-
Chapter 1 : Getting Familiar with VMWareLecture 1: Getting Familiar with VMWarePrivateLecture 2: Installing VMWare and setting up the InfoSec Ubuntu VMPrivateLecture 3: Installing VMware Workstation PlayerPrivateLecture 4: Download the InfoSec Addicts Virtual MachinePrivateLecture 5: Adding the VM to VMWare Workstation PlayerPrivateLecture 6: Download and install the attack VMPrivateLecture 7: Launch VMware Workstation Player 12.5.2PrivateLecture 8: Installing open-vm-toolsPrivateLecture 9: Legacy installation of VMWare Tools - included for referencePrivate
-
Chapter 2 : Basic Linux Commands
-
Chapter 3 : Basic Shell Scripting
-
Chapter 4 : Compiling & Debugging
-
Chapter 5 : Getting Familiar with UbuntuLecture 1: Getting familiar with UbuntuPrivateLecture 2: Build the Ubuntu Perfect Server using UbuntuPrivateLecture 3: Preliminary InformationPrivateLecture 4: Update Your Linux InstallationPrivateLecture 5: Changing the default ShellPrivateLecture 6: Disable AppArmorPrivateLecture 7: Synchronize the System ClockPrivateLecture 8: Install Postfix, Dovecot, MariaDB, rkhunter and binutilsPrivateLecture 9: Postfix - Manual ConfigurationsPrivateLecture 10: MariaDB - Manual ConfigurationsPrivateLecture 11: Installing Amavisd-new, SpamAssassin, and ClamavPrivateLecture 12: Installing Apache, PHP, phpMyAdmin, FCGI, SuExec, PearPrivateLecture 13: PHP Opcode cachePrivateLecture 14: PHP-FPMPrivateLecture 15: Additional PHP VersionsPrivateLecture 16: Installing Let's EncryptPrivateLecture 17: Install MailmanPrivateLecture 18: Install PureFTPd and QuotaPrivateLecture 19: Installing BIND DNS ServerPrivateLecture 20: Installing Vlogger, Webalizer, and AWstatsPrivateLecture 21: Installing JailkitPrivateLecture 22: Installing fail2ban and UFWPrivateLecture 23: Installing Roundcube WebmailPrivateLecture 24: Installing ISPConfig 3PrivateLecture 25: Install SSHFSPrivateLecture 26: Installing SSHFS on UbuntuPrivateLecture 27: Install SambaPrivateLecture 28: Install Google 2 Factor AuthenticationPrivateLecture 29: Installing libpam-google-authenticatorPrivateLecture 30: Configuring OpenSSHPrivateLecture 31: Making SSH Aware of MFAPrivateLecture 32: Install Mod_SecurityPrivateLecture 33: Configuring Mod_Security RulesPrivateLecture 34: Configuring OWASP (Open Web Application Security Project)Private
-
Chapter 6 : Getting Familiar with CentOS 7.2Lecture 1: Build the CentOS Perfect ServerPrivateLecture 2: Preliminary InformationPrivateLecture 3: Update Your Linux InstallationPrivateLecture 4: Disable SELinuxPrivateLecture 5: Enable Additional Repositories and Install SoftwarePrivateLecture 6: QuotaPrivateLecture 7: Enabling quota on the root partitionPrivateLecture 8: Enabling quota on a separate /var partitionPrivateLecture 9: Install Apache, MySQL (MariaDB), phpMyAdminPrivateLecture 10: Install DovecotPrivateLecture 11: Install PostfixPrivateLecture 12: Install GetMailPrivateLecture 13: Set MySQL Passwords and Configure phpMyAdminPrivateLecture 14: Install Amavisd-new, SpamAssassin, and ClamAVPrivateLecture 15: Installing Apache with mod_php, mod_fcgi/PHP5, PHP-FPMPrivateLecture 16: Installation of mod_pythonPrivateLecture 17: Install PureFTPDPrivate
-
Chapter 7 : Security Concepts – Permissions
-
Chapter 8 : Security Concepts – Hashing & Encryption
-
Chapter 9 : Security Concepts – Firewall Concepts
-
Chapter 10 : Security Concepts – SE Linux
-
Chapter 11 : Security Concepts – AppArmor
-
Chapter 12 : Security Concepts – Log Analysis
-
Chapter 13 : Let’s Hack This InfoSec Addicts Machine
-
Chapter 14 : Security Concepts – Post ExploitationLecture 1: Getting files onto a systemPrivateLecture 2: Remote code executionPrivateLecture 3: Avoiding history & cleaning logsPrivateLecture 4: Breaking out of a restricted shellPrivateLecture 5: Privilege EscalationPrivateLecture 6: Reverse ShellsPrivateLecture 7: TunnelingPrivateLecture 8: PersistencePrivateLecture 9: Finding backdoors and rootkitsPrivate
-
Chapter 15 : Basic Windows CommandsLecture 1: VM Download and SetupPrivateLecture 2: Use CMD.exePrivateLecture 3: Having cmd.exe Run a Command... and Dot Is In Your PATHPrivateLecture 4: Dot is in Your PATH, and COM Files Take PrecedencePrivateLecture 5: Redirection of Standard outputPrivateLecture 6: Controlling Output with els, more, find, findstr, and sortPrivateLecture 7: The type Command and Concatenating Multiple CommandsPrivateLecture 8: Command historyPrivateLecture 9: Command Repeat: A Little DifferentPrivateLecture 10: Tab Auto CompletePrivateLecture 11: Echo StrangenessPrivateLecture 12: Hostname and Set CommandsPrivateLecture 13: Line Count ExamplesPrivateLecture 14: Summary of Handy GUIs Invocable at the Command LinePrivateLecture 15: Remote Command ShellPrivateLecture 16: TelnetClients GroupPrivateLecture 17: Remote Access without ShellPrivateLecture 18: The dir CommandPrivateLecture 19: Searching DirectoriesPrivateLecture 20: Searching for Directories vs. Not Searching for DirectoriesPrivateLecture 21: Searching File ContentsPrivateLecture 22: NET COMMANDPrivateLecture 23: Net use CommandPrivateLecture 24: Making a NetBIOS / SMB ConnectionPrivateLecture 25: The runas commandPrivateLecture 26: The net localgroup commandPrivateLecture 27: Net accountsPrivateLecture 28: Net command optionsPrivateLecture 29: Using net userPrivateLecture 30: Other Useful Commands: netshPrivateLecture 31: A Review of NetstatPrivateLecture 32: Protocol StatisticsPrivateLecture 33: Running Netstat Every N SecondsPrivateLecture 34: Unusual (but Helpful) Uses of netstatPrivateLecture 35: One More Unusual (but Helpful) Use of NetstatPrivateLecture 36: Other Useful Commands: TasklistPrivateLecture 37: USING tasklist and taskillPrivateLecture 38: The Services Controller commandPrivateLecture 39: Analyzing and Changing Individual Services with scPrivateLecture 40: Process and ServicesPrivate
-
Chapter 16 : Introduction to WMICLecture 1: WMICPrivateLecture 2: WMI Query Language (WQL)PrivateLecture 3: WMIC and ServicesPrivateLecture 4: WMIC and SharesPrivateLecture 5: Using wmic useraccount and qfePrivateLecture 6: WMIC nicconfig - Getting MAC addressPrivateLecture 7: WMIC and LogsPrivateLecture 8: WQL Where ClausesPrivateLecture 9: WQL Where Clauses with LIKE and %PrivateLecture 10: Calling WMIC MethodsPrivateLecture 11: Useful WMIC Methods: ProcessPrivateLecture 12: Useful WMIC Methods: OSPrivateLecture 13: Useful WMIC Methods: nicconfiqPrivate
-
Chapter 17 : PowerShell Fundamentals
-
Chapter 18 : Regular Expressions in PowerShell
-
Chapter 19 : Log Analysis with PowerShell
-
Chapter 20 : Pentester Tasks with PowerShellLecture 1: Listing IPsPrivateLecture 2: Ping SweepPrivateLecture 3: Reverse LookupsPrivateLecture 4: Forward LookupsPrivateLecture 5: Port ScansPrivateLecture 6: Enumerate WebserversPrivateLecture 7: Parsing Nmap ScansPrivateLecture 8: Parsing Nessus ScansPrivateLecture 9: Post Exploitation 1 - Powershell in a shellPrivateLecture 10: Post Exploitation 2 - Powershell on shellPrivateLecture 11: Compress ScriptPrivateLecture 12: Execute Compressed ScriptPrivateLecture 13: Abusing Windows TokensPrivateLecture 14: Powershell on MetasploitPrivateLecture 15: Post Exploitation With PowersploitPrivateLecture 16: Using Nishang For Post-ExploitationPrivateLecture 17: PowerShell Execution Policy BypassPrivateLecture 18: Native PowerShell x86 Shellcode Injection on 64-bit PlatformPrivateLecture 19: Bypassing Antivirus with PowerShellPrivateLecture 20: Reflective DLL Injection with PowerShellPrivateLecture 21: Reverse Engineering Powershell cmdletsPrivate
-
Chapter 21 : Debugger and Assembly Basics
-
Chapter 22 : Exploit Development - Stack Overflows
-
Chapter 23 : Exploit Development - Structured Exception Handlers
-
Chapter 24 : Exploit Development - Not Enough Space For Shellcode
-
Chapter 25 : Ruby For Metasploit
-
Chapter 26 : Metasploit Scripting & Automation
-
Chapter 27 : Bypassing Security Mechanisms with Metasploit
-
Chapter 28 : Exploit Development with Metasploit
-
Chapter 29 : Splunk Basics
-
Chapter 30 : Hunting malware with Splunk
-
Chapter 31 : Python Fundamentals
-
Chapter 32 : File parsing with Python
-
Chapter 33 : Log parsing with Python
-
Chapter 34 : PCAP Parsing with Python
-
Chapter 35 : Network programming with Python
-
Chapter 36 : Password cracking with Python
-
Chapter 37 : Malware Analysis with Python
-
Chapter 38 : Web Scraping with Python
-
Chapter 39 : Web App Pentesting with Python
-
Chapter 40 : Cryptography with Python
-
Chapter 41 : Intro to reverse engineering
-
Chapter 42 : Identifying program control flow
-
Chapter 43 : Patching binaries and writing keygens
-
Chapter 44 : Intro to secure coding
-
Chapter 45 : Secure Code Review
-
Chapter 46 : Applied data science for InfoSec
-
Chapter 47 : Big Data for InfoSec with Python
Course Description
The InfoSec Addicts Cyber Professional Program (aka: Zero to Hero) is a program designed to take someone from relative newcomer to Cyber Security Expert.
By combining an in-depth, hybrid of self-paced and instructor-led training, along with an InfoSec project-based approach designed this course to land you a job. This is NOT a bootcamp, you are not drinking from the cyber firehose. The goal is to make the candidate proficient, not to get the candidate through the material as quickly as possible. gram
Joseph McCray
Joe McCray is a US Air Force Veteran and has been in the IT Security field for over 12 years. He has worked extensively with the medical community, the financial industry, retail, the federal sector, the Department of Defense, 3-letter agencies, and several foreign governments. His technical background is very broad with over 20 industry certifications and experience covering networks, web applications, binary applications, mobile applications and his expertise is in bypassing IT Security Systems
Login to see discussions
Highlights
- Linux For InfoSec Professional
- Windows For InfoSec Professionals
- Network Penetration Testing
- Web App Penetration Testing
- Python For InfoSec Professionals
Course Completion rule
- Traversal rule : Lectures must all be seen and completed sequentially
- All lectures must be completed
- User must pass all tests to download certificate