Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Network Security & Digital Forensic Practitioner
01 - Digital Forensics with Kali Linux
001 The Course Overview (4:14)
002 Brief Introduction to Digital Forensics (6:14)
003 Downloading and Installing Kali Linux (6:23)
004 Introduction to Forensic Imaging (11:06)
005 Overview of dcfldd and dc3dd (4:29)
006 Drive Imaging with dc3dd (8:35)
007 Android Device Imaging with dc3dd (11:53)
008 Image Acquisition with Guymager (4:59)
009 Overview of the Sleuth Kit and Filesystem Analysis (12:45)
010 Windows Registry Analysis with RegRipper (9:25)
011 Extracting and Analyzing Browser, E-mail, and IM Artifacts (12:28)
012 File Analysis Tools (14:28)
013 Building a Super-Timeline of the Events (10:26)
014 File Carving Overview (6:54)
015 File Carving Tools (8:26)
016 Extracting Data with Bulk Extractor (5:01)
017 Autopsy 4 Overview and Installation (4:58)
018 Analysis of a Windows Image with Autopsy (10:24)
019 Analysis of an Android Image with Autopsy (4:50)
020 Introduction to Memory Forensics and Acquisition (3:58)
021 Memory Acquisition (4:03)
022 Introduction to Volatility (3:10)
023 Memory Analysis with Volatility (4:23)
024 Introduction to Network Forensics (5:05)
025 Capturing Network Traffic with Wireshark (6:14)
026 Network Traffic Analysis with Wireshark (4:09)
027 Introduction to Reporting (3:34)
028 Documentation and Reporting Tools (5:12)
02 - Finding and Exploiting Hidden Vulnerabilities
001 The Course Overview (1:34)
002 Installing Nessus Vulnerability Scanner (9:51)
003 Using Nessus (9:50)
004 Exporting Nessus Output (5:39)
005 Installing OpenVas (6:06)
006 Using OpenVas (6:01)
007 Setting up Metasploit (8:35)
008 Understanding Payloads and Exploits (9:01)
009 Importing Nessus Results (5:12)
010 Scanning with Metasploit (11:31)
011 Metasploit Interfaces (6:52)
012 Using Meterpreter (7:29)
013 Creating Custom Backdoors for Different Platforms (4:10)
014 Msfvenom (10:46)
015 Encoders (6:17)
016 Exploiting MS Office and PDF Documents (12:10)
017 Social Engineering Toolkit (6:00)
018 Recap of Scope (4:26)
019 Information Gathered (2:59)
020 Vulnerabilities Identified (4:17)
021 Exploitable Vulnerabilities (4:27)
022 Documentation (8:35)
03 - Mastering Kali Linux Network Scanning
001 The Course Overview (5:01)
002 Preparing Your Network Scanning Maching (9:17)
003 Validating Network Connectivity (5:38)
004 Updating Kali Software Packages (7:04)
005 Adding a Non-Root User to Kali (4:25)
006 Creating a System Inventory Using Nmap (6:44)
007 Identifying Open Ports and Services on Systems (4:42)
008 Finding and Remediating System Vulnerabilities (4:29)
009 Monitoring Nmap Scans Using Verbose Logging (5:53)
010 Acquiring Permission to Conduct Network Scanning (5:38)
011 Finding Live Hosts on the Network (7:35)
012 Specifying Port Ranges to Make Scans More Efficient (5:05)
013 Nmap Output Formats (7:59)
014 Using Nmap Scripts for Automating Network Scanning (11:39)
015 Sparta and Eyewitness (12:44)
016 Installing and Running OpenVAS in Kali (7:19)
017 Basic Scanning with OpenVAS (6:42)
018 Advanced Scanning with OpenVAS (7:43)
019 Enumerating Websites (8:17)
020 Using Nikto to Find Web-Based Vulnerabilities (12:06)
021 Discovering Hidden Files and Folders (15:38)
022 Finding Website Vulnerabilities with Burp (18:21)
Teach online with
017 Social Engineering Toolkit
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock