Cybersecurity Fundamentals for Beginners-Learning with Demos
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size3.3 GB
- Uploaded Bytutsnode
- Downloads492
- Last checkedSep. 18th '23
- Date uploadedSep. 17th '23
- Seeders 79
- Leechers27
Description
This is a course that has been designed for the Beginners to the world of Cybersecurity and also experienced IT Professionals looking to learn the fundamentals of Cybersecurity , the entire learning will be based on demos and various practical.
* What is Cybersecurity ?
* Types of Cyber Attacks – Malware / Phishing / MITM / DDOS /SQLInjection
* Types of Hackers – Black Hat / White Hat / Grey Hat / Hacktivist
* Basics of Cryptography – History / Caesar’s Cypher / Symmetric & Asymmetric Encryption
* Deep Dive into Various Algorithms – RSA / DSA / AES/ DES / ECDSA / Diffie-Hellman
* Public Key Infrastructure (PKI) – Digital Signature / Certificate Authority (CA) / Digital Certificate / Self Signed Certificate
* Networking Basics – IP Addressing / Subnetting / VPN / DMZ / Firewall / Proxy Server / Packet Switching
* Key Protocols – SSH / SSL / TCP/IP / TLS / mTLS
The details are as below:
1. Introduction
2. Top 10 Cyber Attacks of 21st Century
3. A Look at the Live Threats
4. Demand for CyberSecurity Skills
5. What is Cybersecurity ?
6. What is CIA Triad ?
7. Malware Attack
8. Phishing Attack
9. Demo: How attackers use Phishing Attack ?
10. Password Attack
11. Demo: A Dictionary Attack – Password Attack
12. Man-in-the-Middle Attack
13. Demo: MITM Attack using ARP Poisoning
14. SQL Injection Attack
15. Demo: How to create a Sql Injection(SQLi) Attack
16. Denial-of-Service Attack
17. Cryptojacking
18. White Hat Hacker
19. Black Hat Hacker
20. Grey Hat Hacker
21. Hacktivist
22. Script Kiddie
23. What is Cryptography ?
24. History of Cryptography
25. Understanding the Ceasar’s Cypher
26. What is Symmetric Encryption
27. Understand Symmetric Encryption with an Example
28. Demo: Symmetric Encryption using openssl
29. What is Asymmetric Encryption
30. Understand Asymmetric Encryption – Confidentiality
31. Understand Asymmetric Encryption – Integrity & Authentication
32. Demo:Asymmetric encryption using openssl
33. Get an Understanding of Hybrid Encryption
34. What is Cipher Algorithm & Key
35. What is DES – Data Encryption Standard ?
36. What is AES : Advanced Encryption Standard
37. Which are the NIST Approved Asymmetric Algorithms ?
38. What is the RSA Algorithm ?
39. Understanding RSA Algorithm with Example
40. What is DSA Algorithm ?
41. What is Deffie-Hellman Algorithm ?
42. Understanding DH Algorithm with an Example
43. Understanding Calculations for DH Algorithm
44. What is Elliptic Curve Algorithm ?
45. Quick Comparison : RSA vs DSA vs ECDSA vs DH
46. What is PKI ?
47. What is a Hashing Algorithm
48. Demo: Hashing using openssl
49. What is a Message Digest
50. What is a Digital Signature ?
51. Understanding Digital Signature
52. What is a Certificate Authority -CA
53. Demo: Exploring the DigiCert Website
54. What is a Digital Certificate
55. Understanding Digital Certificate
56. Check a Real Certificate – Facebook
57. Protecting from MITM using Digital Certificate
58. What is a Self Signed Certificate ?
59. PEM Vs PKCS12
60. What is a Chain of Trust
61. Demo: Create a Self Signed Certificate / rootCA
62. Demo : Create a CSR
63. Demo: Sign a Certificate CSR
64. Main Artefacts for Networking
65. Understanding the OSI Model
66. What is a Switch ?
67. What is a Router ?
68. What is a VLAN
69. Decimal to Binary Conversion
70. Binary to Decimal Conversion
71. Understanding an IP address
72. What is Subnetting
73. What is Subnet Mask
74. What is ARP
75. Simulation to understand ARP
76. What is a Network Packet
77. How a Packet Travels from Source to Destination
78. Demo: traceroute to cnn
79. What is a VPN ?
80. Demo: Using a Software based VPN (NordVPN)
81. What is a Firewall ?
82. Role of a Proxy Server
83. What is a Perimeter Network or a DMZ
84. What is SSH
85. What is TCP/IP
86. What is SSL
87. Understanding SSL Vs TLS
88. Demo: Checking the Latest Stats on SSL/TLS
89. What is MTLS
Who this course is for:
Cybersecurity Beginners / Experienced Professionals in IT wanting to understand the fundamentals of Cybersecurity in a Practical oriented learning
The course also teaches all the important Networking Fundamentals as well.
