fbpx
  • 1

Course Currilcum

    • Brief Introduction of cyber Security 00:00:00
    • Information Security Overview 00:00:00
    • Hacking Concepts 00:00:00
    • Ethical Hacking Concepts 00:00:00
    • Information Security Laws and Standards 00:00:00
    • Quiz – 1 00:10:00
    • Introduction 00:00:00
    • Quiz – 2 00:05:00
    • Networking Basics Part 1 00:00:00
    • Networking Basics Part 2 00:00:00
    • Quiz – 3 00:05:00
    • Exploring Kali Linux 00:00:00
    • Installing Kali Linux 00:00:00
    • Quiz – 4 00:10:00
    • File system of Linux 00:00:00
    • Common Commands 00:00:00
    • Quiz – 5 00:10:00
    • OSINT-Maltego 00:00:00
    • OSINT-Recon-ng 00:00:00
    • Recon-ng using Termux 00:00:00
    • OSINT-theHarvester 00:00:00
    • OSINT-Shodan 00:00:00
    • Quiz – 6 00:10:00
    • DNS-Enumeration 00:00:00
    • DNS-Zone Transfer 00:00:00
    • Google Dorks 00:00:00
    • Introduction and NMAP 00:00:00
    • Penetration Test Lab 00:00:00
    • NMAP Multiple Targets & TCP Connect Scan 00:00:00
    • Stealth Scan & ACK Probe 00:00:00
    • Service and OS detection & Aggressive Scanning 00:00:00
    • UDP Scanning 00:00:00
    • Introduction to Vulnerability 00:00:00
    • VALC – Vulnerability Assessment Life Cycle 00:00:00
    • Using NMAP to find Vulnerability 00:00:00
    • Identifying Website Technologies 00:00:00
    • Introduction to Exploitation 00:00:00
    • Reverse Shell and Bind shell 00:00:00
    • Staged and Non-Staged Payloads 00:00:00
    • Introduction of Nessus 00:00:00
    • Introduction to Shell Scripting 00:00:00
    • Text Editor 00:00:00
    • Naming & Permission of Shell Script Unlimited
    • Shell Scripting – Hello World 00:00:00
    • Shell Scripting – Why? Unlimited
    • User Defined Variables 00:00:00
    • System Variables 00:00:00
    • Command Line Argument Unlimited
    • Read Command 00:00:00
    • Command Substitution Unlimited
    • For Loop 00:00:00
    • Functions Unlimited
    • While Loop Unlimited
    • Until Loop Unlimited
    • If Else Condition Unlimited
    • Case Statement Unlimited
    • Bash Debugging Unlimited
    • Introduction to Social Engineering 00:00:00
    • Relevance of Social Engineering Unlimited
    • Human Based Social Engineering 00:00:00
    • Computer Based Social Engineering 00:00:00
    • Doppelganger Domain Unlimited
    • Mobile Based Social Engineering Unlimited
    • Introduction to Web App Pentesting Unlimited
    • Bug Hunting Platforms Unlimited
    • Introduction to recon Unlimited
    • Enumerating Subdomains – Sublister Unlimited
    • Enumerating Subdomains – Assetfinder Unlimited
    • Finding Live Domains Unlimited
    • Sorting Live Subdomains Unlimited
    • Enumerating Subdomains – Gobuster Unlimited
    • Introduction to Cryptography Unlimited
    • Symmetric vs. Asymmetric Encryption Unlimited
    • Hash Functions and Digital Signatures Unlimited
    • Public Key Infrastructure (PKI) Unlimited
    • Cryptographic Attacks Unlimited
    • SSL/TLS Basics Unlimited
    • Implementing and Managing Encryption Unlimited
    • Introduction to Malware Analysis Unlimited
    • Types of Malware (Viruses, Worms, Trojans, etc.) Unlimited
    • Static vs. Dynamic Analysis Unlimited
    • Reverse Engineering Malware Unlimited
    • Analyzing Malware Behavior Unlimited
    • Malware Detection and Prevention Unlimited
    • Understanding Social Engineering Unlimited
    • Phishing Techniques and Countermeasures Unlimited
    • Pretexting and Impersonation Unlimited
    • Baiting and Quizzes Unlimited
    • Social Engineering Tools Unlimited
    • Mitigating Social Engineering Attacks Unlimited
    • Introduction to Incident Response Unlimited
    • Incident Response Procedures and Planning Unlimited
    • Forensic Tools and Techniques Unlimited
    • Digital Evidence Collection Unlimited
    • Chain of Custody in Forensics Unlimited
    • Forensic Analysis of Windows and Linux Systems Unlimited
    • Network Forensics and Traffic Analysis Unlimited
    • Introduction to Penetration Testing Unlimited
    • Penetration Testing Frameworks (PTES, NIST, OSSTMM) Unlimited
    • Penetration Testing Phases Unlimited
    • Reporting and Documentation Unlimited
    • Creating and Presenting a Penetration Test Report Unlimited
    • Ethical and Legal Considerations in Penetration Testing Unlimited
    • Introduction to Cloud Computing Unlimited
    • Cloud Security Models and Concepts Unlimited
    • Cloud Service Models (IaaS, PaaS, SaaS) Unlimited
    • Securing Cloud Infrastructure Unlimited
    • Cloud Vulnerability Scanning Unlimited
    • Identity and Access Management in Cloud Unlimited
    • Cloud Compliance and Governance Unlimited
    • Introduction to IoT Security Unlimited
    • Common IoT Vulnerabilities Unlimited
    • Securing IoT Devices and Networks Unlimited
    • IoT Penetration Testing Unlimited
    • IoT Privacy Concerns Unlimited
    • Creating Security Policies Unlimited
    • Incident Response Plans Unlimited
    • Disaster Recovery Planning Unlimited
    • Risk Management and Assessment Unlimited
    • Compliance and Regulatory Requirements Unlimited
    • Buffer Overflow Attacks Unlimited
    • Exploit Development Unlimited
    • Advanced Persistent Threats (APTs) Unlimited
    • Zero-Day Vulnerabilities Unlimited
    • Red Team vs. Blue Team Exercises Unlimited
    • Ethical Hacking in a DevOps Environment Unlimited
    • Building a Career in Ethical Hacking Unlimited
    • Ethical Hacking Certifications and Training Resources Unlimited
    • Quiz – 7 00:10:00
top