Demystifying Cybersecurity Fundamentals-Learning with Demos
Published 8/2023
Created by Kshitij Joy (Cloud Alchemy Academy)
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 101 Lectures ( 9h 16m ) | Size: 3.3 GB
What you'll learn Top 10 Cyber Attacks of 21st Century What is Cybersecurity ? What is CIA Triad ? Types of Cyber Attacks Demo: How attackers use Phishing Attack ? Demo: How to create a Sql Injection(SQLi) Attack Types of Hackers : Black Hat / White Hat / Grey Hat / Hacktivist What is Cryptography ? Understand Symmetric Encryption with an Example Demo:Asymmetric encryption using openssl Understanding of AES/DES Algorithms Understanding of RSA / DSA / ECDSA / Diffie-Hellman Algorithms with Demos What is PKI ? Demos for Digital Signature / Digital Certificate / Certificate Authority How to raise a CSR and sign the certificate A Primer on Networking and all important terms What is a Switch & a Router What is VLAN / IP Address / Subnetting / Subset Mask Demos on ARP / Network Packets / Traceroute Understanding of VPN / Firewall / DMZ / Proxy Server What is SSH/ TCP-IP What is SSL Understanding SSL Vs TLS Demo: Checking the Latest Stats on SSL/TLS What is mTLS Requirements Cybersecurity Beginners / Experienced Professionals in IT wanting to learn the fundamentals of Cybersecurity Description This is a course that has been designed for the Beginners to the world of Cybersecurity and also experienced IT Professionals looking to learn the fundamentals of Cybersecurity , the entire learning will be based on demos and various practical.* What is Cybersecurity* Types of Cyber Attacks - Malware / Phishing / MITM / DDDOS /SQLinjection* Types of Hackers - Back Hat / White Hat / Grey Hat / Hacktivist* Basics of Cryptography - History / Caesar's Cypher / Symmetric & Asymmetric Encryption* Deep Dive into Various Algorithms - RSA / DSA / AES/ DES / ECDSA / Diffie-Hellman* Public Key Infrastructure (PKI) - Digital Signature / Certificate Authority (CA) / Digital Certificate / Self Signed Certificate* Networking Basics - IP Addressing / Subnetting / VPN / DMZ / Firewall / Proxy Server / Packet Switching* Key Protocols - SSH / SSL / TCP/IP / TLS / mTLSThe details are as below:1. Introduction2. Top 10 Cyber Attacks of 21st Century3. A Look at the Live Threats4. Demand for CyberSecurity Skills5. What is Cybersecurity ?6. What is CIA Triad ?7. Malware Attack8. Phishing Attack9. Demo: How attackers use Phishing Attack ?10. Password Attack11. Demo: A Dictionary Attack - Password Attack12. Man-in-the-Middle Attack13. Demo: MITM Attack using ARP Poisoning14. SQL Injection Attack15. Demo: How to create a Sql Injection(SQLi) Attack16. Denial-of-Service Attack17. Cryptojacking18. White Hat Hacker19. Black Hat Hacker20. Grey Hat Hacker21. Hacktivist22. Script Kiddie23. What is Cryptography ?24. History of Cryptography25. Understanding the Ceasar's Cypher26. What is Symmetric Encryption27. Understand Symmetric Encryption with an Example28. Demo: Symmetric Encryption using openssl29. What is Asymmetric Encryption30. Understand Asymmetric Encryption - Confidentiality31. Understand Asymmetric Encryption - Integrity & Authentication32. Demo:Asymmetric encryption using openssl33. Get an Understanding of Hybrid Encryption34. What is Cipher Algorithm & Key35. What is DES - Data Encryption Standard ?36. What is AES : Advanced Encryption Standard37. Which are the NIST Approved Asymmetric Algorithms ?38. What is the RSA Algorithm ?39. Understanding RSA Algorithm with Example40. What is DSA Algorithm ?41. What is Deffie-Hellman Algorithm ?42. Understanding DH Algorithm with an Example43. Understanding Calculations for DH Algorithm44. What is Elliptic Curve Algorithm ?45. Quick Comparison : RSA vs DSA vs ECDSA vs DH46. What is PKI ?47. What is a Hashing Algorithm48. Demo: Hashing using openssl49. What is a Message Digest50. What is a Digital Signature ?51. Understanding Digital Signature52. What is a Certificate Authority -CA53. Demo: Exploring the DigiCert Website54. What is a Digital Certificate55. Understanding Digital Certificate56. Check a Real Certificate - Facebook57. Protecting from MITM using Digital Certificate58. What is a Self Signed Certificate ?59. PEM Vs PKCS1260. What is a Chain of Trust61. Demo: Create a Self Signed Certificate / rootCA62. Demo : Create a CSR63. Demo: Sign a Certificate CSR64. Main Artefacts for Networking65. Understanding the OSI Model66. What is a Switch ?67. What is a Router ?68. What is a VLAN69. Decimal to Binary Conversion70. Binary to Decimal Conversion71. Understanding an IP address72. What is Subnetting73. What is Subnet Mask74. What is ARP75. Simulation to understand ARP76. What is a Network Packet77. How a Packet Travels from Source to Destination78. Demo: traceroute to cnn79. What is a VPN ?80. Demo: Using a Software based VPN (NordVPN)81. What is a Firewall ?82. Role of a Proxy Server83. What is a Perimeter Network or a DMZ84. What is SSH85. What is TCP/IP86. What is SSL87. Understanding SSL Vs TLS88. Demo: Checking the Latest Stats on SSL/TLS89. What is MTLS Who this course is for Cybersecurity Beginners / Experienced Professionals in IT wanting to understand the fundamentals of Cybersecurity in a Practical oriented learning The course also teaches all the important Networking Fundamentals as well.
Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part1.rar - 995.0 MB Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part2.rar - 995.0 MB Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part3.rar - 995.0 MB Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part4.rar - 388.2 MB
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.