Cyber Security
Unit 1 : Introduction to Cyber Security
Unit 1 : Introduction to Cyber Security
Unit 2 : IT Risk Management
Unit 3 : Mastering IT Risk Management
Unit 4 : Secure your IT infrastructure with effect...
Cyber Security
Section 1- Video 1 : Before we begin!
Section 1 - Video 2 : Virtual Box Install Tutorial
Section 1- Video 3 : Kali Linux Install Tutorial
Section 1- Video 4 : Going Full Screen
Section 1- Video 5 : Basic Commands Part 1
Section 1- Video 6 : Basic Commands Part 2
Section 1- Video 7 : Basic Commands Part 3
Section 1- Video 8 : Changing IP address and setti...
Section 1- Video 9 : Creating Bootable Kali USB
Section 1- Video 10 : Important Networking Terms
Section 1- Video 11 : Important Hacking Terms
Section 1-Video 12 : Few Things to Do After Instal...
Section 1- Video 13 : Changing Our Mac Address - M...
Section 1-Video 14: Footprinting - Google Hacking
Section 1-Video 15 : Footprinting - Nikto Basics
Section 1- Video 16 : Footprinting - Nikto Basics)
Section 1- Video 17 : ootprinting - Email Harvesti...
Section 1- Video 18 : Footprinting - Shodan
Section 1-Video 19 : Footprinting - Zone Transfer ...
Section 2- Video 20 : Scanning - Installing Metasp...
Section 2- Video 21 : Scanning - Nmap Part 1
Section 2- Video 22: Scanning - Nmap Part 2
Section 2- Video 23 : Scanning - Nmap Part 3
Section 2- Video 24 : Scanning - Zenmap
Section 2- Video 25 : Scanning - TCP scans
Section 2- Video 26 : Scanning - Nmap Bypassing De...
Section 2- Video 27 : Scanning - Nmap Scripts 1
Section 2- Video 28 : Scanning - Nmap Scripts 2
Section 2- Video 29 : Webpentest - Installing Owas...
Section 2- Video 30 : Webpentest - HTTP request
Section 2- Video 31 : Webpentest - HTTP Response
Section 2- Video 32 : Webpentest - Burpsuite Confi...
Section 2- Video 33 : Webpentest - Editing Packets...
Section 26- Video 34 : Webpentest - Whatweb & Dirb
Section 2- Video 35 : Webpentest - Password Recove...
Section 2- Video 36 : Webpentest - Burpsuite Login...
Section 2- Video 37 : Webpentest - Hydra Login Bru...
Section 2- Video 38 : Webpentest - Session Fixatio...
Section 1- Video 39 : Webpentest - Injection Attac...
Section 2- Video 40 : Webpentest - Simple Command ...
Section 2- Video 41 : Webpentest - Exploiting Comm...
Section 2- Video 42 : Webpentest - Finding Blind C...
Section 2- Video 43 : Webpentest - Basics Of SQL
Section 2- Video 44 : Webpentest - Manual SQL Inje...
Section 2- Video 45 : Webpentest - Manual SQL Inje...
Section 2- Video 46 : Webpentest - SQLmap basics
Section 2- Video 47 : Webpentest - XML Injection
Section 2- Video 48 : Installing XCAT and Preventi...
Section 2- Video 49 : Webpentest - Reflected XSS
Section 2- Video 50 : Webpentest - Stored XSS
Section 2- Video 51 : Webpentest - Changing HTML C...
Section 2- Video 52 : Webpentest - XSSer & XSSsnip...
Section 2- Video 53 : WPA2 Cracking - Wireless Att...
Section 2- Video 54 : WPA2 Cracking - Putting Netw...
Section 2- Video 55 : WPA2 Cracking - Capturing Ha...
Section 2- Video 56 : WPA2 Cracking - RockYou.txt
Section 2- Video 57 : WPA2 Cracking - Cracking wit...
Section 2 - Video 58 : WPA2 Cracking - Cracking wi...
Section 2- Video 59 : WPA2 Cracking - Making Passw...
Section 2- Video 60 : WPA2 Cracking - Making Passw...
Section 2- Video 61 : WPA2 Cracking - Rainbowtable...
Section 2- Video 62 : WPA2 Cracking - Rainbowtable...
Section 2- Video 63 : WPA2 Cracking - Installing F...
Section 2- Video 64 : WPA2 Cracking - Finding and ...
Section 2- Video 65 : WPA2 Cracking - Preventing W...
Section 2- Video 66 : Man In The Middle - ARP Prot...
Section 2- Video 67 : Man In The Middle - MITM Att...
Section 2- Video 68 : Man In The Middle - Installi...
Section 2- Video 69 : Man In The Middle Attack - M...
Section 2- Video 70 : Man In The Middle Attack - P...
Section 2- Video 71 : Man In The Middle Attack - H...
Section 2- Video 72 : Man In The Middle Attack - D...
Section 2- Video 73 : Man In The Middle Attack - H...
Section 2- Video 74 : Man In The Middle Attack - S...
Section 2- Video 75 : Man In The Middle Attack - C...
Section 2- Video 76 : Man In The Middle Attack - E...
Section 2- Video 77 : System Hacking - MSFconsole ...
Section 2- Video 78 : System Hacking - Metasploit ...
Section 2- Video 79 : System Hacking - Bruteforcin...
Section 2- Video 80 : System Hacking - Attacking T...
Section 2- Video 81 : System Hacking - Getting Met...
Section 2- Video 82 : System Hacking - PHP Code In...
Section 2- Video 83 : System Hacking - 2 Metasploi...
Section 2- Video 84 : System Hacking - Wine instal...
Section 2- Video 85 : System Hacking - Crafting Wi...
Section 2- Video 86 : System Hacking - Encoders & ...
Section 2- Video 87 : System Hacking - Windows 10 ...
Section 2- Video 88 : System Hacking - Meterpreter...
Section 2- Video 89 : System Hacking - Windows 10 ...
Section 2- Video 90 : System Hacking - Preventing ...
Section 2- Video 91 : System Hacking - Post Exploi...
Section 2- Video 92 : System Hacking - Getting Met...
Section 2- Video 93 : System Hacking - Eternalblue...
Section 2- Video 94 : System Hacking - Persistence...
Section 2- Video 95 : System Hacking - Hacking Ove...
Section 2- Video 96 : Video system Hacking - Andro...
Section 2- Video 97 : System Hacking - Real Hackin...
Section 3- Video 98 : Python Basics - Variables
Section 3- Video 99 : Python Basics - raw_input
Section 3- Video 100 : Python Basics - IF ELSE sta...
Section 3- Video 101 : Python Basics - FOR loop
Section 3- Video 102 : Python Basics - WHILE loop
Section-3 - Video 103 : Python Basics - Python Lis...
Section 3- Video 104 : Python Basics - Functions
Section 3- Video 105 : Python Basics - Classes
Section 3- Video 106 : Python Basics - Importing L...
Section 3- Video 107 : Python Basics - Files in Py...
Section 3- Video 108 : Python Basics - Try and Exc...
Section 3- Video 109 : Coding Advance Backdoor - T...
Section 3- Video 107 : Coding Advance Backdoor - S...
Section 3- Video 111 : Coding Advance Backdoor - C...
Section 3- Video 112 : Coding Advance Backdoor - S...
Section 3- Video 113 : Coding Advance Backdoor - S...
Section 3- Video 114 : Coding Advance Backdoor - E...
Section 3- Video 115 : Coding Advance Backdoor - F...
Section 3- Video 115.5 : Coding Advance Backdoor -...
Section 3- Video 116 : Coding Advance Backdoor - F...
Section 3- Video 117 : Coding Advance Backdoor - T...
Section 3- Video 118 :Coding Advance Backdoor - Cr...
Section 3- Video 119 : Coding Advance Backdoor - C...
Section 3- Video 120 : Coding Advance Backdoor - C...
Section 3- Video 121 : Coding Advance Backdoor - U...
Section 3- Video 122 : Coding Advance Backdoor - D...
