Section 01: Introduction to Cyber Security Masterclass Course | |||
Course Introduction | 00:04:00 | ||
Section 02: Complete Computer Networking for Cybersecurity and Ethical Hacking | |||
What is a Network? | 00:04:00 | ||
What is a Local Area Network? | 00:03:00 | ||
Routers and LAN | 00:03:00 | ||
Network Components | 00:07:00 | ||
WAN and MPLS | 00:06:00 | ||
Peer to Peer Network Architecture | 00:04:00 | ||
Client-Server Network Architecture | 00:04:00 | ||
Bus and Star Topology | 00:06:00 | ||
Mesh and Ring Topology | 00:05:00 | ||
Other Network Topologies that you should know! | 00:08:00 | ||
Quick Recap | 00:03:00 | ||
Introduction to Internetworking Models | 00:03:00 | ||
Layered Approach and Advantages | 00:05:00 | ||
Introduction to OSI Model | 00:06:00 | ||
OSI Model: Application Layer | 00:04:00 | ||
OSI Model: Presentation and Session Layer | 00:02:00 | ||
OSI Model: Transport Layer | 00:02:00 | ||
Connection Oriented vs Connectionless Service | 00:06:00 | ||
What is Flow Control? | 00:05:00 | ||
What is Windowing? | 00:04:00 | ||
OSI Model: The Physical Layer | 00:04:00 | ||
Quick Recap | 00:04:00 | ||
What’s next? | 00:02:00 | ||
What is a Coaxial Cable? | 00:06:00 | ||
What is a Twisted Pair Cable? | 00:03:00 | ||
What is Fibre Optic Cable? | 00:06:00 | ||
Media Converters | 00:05:00 | ||
UTP Categories | 00:07:00 | ||
Different Wiring Standards | 00:05:00 | ||
Straight Through Cable Type | 00:05:00 | ||
Quick Recap | 00:03:00 | ||
Welcome to Ethernet Specifications | 00:02:00 | ||
Ethernet Basics | 00:04:00 | ||
CSMA – CD Contention Method | 00:04:00 | ||
Broadband – Baseband | 00:04:00 | ||
Binary – Decimal Conversion | 00:06:00 | ||
Ethernet Addressing | 00:03:00 | ||
What are Ethernet Frames? | 00:04:00 | ||
Ethernet at Physical Layer | 00:02:00 | ||
IEEE 802.3 | 00:03:00 | ||
Quick Recap | 00:01:00 | ||
Section 03: Networking Devices | |||
Common Networking Devices | 00:03:00 | ||
Network Interface Card (NIC) | 00:02:00 | ||
Hub | 00:04:00 | ||
Bridge | 00:02:00 | ||
Switch | 00:05:00 | ||
Router | 00:05:00 | ||
Firewalls | 00:05:00 | ||
IDS IPS HIDS | 00:05:00 | ||
Access Points | 00:03:00 | ||
Wireless Range Extenders | 00:02:00 | ||
CSMA CA Introduction | 00:04:00 | ||
CSMA CA Working | 00:04:00 | ||
CSMA CD Introduction | 00:02:00 | ||
CSMA CD Working | 00:03:00 | ||
Introduction to DHCP Server | 00:04:00 | ||
DHCP Operations | 00:05:00 | ||
Introduction to Other devices | 00:01:00 | ||
Multilayer Switch and Load Balancer | 00:04:00 | ||
Introduction to DNS Server | 00:05:00 | ||
DNS Record types | 00:07:00 | ||
Types of DNS Servers | 00:03:00 | ||
Proxy Servers | 00:05:00 | ||
Encryption Devices | 00:03:00 | ||
Analog Modems, Packet Shaper and VPN Concentrator | 00:04:00 | ||
Media Converters and Next Generation Firewalls | 00:02:00 | ||
Benefits of Routers | 00:02:00 | ||
Quick Recap | 00:04:00 | ||
Section 04: Getting Started with Cybersecurity! | |||
What is Security? | 00:06:00 | ||
What is Cybersecurity? | 00:05:00 | ||
History of Cybersecurity | 00:07:00 | ||
How to start a career in Cybersecurity? | 00:06:00 | ||
Different Careers in Cybersecurity | 00:10:00 | ||
Key Terms in Cyber Security | 00:06:00 | ||
Elements of Information Security | 00:07:00 | ||
Section 05: Fundamentals of Cybersecurity | |||
Types of Actors | 00:09:00 | ||
Passive Attacks in Cybersecurity | 00:05:00 | ||
Active Attacks in Cybersecurity | 00:05:00 | ||
Security Organizations | 00:05:00 | ||
Section 06: Key Security Concepts | |||
Security Architect’s View of Cybersecurity | 00:06:00 | ||
Security Services and Mechanisms | 00:06:00 | ||
Security Attacks! | 00:07:00 | ||
Section 07: Cryptography - Securing your Data | |||
What is Cryptography? | 00:05:00 | ||
What is Symmetric Encryption? | 00:03:00 | ||
AES and DES Standards in Cryptography | 00:06:00 | ||
Asymmetric Encryption | 00:03:00 | ||
Hashing | 00:07:00 | ||
PKI and CA | 00:10:00 | ||
RSA and Diffie Hellman Algorithms | 00:07:00 | ||
What are Digital Signatures? | 00:09:00 | ||
Transport Layer Security (TLS) Encryption | 00:04:00 | ||
Generating Hashes using HashCal | 00:04:00 | ||
Understanding Encryption and Decryption’ | 00:05:00 | ||
Section 08: Introduction to Ethical Hacking | |||
Hacking Terms | 00:07:00 | ||
Vulnerability Assessment and Penetration Testing | 00:09:00 | ||
Pentesting Methodologies | 00:07:00 | ||
Types of Penetration Tests | 00:06:00 | ||
Phases of Penetration Testing | 00:04:00 | ||
10 Steps SECURITY EXPERTS follow! | 00:04:00 | ||
Section 09: Setting up your own Penetration Testing Lab | |||
What is Linux Operating System? | 00:04:00 | ||
Have you heard of Kali Linux? | 00:03:00 | ||
Installing Virtual Box | 00:06:00 | ||
Installing KALI Linux in Virtual Box | 00:12:00 | ||
Installing Metasploitable Machine in Virtual Box | 00:09:00 | ||
Installing Damn Vulnerable Web Application (DVWA) in KALI Linux | 00:18:00 | ||
Installing TOR Browser | 00:09:00 | ||
Executing Linux Commands – Part 1 | 00:12:00 | ||
Executing Linux Commands – Part 2 | 00:14:00 | ||
Section 10: Information Gathering - Reconnaissance | |||
What is Information Gathering? | 00:08:00 | ||
Information Gathering using MALTEGO – Part 1 | 00:07:00 | ||
Information Gathering using MALTEGO – Part 2 | 00:06:00 | ||
Information Gathering using HTTRACK | 00:05:00 | ||
Information Gathering using THE HARVESTER | 00:02:00 | ||
Information Gathering using OSINT Framework | 00:05:00 | ||
Information Gathering using NSLOOKUP | 00:03:00 | ||
Information Gathering using REDHAWK | 00:05:00 | ||
Information Gathering using SHODAN | 00:09:00 | ||
Section 11: Scanning and Enumeration | |||
What is Scanning? | 00:07:00 | ||
What is NMAP Tool? | 00:05:00 | ||
How to use Zenmap GUI? | 00:17:00 | ||
What is Enumeration? | 00:03:00 | ||
Types of Enumeration | 00:03:00 | ||
Enumeration using Super Scan Tool | 00:07:00 | ||
Enumeration Using Hyena Tool | 00:06:00 | ||
Section 12: Vulnerability Assessment and Penetration Testing | |||
What is Vulnerability Assessment? | 00:04:00 | ||
Phases of Vulnerability Assessment | 00:08:00 | ||
What are Vulnerability Scoring Systems? | 00:09:00 | ||
Introduction to Nessus Tool | 00:05:00 | ||
Create and Configure Network Scan using Nessus | 00:08:00 | ||
Launching a Scan in Nessus Tool | 00:08:00 | ||
Section 13: Firewall | |||
What is an Intrusion Detection System? | 00:11:00 | ||
What is a Firewall? | 00:10:00 | ||
What is a Demilitarized Zone (DMZ)? | 00:06:00 | ||
How to evade Intrusion Detection System? | 00:08:00 | ||
How to evade Firewall? | 00:09:00 | ||
Firewall Pentesting | 00:02:00 | ||
Section 14: Web Application Penetration Testing | |||
Introduction to Web Servers | 00:05:00 | ||
Web Server Attacks | 00:05:00 | ||
Web Server Penetration Testing | 00:04:00 | ||
How to protect web servers from getting hacked? | 00:05:00 | ||
OWASP Top 10 Vulnerabilities – Part 1 | 00:05:00 | ||
OWASP Top 10 Vulnerabilities – Part 2 | 00:07:00 | ||
Website Footprinting – Part 1 | 00:05:00 | ||
Website Footprinting – Part 2 | 00:03:00 | ||
Exploiting Basic Command Execution Vulnerability | 00:06:00 | ||
Exploiting Basic Command Execution Vulnerability | 00:07:00 | ||
How to configure Burp Suite? | 00:16:00 | ||
Exploiting Basic File Upload Vulnerability | 00:10:00 | ||
Exploiting Advance File Upload Vulnerability | 00:07:00 | ||
Exploiting more advance File Upload Vulnerability | 00:08:00 | ||
What is SQL Injection? | 00:04:00 | ||
Types of SQL Injections | 00:05:00 | ||
How to exploit SQL Injection manually? | 00:17:00 | ||
Automating SQL Injection using SQLMap | 00:09:00 | ||
How to prevent SQL Injection? | 00:03:00 | ||
What is Cross Site Scripting (XSS) Vulnerability? | 00:03:00 | ||
Types of Cross Site Scripting Vulnerability | 00:06:00 | ||
Exploiting XSS vulnerability – Part 1 | 00:11:00 | ||
Exploiting XSS vulnerability – Part 2 | 00:05:00 | ||
Exploiting XSS vulnerability – Part 3 | 00:11:00 | ||
How to prevent XSS Attacks? | 00:04:00 | ||
What is Cross Site Request Forgery (CSRF)? | 00:06:00 | ||
Exploiting Cross Site Request Forgery Vulnerability | 00:07:00 | ||
What is a Brute Force Attack? | 00:05:00 | ||
Getting Usernames and Passwords using Brute Forcing | 00:18:00 | ||
How to carry out a complete Web Application Penetration Test? | 00:09:00 | ||
How to protect Web Applications? | 00:06:00 | ||
Section 15: Denial of Service | |||
What is Denial of Service? | 00:03:00 | ||
Types of DOS Attacks? | 00:05:00 | ||
What is a Botnet? | 00:03:00 | ||
Section 16: Malware Threats | |||
What is a Malware? | 00:09:00 | ||
What are Trojans? | 00:08:00 | ||
Types of Trojans | 00:08:00 | ||
Introduction to Virus | 00:07:00 | ||
Types of Virus | 00:10:00 | ||
How to prevent against Malware? | 00:07:00 | ||
Section 17: Social Engineering - The Art of Human Exploitation | |||
What is Social Engineering? | 00:05:00 | ||
Types of Social Engineering Techniques | 00:06:00 | ||
Getting user credentials using BEEF – Part 1 | 00:09:00 | ||
Getting user credentials using BEEF – Part 2 | 00:11:00 | ||
Section 18: Writing a Penetration Testing Report | |||
What is a Pentest Report? | 00:08:00 | ||
Components of a Penetration Test Report | 00:14:00 | ||
Assignment | |||
Assignment -Computer Networking and Cyber Security | 00:00:00 |
Membership renews after 12 months. You can cancel anytime from your account.