09-16-2023, 12:45 PM
Demystifying Cybersecurity Fundamentals-Learning With Demos
Published 8/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.29 GB | Duration: 9h 16m
A Practical Approach to learning - Cyber Attacks, Cryptography, Encryption Algorithms, PKI,Networking Topics & Protocols
What you'll learn
Top 10 Cyber Attacks of 21st Century
What is Cybersecurity ?
What is CIA Triad ?
Types of Cyber Attacks
Demo: How attackers use Phishing Attack ?
Demo: How to create a Sql Injection(SQLi) Attack
Types of Hackers : Black Hat / White Hat / Grey Hat / Hacktivist
What is Cryptography ?
Understand Symmetric Encryption with an Example
Demo:Asymmetric encryption using openssl
Understanding of AES/DES Algorithms
Understanding of RSA / DSA / ECDSA / Diffie-Hellman Algorithms with Demos
What is PKI ?
Demos for Digital Signature / Digital Certificate / Certificate Authority
How to raise a CSR and sign the certificate
A Primer on Networking and all important terms
What is a Switch & a Router
What is VLAN / IP Address / Subnetting / Subset Mask
Demos on ARP / Network Packets / Traceroute
Understanding of VPN / Firewall / DMZ / Proxy Server
What is SSH/ TCP-IP
What is SSL
Understanding SSL Vs TLS
Demo: Checking the Latest Stats on SSL/TLS
What is mTLS
Requirements
Cybersecurity Beginners / Experienced Professionals in IT wanting to learn the fundamentals of Cybersecurity
Description
This is a course that has been designed for the Beginners to the world of Cybersecurity and also experienced IT Professionals looking to learn the fundamentals of Cybersecurity , the entire learning will be based on demos and various practical.* What is Cybersecurity* Types of Cyber Attacks - Malware / Phishing / MITM / DDDOS /SQLinjection* Types of Hackers - Back Hat / White Hat / Grey Hat / Hacktivist* Basics of Cryptography - History / Caesar's Cypher / Symmetric & Asymmetric Encryption* Deep Dive into Various Algorithms - RSA / DSA / AES/ DES / ECDSA / Diffie-Hellman* Public Key Infrastructure (PKI) - Digital Signature / Certificate Authority (CA) / Digital Certificate / Self Signed Certificate* Networking Basics - IP Addressing / Subnetting / VPN / DMZ / Firewall / Proxy Server / Packet Switching* Key Protocols - SSH / SSL / TCP/IP / TLS / mTLSThe details are as below:1. Introduction2. Top 10 Cyber Attacks of 21st Century3. A Look at the Live Threats4. Demand for CyberSecurity Skills5. What is Cybersecurity ?6. What is CIA Triad ?7. Malware Attack8. Phishing Attack9. Demo: How attackers use Phishing Attack ?10. Password Attack11. Demo: A Dictionary Attack - Password Attack12. Man-in-the-Middle Attack13. Demo: MITM Attack using ARP Poisoning14. SQL Injection Attack15. Demo: How to create a Sql Injection(SQLi) Attack16. Denial-of-Service Attack17. Cryptojacking18. White Hat Hacker19. Black Hat Hacker20. Grey Hat Hacker21. Hacktivist22. Script Kiddie23. What is Cryptography ?24. History of Cryptography25. Understanding the Ceasar's Cypher26. What is Symmetric Encryption27. Understand Symmetric Encryption with an Example28. Demo: Symmetric Encryption using openssl29. What is Asymmetric Encryption30. Understand Asymmetric Encryption - Confidentiality31. Understand Asymmetric Encryption - Integrity & Authentication32. Demo:Asymmetric encryption using openssl33. Get an Understanding of Hybrid Encryption34. What is Cipher Algorithm & Key35. What is DES - Data Encryption Standard ?36. What is AES : Advanced Encryption Standard37. Which are the NIST Approved Asymmetric Algorithms ?38. What is the RSA Algorithm ?39. Understanding RSA Algorithm with Example40. What is DSA Algorithm ?41. What is Deffie-Hellman Algorithm ?42. Understanding DH Algorithm with an Example43. Understanding Calculations for DH Algorithm44. What is Elliptic Curve Algorithm ?45. Quick Comparison : RSA vs DSA vs ECDSA vs DH46. What is PKI ?47. What is a Hashing Algorithm48. Demo: Hashing using openssl49. What is a Message Digest50. What is a Digital Signature ?51. Understanding Digital Signature52. What is a Certificate Authority -CA53. Demo: Exploring the DigiCert Website54. What is a Digital Certificate55. Understanding Digital Certificate56. Check a Real Certificate - Facebook57. Protecting from MITM using Digital Certificate58. What is a Self Signed Certificate ?59. PEM Vs PKCS1260. What is a Chain of Trust61. Demo: Create a Self Signed Certificate / rootCA62. Demo : Create a CSR63. Demo: Sign a Certificate CSR64. Main Artefacts for Networking65. Understanding the OSI Model66. What is a Switch ?67. What is a Router ?68. What is a VLAN69. Decimal to Binary Conversion70. Binary to Decimal Conversion71. Understanding an IP address72. What is Subnetting73. What is Subnet Mask74. What is ARP75. Simulation to understand ARP76. What is a Network Packet77. How a Packet Travels from Source to Destination78. Demo: traceroute to cnn79. What is a VPN ?80. Demo: Using a Software based VPN (NordVPN)81. What is a Firewall ?82. Role of a Proxy Server83. What is a Perimeter Network or a DMZ84. What is SSH85. What is TCP/IP86. What is SSL87. Understanding SSL Vs TLS88. Demo: Checking the Latest Stats on SSL/TLS89. What is MTLS
Overview
Section 1: Introduction
Lecture 1 Top 10 Cyber Attacks of 21st Century
Lecture 2 A Look at the Live Threats
Lecture 3 Demand for CyberSecurity Skills
Lecture 4 What is Cybersecurity ?
