https://i.im.ge/2023/09/16/6EsVEx.p530ejj4tbah.jpg

Demystifying Cybersecurity Fundamentals-Learning With Demos 
Published 8/2023 
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz 
Language: English | Size: 3.29 GB | Duration: 9h 16m 
A Practical Approach to learning - Cyber Attacks, Cryptography, Encryption Algorithms, PKI,Networking Topics & Protocols

What you'll learn

Top 10 Cyber Attacks of 21st Century

What is Cybersecurity ?

What is CIA Triad ?

Types of Cyber Attacks

Demo: How attackers use Phishing Attack ?

Demo: How to create a Sql Injection(SQLi) Attack

Types of Hackers : Black Hat / White Hat / Grey Hat / Hacktivist

What is Cryptography ?

Understand Symmetric Encryption with an Example

Demo:Asymmetric encryption using openssl

Understanding of AES/DES Algorithms

Understanding of RSA / DSA / ECDSA / Diffie-Hellman Algorithms with Demos

What is PKI ?

Demos for Digital Signature / Digital Certificate / Certificate Authority

How to raise a CSR and sign the certificate

A Primer on Networking and all important terms

What is a Switch & a Router

What is VLAN / IP Address / Subnetting / Subset Mask

Demos on ARP / Network Packets / Traceroute

Understanding of VPN / Firewall / DMZ / Proxy Server

What is SSH/ TCP-IP

What is SSL

Understanding SSL Vs TLS

Demo: Checking the Latest Stats on SSL/TLS

What is mTLS

Requirements

Cybersecurity Beginners / Experienced Professionals in IT wanting to learn the fundamentals of Cybersecurity

Description

This is a course that has been designed for the Beginners to the world of Cybersecurity and also experienced IT Professionals looking to learn the fundamentals of Cybersecurity , the entire learning will be based on demos and various practical.* What is Cybersecurity* Types of Cyber Attacks - Malware / Phishing / MITM / DDDOS /SQLinjection* Types of Hackers - Back Hat / White Hat / Grey Hat / Hacktivist* Basics of Cryptography - History / Caesar's Cypher / Symmetric & Asymmetric Encryption* Deep Dive into Various Algorithms - RSA / DSA / AES/ DES / ECDSA / Diffie-Hellman* Public Key Infrastructure (PKI) - Digital Signature / Certificate Authority (CA) / Digital Certificate / Self Signed Certificate* Networking Basics - IP Addressing / Subnetting / VPN / DMZ / Firewall / Proxy Server / Packet Switching* Key Protocols - SSH / SSL / TCP/IP / TLS / mTLSThe details are as below:1. Introduction2. Top 10 Cyber Attacks of 21st Century3. A Look at the Live Threats4. Demand for CyberSecurity Skills5. What is Cybersecurity ?6. What is CIA Triad ?7. Malware Attack8. Phishing Attack9. Demo: How attackers use Phishing Attack ?10. Password Attack11. Demo: A Dictionary Attack - Password Attack12. Man-in-the-Middle Attack13. Demo: MITM Attack using ARP Poisoning14. SQL Injection Attack15. Demo: How to create a Sql Injection(SQLi) Attack16. Denial-of-Service Attack17. Cryptojacking18. White Hat Hacker19. Black Hat Hacker20. Grey Hat Hacker21. Hacktivist22. Script Kiddie23. What is Cryptography ?24. History of Cryptography25. Understanding the Ceasar's Cypher26. What is Symmetric Encryption27. Understand Symmetric Encryption with an Example28. Demo: Symmetric Encryption using openssl29. What is Asymmetric Encryption30. Understand Asymmetric Encryption - Confidentiality31. Understand Asymmetric Encryption - Integrity & Authentication32. Demo:Asymmetric encryption using openssl33. Get an Understanding of Hybrid Encryption34. What is Cipher Algorithm & Key35. What is DES - Data Encryption Standard ?36. What is AES : Advanced Encryption Standard37. Which are the NIST Approved Asymmetric Algorithms ?38. What is the RSA Algorithm ?39. Understanding RSA Algorithm with Example40. What is DSA Algorithm ?41. What is Deffie-Hellman Algorithm ?42. Understanding DH Algorithm with an Example43. Understanding Calculations for DH Algorithm44. What is Elliptic Curve Algorithm ?45. Quick Comparison : RSA vs DSA vs ECDSA vs DH46. What is PKI ?47. What is a Hashing Algorithm48. Demo: Hashing using openssl49. What is a Message Digest50. What is a Digital Signature ?51. Understanding Digital Signature52. What is a Certificate Authority -CA53. Demo: Exploring the DigiCert Website54. What is a Digital Certificate55. Understanding Digital Certificate56. Check a Real Certificate - Facebook57. Protecting from MITM using Digital Certificate58. What is a Self Signed Certificate ?59. PEM Vs PKCS1260. What is a Chain of Trust61. Demo: Create a Self Signed Certificate / rootCA62. Demo : Create a CSR63. Demo: Sign a Certificate CSR64. Main Artefacts for Networking65. Understanding the OSI Model66. What is a Switch ?67. What is a Router ?68. What is a VLAN69. Decimal to Binary Conversion70. Binary to Decimal Conversion71. Understanding an IP address72. What is Subnetting73. What is Subnet Mask74. What is ARP75. Simulation to understand ARP76. What is a Network Packet77. How a Packet Travels from Source to Destination78. Demo: traceroute to cnn79. What is a VPN ?80. Demo: Using a Software based VPN (NordVPN)81. What is a Firewall ?82. Role of a Proxy Server83. What is a Perimeter Network or a DMZ84. What is SSH85. What is TCP/IP86. What is SSL87. Understanding SSL Vs TLS88. Demo: Checking the Latest Stats on SSL/TLS89. What is MTLS

