Get $1 credit for every $25 spent!

Zero to Hero Cyber Security Hacker Bundle

Ending In:
Add to Cart - $29
Add to Cart ($29)
$360
91% off
wishlist
(71)
Courses
8
Lessons
339
Enrolled
705

What's Included

Product Details

Access
Lifetime
Content
2 hours
Lessons
49

Fundamentals of Computer Hacking

By infySEC | in Online Courses

Have you ever wanted to learn computer hacking and become a real-life cyber warrior for the good guys, then this is the place to be. This is a great opportunity for security enthusiasts and ethical hackers to learn hacking fundamentals through live demonstrations and hands-on experience with the latest tools.

  • Access 49 lectures & 2 hours of content 24/7
  • Learn about real-time attack vectors & defensive methods
  • Gain a deep understanding of how attackers work
  • Understand how to secure your systems from hackers
Vinod Senthil is the Founder & CTO of infySEC. Vinod is passionate about application building, debugging, disassembling computers, compiling, and much more. Over time he has developed interests in networking and, eventually, networking security.

After 14 years of experience, Vinod has turned his efforts to teaching people how attackers hack systems so they may understand how to secure themselves and other from attack. His instruction is actionable and hands-on, with live demos and lab exercises that will allow you to implement what you have learned immediately.

In 2013, Vinod, along with his team at infySEC, set the world record for conducting the largest and longest ethical hacking marathon with over 9,000 participants assembled in one location.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Compatibility

  • Internet required

Course Outline

  • Introduction of Hacking & Security
    • 001 Introduction (0:28)
    • 002 What is Information (1:04)
    • 003 What is Data (1:58)
    • 004 Why to Secure (1:53)
    • 005 What are Threats (2:52)
    • 006 Types of Hackers (1:05)
    • 007 What is a security breach (2:25)
    • 008 What is Risk and Risk Assessment (2:25)
    • 009 What is Hacking (0:53)
    • 010 Overall Course Map (2:01)
    • 011 Defending and countermeasures (0:54)
  • Virus,Worm,Trojan,Backdoor & Antivirus-Malware and Security
    • 012 Introduction to Malware (2:05)
    • 013 Objective and Outcome (0:39)
    • 014 Virus - Introduction (1:33)
    • 015 Life Cycle of Virus (2:02)
    • 016 Worms - Introduction (1:04)
    • 017 Trojan - Introduction (1:55)
    • 018 Backdoor - Introduction (0:55)
    • 019 Anti Virus (1:05)
  • Information Gathering
    • 020 Objectives and Outcome (1:03)
    • 021 Introduction (1:03)
    • 022 Masking Identity (1:09)
    • 023 SSH Tunnelling (3:38)
    • 024 Social Profiling of Individual (3:03)
    • 025 Career Profiling (1:13)
    • 026 Email Address Harvesting (1:07)
  • Network Hacking
    • 027 Objective and Outcome (0:43)
    • 028 Network Basics (16:20)
    • 029 Network Hacking - Introduction (1:52)
    • 030 MAC spoofing (0:56)
    • 031 MAC spoofing - Exercise (0:54)
    • 032 Caffee Latte attack (3:13)
    • 033 WPA Hacking - Protocol (3:18)
  • System Hacking
    • 034 Objective and Outcome (0:33)
    • 035 Introduction (0:58)
    • 036 System Basics (0:29)
    • 037 Powering the system (1:49)
    • 038 Processor - Basics (2:24)
    • 039 Password Cracking (0:57)
    • 040 Steganography (2:44)
    • 041 Game Hacking (1:00)
  • Web Hacking
    • 042 Objective and Outcome (0:28)
    • 043 Web Basics (10:26)
    • 044 Phishing - Localhost and Server (4:52)
    • 045 Exercise clip - Phishing - Local Host (3:36)
    • 046 SQL Basics (6:46)
  • Advanced Web Hacking
    • 047 Objective and Outcome (0:28)
    • 048 Phishing - Full Screen API (2:31)
    • 049 Exercise clip - Phishing - Full Screen API (1:03)

View Full Curriculum


Access
Lifetime
Content
1 hours
Lessons
34

Information Security Awareness: ISO 27001:2013

By infySEC | in Online Courses

The essential objective of this course is to create awareness regarding the various basic information security requirements and how these requirements can be interpreted to suit an organization's processes, products, people, and customers. In this course, you'll learn how employees, business owners, and other computer users tend to have their security compromised, and what you can do to help safeguard yourself and others from digital attacks.

  • Access 34 lectures & 1 hour of content 24/7
  • Learn what every employee of an organization can do to avoid attack
  • Understand ISO 27001:2013 guidelines
  • Discover how to securely handle data, media containing data, & IT devices
  • Explore how various technical & non-technical attack methods are performed
Vinod Senthil is the Founder & CTO of infySEC. Vinod is passionate about application building, debugging, disassembling computers, compiling, and much more. Over time he has developed interests in networking and, eventually, networking security.

After 14 years of experience, Vinod has turned his efforts to teaching people how attackers hack systems so they may understand how to secure themselves and other from attack. His instruction is actionable and hands-on, with live demos and lab exercises that will allow you to implement what you have learned immediately.

In 2013, Vinod, along with his team at infySEC, set the world record for conducting the largest and longest ethical hacking marathon with over 9,000 participants assembled in one location.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Compatibility

  • Internet required

Course Outline

  • Introduction to Information Security Awareness
    • 001 Objective and Outcome (1:26)
    • 002 Features of the course and Instructor (0:39)
    • 003 Introduction (2:05)
    • 004 Vulnerability-Exploit and Threat (1:53)
    • 005 Threat Classification (2:52)
    • 006 Risk and Introduction to ISMS (1:44)
    • 007 Insights of ISO 270012013 (2:51)
  • Human Resource Security
    • 008 HR Security (2:34)
    • 009 HR Security Policy and System Security Policy (2:49)
    • 010 Social Engineering - Need for Information security awareness program (2:11)
    • 011 ClearClean Desk policy and How to report an incident (2:36)
    • 012 Internet usage policy (1:05)
    • 013 Phishing drill (1:17)
    • 014 Anti Spam - Cost Vs Benefit analysis (2:58)
    • 015 Need for Backup and its types (1:49)
    • 016 Incident response (1:05)
  • IT Security Policies
    • 017 Wireless Security policy (0:49)
    • 018 Remote Access policy (3:47)
    • 019 Asset Control policy (1:12)
    • 020 Secure disposal policy (2:15)
    • 021 Access Control policy (1:26)
  • Business continuity planning and Disaster recovery methodology
    • 022 Business continuity planning and Disaster recovery methodology
    • 023 BCP DR - Sample situation and solution (2:04)
    • 024 Types of Disaster Recovery sites
    • 025 Information Security Myths (1:05)
  • Scenario based Quiz
    • 026 Video Quiz 1 (1:15)
    • 027 Video Quiz 2 (0:59)
    • 028 Video Quiz 3 (0:28)
    • 029 Video Quiz 4 (0:48)
    • 030 Video Quiz 5 (0:39)
    • 031 Video Quiz 6
    • 032 Video Quiz 7
    • 033 Video Quiz 8 (0:26)
    • 034 Video Quiz 9 (0:43)

View Full Curriculum


Access
Lifetime
Content
1 hours
Lessons
47

Information Gathering: Basic to Intermediate Level

By infySEC | in Online Courses

This course forms the basis for anyone who wants to become a real-time penetration tester. You'll learn how to research and gather information about a target without leaving any traces, all in an ethical way. By the end of the course, you'll be familiar with how attackers gather their information before launching an attack, and know how to mitigate it beforehand.

  • Access 47 lectures & 1 hour of content 24/7
  • Discuss complex hacking concepts in easily understood modules
  • Develop your skills in the internet security field
  • Gain familiarity w/ how attackers gather various types of information
Vinod Senthil is the Founder & CTO of infySEC. Vinod is passionate about application building, debugging, disassembling computers, compiling, and much more. Over time he has developed interests in networking and, eventually, networking security.

After 14 years of experience, Vinod has turned his efforts to teaching people how attackers hack systems so they may understand how to secure themselves and other from attack. His instruction is actionable and hands-on, with live demos and lab exercises that will allow you to implement what you have learned immediately.