Lecture 5 What is CIA Triad ?
Section 2: Types of Cyber Attacks
Lecture 6 Intro - Types of Cyber Attacks
Lecture 7 Malware Attack
Lecture 8 Phishing Attack
Lecture 9 Demo: How attackers use Phishing Attack ?
Lecture 10 Password Attack
Lecture 11 Demo: A Dictionary Attack - Password Attack
Lecture 12 Man-in-the-Middle Attack
Lecture 13 Demo: MITM Attack using ARP Poisoning
Lecture 14 SQL Injection Attack
Lecture 15 Demo: How to create a Sql Injection(SQLi) Attack
Lecture 16 Denial-of-Service Attack
Lecture 17 Cryptojacking
Section 3: Types of Hackers
Lecture 18 Title-Types of Hackers
Lecture 19 White Hat Hacker
Lecture 20 Black Hat Hacker
Lecture 21 Grey Hat Hacker
Lecture 22 Hacktivist
Lecture 23 Script Kiddie
Section 4: Basics of Cryptography
Lecture 24 Title-Basics of Cryptography
Lecture 25 What is Cryptography ?
Lecture 26 History of Cryptography
Lecture 27 Understanding the Ceasar's Cypher
Lecture 28 What is Symmetric Encryption
Lecture 29 Understand Symmetric Encryption with an Example
Lecture 30 Demo: Symmetric Encryption using openssl
Lecture 31 What is Asymmetric Encryption
Lecture 32 Understand Asymmetric Encryption - Confidentiality
Lecture 33 Understand Asymmetric Encryption - Integrity & Authentication
Lecture 34 Demo:Asymmetric encryption using openssl
Lecture 35 Get an Understanding of Hybrid Encryption
Section 5: Deep Dive into Various Algorithms
Lecture 36 Title-Deep Dive into Various Algorithms
Lecture 37 What is Cipher Algorithm & Key
Lecture 38 What is DES - Data Encryption Standard ?
Lecture 39 What is AES : Advanced Encryption Standard
Lecture 40 Which are the NIST Approved Asymmetric Algorithms ?
Lecture 41 What is the RSA Algorithm ?
Lecture 42 Understanding RSA Algorithm with Example
Lecture 43 What is DSA Algorithm ?
Lecture 44 What is Deffie-Hellman Algorithm ?
Lecture 45 Understanding DH Algorithm with an Example
Lecture 46 Understanding Calculations for DH Algorithm
Lecture 47 What is Elliptic Curve Algorithm ?
Lecture 48 Quick Comparison : RSA vs DSA vs ECDSA vs DH
Section 6: Public Key Infrastructure - PKI
Lecture 49 Title-Public Key Infrastructure - PKI
Lecture 50 What is PKI ?
Lecture 51 What is a Hashing Algorithm
Lecture 52 Demo: Hashing using openssl
Lecture 53 What is a Message Digest
Lecture 54 What is a Digital Signature ?
Lecture 55 Understanding Digital Signature
Lecture 56 What is a Certificate Authority -CA
Lecture 57 Demo: Exploring the DigiCert Website
Lecture 58 What is a Digital Certificate
Lecture 59 Understanding Digital Certificate
Lecture 60 Check a Real Certificate - Facebook.com
Lecture 61 Protecting from MITM using Digital Certificate
Lecture 62 What is a Self Signed Certificate ?
Lecture 63 PEM Vs PKCS12
Lecture 64 What is a Chain of Trust
Lecture 65 Demo: Create a Self Signed Certificate / rootCA
Lecture 66 Demo : Create a CSR
Lecture 67 Demo: Sign a Certificate CSR
Section 7: Networking Basics
Lecture 68 Title-Networking Basics
Lecture 69 Main Artefacts for Networking
Lecture 70 Understanding the OSI Model
Lecture 71 What is a Switch ?
Lecture 72 What is a Router ?
Lecture 73 What is a VLAN
Lecture 74 Binary to Decimal Conversion
Lecture 75 Decimal to Binary Conversion
Lecture 76 Understanding an IP address
Lecture 77 What is Subnetting
Lecture 78 What is Subnet Mask
Lecture 79 What is ARP
Lecture 80 Simulation to understand ARP
Lecture 81 What is a Network Packet
Lecture 82 How a Packet Travels from Source to Destination
Lecture 83 Demo: traceroute to cnn.com
Lecture 84 What is a VPN ?
Lecture 85 Demo: Using a Software based VPN (NordVPN)
Lecture 86 What is a Firewall ?
Lecture 87 Role of a Proxy Server
Lecture 88 What is a Perimeter Network or a DMZ
Lecture 89 What is SSH
Lecture 90 What is TCP/IP
Lecture 91 What is SSL
Lecture 92 Demo: Checking the Latest Stats on SSL/TLS
Lecture 93 Understanding SSL Vs TLS
Lecture 94 What is MTLS
Section 8: Key Protocols
Lecture 95 Title-Key Protocols
Lecture 96 What is SSH ?
Lecture 97 What is TCP/IP ?
Lecture 98 What is SSL ?
Lecture 99 Demo: Checking the Latest Stats on SSL/TLS
Lecture 100 Understanding SSL Vs TLS
Lecture 101 What is mTLS ?
Cybersecurity Beginners / Experienced Professionals in IT wanting to understand the fundamentals of Cybersecurity in a Practical oriented learning,The course also teaches all the important Networking Fundamentals as well.
Demystifying Cybersecurity Fundamentals-Learning with Demos (3.29 GB)
KatFile Link(s)
RapidGator Link(s)