Books & Videos

Table of Contents

Chapter: Introduction

Welcome To The Course

01m 40s

About The Author

01m 11s

Chapter: Social Engineering

Social Engineering - Hacking The Human Part - 1

05m 13s

Social Engineering - Hacking The Human Part - 2

03m 41s

Social Engineering - Social Engineering Techniques - Human Based

02m 40s

Social Engineering Techniques - Computer-Mobile Based Part - 1

04m 22s

Social Engineering Techniques - Computer-Mobile Based Part - 2

04m 49s

Social Engineering Targets And Defense Strategies Part - 1

04m 14s

Social Engineering Targets And Defense Strategies Part - 2

03m 48s

Chapter: Leveraging Malware

Malware Classification And Distribution Part - 1

04m 13s

Malware Classification And Distribution Part - 2

03m 29s

Building Trojans Part - 1

07m 13s

Building Trojans Part - 2

02m 44s

Building Trojans Part - 3

02m 36s

How Hackers Deploy Trojans

06m 6s

Types Of Trojans

02m 3s

Trojan Toolkit Exploration

04m 40s

Viruses Part - 1

04m 20s

Viruses Part - 2

04m 8s

Viruses Part - 3

08m 33s

Virus Writing And Introduction To Worms Part - 1

05m 58s

Virus Writing And Introduction To Worms Part - 2

05m 39s

Malware Reverse Engineering

06m 21s

Malware Detection Part - 1

05m 41s

Malware Detection Part - 2

03m 30s

Malware Countermeasures Part - 1

06m 11s

Malware Countermeasures Part - 2

05m 10s

Chapter: Session Manipulation

Session Hijacking And Spoofing Part - 1

05m 3s

Session Hijacking And Spoofing Part - 2

05m 49s

Application Session Hijacking

05m 25s

Network Level Session Hijacking

05m 18s

Session Hijacking Tools Part - 1

05m 47s

Session Hijacking Tools Part - 2

03m 22s

Chapter: Wireless Hacking

Covering The Spectrum

08m 5s

Wireless Encryption

05m 1s

Wi-Fi Attacks

02m 46s

MitM Wi-Fi Attacks

04m 6s

Cracking Wi-Fi Encryption

04m 32s

Wireless Hacking Tools

02m 11s

Bluetooth

03m 31s

Wireless Countermeasures

02m 55s

Wireless Intrusion Prevention Systems

03m 29s

Wireless Pen Testing - Self Assessment

03m 28s

Chapter: Mobile Pen Testing

Mobile Attack Vectors

04m 37s

Hacking Android Devices

05m 7s

Hacking Ios

03m 55s

Mobile Pen Testing

05m 31s

Chapter: Conclusion

Wrap Up And Thank You

00m 31s