Section 3- Video 123 : Coding Advance Backdoor - S...
Section 3- Video 124 : Coding Advance Backdoor - C...
Section 3- Video 125 : Coding Advance Backdoor - E...
Section 3- Video 126 : Coding Advance Backdoor - E...
Section 3- Video 127 : Coding Advance Backdoor - C...
Section 3 : Video 128 : Coding Advance Backdoor - ...
Section 3- Video 129 :Creating Keylogger For Backd...
Section 3- Video 130 : Creating Keylogger For Back...
Section 3- Video 131 : Creating Keylogger For Back...
Section 3- Video 132 : Creating Keylogger For Back...
Section 3- Video 133 :Creating Keylogger For Backd...
Section 3- Video 134 : Creating Keylogger For Back...
Section 3- Video 135 : Creating Keylogger For Back...
Section 3- Video 136 : Basic Authentication Brutef...
Section 3- Video 137 : Basic Authentication Brutef...
Section 3- Video 138 : Basic Authentication Brutef...
Section 3- Video 139 : Basic Authentication Brutef...
Section 3- Video 140 : Basic Authentication Brutef...
Section 3- Video 141 : Basic Authentication Brutef...
Section 3- Video 142 : Basic Authentication Brutef...
Course info
×
Course info
Cyber Security
Content
Unit 1 : Introduction to Cyber Security
sample
Unit 2 : IT Risk Management
Unit 3 : Mastering IT Risk Management
Unit 4 : Secure your IT infrastructure with effective Risk Management
Cyber Security
Section 1- Video 1 : Before we begin!
Section 1 - Video 2 : Virtual Box Install Tutorial
Section 1- Video 3 : Kali Linux Install Tutorial
Section 1- Video 4 : Going Full Screen
Section 1- Video 5 : Basic Commands Part 1
Section 1- Video 6 : Basic Commands Part 2
Section 1- Video 7 : Basic Commands Part 3
Section 1- Video 8 : Changing IP address and setting up Wireless Adapter
Section 1- Video 9 : Creating Bootable Kali USB
Section 1- Video 10 : Important Networking Terms
Section 1- Video 11 : Important Hacking Terms
Section 1-Video 12 : Few Things to Do After Installing Kali Linux
Section 1- Video 13 : Changing Our Mac Address - Macchanger
Section 1-Video 14: Footprinting - Google Hacking
Section 1-Video 15 : Footprinting - Nikto Basics
Section 1- Video 16 : Footprinting - Nikto Basics)
Section 1- Video 17 : ootprinting - Email Harvesting
Section 1- Video 18 : Footprinting - Shodan
Section 1-Video 19 : Footprinting - Zone Transfer With Dig
Section 2- Video 20 : Scanning - Installing Metasploitable
Section 2- Video 21 : Scanning - Nmap Part 1
Section 2- Video 22: Scanning - Nmap Part 2
Section 2- Video 23 : Scanning - Nmap Part 3
Section 2- Video 24 : Scanning - Zenmap
Section 2- Video 25 : Scanning - TCP scans
Section 2- Video 26 : Scanning - Nmap Bypassing Defences
Section 2- Video 27 : Scanning - Nmap Scripts 1
Section 2- Video 28 : Scanning - Nmap Scripts 2
Section 2- Video 29 : Webpentest - Installing Owasp
Section 2- Video 30 : Webpentest - HTTP request
Section 2- Video 31 : Webpentest - HTTP Response
Section 2- Video 32 : Webpentest - Burpsuite Configuration
Section 2- Video 33 : Webpentest - Editing Packets in Burpsuite
Section 26- Video 34 : Webpentest - Whatweb & Dirb
Section 2- Video 35 : Webpentest - Password Recovery Attack
Section 2- Video 36 : Webpentest - Burpsuite Login Bruteforce
Section 2- Video 37 : Webpentest - Hydra Login Bruteforce
Section 2- Video 38 : Webpentest - Session Fixation
Section 1- Video 39 : Webpentest - Injection Attacks
Section 2- Video 40 : Webpentest - Simple Command Injection
Section 2- Video 41 : Webpentest - Exploiting Command Injection Vulnerability
Section 2- Video 42 : Webpentest - Finding Blind Command Injection
