Cyber Security

Advanced 0(0 Ratings) 0 Students enrolled
Created by TechBricks Edu Last updated Thu, 27-May-2021 English
What will i learn?

Curriculum for this course
56 Lessons 19:16:12 Hours
Cyber Security
56 Lessons 19:16:12 Hours
  • Getting the Most From Your Time 00:01:56
  • Building a Lab 00:05:19
  • Building a LAB- Network Configuration 00:09:14
  • Deploy a Kali Linux in VM 00:13:51
  • Adding Metasploitable to Your Lab-1 00:10:01
  • Adding Windows to your Lab and Configure a Static IP on Kali 00:17:55
  • Ethics and Hacking Terminology 00:12:15
  • InfoSec Concepts and Attack Categories, Types, and Vectors 00:09:41
  • Five Phases of Hacking, Foot printing and Reconnaissance Concepts 00:15:10
  • Search Engine Tools and Hacking Using Google 00:18:54
  • Website Recon Tools and Metagoofil Metadata Tools 00:12:06
  • Email Headers for Footprinting and Using WHOIS for Recon 00:08:59
  • Network Scanning 00:04:03
  • Network Scanning Methodology and Port Discovery 00:16:38
  • Stealth Idle Scanning and OS and Application Fingerprinting 00:19:10
  • Vulnerability Scanning and Network Mapping Tools 00:07:10
  • NMAP and Scapy 00:59:06
  • Hping3 and Proxy Servers 00:36:52
  • Using Public Proxy Services and Shellshock 00:10:18
  • Enumeration Concepts and NetBIOS Enumeration 00:12:49
  • SNMP Enumeration Tools and LDAP Enumeration Concepts 00:12:01
  • LDAP Enumeration Example and NTP Enumeration 00:13:24
  • SMTP Enumeration and System Hacking Overview 00:17:14
  • Password Cracking Concepts and Password Attack Example- MITM and Sniffing 00:22:57
  • Rainbow Crack Lab Setup and Rainbow Crack Demonstration 00:17:00
  • DHCP Starvation 00:10:59
  • Remote Access and NTFS Alternate Data Streams Exploit 00:23:38
  • Steganography with Open Puff and Steganography with SNOW 00:13:34
  • Covering Tracks and Malware Overview 00:16:59
  • Spyware and Buffer Overflow 00:20:44
  • Trojan Overview and Creating a Trojan 00:22:43
  • Virus Overview and Virus Creation 00:21:00
  • Detecting Malware and Malware Analysis 00:27:06
  • File Verification via Hash and Sniffing Overview 00:21:29
  • CAM Table Attack, Port Security and DHCP Snooping 00:21:09
  • Dynamic ARP Inspection and Social Engineering Concepts 00:14:33
  • Social Engineering Phases and Social Engineering Prevention 00:07:54
  • DoS and DDoS Overview and DoS and DDoS Prevention 00:17:20
  • Session Hijacking Overview and Reducing the Risk of Session Hijacking 00:16:42
  • Firewall Evasion and Firewall ACL Example 00:28:16
  • NAT and PAT Fundamentals and IDS_IPS Evasion and Honeypots 00:41:23
  • Hacking Web Servers and OWASP Broken Web Application Project and Web App Vulnerabilities- WordPress 00:30:46
  • SQL Introduction , SQL Injection and Do some research on WIFI Hacking fundamentals 00:26:03
  • Wireless Topologies and Vocabulary and Standards and Regulations and RF Fundamentals 00:55:31
  • Antenna Fundamentals and WLAN Frame Types and WLAN Frame Flow 00:50:11
  • Uncovering Hidden SSIDs AND Bypassing MAC Address Filters AND Breaking WPA2 Wireless 00:36:05
  • Rogue Wireless Access Points and Wireless Mis-Association Attacks AND MITM Using Wireless Bridging 00:54:44
  • Protecting Wireless and Using an Android VM and Malware for Mobile 00:21:28
  • Mobile Device Risks and Improving Mobile Security and Cloud Computing Overview 00:21:17
  • Cloud Computing Security Concerns, Benefits and Symmetrical Encryption Concepts 00:23:46
  • Hashing Concepts for Data Integrity and Asymmetrical Encryption Concepts and Control Types and Multifactor Authentication 00:13:28
  • Confidentiality, Integrity, and Availability and Quantifying Risk, Separation of Duties 00:14:21
  • Centralized Identity Management, Kerberos and Single Sign On (SSO) and Backups and Media Management 00:18:26
  • Operations Security Controls, Physical Security Controls AND Incident Response, VPNs 00:18:16
  • Disaster Recovery Planning and IoT Security Overview, IoT Web, Cloud, and Mobile Interfaces and Pen Testing Tips 00:26:45
  • Useful Tools and Case Study for Security and Additional Resources 00:35:33
Requirements
+ View more
Description
+ View more
Other related courses
About the instructor
  • 4 Reviews
  • 1 Students
  • 129 Courses
+ View more
Best LMS Courses offered

Educate and Evolve.

Your one-stop for everything technology!
We bring to you a range of educational courses to pick. Choose your course, build your life!
Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
₹499
Buy now
Includes:
  • 19:16:12 Hours On demand videos
  • 56 Lessons
  • Access on mobile and tv
  • Full lifetime access
  • Compare this course with other