Home / Course catalog / Cyber Security

Information Technology IT → Executive Doctorate

Cyber Security


Description
Cybersecurity is the practice of protecting computers, networks, and electronic systems from unauthorized access, damage, or misuse of information. It involves implementing measures like firewalls, encryption, and employee training to ensure the confidentiality, integrity, and availability of digital assets.

Skills you will learn

Introduction to Cyber Security
IT Risk Management
Mastering IT Risk Management
Secure your IT infrastructure with effective Risk Management
Explore the practical application and utilization of the Python programming language in the context of cybersecurity tasks and scenarios, including ethical hacking.
Content
  • Unit 1 : Introduction to Cyber Security sample
  • Unit 2 : IT Risk Management
  • Unit 3 : Mastering IT Risk Management
  • Unit 4 : Secure your IT infrastructure with effective Risk Management
  • Cyber Security
  • Section 1- Video 1 : Before we begin!
  • Section 1 - Video 2 : Virtual Box Install Tutorial
  • Section 1- Video 3 : Kali Linux Install Tutorial
  • Section 1- Video 4 : Going Full Screen
  • Section 1- Video 5 : Basic Commands Part 1
  • Section 1- Video 6 : Basic Commands Part 2
  • Section 1- Video 7 : Basic Commands Part 3
  • Section 1- Video 8 : Changing IP address and setting up Wireless Adapter
  • Section 1- Video 9 : Creating Bootable Kali USB
  • Section 1- Video 10 : Important Networking Terms
  • Section 1- Video 11 : Important Hacking Terms
  • Section 1-Video 12 : Few Things to Do After Installing Kali Linux
  • Section 1- Video 13 : Changing Our Mac Address - Macchanger
  • Section 1-Video 14: Footprinting - Google Hacking
  • Section 1-Video 15 : Footprinting - Nikto Basics
  • Section 1- Video 16 : Footprinting - Nikto Basics)
  • Section 1- Video 17 : ootprinting - Email Harvesting
  • Section 1- Video 18 : Footprinting - Shodan
  • Section 1-Video 19 : Footprinting - Zone Transfer With Dig
  • Section 2- Video 20 : Scanning - Installing Metasploitable
  • Section 2- Video 21 : Scanning - Nmap Part 1
  • Section 2- Video 22: Scanning - Nmap Part 2
  • Section 2- Video 23 : Scanning - Nmap Part 3
  • Section 2- Video 24 : Scanning - Zenmap
  • Section 2- Video 25 : Scanning - TCP scans
  • Section 2- Video 26 : Scanning - Nmap Bypassing Defences
  • Section 2- Video 27 : Scanning - Nmap Scripts 1
  • Section 2- Video 28 : Scanning - Nmap Scripts 2
  • Section 2- Video 29 : Webpentest - Installing Owasp
  • Section 2- Video 30 : Webpentest - HTTP request
  • Section 2- Video 31 : Webpentest - HTTP Response
  • Section 2- Video 32 : Webpentest - Burpsuite Configuration
  • Section 2- Video 33 : Webpentest - Editing Packets in Burpsuite
  • Section 26- Video 34 : Webpentest - Whatweb & Dirb
  • Section 2- Video 35 : Webpentest - Password Recovery Attack
  • Section 2- Video 36 : Webpentest - Burpsuite Login Bruteforce
  • Section 2- Video 37 : Webpentest - Hydra Login Bruteforce
  • Section 2- Video 38 : Webpentest - Session Fixation
  • Section 1- Video 39 : Webpentest - Injection Attacks
  • Section 2- Video 40 : Webpentest - Simple Command Injection
  • Section 2- Video 41 : Webpentest - Exploiting Command Injection Vulnerability
  • Section 2- Video 42 : Webpentest - Finding Blind Command Injection
  • Section 2- Video 43 : Webpentest - Basics Of SQL
  • Section 2- Video 44 : Webpentest - Manual SQL Injection Part 1
  • Section 2- Video 45 : Webpentest - Manual SQL Injection Part 2
  • Section 2- Video 46 : Webpentest - SQLmap basics
  • Section 2- Video 47 : Webpentest - XML Injection
  • Section 2- Video 48 : Installing XCAT and Preventing Injection Attacks
  • Section 2- Video 49 : Webpentest - Reflected XSS
  • Section 2- Video 50 : Webpentest - Stored XSS
  • Section 2- Video 51 : Webpentest - Changing HTML Code with XSS
  • Section 2- Video 52 : Webpentest - XSSer & XSSsniper
  • Section 2- Video 53 : WPA2 Cracking - Wireless Attacks Theory
  • Section 2- Video 54 : WPA2 Cracking - Putting Network Card in Monitor Mode
  • Section 2- Video 55 : WPA2 Cracking - Capturing Handshake With Airodump
  • Section 2- Video 56 : WPA2 Cracking - RockYou.txt
  • Section 2- Video 57 : WPA2 Cracking - Cracking with Aircrack
  • Section 2 - Video 58 : WPA2 Cracking - Cracking with Hashcat
  • Section 2- Video 59 : WPA2 Cracking - Making Password Lists WIth Crunch
  • Section 2- Video 60 : WPA2 Cracking - Making Password Lists WIth Cupp
  • Section 2- Video 61 : WPA2 Cracking - Rainbowtables Part 1
  • Section 2- Video 62 : WPA2 Cracking - Rainbowtables Part 2
  • Section 2- Video 63 : WPA2 Cracking - Installing Fluxion
  • Section 2- Video 64 : WPA2 Cracking - Finding and Cracking Hidden Network
  • Section 2- Video 65 : WPA2 Cracking - Preventing Wireless Attacks
  • Section 2- Video 66 : Man In The Middle - ARP Protocol Basics
  • Section 2- Video 67 : Man In The Middle - MITM Attack Theory
  • Section 2- Video 68 : Man In The Middle - Installing MITMf
  • Section 2- Video 69 : Man In The Middle Attack - Manual Arpspoofing
  • Section 2- Video 70 : Man In The Middle Attack - Problems While Installing MITMf
  • Section 2- Video 71 : Man In The Middle Attack - HTTP Traffic Sniffing
  • Section 2- Video 72 : Man In The Middle Attack - DNS Spoofing
  • Section 2- Video 73 : Man In The Middle Attack - Hooking Browsers
  • Section 2- Video 74 : Man In The Middle Attack - Screenshotting Targets Browser
  • Section 2- Video 75 : Man In The Middle Attack - Cloning Any Webpage)
  • Section 2- Video 76 : Man In The Middle Attack - Ettercap Basics
  • Section 2- Video 77 : System Hacking - MSFconsole Enviroment
  • Section 2- Video 78 : System Hacking - Metasploit Modules Explained
  • Section 2- Video 79 : System Hacking - Bruteforcing SSH with Metasploit
  • Section 2- Video 80 : System Hacking - Attacking Tomcat With Metasploit
  • Section 2- Video 81 : System Hacking - Getting Meterpreter
  • Section 2- Video 82 : System Hacking - PHP Code Injection
  • Section 2- Video 83 : System Hacking - 2 Metasploitable Exploits
  • Section 2- Video 84 : System Hacking - Wine installation
  • Section 2- Video 85 : System Hacking - Crafting Windows Payloads With Msfvenom
  • Section 2- Video 86 : System Hacking - Encoders & Hexeditor
  • Section 2- Video 87 : System Hacking - Windows 10 Meterpreter Shell
  • Section 2- Video 88 : System Hacking - Meterpreter Enviroment)
  • Section 2- Video 89 : System Hacking - Windows 10 Privilege Escalation
  • Section 2- Video 90 : System Hacking - Preventing Privilege Escalation)
  • Section 2- Video 91 : System Hacking - Post Exploitation Modules
  • Section 2- Video 92 : System Hacking - Getting Meterpreter
  • Section 2- Video 93 : System Hacking - Eternalblue Exploit
  • Section 2- Video 94 : System Hacking - Persistence Module
  • Section 2- Video 95 : System Hacking - Hacking Over Internet With Ngrok