Overview

Section 1: Introduction

Lecture 1 Top 10 Cyber Attacks of 21st Century

Lecture 2 A Look at the Live Threats

Lecture 3 Demand for CyberSecurity Skills

Lecture 4 What is Cybersecurity ?

Lecture 5 What is CIA Triad ?

Section 2: Types of Cyber Attacks

Lecture 6 Intro - Types of Cyber Attacks

Lecture 7 Malware Attack

Lecture 8 Phishing Attack

Lecture 9 Demo: How attackers use Phishing Attack ?

Lecture 10 Password Attack

Lecture 11 Demo: A Dictionary Attack - Password Attack

Lecture 12 Man-in-the-Middle Attack

Lecture 13 Demo: MITM Attack using ARP Poisoning

Lecture 14 SQL Injection Attack

Lecture 15 Demo: How to create a Sql Injection(SQLi) Attack

Lecture 16 Denial-of-Service Attack

Lecture 17 Cryptojacking

Section 3: Types of Hackers

Lecture 18 Title-Types of Hackers

Lecture 19 White Hat Hacker

Lecture 20 Black Hat Hacker

Lecture 21 Grey Hat Hacker

Lecture 22 Hacktivist

Lecture 23 Script Kiddie

Section 4: Basics of Cryptography

Lecture 24 Title-Basics of Cryptography

Lecture 25 What is Cryptography ?

Lecture 26 History of Cryptography

Lecture 27 Understanding the Ceasar's Cypher

Lecture 28 What is Symmetric Encryption

Lecture 29 Understand Symmetric Encryption with an Example

Lecture 30 Demo: Symmetric Encryption using openssl

Lecture 31 What is Asymmetric Encryption

Lecture 32 Understand Asymmetric Encryption - Confidentiality

Lecture 33 Understand Asymmetric Encryption - Integrity & Authentication

Lecture 34 Demo:Asymmetric encryption using openssl

Lecture 35 Get an Understanding of Hybrid Encryption

Section 5: Deep Dive into Various Algorithms

Lecture 36 Title-Deep Dive into Various Algorithms

Lecture 37 What is Cipher Algorithm & Key

Lecture 38 What is DES - Data Encryption Standard ?

Lecture 39 What is AES : Advanced Encryption Standard

Lecture 40 Which are the NIST Approved Asymmetric Algorithms ?

Lecture 41 What is the RSA Algorithm ?

Lecture 42 Understanding RSA Algorithm with Example

Lecture 43 What is DSA Algorithm ?

Lecture 44 What is Deffie-Hellman Algorithm ?

Lecture 45 Understanding DH Algorithm with an Example

Lecture 46 Understanding Calculations for DH Algorithm

Lecture 47 What is Elliptic Curve Algorithm ?

Lecture 48 Quick Comparison : RSA vs DSA vs ECDSA vs DH

Section 6: Public Key Infrastructure - PKI

Lecture 49 Title-Public Key Infrastructure - PKI

Lecture 50 What is PKI ?

Lecture 51 What is a Hashing Algorithm

Lecture 52 Demo: Hashing using openssl

Lecture 53 What is a Message Digest

Lecture 54 What is a Digital Signature ?

Lecture 55 Understanding Digital Signature

Lecture 56 What is a Certificate Authority -CA

Lecture 57 Demo: Exploring the DigiCert Website

Lecture 58 What is a Digital Certificate

Lecture 59 Understanding Digital Certificate

Lecture 60 Check a Real Certificate - Facebook.com

Lecture 61 Protecting from MITM using Digital Certificate

Lecture 62 What is a Self Signed Certificate ?

Lecture 63 PEM Vs PKCS12

Lecture 64 What is a Chain of Trust

Lecture 65 Demo: Create a Self Signed Certificate / rootCA

Lecture 66 Demo : Create a CSR

Lecture 67 Demo: Sign a Certificate CSR

Section 7: Networking Basics

Lecture 68 Title-Networking Basics

Lecture 69 Main Artefacts for Networking

Lecture 70 Understanding the OSI Model

Lecture 71 What is a Switch ?

Lecture 72 What is a Router ?

Lecture 73 What is a VLAN

Lecture 74 Binary to Decimal Conversion

Lecture 75 Decimal to Binary Conversion

Lecture 76 Understanding an IP address

Lecture 77 What is Subnetting

Lecture 78 What is Subnet Mask

Lecture 79 What is ARP

Lecture 80 Simulation to understand ARP

Lecture 81 What is a Network Packet

Lecture 82 How a Packet Travels from Source to Destination

Lecture 83 Demo: traceroute to cnn.com

Lecture 84 What is a VPN ?

Lecture 85 Demo: Using a Software based VPN (NordVPN)

Lecture 86 What is a Firewall ?

Lecture 87 Role of a Proxy Server

Lecture 88 What is a Perimeter Network or a DMZ

Lecture 89 What is SSH

Lecture 90 What is TCP/IP

Lecture 91 What is SSL

Lecture 92 Demo: Checking the Latest Stats on SSL/TLS

Lecture 93 Understanding SSL Vs TLS

Lecture 94 What is MTLS

Section 8: Key Protocols

Lecture 95 Title-Key Protocols

Lecture 96 What is SSH ?

Lecture 97 What is TCP/IP ?

Lecture 98 What is SSL ?

Lecture 99 Demo: Checking the Latest Stats on SSL/TLS

Lecture 100 Understanding SSL Vs TLS

Lecture 101 What is mTLS ?

Cybersecurity Beginners / Experienced Professionals in IT wanting to understand the fundamentals of Cybersecurity in a Practical oriented learning,The course also teaches all the important Networking Fundamentals as well.

[color=#ff9900]Demystifying Cybersecurity Fundamentals-Learning with Demos[/color] (3.29 GB)

KatFile Link(s)

Код:
https://katfile.com/0umi0dm827z1/Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part1.rar
https://katfile.com/qhnftvpsy34s/Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part2.rar

RapidGator Link(s)

Код:
https://rapidgator.net/file/1d2d041c1df12d6f57c8101e39bae328/Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part1.rar
https://rapidgator.net/file/dc6b41677e353d30f38d31a721a4bf00/Demystifying_Cybersecurity_Fundamentals-Learning_with_Demos.part2.rar