Cyber Security

  • Unit 1 : Introduction to Cyber Security 
    • Unit 1 : Introduction to Cyber Security
    • Unit 2 : IT Risk Management
    • Unit 3 : Mastering IT Risk Management
    • Unit 4 : Secure your IT infrastructure with effect...
    • Cyber Security
    • Section 1- Video 1 : Before we begin!
    • Section 1 - Video 2 : Virtual Box Install Tutorial
    • Section 1- Video 3 : Kali Linux Install Tutorial
    • Section 1- Video 4 : Going Full Screen
    • Section 1- Video 5 : Basic Commands Part 1
    • Section 1- Video 6 : Basic Commands Part 2
    • Section 1- Video 7 : Basic Commands Part 3
    • Section 1- Video 8 : Changing IP address and setti...
    • Section 1- Video 9 : Creating Bootable Kali USB
    • Section 1- Video 10 : Important Networking Terms
    • Section 1- Video 11 : Important Hacking Terms
    • Section 1-Video 12 : Few Things to Do After Instal...
    • Section 1- Video 13 : Changing Our Mac Address - M...
    • Section 1-Video 14: Footprinting - Google Hacking
    • Section 1-Video 15 : Footprinting - Nikto Basics
    • Section 1- Video 16 : Footprinting - Nikto Basics)
    • Section 1- Video 17 : ootprinting - Email Harvesti...
    • Section 1- Video 18 : Footprinting - Shodan
    • Section 1-Video 19 : Footprinting - Zone Transfer ...
    • Section 2- Video 20 : Scanning - Installing Metasp...
    • Section 2- Video 21 : Scanning - Nmap Part 1
    • Section 2- Video 22: Scanning - Nmap Part 2
    • Section 2- Video 23 : Scanning - Nmap Part 3
    • Section 2- Video 24 : Scanning - Zenmap
    • Section 2- Video 25 : Scanning - TCP scans
    • Section 2- Video 26 : Scanning - Nmap Bypassing De...
    • Section 2- Video 27 : Scanning - Nmap Scripts 1
    • Section 2- Video 28 : Scanning - Nmap Scripts 2
    • Section 2- Video 29 : Webpentest - Installing Owas...
    • Section 2- Video 30 : Webpentest - HTTP request
    • Section 2- Video 31 : Webpentest - HTTP Response
    • Section 2- Video 32 : Webpentest - Burpsuite Confi...
    • Section 2- Video 33 : Webpentest - Editing Packets...
    • Section 26- Video 34 : Webpentest - Whatweb & Dirb
    • Section 2- Video 35 : Webpentest - Password Recove...
    • Section 2- Video 36 : Webpentest - Burpsuite Login...
    • Section 2- Video 37 : Webpentest - Hydra Login Bru...
    • Section 2- Video 38 : Webpentest - Session Fixatio...
    • Section 1- Video 39 : Webpentest - Injection Attac...
    • Section 2- Video 40 : Webpentest - Simple Command ...
    • Section 2- Video 41 : Webpentest - Exploiting Comm...
    • Section 2- Video 42 : Webpentest - Finding Blind C...
    • Section 2- Video 43 : Webpentest - Basics Of SQL
    • Section 2- Video 44 : Webpentest - Manual SQL Inje...
    • Section 2- Video 45 : Webpentest - Manual SQL Inje...
    • Section 2- Video 46 : Webpentest - SQLmap basics
    • Section 2- Video 47 : Webpentest - XML Injection
    • Section 2- Video 48 : Installing XCAT and Preventi...
    • Section 2- Video 49 : Webpentest - Reflected XSS
    • Section 2- Video 50 : Webpentest - Stored XSS
    • Section 2- Video 51 : Webpentest - Changing HTML C...
    • Section 2- Video 52 : Webpentest - XSSer & XSSsnip...
    • Section 2- Video 53 : WPA2 Cracking - Wireless Att...
    • Section 2- Video 54 : WPA2 Cracking - Putting Netw...
    • Section 2- Video 55 : WPA2 Cracking - Capturing Ha...
    • Section 2- Video 56 : WPA2 Cracking - RockYou.txt
    • Section 2- Video 57 : WPA2 Cracking - Cracking wit...
    • Section 2 - Video 58 : WPA2 Cracking - Cracking wi...
    • Section 2- Video 59 : WPA2 Cracking - Making Passw...
    • Section 2- Video 60 : WPA2 Cracking - Making Passw...
    • Section 2- Video 61 : WPA2 Cracking - Rainbowtable...
    • Section 2- Video 62 : WPA2 Cracking - Rainbowtable...
    • Section 2- Video 63 : WPA2 Cracking - Installing F...
    • Section 2- Video 64 : WPA2 Cracking - Finding and ...
    • Section 2- Video 65 : WPA2 Cracking - Preventing W...
    • Section 2- Video 66 : Man In The Middle - ARP Prot...
    • Section 2- Video 67 : Man In The Middle - MITM Att...
    • Section 2- Video 68 : Man In The Middle - Installi...
    • Section 2- Video 69 : Man In The Middle Attack - M...
    • Section 2- Video 70 : Man In The Middle Attack - P...
    • Section 2- Video 71 : Man In The Middle Attack - H...
    • Section 2- Video 72 : Man In The Middle Attack - D...
    • Section 2- Video 73 : Man In The Middle Attack - H...
    • Section 2- Video 74 : Man In The Middle Attack - S...
    • Section 2- Video 75 : Man In The Middle Attack - C...
    • Section 2- Video 76 : Man In The Middle Attack - E...
    • Section 2- Video 77 : System Hacking - MSFconsole ...
    • Section 2- Video 78 : System Hacking - Metasploit ...
    • Section 2- Video 79 : System Hacking - Bruteforcin...
    • Section 2- Video 80 : System Hacking - Attacking T...
    • Section 2- Video 81 : System Hacking - Getting Met...
    • Section 2- Video 82 : System Hacking - PHP Code In...
    • Section 2- Video 83 : System Hacking - 2 Metasploi...
    • Section 2- Video 84 : System Hacking - Wine instal...
    • Section 2- Video 85 : System Hacking - Crafting Wi...
    • Section 2- Video 86 : System Hacking - Encoders & ...
    • Section 2- Video 87 : System Hacking - Windows 10 ...
    • Section 2- Video 88 : System Hacking - Meterpreter...
    • Section 2- Video 89 : System Hacking - Windows 10 ...
    • Section 2- Video 90 : System Hacking - Preventing ...
    • Section 2- Video 91 : System Hacking - Post Exploi...
    • Section 2- Video 92 : System Hacking - Getting Met...
    • Section 2- Video 93 : System Hacking - Eternalblue...
    • Section 2- Video 94 : System Hacking - Persistence...
    • Section 2- Video 95 : System Hacking - Hacking Ove...
    • Section 2- Video 96 : Video system Hacking - Andro...
    • Section 2- Video 97 : System Hacking - Real Hackin...
    • Section 3- Video 98 : Python Basics - Variables
    • Section 3- Video 99 : Python Basics - raw_input
    • Section 3- Video 100 : Python Basics - IF ELSE sta...
    • Section 3- Video 101 : Python Basics - FOR loop
    • Section 3- Video 102 : Python Basics - WHILE loop
    • Section-3 - Video 103 : Python Basics - Python Lis...
    • Section 3- Video 104 : Python Basics - Functions
    • Section 3- Video 105 : Python Basics - Classes
    • Section 3- Video 106 : Python Basics - Importing L...
    • Section 3- Video 107 : Python Basics - Files in Py...
    • Section 3- Video 108 : Python Basics - Try and Exc...
    • Section 3- Video 109 : Coding Advance Backdoor - T...
    • Section 3- Video 107 : Coding Advance Backdoor - S...
    • Section 3- Video 111 : Coding Advance Backdoor - C...
    • Section 3- Video 112 : Coding Advance Backdoor - S...
    • Section 3- Video 113 : Coding Advance Backdoor - S...
    • Section 3- Video 114 : Coding Advance Backdoor - E...
    • Section 3- Video 115 : Coding Advance Backdoor - F...
    • Section 3- Video 115.5 : Coding Advance Backdoor -...
    • Section 3- Video 116 : Coding Advance Backdoor - F...
    • Section 3- Video 117 : Coding Advance Backdoor - T...
    • Section 3- Video 118 :Coding Advance Backdoor - Cr...
    • Section 3- Video 119 : Coding Advance Backdoor - C...
    • Section 3- Video 120 : Coding Advance Backdoor - C...
    • Section 3- Video 121 : Coding Advance Backdoor - U...
    • Section 3- Video 122 : Coding Advance Backdoor - D...
    • Section 3- Video 123 : Coding Advance Backdoor - S...
    • Section 3- Video 124 : Coding Advance Backdoor - C...
    • Section 3- Video 125 : Coding Advance Backdoor - E...
    • Section 3- Video 126 : Coding Advance Backdoor - E...
    • Section 3- Video 127 : Coding Advance Backdoor - C...
    • Section 3 : Video 128 : Coding Advance Backdoor - ...
    • Section 3- Video 129 :Creating Keylogger For Backd...
    • Section 3- Video 130 : Creating Keylogger For Back...
    • Section 3- Video 131 : Creating Keylogger For Back...
    • Section 3- Video 132 : Creating Keylogger For Back...
    • Section 3- Video 133 :Creating Keylogger For Backd...
    • Section 3- Video 134 : Creating Keylogger For Back...
    • Section 3- Video 135 : Creating Keylogger For Back...
    • Section 3- Video 136 : Basic Authentication Brutef...
    • Section 3- Video 137 : Basic Authentication Brutef...
    • Section 3- Video 138 : Basic Authentication Brutef...
    • Section 3- Video 139 : Basic Authentication Brutef...
    • Section 3- Video 140 : Basic Authentication Brutef...
    • Section 3- Video 141 : Basic Authentication Brutef...
    • Section 3- Video 142 : Basic Authentication Brutef...
  • Course info
×

Course info

Cyber Security

Content
  • Unit 1 : Introduction to Cyber Security sample
  • Unit 2 : IT Risk Management
  • Unit 3 : Mastering IT Risk Management
  • Unit 4 : Secure your IT infrastructure with effective Risk Management
  • Cyber Security
  • Section 1- Video 1 : Before we begin!
  • Section 1 - Video 2 : Virtual Box Install Tutorial
  • Section 1- Video 3 : Kali Linux Install Tutorial
  • Section 1- Video 4 : Going Full Screen
  • Section 1- Video 5 : Basic Commands Part 1
  • Section 1- Video 6 : Basic Commands Part 2
  • Section 1- Video 7 : Basic Commands Part 3
  • Section 1- Video 8 : Changing IP address and setting up Wireless Adapter
  • Section 1- Video 9 : Creating Bootable Kali USB
  • Section 1- Video 10 : Important Networking Terms
  • Section 1- Video 11 : Important Hacking Terms
  • Section 1-Video 12 : Few Things to Do After Installing Kali Linux
  • Section 1- Video 13 : Changing Our Mac Address - Macchanger
  • Section 1-Video 14: Footprinting - Google Hacking
  • Section 1-Video 15 : Footprinting - Nikto Basics
  • Section 1- Video 16 : Footprinting - Nikto Basics)
  • Section 1- Video 17 : ootprinting - Email Harvesting
  • Section 1- Video 18 : Footprinting - Shodan
  • Section 1-Video 19 : Footprinting - Zone Transfer With Dig
  • Section 2- Video 20 : Scanning - Installing Metasploitable
  • Section 2- Video 21 : Scanning - Nmap Part 1
  • Section 2- Video 22: Scanning - Nmap Part 2
  • Section 2- Video 23 : Scanning - Nmap Part 3
  • Section 2- Video 24 : Scanning - Zenmap
  • Section 2- Video 25 : Scanning - TCP scans
  • Section 2- Video 26 : Scanning - Nmap Bypassing Defences
  • Section 2- Video 27 : Scanning - Nmap Scripts 1
  • Section 2- Video 28 : Scanning - Nmap Scripts 2
  • Section 2- Video 29 : Webpentest - Installing Owasp
  • Section 2- Video 30 : Webpentest - HTTP request
  • Section 2- Video 31 : Webpentest - HTTP Response
  • Section 2- Video 32 : Webpentest - Burpsuite Configuration
  • Section 2- Video 33 : Webpentest - Editing Packets in Burpsuite
  • Section 26- Video 34 : Webpentest - Whatweb & Dirb
  • Section 2- Video 35 : Webpentest - Password Recovery Attack
  • Section 2- Video 36 : Webpentest - Burpsuite Login Bruteforce
  • Section 2- Video 37 : Webpentest - Hydra Login Bruteforce
  • Section 2- Video 38 : Webpentest - Session Fixation
  • Section 1- Video 39 : Webpentest - Injection Attacks
  • Section 2- Video 40 : Webpentest - Simple Command Injection
  • Section 2- Video 41 : Webpentest - Exploiting Command Injection Vulnerability
  • Section 2- Video 42 : Webpentest - Finding Blind Command Injection
  • Section 2- Video 43 : Webpentest - Basics Of SQL
  • Section 2- Video 44 : Webpentest - Manual SQL Injection Part 1
  • Section 2- Video 45 : Webpentest - Manual SQL Injection Part 2
  • Section 2- Video 46 : Webpentest - SQLmap basics
  • Section 2- Video 47 : Webpentest - XML Injection
  • Section 2- Video 48 : Installing XCAT and Preventing Injection Attacks
  • Section 2- Video 49 : Webpentest - Reflected XSS
  • Section 2- Video 50 : Webpentest - Stored XSS
  • Section 2- Video 51 : Webpentest - Changing HTML Code with XSS
  • Section 2- Video 52 : Webpentest - XSSer & XSSsniper
  • Section 2- Video 53 : WPA2 Cracking - Wireless Attacks Theory
  • Section 2- Video 54 : WPA2 Cracking - Putting Network Card in Monitor Mode
