1. Course Overview
2. Yes, You Are a Target
3. Typical Attacks Against a Network
4. DOS DDOS Attacks
5. A Malicious Hackers Methodology
6. What We Can Learn from Malicious Hackers
7. Scanning Tools and Methodology
8. Social Engineering
9. Physical Attacks
10. Getting Sneaky with MiTM and DDOS Attacks
11. ExploidDB
12. What is an Insider Threat
13. Why Employee Training is Important and Some Tips
14. Why You Need to Strike a Balance Between Security and Ease of Use
15. Employee Reporting
16. Patching Everything
17. Antivirus and Console Tools
18. Fake Error Messages, a Look at Scareware and What it is
19. Limiting User Rights
20. Application Reduction, Why You Should Slim It Down
21. VPN (What it is, Why They are Important)
22. System Log Files
23. Monitoring Software
24. Snort (IDS)
25. Network Alert Software and Monitoring (Meraki)
26. IP (What is IP Addresses, Why They are Important)
27. About Phishing Emails
28. Identifying Phishing Emails
29. Running a Phishing Campaign
30. What is a Red Team
31. What is a Blue Team
32. In-house or Contracted
33. What is OSINT
34. Trace Labs OSINT VM
35. Tracking by IP
36. Canary Tokens
37. Bitcoin Tracking
38. Damage Control and Assessment
39. Backup and Recovery
40. Developing and Learning from Your Attack