Fundamentals of Computer Hacking
This Course is the fundamental course on Ethical Hacking which delivers knowledge of real time attack vectors and defensive methods. This course has been designed by group of globally recognized Information Security Professionals to meet the participant and organization expectations. For easy understanding for the participants , LIVE practical demonstration on the appropriate full fledged courses.
This course delivers comprehensive deep understanding of how attacker’s works in dark and methodology they follow to deface a network. In other hand, how the Information Security Professionals working in an organization identifies these methodologies and deface attackers.
This course will give a idea to know how our other full courses will be like.
INTRODUCTION TO HACKING AND SECURITY
This lecture sets the expectation of this course.
This lecture briefs about "Information" from a layman perspective.
This lecture deals with classification of data and need for Information security.
Having seen the need for information security from the previous lecture, this lecture details about "what information security is ?" and briefs about the co-relation between Threat and Vulnerability.
This lecture deals with threat classification and its source.
This lecture gives an overview on classification of hacker and their types.
This lecture explains about the elements of information security such as Confidentiality,Integrity and Availability (CIA triad). This also includes Authentication and Non-repudiation.
This lecture details about RISK and its classification. This lecture also detail with the list of available Information security Standards and Compliance.
This lecture is an introduction to Hacking and its phases.
In short, this lecture is the blueprint of this course.
This lecture explains how countermeasures of hacking are dealt in this course.
The method of sending fraudulent emails, probing people to disclose sensitive data such as user credentials, financial information etc., is called Phishing. This lecture explains how this can be done via the Full Screen API technique.
A step-by-step approach on how to perform Phishing via Full Screen API.