All language subtitles for 0101 What You Should Expect From The Video

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian Download
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,610 --> 00:00:04,660 in this lesson we're going to go over 2 00:00:02,280 --> 00:00:04,660 3 00:00:02,290 --> 00:00:07,780 what you should expect from this series 4 00:00:04,650 --> 00:00:07,780 5 00:00:04,660 --> 00:00:10,059 of videos so in terms of topics covered 6 00:00:07,770 --> 00:00:10,059 7 00:00:07,780 --> 00:00:12,570 we're going to cover a pretty broad 8 00:00:10,049 --> 00:00:12,570 9 00:00:10,059 --> 00:00:15,459 range of material we're going to go over 10 00:00:12,560 --> 00:00:15,459 11 00:00:12,570 --> 00:00:19,060 footprinting and reconnaissance where 12 00:00:15,449 --> 00:00:19,060 13 00:00:15,459 --> 00:00:22,600 you get an idea of what's involved in 14 00:00:19,050 --> 00:00:22,600 15 00:00:19,060 --> 00:00:25,600 the engagement that you are working on 16 00:00:22,590 --> 00:00:25,600 17 00:00:22,600 --> 00:00:28,000 and information about the target that 18 00:00:25,590 --> 00:00:28,000 19 00:00:25,600 --> 00:00:30,520 you are engaged with we're going to talk 20 00:00:27,990 --> 00:00:30,520 21 00:00:28,000 --> 00:00:32,680 about networking fundamentals and here 22 00:00:30,510 --> 00:00:32,680 23 00:00:30,520 --> 00:00:36,100 we're going to get our hands dirty with 24 00:00:32,670 --> 00:00:36,100 25 00:00:32,680 --> 00:00:40,239 packets and understanding tcp/ip at a 26 00:00:36,090 --> 00:00:40,239 27 00:00:36,100 --> 00:00:42,520 deeper level and also understanding how 28 00:00:40,229 --> 00:00:42,520 29 00:00:40,239 --> 00:00:44,829 the different protocols work and why 30 00:00:42,510 --> 00:00:44,829 31 00:00:42,520 --> 00:00:47,170 they work that way we're going to talk 32 00:00:44,819 --> 00:00:47,170 33 00:00:44,829 --> 00:00:49,690 about cryptography where we talk about 34 00:00:47,160 --> 00:00:49,690 35 00:00:47,170 --> 00:00:53,980 different cryptographic ciphers we're 36 00:00:49,680 --> 00:00:53,980 37 00:00:49,690 --> 00:00:56,200 going to deal with web encryption so SSL 38 00:00:53,970 --> 00:00:56,200 39 00:00:53,980 --> 00:00:58,899 and TLS we're going to talk about 40 00:00:56,190 --> 00:00:58,899 41 00:00:56,200 --> 00:01:00,399 certificates and creation of 42 00:00:58,889 --> 00:01:00,399 43 00:00:58,899 --> 00:01:02,800 certificates and how they actually 44 00:01:00,389 --> 00:01:02,800 45 00:01:00,399 --> 00:01:05,890 operate or talk about public key 46 00:01:02,790 --> 00:01:05,890 47 00:01:02,800 --> 00:01:08,770 cryptography we're also going to deal 48 00:01:05,880 --> 00:01:08,770 49 00:01:05,890 --> 00:01:12,159 with scanning and enumeration so nmap 50 00:01:08,760 --> 00:01:12,159 51 00:01:08,770 --> 00:01:15,909 and dealing with Windows servers and 52 00:01:12,149 --> 00:01:15,909 53 00:01:12,159 --> 00:01:17,770 using SNMP and LDAP and all of that sort 54 00:01:15,899 --> 00:01:17,770 55 00:01:15,909 --> 00:01:21,190 of stuff we're going to be talking about 56 00:01:17,760 --> 00:01:21,190 57 00:01:17,770 --> 00:01:25,330 penetration where we deal with different 58 00:01:21,180 --> 00:01:25,330 59 00:01:21,190 --> 00:01:28,720 ways of getting into systems and also go 60 00:01:25,320 --> 00:01:28,720 61 00:01:25,330 --> 00:01:31,030 over using metasploit which is an 62 00:01:28,710 --> 00:01:31,030 63 00:01:28,720 --> 00:01:33,340 exploit framework and we're going to 64 00:01:31,020 --> 00:01:33,340 65 00:01:31,030 --> 00:01:36,220 talk about how to use metasploit you 66 00:01:33,330 --> 00:01:36,220 67 00:01:33,340 --> 00:01:38,530 actually get into systems and make use 68 00:01:36,210 --> 00:01:38,530 69 00:01:36,220 --> 00:01:41,110 of the exploits that they have available 70 00:01:38,520 --> 00:01:41,110 71 00:01:38,530 --> 00:01:44,530 we're going to talk about malware so 72 00:01:41,100 --> 00:01:44,530 73 00:01:41,110 --> 00:01:45,880 viruses and worms and rootkits and all 74 00:01:44,520 --> 00:01:45,880 75 00:01:44,530 --> 00:01:48,250 of that sort of stuff we're going to 76 00:01:45,870 --> 00:01:48,250 77 00:01:45,880 --> 00:01:51,040 look at different pieces of malware and 78 00:01:48,240 --> 00:01:51,040 79 00:01:48,250 --> 00:01:53,189 how you would pull that apart in order 80 00:01:51,030 --> 00:01:53,189 81 00:01:51,040 --> 00:01:55,860 to understand what it's doing and 82 00:01:53,179 --> 00:01:55,860 83 00:01:53,189 --> 00:01:59,530 potentially make use of that malware 84 00:01:55,850 --> 00:01:59,530 85 00:01:55,860 --> 00:02:01,270 during a ethical hacking engagement 86 00:01:59,520 --> 00:02:01,270 87 00:01:59,530 --> 00:02:03,310 we're going to talk about different 88 00:02:01,260 --> 00:02:03,310 89 00:02:01,270 --> 00:02:04,810 types of denial of service attacks and 90 00:02:03,300 --> 00:02:04,810 91 00:02:03,310 --> 00:02:07,210 the difference between a denial of 92 00:02:04,800 --> 00:02:07,210 93 00:02:04,810 --> 00:02:09,220 service attack and a distributed denial 94 00:02:07,200 --> 00:02:09,220 95 00:02:07,210 --> 00:02:10,929 of service attack and there is a 96 00:02:09,210 --> 00:02:10,929 97 00:02:09,220 --> 00:02:12,670 difference there so we're going to go 98 00:02:10,919 --> 00:02:12,670 99 00:02:10,929 --> 00:02:14,319 over dos attacks we're going to talk 100 00:02:12,660 --> 00:02:14,319 101 00:02:12,670 --> 00:02:16,780 about web application hacking 102 00:02:14,309 --> 00:02:16,780 103 00:02:14,319 --> 00:02:19,689 and the types of tools that you would 104 00:02:16,770 --> 00:02:19,689 105 00:02:16,780 --> 00:02:21,999 use during web application hacking the 106 00:02:19,679 --> 00:02:21,999 107 00:02:19,689 --> 00:02:24,939 different vulnerabilities that web 108 00:02:21,989 --> 00:02:24,939 109 00:02:21,999 --> 00:02:27,999 applications have and how to make use of 110 00:02:24,929 --> 00:02:27,999 111 00:02:24,939 --> 00:02:30,040 and exploit those vulnerabilities we're 112 00:02:27,989 --> 00:02:30,040 113 00:02:27,999 --> 00:02:33,459 going to talk about wireless networking 114 00:02:30,030 --> 00:02:33,459 115 00:02:30,040 --> 00:02:36,489 how to probe wireless networks what 116 00:02:33,449 --> 00:02:36,489 117 00:02:33,459 --> 00:02:39,519 wireless networks are doing and how to 118 00:02:36,479 --> 00:02:39,519 119 00:02:36,489 --> 00:02:41,230 secure wireless networks we are going to 120 00:02:39,509 --> 00:02:41,230 121 00:02:39,519 --> 00:02:43,629 talk a little bit about detection 122 00:02:41,220 --> 00:02:43,629 123 00:02:41,230 --> 00:02:46,120 evasion and to be honest with you 124 00:02:43,619 --> 00:02:46,120 125 00:02:43,629 --> 00:02:48,790 detection of Asian kind of comes up in a 126 00:02:46,110 --> 00:02:48,790 127 00:02:46,120 --> 00:02:50,769 lot of different areas through many of 128 00:02:48,780 --> 00:02:50,769 129 00:02:48,790 --> 00:02:53,639 the topics we're also going to