Section 01: Introduction to Cyber Security Masterclass Course |
|
Course Introduction |
|
00:04:00 |
Section 02: Complete Computer Networking for Cybersecurity and Ethical Hacking |
|
What is a Network? |
|
00:04:00 |
|
What is a Local Area Network? |
|
00:03:00 |
|
Routers and LAN |
|
00:03:00 |
|
Network Components |
|
00:07:00 |
|
WAN and MPLS |
|
00:06:00 |
|
Peer to Peer Network Architecture |
|
00:04:00 |
|
Client-Server Network Architecture |
|
00:04:00 |
|
Bus and Star Topology |
|
00:06:00 |
|
Mesh and Ring Topology |
|
00:05:00 |
|
Other Network Topologies that you should know! |
|
00:08:00 |
|
Quick Recap |
|
00:03:00 |
|
Introduction to Internetworking Models |
|
00:03:00 |
|
Layered Approach and Advantages |
|
00:05:00 |
|
Introduction to OSI Model |
|
00:06:00 |
|
OSI Model: Application Layer |
|
00:04:00 |
|
OSI Model: Presentation and Session Layer |
|
00:02:00 |
|
OSI Model: Transport Layer |
|
00:02:00 |
|
Connection Oriented vs Connectionless Service |
|
00:06:00 |
|
What is Flow Control? |
|
00:05:00 |
|
What is Windowing? |
|
00:04:00 |
|
OSI Model: The Physical Layer |
|
00:04:00 |
|
Quick Recap |
|
00:04:00 |
|
What’s next? |
|
00:02:00 |
|
What is a Coaxial Cable? |
|
00:06:00 |
|
What is a Twisted Pair Cable? |
|
00:03:00 |
|
What is Fibre Optic Cable? |
|
00:06:00 |
|
Media Converters |
|
00:05:00 |
|
UTP Categories |
|
00:07:00 |
|
Different Wiring Standards |
|
00:05:00 |
|
Straight Through Cable Type |
|
00:05:00 |
|
Quick Recap |
|
00:03:00 |
|
Welcome to Ethernet Specifications |
|
00:02:00 |
|
Ethernet Basics |
|
00:04:00 |
|
CSMA – CD Contention Method |
|
00:04:00 |
|
Broadband – Baseband |
|
00:04:00 |
|
Binary – Decimal Conversion |
|
00:06:00 |
|
Ethernet Addressing |
|
00:03:00 |
|
What are Ethernet Frames? |
|
00:04:00 |
|
Ethernet at Physical Layer |
|
00:02:00 |
|
IEEE 802.3 |
|
00:03:00 |
|
Quick Recap |
|
00:01:00 |
Section 03: Networking Devices |
|
Common Networking Devices |
|
00:03:00 |
|
Network Interface Card (NIC) |
|
00:02:00 |
|
Hub |
|
00:04:00 |
|
Bridge |
|
00:02:00 |
|
Switch |
|
00:05:00 |
|
Router |
|
00:05:00 |
|
Firewalls |
|
00:05:00 |
|
IDS IPS HIDS |
|
00:05:00 |
|
Access Points |
|
00:03:00 |
|
Wireless Range Extenders |
|
00:02:00 |
|
CSMA CA Introduction |
|
00:04:00 |
|
CSMA CA Working |
|
00:04:00 |
|
CSMA CD Introduction |
|
00:02:00 |
|
CSMA CD Working |
|
00:03:00 |
|
Introduction to DHCP Server |
|
00:04:00 |
|
DHCP Operations |
|
00:05:00 |
|
Introduction to Other devices |
|
00:01:00 |
|
Multilayer Switch and Load Balancer |
|
00:04:00 |
|
Introduction to DNS Server |
|
00:05:00 |
|
DNS Record types |
|
00:07:00 |
|
Types of DNS Servers |
|
00:03:00 |
|
Proxy Servers |
|
00:05:00 |
|
Encryption Devices |
|
00:03:00 |
|
Analog Modems, Packet Shaper and VPN Concentrator |
|
00:04:00 |
|
Media Converters and Next Generation Firewalls |
|
00:02:00 |
|
Benefits of Routers |
|
00:02:00 |
|
Quick Recap |
|
00:04:00 |
Section 04: Getting Started with Cybersecurity! |
|
What is Security? |
|
00:06:00 |
|
What is Cybersecurity? |
|
00:05:00 |
|
History of Cybersecurity |
|
00:07:00 |
|
How to start a career in Cybersecurity? |
|
00:06:00 |
|
Different Careers in Cybersecurity |
|
00:10:00 |
|
Key Terms in Cyber Security |
|
00:06:00 |
|
Elements of Information Security |
|
00:07:00 |
Section 05: Fundamentals of Cybersecurity |
|
Types of Actors |
|
00:09:00 |
|
Passive Attacks in Cybersecurity |
|
00:05:00 |
|
Active Attacks in Cybersecurity |
|
00:05:00 |
|
Security Organizations |
|
00:05:00 |
Section 06: Key Security Concepts |
|
Security Architect’s View of Cybersecurity |
|
00:06:00 |
|
Security Services and Mechanisms |
|
00:06:00 |
|
Security Attacks! |
|
00:07:00 |
Section 07: Cryptography - Securing your Data |
|
What is Cryptography? |
|
00:05:00 |
|
What is Symmetric Encryption? |
|
00:03:00 |
|
AES and DES Standards in Cryptography |
|
00:06:00 |
|
Asymmetric Encryption |
|
00:03:00 |
|
Hashing |
|
00:07:00 |
|
PKI and CA |
|
00:10:00 |
|
RSA and Diffie Hellman Algorithms |
|
00:07:00 |
|
What are Digital Signatures? |
|
00:09:00 |
|
Transport Layer Security (TLS) Encryption |
|
00:04:00 |
|
Generating Hashes using HashCal |
|
00:04:00 |
|
Understanding Encryption and Decryption’ |
|
00:05:00 |
Section 08: Introduction to Ethical Hacking |
|
Hacking Terms |
|
00:07:00 |
|
Vulnerability Assessment and Penetration Testing |
|
00:09:00 |
|
Pentesting Methodologies |
|
00:07:00 |
|
Types of Penetration Tests |
|
00:06:00 |
|
Phases of Penetration Testing |
|
00:04:00 |
|
10 Steps SECURITY EXPERTS follow! |
|
00:04:00 |
Section 09: Setting up your own Penetration Testing Lab |
|
What is Linux Operating System? |
|
00:04:00 |
|
Have you heard of Kali Linux? |
|
00:03:00 |
|
Installing Virtual Box |
|
00:06:00 |
|
Installing KALI Linux in Virtual Box |
|
00:12:00 |
|
Installing Metasploitable Machine in Virtual Box |
|
00:09:00 |
|
Installing Damn Vulnerable Web Application (DVWA) in KALI Linux |
|
00:18:00 |
|
Installing TOR Browser |
|
00:09:00 |
|
Executing Linux Commands – Part 1 |
|
00:12:00 |
|
Executing Linux Commands – Part 2 |
|
00:14:00 |
Section 10: Information Gathering - Reconnaissance |
|
What is Information Gathering? |
|
00:08:00 |
|
Information Gathering using MALTEGO – Part 1 |
|
00:07:00 |
|
Information Gathering using MALTEGO – Part 2 |
|
00:06:00 |
|
Information Gathering using HTTRACK |
|
00:05:00 |
|
Information Gathering using THE HARVESTER |
|
00:02:00 |
|
Information Gathering using OSINT Framework |
|
00:05:00 |
|
Information Gathering using NSLOOKUP |
|
00:03:00 |
|
Information Gathering using REDHAWK |
|
00:05:00 |
|
Information Gathering using SHODAN |
|
00:09:00 |
Section 11: Scanning and Enumeration |
|
What is Scanning? |
|
00:07:00 |
|
What is NMAP Tool? |
|
00:05:00 |
|
How to use Zenmap GUI? |
|
00:17:00 |
|
What is Enumeration? |
|
00:03:00 |
|
Types of Enumeration |
|
00:03:00 |
|
Enumeration using Super Scan Tool |
|
00:07:00 |
|
Enumeration Using Hyena Tool |
|
00:06:00 |
Section 12: Vulnerability Assessment and Penetration Testing |
|
What is Vulnerability Assessment? |
|
00:04:00 |
|
Phases of Vulnerability Assessment |
|
00:08:00 |
|
What are Vulnerability Scoring Systems? |
|
00:09:00 |
|
Introduction to Nessus Tool |
|
00:05:00 |
|
Create and Configure Network Scan using Nessus |
|
00:08:00 |
|
Launching a Scan in Nessus Tool |
|
00:08:00 |
Section 13: Firewall |
|
What is an Intrusion Detection System? |
|
00:11:00 |
|
What is a Firewall? |
|
00:10:00 |
|
What is a Demilitarized Zone (DMZ)? |
|
00:06:00 |
|
How to evade Intrusion Detection System? |
|
00:08:00 |
|
How to evade Firewall? |
|
00:09:00 |
|
Firewall Pentesting |
|
00:02:00 |
Section 14: Web Application Penetration Testing |
|
Introduction to Web Servers |
|
00:05:00 |
|
Web Server Attacks |
|
00:05:00 |
|
Web Server Penetration Testing |
|
00:04:00 |
|
How to protect web servers from getting hacked? |
|
00:05:00 |
|
OWASP Top 10 Vulnerabilities – Part 1 |
|
00:05:00 |
|
OWASP Top 10 Vulnerabilities – Part 2 |
|
00:07:00 |
|
Website Footprinting – Part 1 |
|
00:05:00 |
|
Website Footprinting – Part 2 |
|
00:03:00 |
|
Exploiting Basic Command Execution Vulnerability |
|
00:06:00 |
|
Exploiting Basic Command Execution Vulnerability |
|
00:07:00 |
|
How to configure Burp Suite? |
|
00:16:00 |
|
Exploiting Basic File Upload Vulnerability |
|
00:10:00 |
|
Exploiting Advance File Upload Vulnerability |
|
00:07:00 |
|
Exploiting more advance File Upload Vulnerability |
|
00:08:00 |
|
What is SQL Injection? |
|
00:04:00 |
|
Types of SQL Injections |
|
00:05:00 |
|
How to exploit SQL Injection manually? |
|
00:17:00 |
|
Automating SQL Injection using SQLMap |
|
00:09:00 |
|
How to prevent SQL Injection? |
|
00:03:00 |
|
What is Cross Site Scripting (XSS) Vulnerability? |
|
00:03:00 |
|
Types of Cross Site Scripting Vulnerability |
|
00:06:00 |
|
Exploiting XSS vulnerability – Part 1 |
|
00:11:00 |
|
Exploiting XSS vulnerability – Part 2 |
|
00:05:00 |
|
Exploiting XSS vulnerability – Part 3 |
|
00:11:00 |
|
How to prevent XSS Attacks? |
|
00:04:00 |
|
What is Cross Site Request Forgery (CSRF)? |
|
00:06:00 |
|
Exploiting Cross Site Request Forgery Vulnerability |
|
00:07:00 |
|
What is a Brute Force Attack? |
|
00:05:00 |
|
Getting Usernames and Passwords using Brute Forcing |
|
00:18:00 |
|
How to carry out a complete Web Application Penetration Test? |
|
00:09:00 |
|
How to protect Web Applications? |
|
00:06:00 |
Section 15: Denial of Service |
|
What is Denial of Service? |
|
00:03:00 |
|
Types of DOS Attacks? |
|
00:05:00 |
|
What is a Botnet? |
|
00:03:00 |
Section 16: Malware Threats |
|
What is a Malware? |
|
00:09:00 |
|
What are Trojans? |
|
00:08:00 |
|
Types of Trojans |
|
00:08:00 |
|
Introduction to Virus |
|
00:07:00 |
|
Types of Virus |
|
00:10:00 |
|
How to prevent against Malware? |
|
00:07:00 |
Section 17: Social Engineering - The Art of Human Exploitation |
|
What is Social Engineering? |
|
00:05:00 |
|
Types of Social Engineering Techniques |
|
00:06:00 |
|
Getting user credentials using BEEF – Part 1 |
|
00:09:00 |
|
Getting user credentials using BEEF – Part 2 |
|
00:11:00 |
Section 18: Writing a Penetration Testing Report |
|
What is a Pentest Report? |
|
00:08:00 |
|
Components of a Penetration Test Report |
|
00:14:00 |
Assignment |
|
Assignment -Computer Networking and Cyber Security |
|
00:00:00 |