Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Complete Red Team Ethical Hacking Course - Volume 1
Welcome! Who Is This Guy?
Introduction (1:12)
The 3 Teams
Module Overview - The 3 Teams (1:27)
The Red Team (8:48)
The Blue Team (5:46)
The Purple Team (7:40)
Penetration Testing Process
Module Overview - Penetration Testing Process (3:39)
Penetration Testing Methodology (8:11)
Metrics & Why They Are Important (12:05)
Routine Assessments Part 1 - What Are Routine Assessments? (4:25)
Routine Assessments Part 2 - Yearly Assessments (5:28)
Routine Assessments Part 3 - Quarterly Assessments? (9:17)
Routine Assessments Part 4 - Monthly Assessments? (4:31)
Routine Assessments Part 5 - Constant Assessments? (8:12)
Routine Assessments Part 6 - Building an Assessment Plan (7:21)
Building & Working with an Enterprise Budget (12:15)
Specialties?! (3:58)
The CIA Triangle (3:09)
The Windows Operating System
Installing & Using VirtualBox for Lab Virtualization (10:41)
Windows at a Glance (22:20)
The Windows File System (11:42)
Windows Logs (10:50)
Windows Internals - UAC (8:38)
Windows Internals - Permissions (16:45)
Windows Internals - Alternate Data Streams (8:44)
Windows Internals - API Calls (12:35)
Windows Internals - The SID (6:11)
Windows Internals - Tokens (7:49)
Windows Internals - Named Pipes (6:01)
Windows Internals - PE Files & DLLs (16:08)
Windows Command Line - Accessing the Command Line (4:56)
Windows Command Line - Navigation (7:04)
Windows Command Line - Working with Files and Directories (7:31)
Windows Command Line - Working with Pipes (9:33)
Windows Command Line - Standard I/O/E (3:56)
Windows Command Line - Managing Windows (12:07)
The Linux Operating System
Where is the GUI?! (3:50)
The Linux File System (5:39)
Linux Command Line - Navigation (4:27)
Linux Command Line - Working with Files and Directories (8:42)
Linux Command Line - Standard I/O/E Recap (3:48)
Linux Command Line - Working with Data (13:32)
Linux Command Line - Working with File Permissions (9:39)
Linux Command Line - Man Pages (3:40)
Linux Command Line - Base64 (2:56)
Linux Command Line - Hex (6:26)
Linux Command Line - Network Connections Recap (3:58)
Linux Processes (13:00)
What are INodes? (4:30)
Working with Open Files (6:38)
Symbolic Links (5:49)
The ID's (2:58)
Linux Pipes (3:19)
Linux Run Levels (3:49)
Linux Logs (3:43)
Operating System Internals
The Kernel (11:10)
One Ring to Rule Them All (5:40)
What is a CPU? (2:40)
The CPU Registers (9:15)
The CPU Flags (2:08)
What is Memory & How does it work? (3:35)
The Stack (5:46)
The Heap (3:23)
Extra Information on Memory (4:06)
Debuggers (5:10)
Taking a look at ASLR (3:22)
A Quick Word About AntiVirus (5:14)
Active Directory
What is Active Directory? (5:39)
Basic Windows Server Configuration (7:01)
Install AD DS (9:08)
The AD Tree (9:42)
OU's and their Permissions (6:31)
Managing Users and Groups (5:00)
Adding Machine to the Domain (6:59)
Setting up Group Policies (11:32)
Cached Credentials (2:34)
Kerberos
What is Kerberos? (3:41)
Kerberos Realms (1:41)
The Authentication Server (3:32)
The Ticket Granting Server (6:48)
Data Manipulation
What is Encryption (3:24)
Symmetric Encryption (3:39)
Asymmetric Encryption (5:02)
RSA Encryption (2:07)
AES Encryption (1:42)
What is Hashing? (3:07)
MD5 Hashing (2:34)
SHA Hashing (4:28)
What is Encoding? (2:08)
Base64 Encoding (4:06)
Hex Encoding (4:24)
URL Encoding (2:53)
What is Compression? (3:04)
Lossless vs Lossy Compression (3:09)
LZ77 & LZ78 Compression Algorithms (2:03)
Data Manipulation - Hands On (1:54)
Audio Version of Training
Audio Download
Windows Internals - Permissions
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock