Demystifying Cybersecurity Fundamentals-Learning With Demos

Torrent Details


Demystifying Cybersecurity Fundamentals-Learning with Demos

NAME
Demystifying Cybersecurity Fundamentals-Learning with Demos.torrent
CATEGORY
Other
INFOHASH
2c3656e8b0ff7fc68fc326576414146c22a34015
SIZE
3.3 GB in 98 files
ADDED
Uploaded on 04-10-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Description

This is a course that has been designed for the Beginners to the world of Cybersecurity and also experienced IT Professionals looking to learn the fundamentals of Cybersecurity , the entire learning will be based on demos and various practical.

* What is Cybersecurity ?

* Types of Cyber Attacks – Malware / Phishing / MITM / DDOS /SQLInjection

* Types of Hackers – Black Hat / White Hat / Grey Hat / Hacktivist

* Basics of Cryptography – History / Caesar’s Cypher / Symmetric & Asymmetric Encryption

* Deep Dive into Various Algorithms – RSA / DSA / AES/ DES / ECDSA / Diffie-Hellman

* Public Key Infrastructure (PKI) – Digital Signature / Certificate Authority (CA) / Digital Certificate / Self Signed Certificate

* Networking Basics – IP Addressing / Subnetting / VPN / DMZ / Firewall / Proxy Server / Packet Switching

* Key Protocols – SSH / SSL / TCP/IP / TLS / mTLS

The details are as below:

1. Introduction
2. Top 10 Cyber Attacks of 21st Century

3. A Look at the Live Threats

4. Demand for CyberSecurity Skills

5. What is Cybersecurity ?

6. What is CIA Triad ?

7. Malware Attack
8. Phishing Attack
9. Demo: How attackers use Phishing Attack ?
10. Password Attack
11. Demo: A Dictionary Attack – Password Attack
12. Man-in-the-Middle Attack
13. Demo: MITM Attack using ARP Poisoning
14. SQL Injection Attack
15. Demo: How to create a Sql Injection(SQLi) Attack
16. Denial-of-Service Attack
17. Cryptojacking

18. White Hat Hacker
19. Black Hat Hacker
20. Grey Hat Hacker
21. Hacktivist
22. Script Kiddie

23. What is Cryptography ?
24. History of Cryptography
25. Understanding the Ceasar’s Cypher
26. What is Symmetric Encryption
27. Understand Symmetric Encryption with an Example
28. Demo: Symmetric Encryption using openssl
29. What is Asymmetric Encryption
30. Understand Asymmetric Encryption – Confidentiality
31. Understand Asymmetric Encryption – Integrity & Authentication
32. Demo:Asymmetric encryption using openssl

33. Get an Understanding of Hybrid Encryption

34. What is Cipher Algorithm & Key
35. What is DES – Data Encryption Standard ?
36. What is AES : Advanced Encryption Standard
37. Which are the NIST Approved Asymmetric Algorithms ?
38. What is the RSA Algorithm ?
39. Understanding RSA Algorithm with Example
40. What is DSA Algorithm ?
41. What is Deffie-Hellman Algorithm ?
42. Understanding DH Algorithm with an Example
43. Understanding Calculations for DH Algorithm
44. What is Elliptic Curve Algorithm ?
45. Quick Comparison : RSA vs DSA vs ECDSA vs DH

46. What is PKI ?
47. What is a Hashing Algorithm
48. Demo: Hashing using openssl
49. What is a Message Digest
50. What is a Digital Signature ?
51. Understanding Digital Signature
52. What is a Certificate Authority -CA
53. Demo: Exploring the DigiCert Website
54. What is a Digital Certificate
55. Understanding Digital Certificate
56. Check a Real Certificate – Facebook
57. Protecting from MITM using Digital Certificate
58. What is a Self Signed Certificate ?
59. PEM Vs PKCS12
60. What is a Chain of Trust
61. Demo: Create a Self Signed Certificate / rootCA
62. Demo : Create a CSR
63. Demo: Sign a Certificate CSR

64. Main Artefacts for Networking
65. Understanding the OSI Model
66. What is a Switch ?
67. What is a Router ?
68. What is a VLAN
69. Decimal to Binary Conversion
70. Binary to Decimal Conversion
71. Understanding an IP address
72. What is Subnetting
73. What is Subnet Mask
74. What is ARP
75. Simulation to understand ARP
76. What is a Network Packet
77. How a Packet Travels from Source to Destination
78. Demo: traceroute to cnn
79. What is a VPN ?
80. Demo: Using a Software based VPN (NordVPN)
81. What is a Firewall ?
82. Role of a Proxy Server
83. What is a Perimeter Network or a DMZ

84. What is SSH
85. What is TCP/IP
86. What is SSL
87. Understanding SSL Vs TLS
88. Demo: Checking the Latest Stats on SSL/TLS
89. What is MTLS
Who this course is for:

Cybersecurity Beginners / Experienced Professionals in IT wanting to understand the fundamentals of Cybersecurity in a Practical oriented learning
The course also teaches all the important Networking Fundamentals as well.

