Sadly, recent updates to your Ad Blocker are preventing crucial parts of our shop from loading. Frustrating. We know. We hate to nag, but please turn off your Ad Blocker or whitelist us to continue exploring our shop.