->

Demystifying Cybersecurity Fundamentals-Learning with Demos

Demystifying Cybersecurity Fundamentals-Learning with Demos

Published 8/2023

Created by Kshitij Joy (Cloud Alchemy Academy)

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch

Genre: eLearning | Language: English | Duration: 101 Lectures ( 9h 16m ) | Size: 3.3 GB


What you'll learn

Top 10 Cyber Attacks of 21st Century

What is Cybersecurity ?

What is CIA Triad ?

Types of Cyber Attacks

Demo: How attackers use Phishing Attack ?

Demo: How to create a Sql Injection(SQLi) Attack

Types of Hackers : Black Hat / White Hat / Grey Hat / Hacktivist

What is Cryptography ?

Understand Symmetric Encryption with an Example

Demo:Asymmetric encryption using openssl

Understanding of AES/DES Algorithms

Understanding of RSA / DSA / ECDSA / Diffie-Hellman Algorithms with Demos

What is PKI ?

Demos for Digital Signature / Digital Certificate / Certificate Authority

How to raise a CSR and sign the certificate

A Primer on Networking and all important terms

What is a Switch & a Router

What is VLAN / IP Address / Subnetting / Subset Mask

Demos on ARP / Network Packets / Traceroute

Understanding of VPN / Firewall / DMZ / Proxy Server

What is SSH/ TCP-IP

What is SSL

Understanding SSL Vs TLS

Demo: Checking the Latest Stats on SSL/TLS

What is mTLS

 

Requirements

Cybersecurity Beginners / Experienced Professionals in IT wanting to learn the fundamentals of Cybersecurity

 

Description

This is a course that has been designed for the Beginners to the world of Cybersecurity and also experienced IT Professionals looking to learn the fundamentals of Cybersecurity , the entire learning will be based on demos and various practical.* What is Cybersecurity* Types of Cyber Attacks - Malware / Phishing / MITM / DDDOS /SQLinjection* Types of Hackers - Back Hat / White Hat / Grey Hat / Hacktivist* Basics of Cryptography - History / Caesar's Cypher / Symmetric & Asymmetric Encryption* Deep Dive into Various Algorithms - RSA / DSA / AES/ DES / ECDSA / Diffie-Hellman* Public Key Infrastructure (PKI) - Digital Signature / Certificate Authority (CA) / Digital Certificate / Self Signed Certificate* Networking Basics - IP Addressing / Subnetting / VPN / DMZ / Firewall / Proxy Server / Packet Switching* Key Protocols - SSH / SSL / TCP/IP / TLS / mTLSThe details are as below:1. Introduction2. Top 10 Cyber Attacks of 21st Century3. A Look at the Live Threats4. Demand for CyberSecurity Skills5. What is Cybersecurity ?6. What is CIA Triad ?7. Malware Attack8. Phishing Attack9. Demo: How attackers use Phishing Attack ?10. Password Attack11. Demo: A Dictionary Attack - Password Attack12. Man-in-the-Middle Attack13. Demo: MITM Attack using ARP Poisoning14. SQL Injection Attack15. Demo: How to create a Sql Injection(SQLi) Attack16. Denial-of-Service Attack17. Cryptojacking18. White Hat Hacker19. Black Hat Hacker20. Grey Hat Hacker21. Hacktivist22. Script Kiddie23. What is Cryptography ?24. History of Cryptography25. Understanding the Ceasar's Cypher26. What is Symmetric Encryption27. Understand Symmetric Encryption with an Example28. Demo: Symmetric Encryption using openssl29. What is Asymmetric Encryption30. Understand Asymmetric Encryption - Confidentiality31. Understand Asymmetric Encryption - Integrity & Authentication32. Demo:Asymmetric encryption using openssl33. Get an Understanding of Hybrid Encryption34. What is Cipher Algorithm & Key35. What is DES - Data Encryption Standard ?36. What is AES : Advanced Encryption Standard37. Which are the NIST Approved Asymmetric Algorithms ?38. What is the RSA Algorithm ?39. Understanding RSA Algorithm with Example40. What is DSA Algorithm ?41. What is Deffie-Hellman Algorithm ?42. Understanding DH Algorithm with an Example43. Understanding Calculations for DH Algorithm44. What is Elliptic Curve Algorithm ?45. Quick Comparison : RSA vs DSA vs ECDSA vs DH46. What is PKI ?47. What is a Hashing Algorithm48. Demo: Hashing using openssl49. What is a Message Digest50. What is a Digital Signature ?51. Understanding Digital Signature52. What is a Certificate Authority -CA53. Demo: Exploring the DigiCert Website54. What is a Digital Certificate55. Understanding Digital Certificate56. Check a Real Certificate - Facebook57. Protecting from MITM using Digital Certificate58. What is a Self Signed Certificate ?59. PEM Vs PKCS1260. What is a Chain of Trust61. Demo: Create a Self Signed Certificate / rootCA62. Demo : Create a CSR63. Demo: Sign a Certificate CSR64. Main Artefacts for Networking65. Understanding the OSI Model66. What is a Switch ?67. What is a Router ?68. What is a VLAN69. Decimal to Binary Conversion70. Binary to Decimal Conversion71. Understanding an IP address72. What is Subnetting73. What is Subnet Mask74. What is ARP75. Simulation to understand ARP76. What is a Network Packet77. How a Packet Travels from Source to Destination78. Demo: traceroute to cnn79. What is a VPN ?80. Demo: Using a Software based VPN (NordVPN)81. What is a Firewall ?82. Role of a Proxy Server83. What is a Perimeter Network or a DMZ84. What is SSH85. What is TCP/IP86. What is SSL87. Understanding SSL Vs TLS88. Demo: Checking the Latest Stats on SSL/TLS89. What is MTLS

 

Who this course is for

Cybersecurity Beginners / Experienced Professionals in IT wanting to understand the fundamentals of Cybersecurity in a Practical oriented learning

 

The course also teaches all the important Networking Fundamentals as well.

Demystifying Cybersecurity Fundamentals-Learning with Demos

Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part1.rar - 995.0 MB

Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part2.rar - 995.0 MB

Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part3.rar - 995.0 MB

Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part4.rar - 388.2 MB


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 NinoAzul   |  

Information
Members of Guests cannot leave comments.




rss