Requirements

Cybersecurity Beginners / Experienced Professionals in IT wanting to learn the fundamentals of Cybersecurity

Last Updated 8/2023

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
.pad/0504.9 KB
.pad/1952.1 KB
.pad/10205.1 KB
.pad/11441.4 KB
.pad/12148.1 KB
.pad/13224 KB
.pad/14861.5 KB
.pad/15370.6 KB
.pad/16705.6 KB
.pad/17441.6 KB
.pad/18641.5 KB
.pad/19872.3 KB
.pad/2753.5 KB
.pad/20489.3 KB
.pad/21529.1 KB
.pad/22578.5 KB
.pad/23301.3 KB
.pad/2410.5 KB
.pad/25193.7 KB
.pad/26793.4 KB
.pad/27717.6 KB
.pad/28783 KB
.pad/29213.2 KB
.pad/3103.4 KB
.pad/30364.5 KB
.pad/31235.2 KB
.pad/32424.5 KB
.pad/33282.9 KB
.pad/34631.3 KB
.pad/35677.6 KB
.pad/36296.5 KB
.pad/37463.9 KB
.pad/38894.2 KB
.pad/39910.2 KB
.pad/4757.3 KB
.pad/40915.8 KB
.pad/41307.5 KB
.pad/42508 KB
.pad/43769 KB
.pad/44835.6 KB
.pad/45354.5 KB
.pad/5427.1 KB
.pad/6514.8 KB
.pad/7624.2 KB
.pad/8902.5 KB
.pad/9720.1 KB
TutsNode.net.txt63 B
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/1. Top 10 Cyber Attacks of 21st Century.mp4101.2 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/2. A Look at the Live Threats.mp446.5 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/4. What is Cybersecurity .mp451.8 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/5. What is CIA Triad .mp441.8 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/2. Malware Attack.mp436.3 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/4. Demo How attackers use Phishing Attack .mp448.1 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/5. Password Attack.mp442 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/6. Demo A Dictionary Attack - Password Attack.mp459.3 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/8. Demo MITM Attack using ARP Poisoning.mp451.9 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/3. Black Hat Hacker.mp448.4 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/4. Grey Hat Hacker.mp444.5 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/5. Hacktivist.mp464.4 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/6. Script Kiddie.mp463.1 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/11. DemoAsymmetric encryption using openssl.mp450.6 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/11.1 Asymmetric Encryption using openssl.pdf53.4 KB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/2. What is Cryptography .mp439.8 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/3. History of Cryptography.mp437.8 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/5. What is Symmetric Encryption.mp442.7 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/8. What is Asymmetric Encryption.mp448.6 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/10. Understanding DH Algorithm with an Example.mp456.8 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/12. What is Elliptic Curve Algorithm .mp451.2 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/13. Quick Comparison RSA vs DSA vs ECDSA vs DH.mp435.5 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/2. What is Cipher Algorithm & Key.mp456.6 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/6. What is the RSA Algorithm .mp478.3 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/7. Understanding RSA Algorithm with Example.mp490.3 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/8. What is DSA Algorithm .mp449.3 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/9. What is Deffie-Hellman Algorithm .mp496.1 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/10. What is a Digital Certificate.mp436.4 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/14. What is a Self Signed Certificate .mp435.7 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/17. Demo Create a Self Signed Certificate rootCA.mp434.2 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/17.1 create_a_rootCA.pdf61.8 KB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/18.1 create_a_certificate_request.pdf62.5 KB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/19.1 signing_the_certificate.pdf51.6 KB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/2. What is PKI .mp472.6 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/3. What is a Hashing Algorithm.mp436.7 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/4.1 demo_hashing_openssl.pdf49.6 KB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/8. What is a Certificate Authority -CA.mp444.4 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/10. What is Subnetting.mp437.6 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/11. What is Subnet Mask.mp434.5 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/15. How a Packet Travels from Source to Destination.mp483.9 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/17. What is a VPN .mp438.6 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/18. Demo Using a Software based VPN (NordVPN).mp434.7 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/21. What is a Perimeter Network or a DMZ.mp435.1 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/24. What is SSL.mp435.1 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/25. Demo Checking the Latest Stats on SSLTLS.mp440.2 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/3. Understanding the OSI Model.mp434.2 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/4. What is a Switch .mp433.7 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/5. What is a Router .mp441.2 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/9. Understanding an IP address.mp466.5 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/8. Key Protocols/4. What is SSL .mp435.1 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/8. Key Protocols/5. Demo Checking the Latest Stats on SSLTLS.mp440.3 MB

Alternative Torrents for 'Demystifying Cybersecurity FundamentalsLearning with Demos'.

There are no alternative torrents found.