CISS Training

 CISS Training

Become CISS – Certified IT Security Specialist by covering the following topics:

Security and Hacking Myths Debunked

Beginner to Advanced IT Security

Microsoft Windows Threats and WiFi Weaknesses

Current Black-Hat Threats and Trends

Designing More Secure Networks

Encrypted Data, Identify Spoofing, and Windows Authorization

IT Security Academy Exam Preparation

Boost Network Security and Identify Weaknesses

Certified hackers identify network security threats to prevent criminal hacking attempts. The best way to do this, is to understand how cyber criminals evaluate and test your network for vulnerabilities.

Contents and Overview

This course is designed for anyone seeking a career in IT security, as well as programmers and technology enthusiasts who want to develop hacking and prevention skills. A basic understanding of IT and infrastructure is recommended but not required.

With 239 lectures and over 23+ hours of content, you will start with the basics of IT security and progress to the advanced curriculum in a matter of days.

Who is the target audience?

Future IT Sec Professionals

IT Students


IT enthusiasts

Introduction to Current Cyber Threats

IT Prehistory

Let’s look a few years back

Cyber crimes - an evolution not revolution

Popular myths about IT security - origins

Myths #1 - you’ll never be hacked

Myths #2 - you don’t need any protection software or hardware

Myths #3 - IT security is always a priority

Popular Myths About Computer System Security - notes for the examination

Trends in IT Security

The birth of technology society

EXERCISE: How much info can you gather?

Fake identity

Online privacy

Analyzing sniffing software

Cyber War

Changing IT Security Trends - notes for the examination

Objective #1 - Data security - Introduction

Confidentiality of data

EXERCISE: Finding confidential data with search engines

Integrity of data

Data security - notes for the examination

Computer Network Security

Network security - introduction

OSI MODEL #1 - Physical layer

OSI MODEL #2 - Data link layer

Threats: MAC spoofing

Threats: ARP Poisoning

EXERCISE: Data Link Layer Attack

OSI MODEL #3 - Network layer

TCP Tunnelling over ICMP

Network Protocols - notes for the examination

OSI MODEL #4 - Transport Layer

Threats: Enumerating Remote Computers

EXERCISE: Transport Layer Attack using METASPLOIT part 1

EXERCISE: Transport Layer Attack using METASPLOIT part 2

OSI MODEL #5 - Session Layer

Transport Protocols - notes for the examination

OSI MODEL #6 - Presentation Layer

OSI MODEL #7 - Application Layer

EXERCISE: Application Layer Attacks

Kali Linux: Attack Demonstration

Man-in-the-Middle and Denial of Service Attacks

Modifying Transmitted Packets

Unencrypted protocols

Application Protocols - notes for the examination

Designing Secure Computer Networks

Designing Computer Networks - introduction

Subnetting IPv4

Subnetting IPv6

Subnetting - notes for the examination

IPv6 address notation

DMZ: demilitarized Zone

Protocols and services: IP SEC

IP SEC: Phase 1

Network Address translation

Network access control: RADIUS

Protocols and Services - notes for the examination

Network administration

Introduction to Monitoring Transmitted Data

Monitoring Transmitted Data - Basic informations

Intrusion detection systems

Why are firewalls and NDIS not enough?

Wireshark - Introduction to network analysis

How to use Wireshark?

Analyzing Captured data

How to analyze telnet protocol?

Intrusion detection

Scanning computers

Monitoring transmitted data - notes for the examination

Wireless Networks Security

Wireless Networks

WIFI security solutions - introduction

WIFI - working principles

Other wireless technologies

Threats and risks

Ineffective solutions

Authentication methods

802.11 WEP

802.11I WPA

Standards and Security Solutions - notes for the examination

Threats of WIFI networks

Client Attacks: Launching a rogue access point

Client Attacks: Evil twin

Client Attacks: Denial of service


Wi-Fi Security Threats - notes for the examination

Operating Systems Security

Operating systems security - introduction

Security boundaries

Three core

EXERCISE: OS boundaries

Process isolation

Kernel Mode Code Signing

Java Virtual Machine and code access security

OS Security Boundaries - notes for the examination


EXERCISE: Vulnerability attacks

EXERCISE: Identifying suspicious processes

Demonstration: Process Explorer

EXERCISE: Removing malware


EXERCISE: Detecting rootkits

EXERCISE: Security evaluation

Malware - notes for the examination

Access Control

Authentication and authorisation - Introduction

Authentication users

How secure is your password?

Authentication protocols and services

Authentication - notes for the examination

LM Hash

Cached Credentials


Identity Theft

EXERCISE: Offline attacks

Using online cracking services

Identity Theft - notes for the examination

Windows Security

Windows Security - what you’ll learn

User Account Control

UAC configuration

Additional Security Features - ASLR and DEP


Techniques and Methods - notes for the examination

Encryption - key protection

Drive encryption


BitLocker To Go Reader

File and folder encryption - EFS


Encryption - notes for the examination

Security Policies

Security policies – introduction

What is security?

Information security

Information security - level up

Security issues

Why are security solutions fallible?

Security policy issues

Introduction to threat modelling and classification

Threat modelling - STRIDE

STRIDE: Spoofing identity

STRIDE: Tampering with Data

STRIDE: Denial of Service

Risk Management

Introduction to Risk Management

Attack methods

Local attacks

Target scanning and enumeration techniques #1

Target scanning and enumeration techniques #2

Passive scanning

Attack Methodologies - notes for the examination

Introduction to risk assessment

DREAD: Risk assessment model

DREAD: Exploitability

EXERCISE: Risk Assessment

Risk Assessment - notes for the examination

Introduction to Social Engineering and rogue software

Manipulation tactics

EXERCISE: Social Engineering attacks

SE with KALI / BackTrack

Rogue Software

Fraud tools 

Social Engineering and Rogue Software - notes for the examination


Defence in Depth

Introduction to Defence in Depth

How to use Defence in Depth model?

DiD: OS and LAN Layers

DiD: Perimeter and Physical Access Layers

DiD: Demonstration

Automated attack targeting a service

Automated user-targeting attack

The Defence in Depth Model - notes for the examination

Introduction to Immutable laws of security - Law #1

Laws for administrators

Immutable Laws of Security - notes for the examination


Disaster Recovery

Introduction to Disaster Recovery

How to reduce losses?

Ensuring continous availability

Threat discovery 

Audit users and keep control accounts

High risk users

Collecting and analysing evidence

Forensics example


How to reduce losses - notes for the examination

Application Security

Introduction to Application Security

Attacks on applications

SQL Injection

EXERCISE: Analyze the application

Blind SQL Injection

Automated SQL Injection

Cross-site scripting - XSS

Application Attacks - notes for the examination

Program security assessment

Unsafe applications

Application Security - Configuration and Management

Here’s what you’ll learn in this module

Managing applications

Software updates

MS Update

System Center Configuration Manager

Blocking applications

Software restrictions policies

EXERCISE: Application control rules

Isolating applications

How to protect users without interrupting their work - notes for the examination



Introduction to cryptography

History of ciphers

Symmetric and asymmetric ciphers

Symmetric-key algorithms

Block ciphers

Data encryption standard


Advanced encryption standards

Block cipher modes

Stream Ciphers - RC4

Asymmetric-key algorithms



HASH functions

Digital signature

Hybrid Schemes

Symmetric and Asymmetric Ciphers - notes for the examination


Public Key Infrastructure

Introduction to cryptology

Public key infrastructure

Implementing public key infrastructure

What will PKI allow you?

EXERCISE: Certificates

Planning the PKI

Certificate life cycle

PKI Administration

Threat Modelling and Classification - notes for the examination

Public Key Infrastructure - Trust but verify - notes for the examination


Prepare for the examination

Answer sample questions which you can find during the examination 

0 coment�rios:

Post a Comment

100 Web Vulnerabilities you should know as a Web application Penetration Tester

100 Web Vulnerabilities you should know as a Web application Penetration Tester If you are working as web application penetration testing en...