Video Lectures

32x32

Chapter 1 : preface (general information)
Topic : Introduction to Ethical Hacking
Content : what is ethical hacking, what is ethical vs law 51 MB ,27:57 MIN , THEORY


32x32

Chapter 1 : preface (general information)
Topic : Introduction to Information Security, What is Information Security, Why Security is needed
Content : explanation 54 MB ,32:26 MIN , THEORY


32x32

Chapter 1 : Introduction to Information Security
Topic : Asset
Content : explanation 33 MB ,17:17 MIN , THEORY


32x32

Chapter 1 : Introduction to Information Security
Topic : Access Control
Content : Access Control, Hack-value, Target of Evaluation, Zero-day Attack 44 MB ,26:22 MIN , THEORY


32x32

Chapter 1 : Introduction to Information Security
Topic : CIA, Authentication, Authorization
Content : CIA, Authentication, Authorization, Non-Repudiation 59 MB ,30:34 MIN , THEORY


32x32

Chapter 1 : Introduction to Information Security
Topic : Risk, Threat, Vulnerability
Content : Threat, Vulnerability, Risk, RMIS 47 MB ,24:12 MIN , THEORY


32x32

Chapter 1 : Introduction to Information Security
Topic : Attack, Attack Surface
Content : Attack, Attack Surface, Attack Vector, Exploit 44 MB ,25:2 MIN , THEORY


32x32

Chapter 1 : Introduction to Information Security
Topic : Security-Functionality-Ease of Use Triangle
Content : Security-Functionality-Ease of Use Triangle 29 MB ,13:18 MIN , THEORY


32x32

Chapter 2 : Types of Malware
Topic : Worms, viruses, Trojans, Spyware, Rootkits
Content : Malware, Types of Malware, Worms, viruses, Trojans, Spyware, Rootkits, Ransomware 115 MB ,56:56 MIN , THEORY


32x32

Chapter 3 : Types of vulnerabilities
Topic : OWASP Top 10, SQL injection, Broken authentication, Sensitive information disclosure, XML External Entities, Broken access control, Security Misconfiguration
Content : explanation 95 MB ,47:54 MIN , THEORY


32x32

Chapter 3 : Types of vulnerabilities
Topic : OWASP Top 10, cross-site scripting (XSS), cross site request forgery (CSRF/XSRF), input parameter manipulation, Insecure Deserialization, Using components with known vulnerabilities, Insufficient Logging and monitoring
Content : explanation 79 MB ,38:37 MIN , THEORY


32x32

Chapter 3 : Types of vulnerabilities
Topic : OWASP Mobile Top 10
Content : Top 10 mobile Vulnerabilities 141 MB ,58:49 MIN , THEORY


32x32

Chapter 3 : Types of vulnerabilities
Topic : CVE Database
Content : CVE ID, Report a CVE 49 MB ,22:22 MIN , THEORY


32x32

Chapter 4 : Types of attacks and their common prevention mechanisms
Topic : phishing and fake WAP
Content : explanation 17 MB ,11:34 MIN , THEORY


32x32

Chapter 4 : Types of attacks and their common prevention mechanisms
Topic : Keystroke Logging, Denial of Service (DoS /DDoS), Waterhole attack, brute force
Content : explanation 44 MB ,26:27 MIN , THEORY


32x32

Chapter 4 : Types of attacks and their common prevention mechanisms
Topic : IoT Attacks, BOTs and BOTNETs
Content : explanation 11 MB ,7:24 MIN , THEORY


32x32

Chapter 4 : Types of attacks and their common prevention mechanisms
Topic : Eavesdropping, Man-in-the-middle, Session Hijacking, Clickjacking, Cookie Theft, URL Obfuscation, buffer overflow, DNS poisoning, ARP poisoning, Identity Theft
Content : explanation 44 MB ,28:51 MIN , THEORY


32x32

Chapter 5 : Case-studies: Recent attacks
Topic : Adult Friend Finder
Content : explanation 19 MB ,12:47 MIN , THEORY


32x32

Chapter 5 : Case-studies: Recent attacks
Topic : Equifax
Content : explanation 6 MB ,4:10 MIN , THEORY


32x32

Chapter 5 : Case-studies: Recent attacks
Topic : JP Morgan Chase
Content : explanation 9 MB ,6:5 MIN , THEORY


32x32

Chapter 5 : Case-studies: Recent attacks
Topic : eBay
Content : explanation 14 MB ,9:17 MIN , THEORY


32x32

Chapter 5 : Case-studies: Recent attacks
Topic : Uber
Content : explanation 15 MB ,10:24 MIN , THEORY


32x32

Chapter 5 : Case-studies: Recent attacks
Topic : Bad Rabbit
Content : explanation 18 MB ,12:42 MIN , THEORY


32x32

Chapter 5 : Case-studies: Recent attacks
Topic : Target Stores
Content : explanation 17 MB ,10:22 MIN , THEORY


32x32

Chapter 5 : Case-studies: Recent attacks
Topic : Yahoo
Content : explanation 23 MB ,15:21 MIN , THEORY


32x32

Chapter 5 : Case-studies: Recent attacks
Topic : WannaCry
Content : explanation 22 MB ,13:57 MIN , THEORY


