Computer Hacking Forensic Investigation & Penetration Testing Bundle

4 Reviews
1656 Enrolled
48 Hours
$49.00$5,428.00
Save 99% -

305 Lessons (48h)

  • Introduction to Computer Forensics
    Introduction to Computer Forensics Part 14:57
    Introduction to Computer Forensics Part 26:44
    Introduction to Computer Forensics Part 34:42
    Introduction to Computer Forensics Part 46:09
    Introduction to Computer Forensics Part 54:40
  • Computer Forensics Investigation Process
    Computer Forensics Investigation Process Part 17:27
    Computer Forensics Investigation Process Part 28:31
    Application Password Crackers7:49
    Investigating Wireless Attacks Part 15:38
    Investigating Wireless Attacks Part 25:21
    Investigating Wireless Attacks Part 35:36
    Investigating Wireless Attacks Part 45:18
    Investigating Wireless Attacks Part 54:31
    Windows Forensics Part 16:37
    Windows Forensics Part 26:11
    Windows Forensics Part 37:05
    Windows Forensics Part 44:48
    Penetration Testing-course416:04
    New Lecture
  • Searching and Seizing Computers
    Searching and Seizing Computers Part 12:47
    Searching and Seizing Computers Part 23:44
    Searching and Seizing Computers Part 34:23
    Searching and Seizing Computers Part 44:03
    Searching and Seizing Computers Part 54:27
    Searching and Seizing Computers Part 65:11
  • Digital Evidence
    Digital Evidence Part 15:23
    Digital Evidence Part 25:14
    Digital Evidence Part 34:32
    Digital Evidence Part 44:21
    Digital Evidence Part 54:21
  • First Responder Person
    First Responder Person Part 14:19
    First Responder Person Part 25:08
    First Responder Person Part 35:24
    First Responder Person Part 45:42
    First Responder Person Part 55:33
  • Computer Forensic Lab
    Computer Forensic Lab Part 15:03
    Computer Forensic Lab Part 26:10
  • Understanding HardDisks & File Systems
    Understanding HardDisks & File Systems Part 14:50
    Understanding HardDisks & File Systems Part 24:45
    Understanding HardDisks & File Systems Part 35:37
    Understanding HardDisks & File Systems Part 45:19
  • Data Acquisition & Duplication
    Data Acquisition & Duplication Part 15:47
    Data Acquisition & Duplication Part 25:04
    Data Acquisition & Duplication Part 34:30
  • Recovering Deleted Files & Partitions
    Recovering Deleted files & Partitions4:36
  • Stegnography
    Steganography Part 15:07
    Steganography Part 24:56
    Steganography Part 34:45
  • Application Password Crackers
    Log Capturing & Event Correlation Part 15:47
    Log Capturing & Event Correlation Part 26:35
  • Network Forensics, Investigating Network Logs & Investigating Network Traffic
    Network Forensics, Investigating Network Logs & Investigating Network Traffic Part 16:11
    Network Forensics, Investigating Network Logs & Investigating Network Traffic Part 24:55
    Network Forensics, Investigating Network Logs & Investigating Network Traffic Part 35:17
    Network Forensics, Investigating Network Logs & Investigating Network Traffic Part 45:47
    Network Forensics, Investigating Network Logs & Investigating Network Traffic Part 55:23
  • Investigating Wireless Attacks
    Investigating Web Attacks Part 14:29
    Investigating Web Attacks Part 25:56
    Investigating Web Attacks Part 35:30
    Investigating Web Attacks Part 44:23
    Investigating Web Attacks Part 57:16
  • Tracking Email & Investigating Email Clients
    Tracking Email & Investigating Email Clients Part 14:43
    Tracking Email & Investigating Email Clients Part 25:13
    Tracking Email & Investigating Email Clients Part 35:12
    Tracking Email & Investigating Email Clients Part 45:08
  • Mobile Forensics
    Mobile Forensics Part 16:23
    Mobile Forensics Part 26:07
    Mobile Forensics Part 36:29
    Mobile Forensics Part 46:45
  • Investigative Reports
