Studying:

Since the end of 2019 I have decided to learn more about Cyber Security which includes the development of this website which only uses html. I have enrolled myself in several intensive cyber security courses since the December 2019. I aim to have finished them by December 2024.

The Ethical Hacker Master Class.

  • Ethical Hacker Training
  • Cyber Threat Intelligence Analyst
  • Advanced Persistent Threat Analyst
  • Computer Hacker & Forensic Investigator Training
  • CompTIA A+ Certification Prep
  • CompTIA Security+ Certification Prep
  • CompTIA Network+ Certification Prep
  • Security Analyst Training
  • Ethical Hacker Bootcamp
  • Ethical Hacking With Python
  • Udemy Ethical Hacking

  • Section 1: Course Resources
  • Section 2: Introduction
  • Section 3: Note Keeping
  • Section 4: Networking Refresher
  • Section 5: Setting Up Our Lab
  • Section 6: Introduction to Linux
  • Section 7: Introduction to Python
  • Section 8: The Ethical Hacker Methodology
  • Section 9: Information Gathering (Reconnaissance)
  • Section 10: Scanning & Enumeration
  • Section 11: Additional Scanning Tools
  • Section 12: Exploitation Basics
  • Section 13: Mid-Course Capstone
  • Section 14: Introduction to Exploit Development (Buffer Overflows)
  • Section 15: Active Directory Overview
  • Section 16: Active Directory Lab Build
  • Section 17: Attacking Active
  • Section 18: Attacking Active Directory: Post-Compromise Enumeration
  • Section 19: Attacking Active Directory: Post-Compromise Attacks
  • Section 20: Post Exploitation
  • Section 21: Web Application Enumeration, Revisited
  • Section 22: Testing the Top 10 Web Application Vulnerabilities
  • Section 23: Wireless Penetration Testing
  • Section 24: Legal Documents and Report Writing
  • Section 25: Career Advice
  • Section 26: BONUS Section
  • Cyber Training 365.

  • Computer Forensics Investigation Process
  • Searching and Seizing Computers Digital Evidence
  • First Responder Person
  • Computer Forensic Lab
  • Understanding HardDisks & File Systems
  • Data Acquisition & Duplication
  • Recovering Deleted Files & Partitions
  • Stegnography
  • Application Password Crackers
  • Network Forensics, Investigating
  • Network Logs & Investigating Network Traffic
  • Investigating Wireless Attacks
  • Tracking Email & Investigating
  • Email Clients
  • Mobile Forensics
  • Investigative Reports
  • Becoming an Expert Witness
  • Need for Security Analysis
  • TCP IP Packet Analysis
  • Penetration Testing Methodologies
  • Customer and Legal Agreements
  • Rules Of Engagement
  • Penetration Testing Planning & Scheduling
  • Pre Penetration Testing Steps
  • Information Gathering
  • Vulnerability Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Firewall Penetration Testing
  • Intrusion Detection System (IDS) Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • SWeb Application Penetration Testing
  • SQL Penetration Testing
  • Penetration Testing Reports & Post Testing Actions
  • Database Penetration Testing
  • Wireless Network Penetration Testing
  • Mobile Devices Penetration Testing
  • Cloud Penetration Testing
  • Methodology
  • © 2021 Josh Mountain