In 2013, Vinod, along with his team at infySEC, set the world record for conducting the largest and longest ethical hacking marathon with over 9,000 participants assembled in one location.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Introduction to Information Gathering
    • 001 Objective and Outcome (1:03)
    • 002 Introduction (1:03)
  • Masking Identity
    • 003 Masking Identity (1:08)
    • 004 SSH Tunnelling (3:38)
    • 005 HTTP Tunnelling (3:09)
    • 006 TOR The Onion Routing (1:53)
    • 007 Proxy Chains (0:55)
    • 008 Proxy Trojans (4:27)
    • 009 VPN (2:00)
  • Individual Profiling
    • 010 Social Profiling of an Individual (3:03)
    • 011 Career Profiling (1:13)
    • 012 Exercise 1-Social and career profiling
    • 013 Exercise 2-Social and career profiling
    • 014 Automated Tracking of the Target information (1:06)
    • 015 Email Address Harvesting (1:06)
    • 016 Email Tracking (2:24)
  • Organization Profiling
    • 017 Competitive Intelligence Gathering (1:57)
    • 018 Human Resource and Infrastructure Mapping (2:32)
    • 019 Exercise 1-Organisation Profiling
    • 020 Exercise 2-Organisation Profiling
  • Web Based Information Gathering
    • 021 The Website (1:17)
    • 022 Website Architecture (1:59)
    • 023 Website Infrastructure
    • 024 The Domain (1:20)
    • 025 IP Address (2:13)
    • 026 Exercise 1-Website Information Gathering
    • 027 Exercise 2-Website Information Gathering
  • Network Based Information Gathering
    • 028 Network Based Information Gathering - An introduction (1:02)
    • 029 Mapping the Network (1:30)
    • 030 Checking for Machines to be Up (1:17)
  • System Based Information Gathering
    • 031 System Based Information Gathering (0:48)
    • 032 Ports A Brush Up
    • 033 TCP and UDP Headers and Role of Flags (3:19)
    • 034 TCP or Full Open Scan and Half Open Scan (1:52)
    • 035 Idle Scan (1:57)
    • 036 ACK and FIN Scan (1:23)
    • 037 NULL and XMAS Scan (2:05)
    • 038 Targeting the Operating System and Host Names (0:38)
    • 039 Active OS Fingerprinting (0:58)
    • 040 Passive OS fingerprinting (1:03)
    • 041 SMB Versioning (1:00)
  • The Essential Contents of Hackers Toolkit
    • 042 Google Hacking (2:40)
    • 043 Exercise 1-Google Dorking
    • 044 Exercise 2-Google Dorking
    • 045 Exercise 3-Google Dorking
    • 046 Dark NetDEEP Web and Shodan HQExploit DB (1:40)
    • 047 Non- Technical Attacks (1:37)

View Full Curriculum


Access
Lifetime
Content
1.5 hours
Lessons
35

Web Hacking: Basics to Intermediate

By infySEC | in Online Courses

In this course, you'll learn how client-based, server-based, and application-based web attacks are performed in a simulated test environment in an ethical way. This course helps the web security professional to mitigate these attacks using the recommended solution at the end of each module. By course's end, you'll be familiar with various types of web hacks and be fully equipped to test and safeguard a web infrastructure against various real-time attack vectors.

  • Access 35 lectures & 1.5 hours of content 24/7
  • Learn how to perform client-based, server-based, & application-based web attacks
  • Understand how to mitigate against these types of attacks
  • Accelerate your learning process through the use of creative animations & easy to understand voice over narratives
Vinod Senthil is the Founder & CTO of infySEC. Vinod is passionate about application building, debugging, disassembling computers, compiling, and much more. Over time he has developed interests in networking and, eventually, networking security.

After 14 years of experience, Vinod has turned his efforts to teaching people how attackers hack systems so they may understand how to secure themselves and other from attack. His instruction is actionable and hands-on, with live demos and lab exercises that will allow you to implement what you have learned immediately.

In 2013, Vinod, along with his team at infySEC, set the world record for conducting the largest and longest ethical hacking marathon with over 9,000 participants assembled in one location.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Compatibility

