Advanced Cyber Security Training: Hands-On Password Attacks

Welcome to Hands-On Password Attacks and Security and the start of your learning journey on Advanced Cyber Security Training brought to you by EC Council.

Intermediate 0(0 Ratings) 0 Students enrolled
Created by Skill Central Last updated Tue, 06-Jul-2021 English
What will i learn?
  • By the end of this week, you will be able to:
  • identify how to prevent password attacks
  • describe when password cracking is permissible
  • describe the basics of entropy, hashing, and cryptography for password security
  • explain how to crack a password
  • explain how to set up a small environment for security testing
  • describe brute force attacks, dictionary attacks, rainbow table attacks and keyloggers
  • explain how to bypass passwords using brute force attacks, dictionary attacks, rainbow table attacks, and keyloggers

Curriculum for this course
24 Lessons 01:57:11 Hours
Bypassing Your First Password
4 Lessons 00:22:59 Hours
  • Basics of Entropy for Password Security 00:05:31
  • Basics of Hashing and Cryptography 00:05:29
  • Setting Up the Environment 00:07:13
  • Bypassing your First Password 00:04:46
Brute Force Attacks
3 Lessons 00:09:53 Hours
  • Tools and Commands for Brute Force Attacks 00:03:29
  • Cracking Weak Passwords 00:02:00
  • Brute Forcing your First Real Password 00:04:24
Dictionary Attacks
3 Lessons 00:18:36 Hours
  • Tools and Commands for Dictionary Attacks 00:05:42
  • Using Rules in a Dictionary Attack 00:06:42
  • Crack a Password Using a Dictionary Attack 00:06:12
Rainbow Table Attacks
4 Lessons 00:18:01 Hours
  • What Are Rainbow Tables? 00:05:02
  • Tools and Commands for Rainbow Table Attacks 00:03:35
  • Crack a Password Using a Rainbow Table: Part 1 00:02:23
  • Crack a Password Using a Rainbow Table: Part 2 00:07:01
The Downside of Passwords
4 Lessons 00:17:48 Hours
  • Password Spraying 00:04:00
  • Credential Stuffing 00:04:48
  • Keylogger Attacks 00:04:41
  • Alternatives to Password Authentication 00:04:19
Remedies and Mitigations
6 Lessons 00:29:54 Hours
  • Protect Your Passwords Against Rainbow Table Attacks 00:03:39
  • Prevent Your Key Actions from Being Recorded by a Keylogger 00:03:33
  • Other Considerations 00:04:09
  • Password Managers, The All-In-One Solution? 00:06:45
  • Case Studies Part 2 00:06:31
  • Case Studies Part 1 00:05:17
Requirements
+ View more
Description

 

Passwords have become the top authentication factor in today’s world. You use it in combination with an email or username to sign into almost any service. Big Corporations like Google, Microsoft, Amazon, and Facebook still widely use passwords as an authentication mechanism today. But how secure are passwords?

This course focuses on the practical attacks that malicious users use to crack passwords, how you can use this attack in a penetration test, and how you can prevent them. We will very briefly cover the basics of cryptography, hashing and entropy and then immediately go on to crack different types of passwords using different methodologies.

+ View more
Other related courses
09:05:28 Hours
Updated Thu, 10-Jun-2021
3 76 Free
03:48:54 Hours
Updated Thu, 10-Jun-2021
0 5 ₦5,000
00:00:00 Hours
Updated Mon, 28-Jun-2021
0 0 ₦5,000
00:00:00 Hours
0 2 ₦5,000
00:00:00 Hours
0 1 ₦5,000
About the instructor
  • 5 Reviews
  • 158 Students
  • 96 Courses
+ View more

 

Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
₦10,000
Buy now
Includes:
  • 01:57:11 Hours On demand videos
  • 24 Lessons
  • Access on mobile and tv
  • Full lifetime access
  • Certificate of completion
  • Compare this course with another