  • Section 2- Video 55 : WPA2 Cracking - Capturing Handshake With Airodump
  • Section 2- Video 56 : WPA2 Cracking - RockYou.txt
  • Section 2- Video 57 : WPA2 Cracking - Cracking with Aircrack
  • Section 2 - Video 58 : WPA2 Cracking - Cracking with Hashcat
  • Section 2- Video 59 : WPA2 Cracking - Making Password Lists WIth Crunch
  • Section 2- Video 60 : WPA2 Cracking - Making Password Lists WIth Cupp
  • Section 2- Video 61 : WPA2 Cracking - Rainbowtables Part 1
  • Section 2- Video 62 : WPA2 Cracking - Rainbowtables Part 2
  • Section 2- Video 63 : WPA2 Cracking - Installing Fluxion
  • Section 2- Video 64 : WPA2 Cracking - Finding and Cracking Hidden Network
  • Section 2- Video 65 : WPA2 Cracking - Preventing Wireless Attacks
  • Section 2- Video 66 : Man In The Middle - ARP Protocol Basics
  • Section 2- Video 67 : Man In The Middle - MITM Attack Theory
  • Section 2- Video 68 : Man In The Middle - Installing MITMf
  • Section 2- Video 69 : Man In The Middle Attack - Manual Arpspoofing
  • Section 2- Video 70 : Man In The Middle Attack - Problems While Installing MITMf
  • Section 2- Video 71 : Man In The Middle Attack - HTTP Traffic Sniffing
  • Section 2- Video 72 : Man In The Middle Attack - DNS Spoofing
  • Section 2- Video 73 : Man In The Middle Attack - Hooking Browsers
  • Section 2- Video 74 : Man In The Middle Attack - Screenshotting Targets Browser
  • Section 2- Video 75 : Man In The Middle Attack - Cloning Any Webpage)
  • Section 2- Video 76 : Man In The Middle Attack - Ettercap Basics
  • Section 2- Video 77 : System Hacking - MSFconsole Enviroment
  • Section 2- Video 78 : System Hacking - Metasploit Modules Explained
  • Section 2- Video 79 : System Hacking - Bruteforcing SSH with Metasploit
  • Section 2- Video 80 : System Hacking - Attacking Tomcat With Metasploit
  • Section 2- Video 81 : System Hacking - Getting Meterpreter
  • Section 2- Video 82 : System Hacking - PHP Code Injection
  • Section 2- Video 83 : System Hacking - 2 Metasploitable Exploits
  • Section 2- Video 84 : System Hacking - Wine installation
  • Section 2- Video 85 : System Hacking - Crafting Windows Payloads With Msfvenom
  • Section 2- Video 86 : System Hacking - Encoders & Hexeditor
  • Section 2- Video 87 : System Hacking - Windows 10 Meterpreter Shell
  • Section 2- Video 88 : System Hacking - Meterpreter Enviroment)
  • Section 2- Video 89 : System Hacking - Windows 10 Privilege Escalation
  • Section 2- Video 90 : System Hacking - Preventing Privilege Escalation)
  • Section 2- Video 91 : System Hacking - Post Exploitation Modules
  • Section 2- Video 92 : System Hacking - Getting Meterpreter
  • Section 2- Video 93 : System Hacking - Eternalblue Exploit
  • Section 2- Video 94 : System Hacking - Persistence Module
  • Section 2- Video 95 : System Hacking - Hacking Over Internet With Ngrok
  • Section 2- Video 96 : Video system Hacking - Android Device Attack With Venom
  • Section 2- Video 97 : System Hacking - Real Hacking Begins Now!
  • Section 3- Video 98 : Python Basics - Variables
  • Section 3- Video 99 : Python Basics - raw_input
  • Section 3- Video 100 : Python Basics - IF ELSE statement
  • Section 3- Video 101 : Python Basics - FOR loop
  • Section 3- Video 102 : Python Basics - WHILE loop
  • Section-3 - Video 103 : Python Basics - Python Lists