talk 130 00:02:50,759 --> 00:02:53,639 131 00:02:50,769 --> 00:02:56,379 about programming attacks and how to 132 00:02:53,629 --> 00:02:56,379 133 00:02:53,639 --> 00:02:59,169 protect against and prevent programming 134 00:02:56,369 --> 00:02:59,169 135 00:02:56,379 --> 00:03:01,689 attacks now the approach that I'm going 136 00:02:59,159 --> 00:03:01,689 137 00:02:59,169 --> 00:03:03,730 to be taking in this series of videos is 138 00:03:01,679 --> 00:03:03,730 139 00:03:01,689 --> 00:03:06,639 wherever possible we're going to be 140 00:03:03,720 --> 00:03:06,639 141 00:03:03,730 --> 00:03:08,859 using a hands-on approach so we're going 142 00:03:06,629 --> 00:03:08,859 143 00:03:06,639 --> 00:03:11,379 to show you the actual tools i'm going 144 00:03:08,849 --> 00:03:11,379 145 00:03:08,859 --> 00:03:13,719 to make use of the tools and do some 146 00:03:11,369 --> 00:03:13,719 147 00:03:11,379 --> 00:03:16,480 demonstrations on how they actually work 148 00:03:13,709 --> 00:03:16,480 149 00:03:13,719 --> 00:03:18,729 i am a big believer in getting your 150 00:03:16,470 --> 00:03:18,729 151 00:03:16,480 --> 00:03:22,180 hands dirty as the best way to learn 152 00:03:18,719 --> 00:03:22,180 153 00:03:18,729 --> 00:03:24,939 anything so as we go through this series 154 00:03:22,170 --> 00:03:24,939 155 00:03:22,180 --> 00:03:26,949 of videos i strongly encourage you to 156 00:03:24,929 --> 00:03:26,949 157 00:03:24,939 --> 00:03:28,389 get access to the tools that i'm going 158 00:03:26,939 --> 00:03:28,389 159 00:03:26,949 --> 00:03:31,209 to be demonstrating wherever possible 160 00:03:28,379 --> 00:03:31,209 161 00:03:28,389 --> 00:03:33,970 and dig in and get your hands dirty 162 00:03:31,199 --> 00:03:33,970 163 00:03:31,209 --> 00:03:36,459 along with me there are places where 164 00:03:33,960 --> 00:03:36,459 165 00:03:33,970 --> 00:03:38,650 we're going to be going over theoretical 166 00:03:36,449 --> 00:03:38,650 167 00:03:36,459 --> 00:03:41,139 material and i'm not a big fan of 168 00:03:38,640 --> 00:03:41,139 169 00:03:38,650 --> 00:03:44,409 PowerPoint slides but sometimes they are 170 00:03:41,129 --> 00:03:44,409 171 00:03:41,139 --> 00:03:46,870 necessary in order to convey certain 172 00:03:44,399 --> 00:03:46,870 173 00:03:44,409 --> 00:03:49,269 types of information so wherever 174 00:03:46,860 --> 00:03:49,269 175 00:03:46,870 --> 00:03:51,669 possible i'm going to minimize their use 176 00:03:49,259 --> 00:03:51,669 177 00:03:49,269 --> 00:03:54,790 but you will run across places where 178 00:03:51,659 --> 00:03:54,790 179 00:03:51,669 --> 00:03:56,349 they are just a necessary evil and we're 180 00:03:54,780 --> 00:03:56,349 181 00:03:54,790 --> 00:03:58,810 gonna have to go through some slide 182 00:03:56,339 --> 00:03:58,810 183 00:03:56,349 --> 00:04:02,019 where in order to get some particular 184 00:03:58,800 --> 00:04:02,019 185 00:03:58,810 --> 00:04:04,389 points across that are primarily of a 186 00:04:02,009 --> 00:04:04,389 187 00:04:02,019 --> 00:04:06,519 theoretical nature so that's the 188 00:04:04,379 --> 00:04:06,519 189 00:04:04,389 --> 00:04:09,280 approach that will be taking through 190 00:04:06,509 --> 00:04:09,280 191 00:04:06,519 --> 00:04:13,349 this series of videos and I hope that 192 00:04:09,270 --> 00:04:13,349 193 00:04:09,280 --> 00:04:13,349 you have fun as we go along the way 10510

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.