  • Internet required

Course Outline

  • Introduction to Web Hacking
    • 001 Objective and Outcome (0:28)
    • 002 Web Basics (10:24)
    • 003 Introduction (1:46)
    • 004 Tools Walkthrough (14:47)
  • Client Based Attacks
    • 005 Phishing - Local host and Server (4:49)
    • 006 Exercise clip - Phishing - Local Host (3:36)
    • 007 Phishing - Host File Manipulation (1:36)
    • 008 Exercise clip - Phishing - Host File Manipulation (2:59)
    • 009 Phishing - Base64 Encoding (2:29)
    • 010 Exercise clip - Phishing - Base64 Encoding (1:28)
    • 011 Cross Site Scripting - Reflected (2:22)
    • 012 Exercise clip - XSS - Reflected (1:09)
    • 013 Cross Site Scripting - Stored (1:15)
    • 014 Exercise clip - XSS - Stored (0:57)
    • 015 URL Redirection (0:58)
    • 016 Exercise clip - URL Redirection (0:56)
    • 017 Content Spoofing (1:52)
    • 018 Exercise clip - Content Spoofing (0:49)
    • 019 Cross Site Request Forgery (2:30)
    • 020 Exercise clip - XSRF (0:55)
    • 021 Clickjacking (2:25)
    • 022 Exercise clip - Clickjacking (1:09)
    • 023 Likejacking (1:36)
    • 024 Mitigation Techniques - Client-Based Attacks
  • Server Based Attacks
    • 025 Bruteforce Attack (4:31)
    • 026 Exercise clip - Bruteforce (8:37)
    • 027 Denial of Service DOS (3:25)
    • 028 Mitigation Techniques - Server-Based Attacks
  • Application Based Attacks
    • 029 Parameter Tampering (4:41)
    • 030 Exercise clip - Parameter Tampering (4:02)
    • 031 Mitigation Techniques - Application-Based Attacks
  • SQL injection - Basic level
    • 032 SQL Basics (6:48)
    • 033 Authentication Bypass (3:09)
    • 034 Exercise clip - SQL Injection - Authentication Bypass (1:02)
    • 035 Mitigation Techniques - SQL Injection

View Full Curriculum


Access
Lifetime
Content
2 hours
Lessons
28

Advanced Web Hacking and Security

By infySEC | in Online Courses

In this course, you'll learn how client-based, server-based, and application-based web attacks are performed in a simulated test environment in an ethical way, at an advanced level. This course helps the web security professional to mitigate these attacks using the recommended solution at the end of each module. By course's end, you'll be familiar with various types of web hacks and be fully equipped to test and safeguard a web infrastructure against various real-time attack vectors.

  • Access 28 lectures & 2 hours of content 24/7
  • Learn how to perform advanced client-based, server-based, & application-based web attacks
  • Understand how to mitigate against these types of attacks
  • Accelerate your learning process through the use of creative animations & easy to understand voice over narratives
Vinod Senthil is the Founder & CTO of infySEC. Vinod is passionate about application building, debugging, disassembling computers, compiling, and much more. Over time he has developed interests in networking and, eventually, networking security.

After 14 years of experience, Vinod has turned his efforts to teaching people how attackers hack systems so they may understand how to secure themselves and other from attack. His instruction is actionable and hands-on, with live demos and lab exercises that will allow you to implement what you have learned immediately.

In 2013, Vinod, along with his team at infySEC, set the world record for conducting the largest and longest ethical hacking marathon with over 9,000 participants assembled in one location.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: advanced

Compatibility

  • Internet required

Course Outline

  • Introduction to Advanced Web Hacking
    • 001 Objective and Outcome (0:28)
    • 002 Web Basics (10:26)
    • 003 Introduction (1:43)
    • 004 Tools walkthrough (14:47)
  • Advanced Client Based Attacks
    • 005 Phishing - Full Screen API (2:31)
    • 006 Exercise clip - Phishing - Full Screen API (1:03)
    • 007 Session Hijacking (4:03)
    • 008 Exercise clip - Session Hijacking (2:13)
    • 009 Browser Extension Exploitation (2:32)
    • 010 Exercise clip - Browser Extension Exploitation (2:24)
    • 011 Man in the Browser (3:46)
  • Server Based Attacks
    • 012 Directory Traversal (4:33)
    • 013 Exercise clip - Directory Traversal (1:44)
    • 014 Excercise clip - File Inclusion (1:50)
    • 015 File Inclusion (1:50)
  • Application Based Attacks
    • 016 Buffer Overflow (7:55)
    • 017 Exercise clip - Buffer Overflow (3:27)
  • SQL injection - Basics to Advanced
    • 018 SQL Basics (6:48)
    • 019 Error-Based SQL Injection (10:22)
    • 020 Exercise clip - SQL Injection - Error Based Injection (4:26)
    • 021 Boolean-Based SQL Injection (15:40)
    • 022 Exercise clip - SQL Injection - Boolean Based Injection (5:36)
    • 023 Time-Based SQL Injection (4:15)
    • 024 Exercise clip - SQL Injection - Time Based Injection (1:26)
  • Web Services Attacks
    • 025 XML Injection (3:12)
    • 026 Exercise clip - XML Injection (1:29)
    • 027 XPATH Injection (2:03)
    • 028 Exercise clip - Xpath Injection (1:02)

View Full Curriculum


Access
Lifetime
Content
2 hours
Lessons
59

Network Hacking and Security

By infySEC | in Online Courses

In this course, you'll learn how wired and wireless network attacks are performed in a simulated test environment in an ethical way. This course helps the network security professional to mitigate each of these attacks. By course's end, you'll be well equipped to test and safeguard network infrastructure against attack.

  • Access 59 lectures & 2 hours of content 24/7
  • Cover ground basics about the web
  • Learn how to perform various types of network hacks
  • Understand how to mitigate against these types of attacks
  • Accelerate your learning process through the use of creative animations & easy to understand voice over narratives
Vinod Senthil is the Founder & CTO of infySEC. Vinod is passionate about application building, debugging, disassembling computers, compiling, and much more. Over time he has developed interests in networking and, eventually, networking security.

After 14 years of experience, Vinod has turned his efforts to teaching people how attackers hack systems so they may understand how to secure themselves and other from attack. His instruction is actionable and hands-on, with live demos and lab exercises that will allow you to implement what you have learned immediately.

In 2013, Vinod, along with his team at infySEC, set the world record for conducting the largest and longest ethical hacking marathon with over 9,000 participants assembled in one location.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Compatibility

  • Internet required

Course Outline

  • Introduction to Network Hacking
    • 001 Network Objective and Outcome (0:43)
    • 002 Network Basics (16:22)
    • 003 Introduction - Network hacking and security (1:52)
  • Physical Layer Attacks - Wired
    • 004 Physical Layer Attack (1:58)
    • 005 Mitigation technique-Physical layer security
  • Datalink Layer Attacks - Wired
    • 006 MAC Spoofing (0:56)
    • 007 Exercise-MAC Spoofing (0:53)
    • 008 MAC Flooding (2:09)
    • 009 Exercise-MAC Flooding (0:48)
    • 010 ARP Poisoning (1:59)
    • 011 Exercise-ARP Poisoning (1:27)
    • 012 DNS Spoofing (2:05)
    • 013 Exercise-DNS Spoofing (1:34)
    • 014 DHCP Starvation (2:36)
    • 015 Rogue DHCP Attack (4:12)
    • 016 Mitigation technique-Datalink layer security
  • Network Layer Attacks
    • 017 IP Spoofing (1:28)
    • 018 Exercise-IP Spoofing (0:42)
    • 019 Passive MITM (1:32)
    • 020 Active MITM (0:47)
    • 021 Exercise-MITM (2:50)
    • 022 ICMP Flooding (1:15)
    • 023 Exercise-ICMP Flooding (0:58)
    • 024 SMURF Attack (1:44)
    • 025 Exercise-Smurf Attack (1:10)
    • 026 Ping of Death (1:00)
    • 027 Mitigation technique-Network layer security
  • Transport Layer Attacks
    • 028 Transport Layer (1:53)
    • 029 TCP Flooding (2:56)
    • 030 Exercise-TCP Flooding (1:12)
    • 031 UDP Flooding (2:08)
    • 032 Exercise-UDP Flooding (0:58)
    • 033 Mitigation technique-Transport layer security
  • Wireless Network Attacks
    • 034 Wireless Basics (3:37)
    • 035 Introduction to Wireless Hacking and Security (1:07)
  • Physical Layer Attacks - Wireless
    • 037 Mitigation technique-Wireless-Physical layer security
    • 036 Physcial Layer Attack (1:45)
  • Datalink Layer Attacks - Wireless
    • 038 War Driving (3:09)
    • 039 Hidden Hotspot (3:39)
    • 040 Exercise-Pre Requisite (0:24)
    • 041 Exercise-Hidden hotspot (1:13)
  • Datalink Layer Attacks - WEP Cracking
    • 042 WEP Working (2:05)
    • 043 Packet Injection (2:44)
    • 044 Exercise-WEP Packet Injection (2:18)
    • 045 Caffe Latte (3:14)
    • 046 Exercise-Caffe Latte Attack (1:37)
    • 047 Hirte Attack (2:42)
    • 048 Exercise-Hirte attack (1:25)
    • 049 Koreks chop chop (4:27)
    • 050 Exercise-Koreks ChopChop (1:58)
  • Datalink Layer Attacks - WPA Cracking
    • 051 WPA Working (3:17)
    • 052 WPA Cracking (2:42)
    • 053 Exercise-WPA Cracking (1:25)
  • Datalink Layer Attacks - WPA II Cracking
    • 054 WPA 2 Basics (1:18)
    • 055 WPA 2 Cracking (2:05)
    • 056 Exercise-WPA 2 Cracking (1:23)
    • 057 Rogue AP attack (4:29)
    • 058 Exercise-Rouge Ap (1:58)
    • 059 Mitigation technique-Wireless-Datalink layer security

View Full Curriculum


Access
Lifetime
Content
2 hours
Lessons
50

System Hacking

By infySEC | in Online Courses

In this course, you'll learn how cryptography, steganography, password cracking, game hacking, reverse engineering, and privilege escalation based attacks are performed in a simulated test environment in an ethical way. This course helps system security professionals mitigate these attacks. It's perfect for anybody who is passionate about developing their skills in the field of internet security.

  • Access 50 lectures & 2 hours of content 24/7
  • Cover the ground basics about systems
  • Learn how to perform various types of system hacks
  • Understand how to mitigate against these types of attacks
  • Accelerate your learning process through the use of creative animations & easy to understand voice over narratives
Vinod Senthil is the Founder & CTO of infySEC. Vinod is passionate about application building, debugging, disassembling computers, compiling, and much more. Over time he has developed interests in networking and, eventually, networking security.

After 14 years of experience, Vinod has turned his efforts to teaching people how attackers hack systems so they may understand how to secure themselves and other from attack. His instruction is actionable and hands-on, with live demos and lab exercises that will allow you to implement what you have learned immediately.

In 2013, Vinod, along with his team at infySEC, set the world record for conducting the largest and longest ethical hacking marathon with over 9,000 participants assembled in one location.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: advanced

Compatibility

  • Internet required

Course Outline

  • Introduction to System Hacking
    • 001 Objective and Outcome (0:33)
    • 002 Introduction (0:58)
    • 003 System Basics (0:29)
    • 004 System Basics - Powering on the System (1:49)
    • 005 System Basics - Processor (2:24)
    • 006 System Basics - Memory (1:46)
    • 007 System Basics - Boot Loader (2:15)
    • 008 System Basics - Operating System (2:13)
    • 009 System Basics - File Management Unit Explained (2:29)
    • 010 System Basics - Security Management Unit Explained (2:26)
    • 011 System Basics - Switching off the System (1:26)
  • Password Cracking
    • 012 What are Passwords How are they used (2:27)
    • 013 Password Cracking - An introduction (0:57)
    • 014 Keylogging - Password Cracking (1:38)
    • 015 Password Guessing (1:12)
    • 016 Man-In-The-Middle (1:36)
    • 017 Password Sniffing - Passive Password Sniffing (1:10)
    • 018 Offline Password Cracking - Using Dictionary Method (4:02)
    • 019 Offline Password Cracking - Using Rainbow Tables Method (1:10)
  • Cryptography
    • 020 What is Cryptography (3:23)
    • 021 Types of Cryptography (2:26)
    • 022 Hashing - Real-time usage (2:21)
    • 023 Role of Keys in Cryptography (2:46)
    • 024 Working mechanism of the SSL (3:05)
  • Steganography
    • 025 An Introduction to Steganography (2:45)
    • 026 Image steganography (2:38)
    • 027 Image Steganography - How it works (3:33)
    • 028 Image Steganography - Getting the hidden message (1:19)
    • 029 Audio steganography (2:53)
    • 030 Text steganography (4:46)
    • 031 Whitespace steganography (3:10)
    • 032 Email Steganography (1:38)
    • 033 Document Steganography (2:21)
    • 034 File merging and mangling (3:23)
    • 035 Hiding a RAR file behind an image (1:22)
    • 036 Hiding text behind an image (1:09)
    • 037 Steganalysis (0:56)
  • Process and Memory hacking
    • 038 Game Hacks - An introduction (1:00)
    • 039 Game Hacks - Basics (1:57)
    • 040 Game Hacks - Offline Games (3:49)
    • 041 Game Hacks - Online Games (2:24)
    • 042 Game Hacks - Dynamic Score changing (0:38)
  • Reverse Engineering
    • 043 Reverse Engineering - An Introduction. (1:56)
    • 044 Reverse Engineering - Study of the File (1:10)
    • 045 Reverse Engineering - The Vault (2:17)
    • 046 Reverse Engineering - Cracking The Vault (2:21)
    • 047 Reverse Engineering - Tantanos Keygenme (1:00)
    • 048 Reverse Engineering - Cracking Tantanos Keygenme (0:47)
  • Privilege Escalation
    • 049 Privilege Escalation - Windows 7 8 machines - Post compromise (5:31)
    • 050 Privilege Escalation - Using Konboot (2:00)