Requirements
Cybersecurity Beginners / Experienced Professionals in IT wanting to learn the fundamentals of Cybersecurity
Last Updated 8/2023
Files:
Demystifying Cybersecurity Fundamentals-Learning with Demos [TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos 1. Introduction- 1. Top 10 Cyber Attacks of 21st Century.mp4 (101.2 MB)
- 4. What is Cybersecurity .mp4 (51.8 MB)
- 2. A Look at the Live Threats.mp4 (46.5 MB)
- 5. What is CIA Triad .mp4 (41.8 MB)
- 3. Demand for CyberSecurity Skills.mp4 (8.3 MB)
- 18.1 create_a_certificate_request.pdf (62.5 KB)
- 17.1 create_a_rootCA.pdf (61.8 KB)
- 19.1 signing_the_certificate.pdf (51.6 KB)
- 4.1 demo_hashing_openssl.pdf (49.6 KB)
- 2. What is PKI .mp4 (72.6 MB)
- 8. What is a Certificate Authority -CA.mp4 (44.4 MB)
- 3. What is a Hashing Algorithm.mp4 (36.7 MB)
- 10. What is a Digital Certificate.mp4 (36.4 MB)
- 14. What is a Self Signed Certificate .mp4 (35.7 MB)
- 17. Demo Create a Self Signed Certificate rootCA.mp4 (34.2 MB)
- 12. Check a Real Certificate - Facebook.com.mp4 (25.1 MB)
- 5. What is a Message Digest.mp4 (25.0 MB)
- 19. Demo Sign a Certificate CSR.mp4 (23.4 MB)
- 9. Demo Exploring the DigiCert Website.mp4 (23.2 MB)
- 18. Demo Create a CSR.mp4 (21.5 MB)
- 13. Protecting from MITM using Digital Certificate.mp4 (19.3 MB)
- 15. PEM Vs PKCS12.mp4 (18.4 MB)
- 16. What is a Chain of Trust.mp4 (17.8 MB)
- 7. Understanding Digital Signature.mp4 (16.2 MB)
- 11. Understanding Digital Certificate.mp4 (12.7 MB)
- 6. What is a Digital Signature .mp4 (11.4 MB)
- 4. Demo Hashing using openssl.mp4 (10.6 MB)
- 1. Title-Public Key Infrastructure - PKI.mp4 (2.4 MB)
- 11.1 Asymmetric Encryption using openssl.pdf (53.4 KB)
- 11. DemoAsymmetric encryption using openssl.mp4 (50.6 MB)
- 8. What is Asymmetric Encryption.mp4 (48.6 MB)
- 5. What is Symmetric Encryption.mp4 (42.7 MB)
- 2. What is Cryptography .mp4 (39.8 MB)
- 3. History of Cryptography.mp4 (37.8 MB)
- 4. Understanding the Ceasar's Cypher.mp4 (29.7 MB)
- 7. Demo Symmetric Encryption using openssl.mp4 (24.8 MB)
- 12. Get an Understanding of Hybrid Encryption.mp4 (24.5 MB)
- 10. Understand Asymmetric Encryption - Integrity & Authentication.mp4 (15.3 MB)
- 9. Understand Asymmetric Encryption - Confidentiality.mp4 (14.1 MB)
- 6. Understand Symmetric Encryption with an Example.mp4 (6.9 MB)
- 1. Title-Basics of Cryptography.mp4 (2.3 MB)
- 9. What is Deffie-Hellman Algorithm .mp4 (96.1 MB)
- 7. Understanding RSA Algorithm with Example.mp4 (90.3 MB)
- 6. What is the RSA Algorithm .mp4 (78.3 MB)
- 10. Understanding DH Algorithm with an Example.mp4 (56.8 MB)
- 2. What is Cipher Algorithm & Key.mp4 (56.6 MB)
- 12. What is Elliptic Curve Algorithm .mp4 (51.2 MB)
- 8. What is DSA Algorithm .mp4 (49.3 MB)
- 13. Quick Comparison RSA vs DSA vs ECDSA vs DH.mp4 (35.5 MB)
- 3. What is DES - Data Encryption Standard .mp4 (32.6 MB)
- 4. What is AES Advanced Encryption Standard.mp4 (27.9 MB)