    Investigative Reports Part 13:49
    Investigative Reports Part 26:23
    Investigative Reports Part 35:41
  • Becoming an Expert Witness
    Becoming an Expert Witness Part 15:25
    Becoming an Expert Witness Part 25:46
    Becoming an Expert Witness Part 35:19
    Becoming an Expert Witness Part 47:40
  • Need for Security Analysis
    Security28:18
    Need for Security Analysis Part 110:04
    Need for Security Analysis Part 29:25
    Greatest Challenges20:49
    Threat Agents10:51
    RISK14:36
    Information Security Awareness Part 116:38
    Information Security Awareness Part 20:27
    Information Security Awareness Part 39:45
    FACTA & ISO 1779915:45
    US Legislation Part 113:28
    US Legislation Part 26:57
    Course Recap7:41
  • TCP IP Packet Analysis
    TCP IP Model12:48
    Comparing OSI and TCP IP Model14:45
    TCP and UDP Protocol Part 18:23
    TCP and UDP Protocol Part 26:35
    TCP and UDP Protocol Part 310:10
    TCP and UDP Protocol Part 49:30
    TCP and UDP Protocol Part 514:41
    TCP Operation Part 113:10
    TCP Operation Part 212:33
    TCP Operation Part 312:52
    TCP Operation Part 418:08
    IPv4 & IPv6 Part 17:53
    IPv4 & IPv6 Part 214:16
    IPv4 & IPv6 Part 39:58
    IPv4 & IPv6 Part 49:52
    IPv4 & IPv6 Part 511:53
    IPv4 & IPv6 Part 618:39
    IP SEC Part 19:25
    IP SEC Part 213:06
    IP SEC Part 38:08
    ICMP Part 110:21
    ICMP Part 210:37
    ICMP Part 313:56
  • Penetration Testing Methodologies
    Penetration Testing11:00
    Pen-Testing Techniques14:32
    Scope of Pen-Testing14:31
    Types of Pen-Testing and its Strategies Part 112:16
    Types of Pen-Testing and its Strategies Part 29:07
    Types of Pen-Testing and its Strategies Part 313:57
    Types of Pen-Testing and its Strategies Part 414:54
    Profile of a Pen-Tester and Pen-Testing Methodologies Part 113:52
    Profile of a Pen-Tester and Pen-Testing Methodologies Part 212:08
    Guidelines for Security Testing and Phases of Pen-Testing Part 113:15
    Guidelines for Security Testing and Phases of Pen-Testing Part 211:07
    Guidelines for Security Testing and Phases of Pen-Testing Part 315:08
    Guidelines for Security Testing and Phases of Pen-Testing Part 415:10
  • Customer and Legal Agreements
    Stages of Pen-Testing and Testing Requirements Part 113:51
    Stages of Pen-Testing and Testing Requirements Part 210:30
    Stages of Pen-Testing and Testing Requirements Part 311:23
    Legal Consequences Part 18:23
    Legal Consequences Part 27:32
    Liability Issues11:04
  • Rules Of Engagement
    Rules Of Engagement Part 112:07
    Rules Of Engagement Part 27:52
    Steps for Framing Rules of Engagement10:48
  • Penetration Testing Planning & Scheduling
    Building a Penetration Test Plan Part 113:37
    Building a Penetration Test Plan Part 219:45
    Building a Penetration Test Plan Part 37:52
    Pen-Testing Planning Phases Part 117:20
    Pen-Testing Planning Phases Part 212:07
    Pen-Testing Planning Phases Part 38:57
    Kickoff Meetings and Pen-Testing Project Plan Part 19:25
    Kickoff Meetings and Pen-Testing Project Plan Part 210:48
  • Pre Penetration Testing Steps
    Pre Penetration Testing Steps Overview18:47
    Pre-Pen Testing Steps 1-413:57
    Pre-Pen Testing Steps 5-1424:53
    Pre-Pen Testing Steps 15-1914:50
    Pre-Pen Testing Steps 20-2418:15
    Pre-Pen Testing Steps 25-3214:17
    Pre-Pen Testing Steps 33-3815:34
    Pre-Pen Testing Steps 39-4214:02
  • Information Gathering
    Information Gathering Part 19:37
    Information Gathering Part 28:07
    Information Gathering Steps Overview11:22
    Information Gatherings Steps 1-314:59
    Information Gatherings Steps 4-915:56
    Information Gatherings Steps 10-118:58
    Information Gatherings Steps 12-1511:07
    Information Gathering Steps 16-2214:53
    Information Gathering Steps 23-2915:19
    Information Gathering Steps 30-3410:21
  • Vulnerability Analysis
    Vulnerability Analysis Part 110:41
    Vulnerability Analysis Part 214:03
    Vulnerability Analysis Part 315:33
    Phases of Vulnerability Analysis Part 19:04
    Phases of Vulnerability Analysis Part 210:07
    Vulnerability Analysis Report Model Part 110:34
    Vulnerability Analysis Report Model Part 215:34
    Vulnerability Analysis Assessment Tools Part 19:40
    Vulnerability Analysis Assessment Tools Part 212:58
    Vulnerability Analysis Assessment Tools Part 39:35
    Vulnerability Analysis Reports Part 110:00
    Vulnerability Analysis Reports Part 212:02
  • External Penetration Testing
    What is External Penetration Testing15:18
    External Intrusion Test & Analysis & External Pen-Testing Steps Part 110:33
    External Intrusion Test & Analysis & External Pen-Testing Steps Part 28:41
    External Intrusion Test & Analysis & External Pen-Testing Steps Part 39:23
    External Pen-Testing Steps 1-7 Part 19:59
    External Pen-Testing Steps 1-7 Part 28:55
    External Pen-Testing Steps 8-1016:46
    External Pen-Testing Steps 11-12 Part 18:10
    External Pen-Testing Steps 11-12 Part 210:06
    External Pen-Testing Steps 13-2017:27
    External Pen-Testing Steps 21-29 Part 19:31
    External Pen-Testing Steps 21-29 Part 29:49
    External Pen-Testing Steps 21-29 Part 310:29
    External Pen-Testing Steps 30-37 Part 112:26
    External Pen-Testing Steps 30-37 Part 211:35
    External Pen-Testing Steps 38-44 Part 19:20
    External Pen-Testing Steps 38-44 Part 29:14
    External Pen-Testing Steps 38-44 Part 39:04
    External Pen-Testing Steps 45-52 Part 19:00
    External Pen-Testing Steps 45-52 Part 29:15
    External Pen-Testing Steps 45-52 Part 39:52
    External Pen-Testing Steps 53-6215:00
    External Pen-Testing Steps 63-7516:35
    External Pen-Testing Steps 76-8414:12
  • Internal Network Penetration Testing
    Internal Network Penetration Testing Part 112:10
    Internal Network Penetration Testing Part 212:33
    Internal Network Penetration Testing Steps 1-5 Part 111:14
    Internal Network Penetration Testing Steps 1-5 Part 211:31
    Internal Network Penetration Testing Steps 6-810:02
    Internal Network Penetration Testing Steps 9-1011:11
    Internal Network Penetration Testing Step 1111:56
    Internal Network Penetration Testing Steps 12-139:59
    Internal Network Penetration Testing Steps 14-1711:17
    Internal Network Penetration Testing Steps 18-2212:54
    Internal Network Penetration Testing Steps 23-3313:56
    Internal Network Penetration Testing Steps 34-44 Part 19:33
    Internal Network Penetration Testing Steps 34-44 Part 210:20
  • Firewall Penetration Testing
    Firewalls and How They Work Part 18:56
    Firewalls and How They Work Part 212:27
    Firewalls and How They Work Part 311:59
    Firewall Implementation & Types of Firewalls Part 111:36
    Firewall Implementation & Types of Firewalls Part 29:28
    Steps for Firewall Penetration Testing Part 110:05
    Steps for Firewall Penetration Testing Part 29:18
    Steps for Firewall Penetration Testing Part 39:32
  • Intrusion Detection System (IDS) Testing
    Intrusion Detection System (IDS) and Types of IDS Part 110:57
    Intrusion Detection System (IDS) and Types of IDS Part 29:29
    Intrusion Detection System (IDS) and Types of IDS Part 36:48
    IDS Testing Tools and Common Techniques to Evade IDS11:29
    IDS Pen-Testing Steps 1-411:35
    IDS Pen-Testing Steps 5-1412:03
    IDS Pen-Testing Steps 15-2010:40
    IDS Pen-Testing Steps 21-2712:31
    IDS Pen-Testing Steps 28-3712:40
  • Password Cracking Penetration Testing
    Passwords, Common Vulnerabilities in Passwords and Steps 1-2 for Password Cracking Pen-Testing Part 112:14
    Passwords, Common Vulnerabilities in Passwords and Steps 1-2 for Password Cracking Pen-Testing Part 213:13
    Steps 3-7 for Password Cracking Pen-Testing Part 110:28
    Steps 3-7 for Password Cracking Pen-Testing Part 210:02
    Steps 3-7 for Password Cracking Pen-Testing Part 311:58
    Steps 3-7 for Password Cracking Pen-Testing Part 410:11
  • Social Engineering Penetration Testing
    Social Engineering and Steps 1-4 for Social Engineering Pen-Testing Part 110:25
    Social Engineering and Steps 1-4 for Social Engineering Pen-Testing Part 212:28
    Social Engineering and Steps 1-4 for Social Engineering Pen-Testing Part 39:27
    Social Engineering and Steps 1-4 for Social Engineering Pen-Testing Part 48:14
    Steps 5-11 for Social Engineering Pen-Testing Part 110:18
    Steps 5-11 for Social Engineering Pen-Testing Part 210:19
    Steps 12-20 for Social Engineering Pen-Testing13:06
  • Web Application Penetration Testing
    Application Testing and Web Application Penetration Testing Part 113:12
    Application Testing and Web Application Penetration Testing Part 213:06
    Steps 1–10 for Web Application Penetration Testing Part 110:00
    Steps 1–10 for Web Application Penetration Testing Part 28:28
    Steps 1–10 for Web Application Penetration Testing Part 39:24
    Steps 11–21 for Web Application Penetration Testing Part 19:58
    Steps 11–21 for Web Application Penetration Testing Part 26:58
    Steps 22-32 for Web Application Penetration Testing Part 110:02
    Steps 22-32 for Web Application Penetration Testing Part 29:56
    Steps 22-32 for Web Application Penetration Testing Part 310:00
    Steps 33-35 for Web Application Penetration Testing Part 18:23
    Steps 33-35 for Web Application Penetration Testing Part 210:20
    Steps 11–21 for Web Application Penetration Testing Part 39:46
  • SQL Penetration Testing
    Microsoft SQL Server Testing Part 110:32
    Microsoft SQL Server Testing Part 28:05
    Microsoft SQL Server Testing Part 38:11
    MySQL Server Database Testing10:31
  • Penetration Testing Reports & Post Testing Actions
    Penetration Testing Report Analysis9:57
    Prioritize Recommendations, Develop Action Plan and Create Security Policies Part 17:05
    Prioritize Recommendations, Develop Action Plan and Create Security Policies Part 28:17
    Penetration Testing Report and Test Reports on Networks Part 113:50
    Penetration Testing Report and Test Reports on Networks Part 212:03
    Client Side Test Report, Test Reports on Web Applications, and Writing Final Report Part 19:02
    Client Side Test Report, Test Reports on Web Applications, and Writing Final Report Part 29:00
  • Database Penetration Testing
    Database Penetration Testing and Steps for Database Penetration Testing (1-6) Part 112:18
    Database Penetration Testing and Steps for Database Penetration Testing (1-6) Part 212:33
    Database Penetration Testing Step 7 - Oracle Server Pen-Testing Part 210:10
    Database Penetration Testing Step 7 - Oracle Server Pen-Testing Part 110:40
    SQL Injection12:00
  • Wireless Network Penetration Testing
    Wireless Security Threats, Wireless Assessments, and Wireless Pen-Testing Steps 1-2 Part 112:03
    Wireless Security Threats, Wireless Assessments, and Wireless Pen-Testing Steps 1-2 Part 211:50
    Wireless Penetration Testing Steps 3-12 Part 19:29
    Wireless Penetration Testing Steps 3-12 Part 29:14
    Wireless Penetration Testing Tools Part 18:32
    Wireless Penetration Testing Tools Part 28:12
  • Mobile Devices Penetration Testing
    Android Penetration Testing15:02
    iOS Penetration Testing7:56
    Windows Phone Penetration Testing5:08
    Blackberry Penetration Testing7:17
  • Cloud Penetration Testing Methodology
    Cloud Computing and Cloud Deployment Model12:40
    Cloud Service Model, Cloud Computing Security and Cloud Security Controls13:15
    Steps for Cloud Penetration Testing Part 18:44
    Steps for Cloud Penetration Testing Part 211:34

Cybersecurity Is More Important & More In-Demand Than Ever. Time to Get Paid to Fight for the Good Guys.

C3
CyberTraining 365

Instructor

With the call by President Obama to update the national US. cybersecurity strategy in order to help secure the United States in cyberspace, all the different goals set by this initiative cannot be achieved without experienced security professionals, able to dissect, stop and prevent sophisticated cyber attacks. This is the mission of CyberTraining 365, prepare security professionals worldwide to help to secure their nations against organized crime.

CyberTraining 365 main focus is to prepare professionals with the best techniques to defend their organizations at all different layers: In the perimeter, internal network, applications, memory and binary level.

We offer multiple certifications taught by authors of Gray Hat Hacking book and Certified EC-Council Instructors who have experience in real state-sponsored attacks worldwide. Our courses are aligned with the National Cybersecurity Workforce Framework developed by National Initiative for Cybersecurity Education (NICE).

Our career path starts from 101 courses for new security professionals but goes all the way up to Advanced courses for experienced ethical hackers, including the best security tools in the Market that are not accessible for students due to its high cost.

Our online academy is unique in the world, with a social network with multiple students interacting online, with CTF-like challenges released constantly to test the students skills which give them points that are reflected in the ranking system showing the best minds in the Academy and finally with head hunters monitoring the best students throwing them job offers daily.

Do you want to compete with other professionals to know who is the best Penetration Tester, Malware Analysis or Reverse Engineer while learning real-world attack and defense techniques? Come and show us what you got!

Description

Cybersecurity is one of the most important considerations that companies must make in this day and age. Consequently, qualified security analysts and penetration testers are in hot demand! In this massive course, which combines two popular courses, you'll receive prep materials for the Computer Hacking Forensic Investigator (CHFI) certification, and Certified Security Analyst (CSA) certification exams. By course's end, you'll have the know-how to ace both of these exams and become a well-paid security analyst.

  • Access 305 lectures & 48 hours of content 24/7
  • Gain practical experience w/ the standard tools required to successfully carry out a computer forensic investigation
  • Understand how to prosecute data breaches, corporate espionage, insider threats, & more
  • Perform intensive assessments to identify & mitigate risks to an infrastructure's security
  • Identify, avoid, & eliminate security threats by studying real life examples

Specs

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...