View Full Curriculum


Access
Lifetime
Content
1 hours
Lessons
37

Virus, Worm, Trojan, Backdoor & Antivirus-Malware and Security

By infySEC | in Online Courses

In this course, you'll learn how viruses, worms, Trojans, and backdoor-based attacks are performed in a simulated test environment in an ethical way. It has been designed to enable you to learn core concepts on malware and become familiar with how various types of attacks are performed. Ultimately, you will come out fully prepared to test and safeguard a system against various real-time attack vectors.

  • Access 37 lectures & 1 hour of content 24/7
  • Cover the ground basics about malware
  • Develop your skills in the field of internet security
  • Learn how to perform various types of malware hacks
  • Understand how to mitigate against these types of attacks
  • Accelerate your learning process through the use of creative animations & easy to understand voice over narratives
Vinod Senthil is the Founder & CTO of infySEC. Vinod is passionate about application building, debugging, disassembling computers, compiling, and much more. Over time he has developed interests in networking and, eventually, networking security.

After 14 years of experience, Vinod has turned his efforts to teaching people how attackers hack systems so they may understand how to secure themselves and other from attack. His instruction is actionable and hands-on, with live demos and lab exercises that will allow you to implement what you have learned immediately.

In 2013, Vinod, along with his team at infySEC, set the world record for conducting the largest and longest ethical hacking marathon with over 9,000 participants assembled in one location.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Malware - Wide threat faced by the common man
    • 001 Objective and Outcome (0:39)
    • 002 Introduction to Malware (2:04)
  • Viruses
    • 003 Virus an introduction (1:33)
    • 004 Life cycle of a Virus - Phase 1 (2:02)
    • 005 Making the Virus appear benign (1:11)
    • 006 Transmission and Triggering Phase 23 (2:35)
    • 007 Infection - Phase 4 and The code (2:01)
  • Worms
    • 008 Worm An Introduction (1:03)
    • 009 Life cycle of a Worm - Phase 1 (1:47)
    • 010 Propagation Vs Transmission (0:36)
    • 011 Propagation Triggering and Infection Phase 23 and 4 (1:11)
    • 012 The code (2:44)
    • 013 Types of Worm - Identification - Phase 5 (1:32)
  • Trojans
    • 014 Trojan An Introduction (1:55)
    • 015 Life cycle of a Trojan - Phase 1 (1:58)
    • 016 Creation using tool Phase 1 (0:54)
    • 017 Transmission and Triggering - Phase 2 and 3 (0:28)
    • 018 Infection - Phase 4 (0:48)
    • 019 The code (0:53)
    • 020 Types of Trojan (1:52)
    • 021 Identification Phase 5 (0:23)
    • 022 Removal Phase 6 (1:59)
  • Backdoors
    • 023 Backdoor An Introduction (0:55)
    • 024 Conventional Backdoor (1:57)
    • 025 Unconventional Backdoor (1:39)
    • 026 Phases of a conventional backdoor (2:41)
    • 027 Phases of an unconventional Backdoor (2:25)
    • 028 Backdoor on an XP machine (2:00)
    • 029 Removal of a backdoor (1:08)
  • Anti Virus
    • 030 Antivirus (1:05)
    • 031 Components of AV (2:03)
    • 032 2 stage AV working (1:54)
    • 033 Virus Lab (2:10)
    • 034 Checking the AV functionality (0:59)
    • 035 Dodging the AV (2:14)
    • 036 File Encoding (1:13)
    • 037 Current Working arenas in Antivirus (1:54)

View Full Curriculum



Terms

  • Instant digital redemption

15-Day Satisfaction Guarantee

We want you to be happy with every course you purchase! If you're unsatisfied for any reason, we will issue a store credit refund within 15 days of purchase.