  • Section 2- Video 96 : Video system Hacking - Android Device Attack With Venom
  • Section 2- Video 97 : System Hacking - Real Hacking Begins Now!
  • Section 3- Video 98 : Python Basics - Variables
  • Section 3- Video 99 : Python Basics - raw_input
  • Section 3- Video 100 : Python Basics - IF ELSE statement
  • Section 3- Video 101 : Python Basics - FOR loop
  • Section 3- Video 102 : Python Basics - WHILE loop
  • Section-3 - Video 103 : Python Basics - Python Lists
  • Section 3- Video 104 : Python Basics - Functions
  • Section 3- Video 105 : Python Basics - Classes
  • Section 3- Video 106 : Python Basics - Importing Libraries
  • Section 3- Video 107 : Python Basics - Files in Python
  • Section 3- Video 108 : Python Basics - Try and Except rule
  • Section 3- Video 109 : Coding Advance Backdoor - Theory Behind Reverse Shell
  • Section 3- Video 107 : Coding Advance Backdoor - Simple Server Code
  • Section 3- Video 111 : Coding Advance Backdoor - Connection With Reverse Shell
  • Section 3- Video 112 : Coding Advance Backdoor - Sending and Receiving Messages
  • Section 3- Video 113 : Coding Advance Backdoor - Sending Messages
  • Section 3- Video 114 : Coding Advance Backdoor - Executing Commands
  • Section 3- Video 115 : Coding Advance Backdoor - Fixing Backdoor Bugs
  • Section 3- Video 115.5 : Coding Advance Backdoor - Fixing Backdoor Bugs
  • Section 3- Video 116 : Coding Advance Backdoor - First Performance
  • Section 3- Video 117 : Coding Advance Backdoor - Trying to Connect
  • Section 3- Video 118 :Coding Advance Backdoor - Creating Persistence Part 1
  • Section 3- Video 119 : Coding Advance Backdoor - Creating Persistence Part 2
  • Section 3- Video 120 : Coding Advance Backdoor - Changing Directory
  • Section 3- Video 121 : Coding Advance Backdoor - Uploading & Downloading Files
  • Section 3- Video 122 : Coding Advance Backdoor - Downloading Files From Internet
  • Section 3- Video 123 : Coding Advance Backdoor - Starting Programs
  • Section 3- Video 124 : Coding Advance Backdoor - Capturing Screenshot
  • Section 3- Video 125 : Coding Advance Backdoor - Embedding Backdoor In Image
  • Section 3- Video 126 : Coding Advance Backdoor - Embedding
  • Section 3- Video 127 : Coding Advance Backdoor - Checking
  • Section 3 : Video 128 : Coding Advance Backdoor - Adding Help Option
  • Section 3- Video 129 :Creating Keylogger For Backdoor - Importing Pynput
  • Section 3- Video 130 : Creating Keylogger For Backdoor - Simple Keylogger
  • Section 3- Video 131 : Creating Keylogger For Backdoor - Adding Report Function
  • Section 3- Video 132 : Creating Keylogger For Backdoor - Writing Keystrokes
  • Section 3- Video 133 :Creating Keylogger For Backdoor - Adding Keylogger
  • Section 3- Video 134 : Creating Keylogger For Backdoor - Adding Keylogger
  • Section 3- Video 135 : Creating Keylogger For Backdoor - Final Project Test
  • Section 3- Video 136 : Basic Authentication Bruteforcer - Printing Banner
  • Section 3- Video 137 : Basic Authentication Bruteforcer
  • Section 3- Video 138 : Basic Authentication Bruteforcer - Starting Threads
  • Section 3- Video 139 : Basic Authentication Bruteforcer - Making Function
  • Section 3- Video 140 : Basic Authentication Bruteforce
  • Section 3- Video 141 : Basic Authentication Bruteforcer
  • Section 3- Video 142 : Basic Authentication Bruteforcer
Completion rules
  • All units must be completed