  • Section 3- Video 104 : Python Basics - Functions
  • Section 3- Video 105 : Python Basics - Classes
  • Section 3- Video 106 : Python Basics - Importing Libraries
  • Section 3- Video 107 : Python Basics - Files in Python
  • Section 3- Video 108 : Python Basics - Try and Except rule
  • Section 3- Video 109 : Coding Advance Backdoor - Theory Behind Reverse Shell
  • Section 3- Video 107 : Coding Advance Backdoor - Simple Server Code
  • Section 3- Video 111 : Coding Advance Backdoor - Connection With Reverse Shell
  • Section 3- Video 112 : Coding Advance Backdoor - Sending and Receiving Messages
  • Section 3- Video 113 : Coding Advance Backdoor - Sending Messages
  • Section 3- Video 114 : Coding Advance Backdoor - Executing Commands
  • Section 3- Video 115 : Coding Advance Backdoor - Fixing Backdoor Bugs
  • Section 3- Video 115.5 : Coding Advance Backdoor - Fixing Backdoor Bugs
  • Section 3- Video 116 : Coding Advance Backdoor - First Performance
  • Section 3- Video 117 : Coding Advance Backdoor - Trying to Connect
  • Section 3- Video 118 :Coding Advance Backdoor - Creating Persistence Part 1
  • Section 3- Video 119 : Coding Advance Backdoor - Creating Persistence Part 2
  • Section 3- Video 120 : Coding Advance Backdoor - Changing Directory
  • Section 3- Video 121 : Coding Advance Backdoor - Uploading & Downloading Files
  • Section 3- Video 122 : Coding Advance Backdoor - Downloading Files From Internet
  • Section 3- Video 123 : Coding Advance Backdoor - Starting Programs
  • Section 3- Video 124 : Coding Advance Backdoor - Capturing Screenshot
  • Section 3- Video 125 : Coding Advance Backdoor - Embedding Backdoor In Image
  • Section 3- Video 126 : Coding Advance Backdoor - Embedding
  • Section 3- Video 127 : Coding Advance Backdoor - Checking
  • Section 3 : Video 128 : Coding Advance Backdoor - Adding Help Option
  • Section 3- Video 129 :Creating Keylogger For Backdoor - Importing Pynput
  • Section 3- Video 130 : Creating Keylogger For Backdoor - Simple Keylogger
  • Section 3- Video 131 : Creating Keylogger For Backdoor - Adding Report Function
  • Section 3- Video 132 : Creating Keylogger For Backdoor - Writing Keystrokes
  • Section 3- Video 133 :Creating Keylogger For Backdoor - Adding Keylogger
  • Section 3- Video 134 : Creating Keylogger For Backdoor - Adding Keylogger
  • Section 3- Video 135 : Creating Keylogger For Backdoor - Final Project Test
  • Section 3- Video 136 : Basic Authentication Bruteforcer - Printing Banner
  • Section 3- Video 137 : Basic Authentication Bruteforcer
  • Section 3- Video 138 : Basic Authentication Bruteforcer - Starting Threads
  • Section 3- Video 139 : Basic Authentication Bruteforcer - Making Function
  • Section 3- Video 140 : Basic Authentication Bruteforce
  • Section 3- Video 141 : Basic Authentication Bruteforcer
  • Section 3- Video 142 : Basic Authentication Bruteforcer
Completion rules
  • All units must be completed
Close
×

Congratulations!

Course completed!

Course completed!

Download certificate

Continue

Go to next course

×

You didn't quite make it

You didn't quite make it

Unfortunately, you didn't reach a passing score for this course

Go to course list

×

Notice

 Delete  Delete, don't keep asking Cancel
×

Notice

 Delete Cancel
×

Notice

 Discard changes Cancel