| 1 |
Types of Security |
|
| 2 |
History of Cybersecurity |
|
| 3 |
Key Terms in Cybersecurity |
|
| 4 |
What are Vulnerability Assessments |
|
| 5 |
Importance of Vulnerability Assessments |
|
| 6 |
10 Steps of Vulnerability Assessments |
|
| 7 |
Need for Cybersecurity |
|
| 8 |
Organizations in Information Security |
|
| 9 |
Should we fix the Vulnerabilities |
|
| 10 |
What is Hacking Sponsored Security |
|
| 11 |
Essential terms to become a Bug Bounty Hunter |
|
| 12 |
Bug Bounty - Definition |
|
| 13 |
Bug Bounty Programs |
|
| 14 |
Bug Bounty Platform |
|
| 15 |
Why are you important for Organizations |
|
| 16 |
What is a Virtual Machine and Why do we need it |
|
| 17 |
How to install Virtual Box on your machine |
|
| 18 |
How to install Kali Linux on Virtual Machine |
|
| 19 |
How to install OWASP BWA on Virtual Box |
|
| 20 |
How to install DVWA in Kali Linux |
|
| 21 |
How to Install Metasploitable on Virtual Box |
|
| 22 |
Kali Linux - Execute Basic Commands |
|
| 23 |
Kali Linux - Execute Advance Commands |
|
| 24 |
What is Information Gathering |
|
| 25 |
Information Gathering using Maltego Tool in Kali Linux |
|
| 26 |
Information Gathering using Maltego Tool in Kali Linux (Continued) |
|
| 27 |
Cloning Website using HTTrack |
|
| 28 |
Open Source Intelligence Framework |
|
| 29 |
Information Gathering using RedHawk |
|
| 30 |
Basic Overview of Network Scanning |
|
| 31 |
Network Scanning Concepts |
|
| 32 |
Using Zenmap for Network Scanning |
|
| 33 |
Using Nmap for Network Scanning |
|
| 34 |
Using TOR Browser |
|
| 35 |
Using Superscan for Enumeration of local resources |
|
| 36 |
Using Nmap for Enumeration |
|
| 37 |
Enumeration using Hyena |
|
| 38 |
What is Vulnerability Assessment |
|
| 39 |
Phases of Vulnerability Assessment |
|
| 40 |
Nessus - Download and Install |
|
| 41 |
Nessus - Create and Configure a Policy |
|
| 42 |
Nessus - Analyse Results |
|
| 43 |
OWASP Top 10 Vulnerabilities - Part 1 |
|
| 44 |
OWASP Top 10 Vulnerabilities - Part 2 |
|
| 45 |
Vulnerability - Basic Command Execution |
|
| 46 |
Vulnerability - Intermediate Command Execution |
|
| 47 |
Configuring Burp Suite |
|
| 48 |
Vulnerability - Basic File Upload Vulnerability |
|
| 49 |
Vulnerability - Advanced File Upload Vulnerability |
|
| 50 |
What is SQL Injection |
|
| 51 |
Types of SQL Injection |
|
| 52 |
Vulnerability - Manual SQL Injection |
|
| 53 |
What is Cross Site Scripting Attack |
|
| 54 |
Vulnerability - Basic Exploitation of Cross Site Scripting |
|
| 55 |
Vulnerability - Intermediate Exploitation of Cross Site Scripting |
|
| 56 |
Vulnerability - Advance Exploitation of Cross Site Scripting |
|
| 57 |
Different types of XSS Attack |
|
| 58 |
What is Cross Site Request Forgery |
|
| 59 |
CSRF Attack Practical |
|
| 60 |
What is a Brute Force Attack |
|
| 61 |
Password Cracking using Burp Suite |
|
| 62 |
What is DOS |
|
| 63 |
Types of DOS Attacks |
|
| 64 |
What is a Botnet |
|
| 65 |
Performing a DOS attack |
|
| 66 |
What is a Malware |
|
| 67 |
What is a Trojan |
|
| 68 |
Types of Trojan |
|
| 69 |
Introduction to Viruses |
|
| 70 |
Types of Viruses |
|
| 71 |
How to protect from security threats |
|
| 72 |
Section Overview |
|
| 73 |
Introduction To Cryptography |
|
| 74 |
Types of Encryptions |
|
| 75 |
Types of Ciphers |
|
| 76 |
What is Symmetric Encryption |
|
| 77 |
Examples of Symmetric Encryption |
|
| 78 |
What is Aysmmetric Encryption |
|
| 79 |
Working of Aysmmetric Algorithm |
|
| 80 |
Diffie Hellman Key Exchange Algorithm |
|
| 81 |
What is Hashing |
|
| 82 |
Calculating hashes online |
|
| 83 |
What is a Digital Signature |
|
| 84 |
Working of Digital Signatures |
|
| 85 |
What is Secure sockets Layer Protocol |
|
| 86 |
What is a certificate authority |
|
| 87 |
Art of human exploitation |
|
| 88 |
How is Social Engineering Performed |
|
| 89 |
Practical - Using BEEF Project to get user credentials |
|
| 90 |
Practical - Using BEEF Project to get user credentials (Cont.) |
|