This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
ISG Cyber Network Defense Course
Welcome to Cyber Network Defense Course
Welcome to the ISG Cyber Network Defense Course (4:32)
Live Session Wednesdays at 7:30PM ET
Course Syllabus
How to get Credit for Completion
How to Prepare for the Final before you Start
Lab Handouts
Lab Hand Outs
Additional exercises
Student Guides
Initial Entry Quiz
New Student Quiz
Performing Recon from the WAN
Module 1 Lab
Performing Reconnaissance from the WAN (56:51)
Performing Reconnaissance from the WAN Part 2 (50:53)
Performing Reconnaissance from the WAN Part 3 (18:05)
Performing Reconnaissance from the WAN LAB Demo 1 (45:58)
Performing Reconnaissance from the WAN LAB Demo Part 2 (24:30)
Performing Reconnaissance from the WAN LAB Demo Part 3 (27:18)
FAQs (15:14)
Scanning the Network on the LAN
Network Scanning (11:28)
Network Scanning Lab (5:56)
Network Scanning Part 3 (21:16)
Enumerating Hosts using Wireshark, Windows, and Linux Commands
Enumerating Hosts Intro (3:38)
Lab 1 (8:04)
Lab part 2 (14:25)
Lab part 3 (10:59)
FAQs (2:42)
Remote and Local Exploitation
Remote and Local Exploits Intro (4:36)
FAQs (2:58)
Labs Example (23:19)
Using the Dark Comet Remote Access Trojan
Dark Comet Trojan Intro (3:36)
Capturing and Analyzing Network Traffic Using a Sniffer
Using a sniffer (6:55)
Using Social Engineering Toolkit
Social Engineering using the SET (4:48)
Performing a Denial of Service Attack from the WAN
New Lecture Coming Soon
Using Browser Exploitation to take over a Host's Computer
New Lecture Coming Soon
Attacking Webservers from the WAN
New Lecture Coming Soon
Exploiting a Vulnerable Web Application
New Lecture Coming Soon
Performing SQL Injection to Manipulate Tables in a Database
New Lecture Coming Soon
Breaking WEP and WPA and Decrypting the Traffic
New Lecture Coming Soon
Attacking he Firewall and Stealing Data Over and Encrypted Channel
New Lecture Coming Soon
Using Public Key Encryption to Secure Messages
New Lecture Coming Soon
Overview for Vulnerability Assessment and Creating the Report
Report Example and Description (34:36)
Congratulations!!!!
How to get Credit for Completion
Live Class Recordings
Live Class Recordings (112:19)
Preparing for an interview
Intro to Info Sec (61:50)
Interview Preperation (40:30)
Module 1 Lab
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock