Become a member
Online Access to 1000+ Courses!

Using Security Tools Course

9hrs (91 Lessons) 2009-12-04

This Course can only be played using a subscription. You can play only first 3 chapters for free. Click Here to avail a subscription
Whether you are a new security professional or a seasoned security engineer, you’ll need experience in working with the most commonly used security tools available. Veteran VTC author Bobby Rogers will show you how to use basic security tools that every security professional should be familiar with, such as Netcat, Nikto, Nessus, Nmap, and many others. You will learn how to use tools covering a wide range of security disciplines, such as penetration testing, computer forensics, and network security. Demonstrations include both Windows and Linux tools, and show how these tools are actually used in the daily jobs of security professionals everywhere. To begin learning today, simply click on the movie links.

Welcome to the Virtual Training Company course Using Security Tools. I'm Bobby Rogers and I'm going to be your guide throughout this course. Now, this course is a little bit different than what you might have taken with other Virtual Training Company courses or other courses where you may have sat in a classroom or even books you might have read and the reason this is a little bit different is that we're not going to cover a lot of theory or concepts during the course. What this course entails is basically how to use basic security tools that all security practitioners should be able to use. We're going to cover fundamental knowledge, fundamental hands-on demonstrations of tools and techniques that relate to all areas of computer security. We're going to try to cover cutting edge versions of tools; in other words we're going to try to use tools that are in use today by security professionals around the world. Now, we'll touch here and there on some tools that have been around for a while and are still widely used because they're tried and true but we are going to focus primarily on cutting-edge tools, new tools. Now, we've categorized these tools rather loosely and you can slice and dice some of these categories any way you would like but we've categorized them and you can basically follow along. You can take this course and look at the tool demonstrations basically in any order you'd like or you can look at them in the order that most interest you; that's most important to you. Now, some of these may fall in specific categories. For example, we've got some tools that are listed in the Linux Tools category but they're also network security tools or they might be forensics tools. So don't feel bad if these aren't categories exactly the way you think you might put them in a category because they usually fall into a wide range of different areas and again, these are basic, common tools that all security practitioners should be familiar with. There's good training out there but there's a lack of hands-on demonstrations. I've met a lot of security professionals over the years that knew their concepts and their knowledge very well but maybe they had never been exposed to a particular tool before or had never worked with it and in this world of security we live in now, if you're a security professional, you need to have exposures to all these different tools. So having said that, let's go ahead and look at some of the tools we're going to cover and some of the categories we're going to talk about. As I said, we've divided these up and this may be nothing more than arbitrary way of categorizing certain tools but we've done the best we can to put them in a logical order. Again, you may look at this and decide to take this in any order you would like but here's the categories that we've divided it up into. We've got General Security Utilities and these are utilities that are normally cross-platform. They may or may not be specific Windows or Linux tools. They may be used across platforms. There may be a Windows version and a Linux version. Then we're going to talk about specific Windows utilities. These are specific to the Windows Operating System; some things you won't find in Linux and also right after that we're going to talk about Linux-specific tools, security tools and we'll cover command-line tools and GUI tools throughout this course; sometimes versions of both, sometimes just command-line version or just the GUI version. The next category we'll look at will be Scanning and Reconnaissance Tools and these are tools that you would use, let's say you might be doing a pen test or you might be doing vulnerability scanning on your network. These tools will help you do that. Then we're going to look at specific Network Security Tools. We'll also look at Wireless Security Tools as well. Then we're going to go to Web Tools. We'll look at web-based tools that you might find on an Internet site or an Internet site that would help you manage web security. We'll also look at Encryption Tools as well. These tools cover data at rest on your system and how to encrypt that and also tools that cover how to encrypt data in transit; that's being transmitted across unsecure networks. We've also thrown some Penetration Testing Tools in there as well; Hacker Tools for lack of a better word that I think you'll find very interesting that security professionals need to know also. They're not just for hackers. They're for security professionals to learn how to use to secure their own networks. We'll also look at Computer Forensics Tools and these tools are very useful in the incidence response arena of computer security. You'll learn to use these tools to gather and collect evidence and analyze it on computer systems. Then we're going to take a generic look at Live Linux Distros and these are becoming very popular in the security world in that they're very easy to use, they hold a wide variety of security tools and they make using these tools very convenient and usually they're in the form of Linux Distros, live distros that you boot up a computer with and you can either examine the computer itself or you can examine the network around it. And then finally we'll look at building a security toolbox and we'll do this several different ways including building a Linux distro of your own or putting specific tools on a USB thumb drive and so forth. So we're going to look at a wide range of tools and how to use them and that's what this course is going to focus on is how to use the tools. We'll look at what the tool is used for, how it's used, different options and techniques and so forth in using the tool and this is what we'll talk about, we'll stay focused on throughout this course. So sit back and enjoy it but don't sit back too much. I want you to look at the course. I want you to look at the tool demonstrations and then I want you to do some work on your own, set up a practice lab or practice computer and actually work with these tools. That's the only way you're going to get good at using them is actually by using them. So let's go ahead and jump into this right now. I hope you enjoy the course.  

  • Course: Using Security Tools
  • Author: Bobby Rogers
  • SKU: 34068
  • ISBN: 1-935320-88-2
  • Work Files: No
  • Captions: No
  • Subject: Networking & Security
  • The first 3 chapters of courses are available to play for FREE (first chapter only for QuickStart! and MasterClass! courses). Just click on the movie link to play a lesson.
Course outline
Introduction

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
General Utilities

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
VNC (05:31)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
NX Client (06:01)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
VMware pt. 1 (07:55)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
VMware pt. 2 (08:32)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Host Security

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Anti-Malware (06:33)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Windows Utilities

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
MBSA (07:00)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
MSConfig (06:07)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Linux Tools

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
tcpdump (05:51)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
md5sum (05:51)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
su & sudo (08:13)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Scanning & Reconnaisance Tools
Nmap pt. 1 (02:06)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Nmap pt. 2 (07:10)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Nessus pt. 1 (05:46)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Nessus pt. 2 (06:22)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Hping3 (07:19)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Look-at-Lan (06:06)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Fing (04:57)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Network Security Tools

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Wireless Security
Net Stumbler (05:20)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
inSSIDer (04:43)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Web Tools

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Nikto/Wikto (07:10)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
NetCraft (04:02)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
whois (06:02)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Paros Proxy (06:41)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Encryption Tools
TrueCrypt (07:55)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Penetration Testing tools

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Netcat (05:24)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Computer Forensics Tools
Adepto (02:50)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Ghost (06:34)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Autopsy (09:32)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Live Linux Distros
Backtrack 4 (05:46)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Helix (05:30)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Building a Security Toolbox

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Conclusion

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Resources (04:54)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Credits

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference