Cyber Security Training

Advanced 0(0 Ratings) 0 Students enrolled English
Created by Admin TDP Yuva
Last updated Wed, 26-Oct-2022
+ View more
Course overview

What will i learn?

Requirements
Curriculum for this course
56 Lessons 19:16:12 Hours
Cyber Security
56 Lessons 19:16:12 Hours
  • Getting the Most From Your Time
    00:01:56
  • Building a Lab
    00:05:19
  • Building a LAB- Network Configuration
    00:09:14
  • Deploy a Kali Linux in VM
    00:13:51
  • Adding Metasploitable to Your Lab-1
    00:10:01
  • Adding Windows to your Lab and Configure a Static IP on Kali
    00:17:55
  • Ethics and Hacking Terminology
    00:12:15
  • InfoSec Concepts and Attack Categories, Types, and Vectors
    00:09:41
  • Five Phases of Hacking, Foot printing and Reconnaissance Concepts
    00:15:10
  • Search Engine Tools and Hacking Using Google
    00:18:54
  • Website Recon Tools and Metagoofil Metadata Tools
    00:12:06
  • Email Headers for Footprinting and Using WHOIS for Recon
    00:08:59
  • Network Scanning
    00:04:03
  • Network Scanning Methodology and Port Discovery
    00:16:38
  • Stealth Idle Scanning and OS and Application Fingerprinting
    00:19:10
  • Vulnerability Scanning and Network Mapping Tools
    00:07:10
  • NMAP and Scapy
    00:59:06
  • Hping3 and Proxy Servers
    00:36:52
  • Using Public Proxy Services and Shellshock
    00:10:18
  • Enumeration Concepts and NetBIOS Enumeration
    00:12:49
  • SNMP Enumeration Tools and LDAP Enumeration Concepts
    00:12:01
  • LDAP Enumeration Example and NTP Enumeration
    00:13:24
  • SMTP Enumeration and System Hacking Overview
    00:17:14
  • Password Cracking Concepts and Password Attack Example- MITM and Sniffing
    00:22:57
  • Rainbow Crack Lab Setup and Rainbow Crack Demonstration
    00:17:00
  • DHCP Starvation
    00:10:59
  • Remote Access and NTFS Alternate Data Streams Exploit
    00:23:38
  • Steganography with Open Puff and Steganography with SNOW
    00:13:34
  • Covering Tracks and Malware Overview
    00:16:59
  • Spyware and Buffer Overflow
    00:20:44
  • Trojan Overview and Creating a Trojan
    00:22:43
  • Virus Overview and Virus Creation
    00:21:00
  • Detecting Malware and Malware Analysis
    00:27:06
  • File Verification via Hash and Sniffing Overview
    00:21:29
  • CAM Table Attack, Port Security and DHCP Snooping
    00:21:09
  • Dynamic ARP Inspection and Social Engineering Concepts
    00:14:33
  • Social Engineering Phases and Social Engineering Prevention
    00:07:54
  • DoS and DDoS Overview and DoS and DDoS Prevention
    00:17:20
  • Session Hijacking Overview and Reducing the Risk of Session Hijacking
    00:16:42
  • Firewall Evasion and Firewall ACL Example
    00:28:16
  • NAT and PAT Fundamentals and IDS_IPS Evasion and Honeypots
    00:41:23
  • Hacking Web Servers and OWASP Broken Web Application Project and Web App Vulnerabilities- WordPress
    00:30:46
  • SQL Introduction , SQL Injection and Do some research on WIFI Hacking fundamentals
    00:26:03
  • Wireless Topologies and Vocabulary and Standards and Regulations and RF Fundamentals
    00:55:31
  • Antenna Fundamentals and WLAN Frame Types and WLAN Frame Flow
    00:50:11
  • Uncovering Hidden SSIDs AND Bypassing MAC Address Filters AND Breaking WPA2 Wireless
    00:36:05
  • Rogue Wireless Access Points and Wireless Mis-Association Attacks AND MITM Using Wireless Bridging
    00:54:44
  • Protecting Wireless and Using an Android VM and Malware for Mobile
    00:21:28
  • Mobile Device Risks and Improving Mobile Security and Cloud Computing Overview
    00:21:17
  • Cloud Computing Security Concerns, Benefits and Symmetrical Encryption Concepts
    00:23:46
  • Hashing Concepts for Data Integrity and Asymmetrical Encryption Concepts and Control Types and Multifactor Authentication
    00:13:28
  • Confidentiality, Integrity, and Availability and Quantifying Risk, Separation of Duties
    00:14:21
  • Centralized Identity Management, Kerberos and Single Sign On (SSO) and Backups and Media Management
    00:18:26
  • Operations Security Controls, Physical Security Controls AND Incident Response, VPNs
    00:18:16
  • Disaster Recovery Planning and IoT Security Overview, IoT Web, Cloud, and Mobile Interfaces and Pen Testing Tips
    00:26:45
  • Useful Tools and Case Study for Security and Additional Resources
    00:35:33
+ View more
Other related courses
About instructor

Admin TDP Yuva

0 Reviews | 0 Students | 126 Courses
Student feedback
0
0 Reviews
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Reviews

₹499
Includes: