
System Hacking and Security
Curriculum
- 7 Sections
- 50 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- Section 1: Introduction12
- 1.01. Objective and Outcome1 Minute
- 1.12. Introduction1 Minute
- 1.23. System Basics1 Minute
- 1.34. System Basics – Powering on the System2 Minutes
- 1.45. System Basics – Processor2 Minutes
- 1.56. System Basics – Memory2 Minutes
- 1.67. System Basics – Boot Loader2 Minutes
- 1.78. System Basics – Operating System2 Minutes
- 1.89. System Basics – File Management Unit Explained2 Minutes
- 1.910. System Basics – Security Management Unit Explained2 Minutes
- 1.1011. System Basics – Switching off the System1 Minute
- 1.12Quiz 1: System Basics10 Questions
- Section 2: Password Cracking15
- 2.012. What are Passwords? How are they used?2 Minutes
- 2.113. Password Cracking – An introduction1 Minute
- 2.2Quiz 2: Password Cracking2 Questions
- 2.314. Keylogging – Password Cracking2 Minutes
- 2.4Quiz 3: Keylogging2 Questions
- 2.515. Password Guessing1 Minute
- 2.6Quiz 4: Password Guessing1 Question
- 2.716. Man-In-The-Middle2 Minutes
- 2.8Quiz 5: Man – in – the – Middle2 Questions
- 2.917. Password Sniffing – Passive Password Sniffing1 Minute
- 2.10Quiz 6: Passive MITM2 Questions
- 2.1118. Offline Password Cracking – Using Dictionary Method4 Minutes
- 2.12Quiz 7: Offline Password Cracking – Dictionary attack2 Questions
- 2.1319. Offline Password Cracking – Using Rainbow Tables Method1 Minute
- 2.14Quiz 8: Offline Password Cracking – Rainbow Tables1 Question
- Section 3: Cryptography6
- Section 4: Steganography22
- 4.025. An Introduction to Steganography3 Minutes
- 4.1Quiz 10: Steganography10 Minutes4 Questions
- 4.226. Image steganography2 Minutes
- 4.327. Image Steganography – How it works?3 Minutes
- 4.428. Image Steganography – Getting the hidden message1 Minute
- 4.5Quiz 11: Image Steganography1 Question
- 4.629. Audio steganography3 Minutes
- 4.7Quiz 12: Audio Steganography1 Question
- 4.830. Text steganography5 Minutes
- 4.9Quiz 13: Text steganography2 Questions
- 4.1031. Whitespace steganography3 Minutes
- 4.11Quiz 14: Whitespace Steganography2 Questions
- 4.1232. Email Steganography2 Minutes
- 4.13Quiz 15: Email Steganography1 Question
- 4.1433. Document Steganography2 Minutes
- 4.15Quiz 16: Document Steganography1 Question
- 4.1634. File merging and mangling3 Minutes
- 4.1735. Hiding a RAR file behind an image1 Minute
- 4.1836. Hiding text behind an image1 Minute
- 4.19Quiz 17: File Merging and File Mangling1 Question
- 4.2037. Steganalysis1 Minute
- 4.21Quiz 18: Steganalysis and Hiding files behind RAR and text file1 Question
- Section 5: Process and Memory hack using Cheat Engine6
- Section 6: Reverse Engineering7
- 6.043. Reverse Engineering – An Introduction.2 Minutes
- 6.144. Reverse Engineering – Study of the File1 Minute
- 6.245. Reverse Engineering – “The Vault”2 Minutes
- 6.346. Reverse Engineering – Cracking “The Vault”2 Minutes
- 6.447. Reverse Engineering – ” Tantanos Keygenme”1 Minute
- 6.548. Reverse Engineering – Cracking “Tantanos Keygenme”1 Minute
- 6.6Quiz 20: Reverse Engineering4 Questions
- Section 7: Privilege Escalation3