32x32

Chapter 1 : Introduction
Topic : Black Hat vs. Gray Hat vs. White Hat (Ethical) hacking, Why is Ethical hacking needed?
Content : Difference between Ethical Hacking and Non-Ethical Hacking 59 MB ,34:59 MIN , THEORY


32x32

Chapter 1 : introduction
Topic : How is Ethical hacking different from security auditing and digital forensics?, Signing NDA, Compliance and Regulatory concerns
Content : explanation 61 MB ,29:41 MIN , THEORY


32x32

Chapter 1 : introduction
Topic : Black box vs. White box vs. Black box, Vulnerability assessment and Penetration Testing
Content : Difference between VA and PT, White box, Grey Box, Black Box 91 MB ,44:24 MIN , THEORY


32x32

Chapter 2 : Approach
Topic : Planning â?? Threat Modeling
Content : explanation 8 MB ,5:25 MIN , THEORY


32x32

Chapter 2 : Approach
Topic : set up security verification standards
Content : explanation 10 MB ,6:36 MIN , THEORY


32x32

Chapter 2 : Approach
Topic : Set up security testing plan â?? When, which systems/apps, understanding functionality
Content : explanation 13 MB ,7:52 MIN , THEORY


32x32

Chapter 2 : Approach
Topic : black/gray/white
Content : explanation 15 MB ,9:47 MIN , THEORY


32x32

Chapter 2 : Approach
Topic : authenticated vs. unauthenticated
Content : explanation 5 MB ,3:35 MIN , THEORY


32x32

Chapter 2 : Approach
Topic : internal vs. external PT
Content : explanation 7 MB ,4:23 MIN , THEORY


32x32

Chapter 2 : Approach
Topic : Information gathering
Content : explanation 12 MB ,8:1 MIN , THEORY


32x32

Chapter 2 : Approach
Topic : Perform Manual and automated (Tools: WebInspect/Qualys, Nessus, Proxies, Metasploit) VA and PT
Content : explanation 34 MB ,22:38 MIN , THEORY


32x32

Chapter 2 : Approach
Topic : How WebInspect/Qualys tools work: Crawling/Spidering, requests forging, pattern matching to known vulnerability database and Analyzing results, Preparing report, Fixing security gaps following the report
Content : explanation 31 MB ,19:50 MIN , THEORY


32x32

Chapter 3 : Enterprise strategy
Topic : Repeated PT, approval by security testing team, Continuous Application Security Testing
Content : explanation 6 MB ,3:45 MIN , THEORY


32x32

Chapter 4 : Phases
Topic : Reconnaissance/foot-printing/Enumeration, Scanning, Sniffing
Content : explanation 16 MB ,10:14 MIN , THEORY


32x32

Chapter 1 : Phases: Gaining and Maintaining Access:
Topic : Systems hacking : Windows and Linux , Metasploit and Kali Linux
Content : explanation 53 MB ,35:24 MIN , THEORY


32x32

Chapter 1 : Phases: Gaining and Maintaining Access:
Topic : Keylogging
Content : explanation 14 MB ,10:3 MIN , THEORY


32x32

Chapter 1 : Phases: Gaining and Maintaining Access:
Topic : Buffer Overflows
Content : explanation 9 MB ,6:1 MIN , THEORY


32x32

Chapter 1 : Phases: Gaining and Maintaining Access:
Topic : Privilege Escalation
Content : explanation 4 MB ,2:59 MIN , THEORY


32x32

Chapter 1 : Phases: Gaining and Maintaining Access:
Topic : Network hacking : ARP Poisoning, Password Cracking, WEP Vulnerabilities, MAC Spoofing, MAC Flooding
Content : explanation 51 MB ,32:2 MIN , THEORY


32x32

Chapter 1 : Phases: Gaining and Maintaining Access:
Topic : IP spoofing, SYN Flooding, Smurf attack
Content : explanation 22 MB ,14:36 MIN , THEORY


32x32

Chapter 1 : Phases: Gaining and Maintaining Access:
Topic : Applications hacking: SMTP/Email-based attacks
Content : explanation 7 MB ,4:29 MIN , THEORY


32x32

Chapter 1 : Phases: Gaining and Maintaining Access:
Topic : VOIP vulnerabilities
Content : explanation 12 MB ,7:42 MIN , THEORY


32x32

Chapter 1 : Phases: Gaining and Maintaining Access:
Topic : Directory traversal, Input Manipulation, Brute force attack, Unsecured login mechanisms, SQL injection, XSS
Content : explanation 53 MB ,32:55 MIN , THEORY


32x32

Chapter 2 : Malware analysis
Topic : Netcat Trojan, wrapping definition, reverse engineering
Content : explanation 15 MB ,10:29 MIN , THEORY


32x32

Chapter 3 : Phases
Topic : Covering your tracks: Steganography, Event Logs alteration
Content : explanation 11 MB ,6:48 MIN , THEORY


32x32

Chapter 4 : Additional Security Mechanisms
Topic : IDS/IPS, Honeypots and evasion techniques, Secure Code Reviews (Fortify tool, OWASP Secure Coding Guidelines)
Content : explanation 32 MB ,20:36 MIN , THEORY


The Shikshak App

The Shikshak App is an honest attempt to provide quality education.

https://play.google.com/store/apps/details?id=com.weit.theshikshak&hl=en_IN