Section 2- Video 43 : Webpentest - Basics Of SQL
Section 2- Video 44 : Webpentest - Manual SQL Injection Part 1
Section 2- Video 45 : Webpentest - Manual SQL Injection Part 2
Section 2- Video 46 : Webpentest - SQLmap basics
Section 2- Video 47 : Webpentest - XML Injection
Section 2- Video 48 : Installing XCAT and Preventing Injection Attacks
Section 2- Video 49 : Webpentest - Reflected XSS
Section 2- Video 50 : Webpentest - Stored XSS
Section 2- Video 51 : Webpentest - Changing HTML Code with XSS
Section 2- Video 52 : Webpentest - XSSer & XSSsniper
Section 2- Video 53 : WPA2 Cracking - Wireless Attacks Theory
Section 2- Video 54 : WPA2 Cracking - Putting Network Card in Monitor Mode
Section 2- Video 55 : WPA2 Cracking - Capturing Handshake With Airodump
Section 2- Video 56 : WPA2 Cracking - RockYou.txt
Section 2- Video 57 : WPA2 Cracking - Cracking with Aircrack
Section 2 - Video 58 : WPA2 Cracking - Cracking with Hashcat
Section 2- Video 59 : WPA2 Cracking - Making Password Lists WIth Crunch
Section 2- Video 60 : WPA2 Cracking - Making Password Lists WIth Cupp
Section 2- Video 61 : WPA2 Cracking - Rainbowtables Part 1
Section 2- Video 62 : WPA2 Cracking - Rainbowtables Part 2
Section 2- Video 63 : WPA2 Cracking - Installing Fluxion
Section 2- Video 64 : WPA2 Cracking - Finding and Cracking Hidden Network
Section 2- Video 65 : WPA2 Cracking - Preventing Wireless Attacks
Section 2- Video 66 : Man In The Middle - ARP Protocol Basics
Section 2- Video 67 : Man In The Middle - MITM Attack Theory
Section 2- Video 68 : Man In The Middle - Installing MITMf
Section 2- Video 69 : Man In The Middle Attack - Manual Arpspoofing
Section 2- Video 70 : Man In The Middle Attack - Problems While Installing MITMf
Section 2- Video 71 : Man In The Middle Attack - HTTP Traffic Sniffing
Section 2- Video 72 : Man In The Middle Attack - DNS Spoofing
Section 2- Video 73 : Man In The Middle Attack - Hooking Browsers
Section 2- Video 74 : Man In The Middle Attack - Screenshotting Targets Browser
Section 2- Video 75 : Man In The Middle Attack - Cloning Any Webpage)
Section 2- Video 76 : Man In The Middle Attack - Ettercap Basics
Section 2- Video 77 : System Hacking - MSFconsole Enviroment
Section 2- Video 78 : System Hacking - Metasploit Modules Explained
Section 2- Video 79 : System Hacking - Bruteforcing SSH with Metasploit
Section 2- Video 80 : System Hacking - Attacking Tomcat With Metasploit
Section 2- Video 81 : System Hacking - Getting Meterpreter
Section 2- Video 82 : System Hacking - PHP Code Injection
Section 2- Video 83 : System Hacking - 2 Metasploitable Exploits
Section 2- Video 84 : System Hacking - Wine installation
Section 2- Video 85 : System Hacking - Crafting Windows Payloads With Msfvenom
Section 2- Video 86 : System Hacking - Encoders & Hexeditor
Section 2- Video 87 : System Hacking - Windows 10 Meterpreter Shell
Section 2- Video 88 : System Hacking - Meterpreter Enviroment)
Section 2- Video 89 : System Hacking - Windows 10 Privilege Escalation
Section 2- Video 90 : System Hacking - Preventing Privilege Escalation)
Section 2- Video 91 : System Hacking - Post Exploitation Modules
Section 2- Video 92 : System Hacking - Getting Meterpreter
Section 2- Video 93 : System Hacking - Eternalblue Exploit
Section 2- Video 94 : System Hacking - Persistence Module
Section 2- Video 95 : System Hacking - Hacking Over Internet With Ngrok
Section 2- Video 96 : Video system Hacking - Android Device Attack With Venom
Section 2- Video 97 : System Hacking - Real Hacking Begins Now!
Section 3- Video 98 : Python Basics - Variables
Section 3- Video 99 : Python Basics - raw_input
Section 3- Video 100 : Python Basics - IF ELSE statement
Section 3- Video 101 : Python Basics - FOR loop
Section 3- Video 102 : Python Basics - WHILE loop
Section-3 - Video 103 : Python Basics - Python Lists
Section 3- Video 104 : Python Basics - Functions
Section 3- Video 105 : Python Basics - Classes
Section 3- Video 106 : Python Basics - Importing Libraries
Section 3- Video 107 : Python Basics - Files in Python
Section 3- Video 108 : Python Basics - Try and Except rule
Section 3- Video 109 : Coding Advance Backdoor - Theory Behind Reverse Shell
Section 3- Video 107 : Coding Advance Backdoor - Simple Server Code
Section 3- Video 111 : Coding Advance Backdoor - Connection With Reverse Shell
Section 3- Video 112 : Coding Advance Backdoor - Sending and Receiving Messages
Section 3- Video 113 : Coding Advance Backdoor - Sending Messages
Section 3- Video 114 : Coding Advance Backdoor - Executing Commands
Section 3- Video 115 : Coding Advance Backdoor - Fixing Backdoor Bugs
Section 3- Video 115.5 : Coding Advance Backdoor - Fixing Backdoor Bugs
Section 3- Video 116 : Coding Advance Backdoor - First Performance
Section 3- Video 117 : Coding Advance Backdoor - Trying to Connect
Section 3- Video 118 :Coding Advance Backdoor - Creating Persistence Part 1
Section 3- Video 119 : Coding Advance Backdoor - Creating Persistence Part 2
Section 3- Video 120 : Coding Advance Backdoor - Changing Directory
Section 3- Video 121 : Coding Advance Backdoor - Uploading & Downloading Files
Section 3- Video 122 : Coding Advance Backdoor - Downloading Files From Internet
Section 3- Video 123 : Coding Advance Backdoor - Starting Programs
Section 3- Video 124 : Coding Advance Backdoor - Capturing Screenshot
Section 3- Video 125 : Coding Advance Backdoor - Embedding Backdoor In Image
Section 3- Video 126 : Coding Advance Backdoor - Embedding
Section 3- Video 127 : Coding Advance Backdoor - Checking
Section 3 : Video 128 : Coding Advance Backdoor - Adding Help Option
Section 3- Video 129 :Creating Keylogger For Backdoor - Importing Pynput
Section 3- Video 130 : Creating Keylogger For Backdoor - Simple Keylogger
Section 3- Video 131 : Creating Keylogger For Backdoor - Adding Report Function
Section 3- Video 132 : Creating Keylogger For Backdoor - Writing Keystrokes
Section 3- Video 133 :Creating Keylogger For Backdoor - Adding Keylogger
Section 3- Video 134 : Creating Keylogger For Backdoor - Adding Keylogger
Section 3- Video 135 : Creating Keylogger For Backdoor - Final Project Test
Section 3- Video 136 : Basic Authentication Bruteforcer - Printing Banner
Section 3- Video 137 : Basic Authentication Bruteforcer
Section 3- Video 138 : Basic Authentication Bruteforcer - Starting Threads
Section 3- Video 139 : Basic Authentication Bruteforcer - Making Function
Section 3- Video 140 : Basic Authentication Bruteforce
Section 3- Video 141 : Basic Authentication Bruteforcer
Section 3- Video 142 : Basic Authentication Bruteforcer
Completion rules
All units must be completed
×
Congratulations!
Course completed!
Download certificate
Continue
Go to next course
×
You didn't quite make it
Unfortunately, you didn't reach a passing score for this course
Go to course list
×
Notice
×
Notice
×
Notice