- 11. Understanding Calculations for DH Algorithm.mp4 (23.9 MB)
- 5. Which are the NIST Approved Asymmetric Algorithms .mp4 (14.4 MB)
- 1. Title-Deep Dive into Various Algorithms.mp4 (2.3 MB)
- 15. How a Packet Travels from Source to Destination.mp4 (83.9 MB)
- 9. Understanding an IP address.mp4 (66.5 MB)
- 5. What is a Router .mp4 (41.2 MB)
- 25. Demo Checking the Latest Stats on SSLTLS.mp4 (40.2 MB)
- 17. What is a VPN .mp4 (38.6 MB)
- 10. What is Subnetting.mp4 (37.6 MB)
- 21. What is a Perimeter Network or a DMZ.mp4 (35.1 MB)
- 24. What is SSL.mp4 (35.1 MB)
- 18. Demo Using a Software based VPN (NordVPN).mp4 (34.7 MB)
- 11. What is Subnet Mask.mp4 (34.5 MB)
- 3. Understanding the OSI Model.mp4 (34.2 MB)
- 4. What is a Switch .mp4 (33.7 MB)
- 13. Simulation to understand ARP.mp4 (33.0 MB)
- 27. What is MTLS.mp4 (31.3 MB)
- 22. What is SSH.mp4 (30.9 MB)
- 19. What is a Firewall .mp4 (28.2 MB)
- 6. What is a VLAN.mp4 (27.3 MB)
- 23. What is TCPIP.mp4 (25.8 MB)
- 20. Role of a Proxy Server.mp4 (25.3 MB)
- 12. What is ARP.mp4 (24.8 MB)
- 26. Understanding SSL Vs TLS.mp4 (22.9 MB)
- 2. Main Artefacts for Networking.mp4 (21.8 MB)
- 14. What is a Network Packet.mp4 (21.6 MB)
- 16. Demo traceroute to cnn.com.mp4 (18.6 MB)
- 8. Decimal to Binary Conversion.mp4 (12.8 MB)
- 7. Binary to Decimal Conversion.mp4 (11.4 MB)
- 1. Title-Networking Basics.mp4 (2.3 MB)
- 5. Hacktivist.mp4 (64.4 MB)
- 6. Script Kiddie.mp4 (63.1 MB)
- 3. Black Hat Hacker.mp4 (48.4 MB)
- 4. Grey Hat Hacker.mp4 (44.5 MB)
- 2. White Hat Hacker.mp4 (31.5 MB)
- 1. Title-Types of Hackers.mp4 (2.3 MB)
- 6. Demo A Dictionary Attack - Password Attack.mp4 (59.3 MB)
- 8. Demo MITM Attack using ARP Poisoning.mp4 (51.9 MB)
- 4. Demo How attackers use Phishing Attack .mp4 (48.1 MB)
- 5. Password Attack.mp4 (42.0 MB)
- 2. Malware Attack.mp4 (36.3 MB)
- 3. Phishing Attack.mp4 (31.5 MB)
- 10. Demo How to create a Sql Injection(SQLi) Attack.mp4 (27.8 MB)
- 9. SQL Injection Attack.mp4 (25.2 MB)
- 12. Cryptojacking.mp4 (22.1 MB)
- 11. Denial-of-Service Attack.mp4 (20.6 MB)
- 7. Man-in-the-Middle Attack.mp4 (20.4 MB)
- 1. Intro - Types of Cyber Attacks.mp4 (2.3 MB)
- 5. Demo Checking the Latest Stats on SSLTLS.mp4 (40.3 MB)
- 4. What is SSL .mp4 (35.1 MB)
- 7. What is mTLS .mp4 (31.3 MB)
- 2. What is SSH .mp4 (30.9 MB)
- 3. What is TCPI
Code:
- udp://open.stealth.si:80/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://fasttracker.foreverpirates.co:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://explodie.org:6969/announce
- udp://tracker.cyberia.is:6969/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://tracker.uw0.xyz:6969/announce
- udp://opentracker.i2p.rocks:6969/announce
- udp://tracker.birkenwald.de:6969/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.moeking.me:6969/announce
- udp://tracker.dler.org:6969/announce
- udp://9.rarbg.me:2970/announce