Course Curriculum

Before the course
(W00) Course Instructions 00:00:00
(W38M00) Before the course - introduction 00:00:00
Module 1
(W38M01) Module Introduction 00:00:00
(W38M02) Methodology of Hacking 00:00:00
(W38M03) Covering tracks and hiding 00:00:00
(W38M04) Hiding evidence by altering event logs 00:00:00
(W38M05) Attacking event logs in Windows 00:00:00
(W38M06) Altering Event Logs in Windows 00:00:00
(W38M07) Tool 1 - LCP 00:00:00
(W38M08) Tool 2 - Winzapper 00:00:00
(W38M09) Tool 3 - Event Viewer 00:00:00
(W38M10) How to clear Event Logs 00:00:00
(W38M11) Clearing Events from Command Prompt Part 1 00:00:00
(W38M12) Clearing Events from Command Prompt Part 2 00:00:00
(W38M13) Clear All Events Using PowerShell 00:00:00
(W38M14) Linux / Unix Logs 00:00:00
(W38M15) How to View Linux Logs? 00:00:00
(W38M16) Brief History About Syslogs 00:00:00
(W38M17) Attacking System Logs and Accounting Files in Linux / Unix 00:00:00
(W38M18) Netcat 00:00:00
(W38M00) Netcat 00:00:00
(W38M19) Demonstration: Clearing Logs 00:00:00
(W38M20) Demonstration: Linux Logs 00:00:00
(W38M21) Demonstration: Lab Exercise 1 00:00:00
(W38A01) Module 1 Exercises and Practical Labs 30, 00:00
Module 2
(W38M00) UBUNTU SERVER INSTALLATION (MODULE 2) 00:00:00
(W38M23) Defences against Log and Accounting File Attacks 00:00:00
(W38M00) UNIX / LINUX - SYSTEM LOGGING 00:00:00
(W38M24) Active Logging 00:00:00
(W38M25) Group Policy Objects 00:00:00
(W38M26) Active Directory 00:00:00
(W38M27) Microsoft Management Console 00:00:00
(W38M28) Setting Proper Permissions 00:00:00
(W38M29) Separate Logging Server 00:00:00
(W38M30) Encrypting Log Files 00:00:00
(W38M31) Append-only 00:00:00
(W38M32) Write-once media 00:00:00
(W38M33) UTMP, WTMP, BTMP filesv in Linux 00:00:00
(W38M34) Demonstration: UTMP, WTMP, BTMP files 00:00:00
(W38M35) Linux 00:00:00
(W38M36) Shell History 00:00:00
(W38M37) Syslog Services 00:00:00
(W38M38) Demonstration: Microsoft Management Console 00:00:00
(W38M39) Demonstration: ACL Enabling 00:00:00
(W38A02) Module 2 Exercises and Practical Labs 30, 00:00
Module 3
(W38M41) Creating hidden files and directories in UNIX 00:00:00
(W38M42) Linux Links 00:00:00
(W38M43) Creating Hidden Files in Windows 00:00:00
(W38M44) Defenses from Hidden Files 00:00:00
(W38M45) Alternate Stream View 00:00:00
(W38M46) ADS Manager 00:00:00
(W38M47) ADS Spy Tool 00:00:00
(W38M48) Create a text file using a CAT command 00:00:00
(W38M49) Hiding Files Demonstration 00:00:00
(W38M50) NTFS Streaming Demonstration 00:00:00
(W38M51) Tools Demonstration 00:00:00
(W38M52) Port Scanning Demonstration 00:00:00
(W38M53) Exercise Demonstration 00:00:00
(W38A03) Module 3 Assignments 30, 00:00
Module 4
(W38M57) Hiding Evidence on the network - covert channels 00:00:00
(W38M55) Tunneling 00:00:00
(W38M56) ICMP 00:00:00
(W38M58) Loki - covert channel using ICMP 00:00:00
(W38M59) Reverse WWW shell - covert channel using HTTP 00:00:00
(W38M60) Covert channels and malware 00:00:00
(W38M61) Defenses against covert channels 00:00:00
(W38M62) Camouflage - demonstration 00:00:00
(W38M63) Netstat 00:00:00
(W38M64) ICMP & HTTP 00:00:00
(W38M65) Practical demonstration 00:00:00
(W38A04) Module 4 Assignment 30, 00:00
Final Exam
(W38Q01) Final Exam 00:30:00
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023