Course curriculum

  • 2

    Basic Skills 1 - Cyber Security Essentials

    • What is Cyber Security

      FREE PREVIEW
    • The CIA triad

      FREE PREVIEW
    • Security Terminologies

    • Types of Hackers

    • Hacking Methodology

    • Cyber Security Attacks

    • Cyber Security Malwares

    • Cyber Security Defenses

    • Cyber Warfare

    • The Attack Against Estonia

    • Stuxnet and the Attack Against Iran

    • The Sony Hack

    • Cyber Security Careers

    • Top 10 Cyber Threats

    • 10 Best Practices on Cyber Security

  • 3

    Basic Skills 2 - Linux Essentials

    • Linux Section Outline

    • Introduction Lectures

    • History of Unix

    • linux vs Unix

    • Then What is GNU Linux

    • What is Linux Distributions

    • Unix Architecture

    • Linux Fundamentals Lectures

    • IMPORTANT NOTE

    • Linux Directory Structure Theory

    • The Shell Theory

    • Basic Linux Commands Theory

    • Linux Basics Commands Hands-On

    • Working with Directories Theory

    • Working with Directories Hands-On

    • Listing Files and Understanding ls Output Theory

    • Listing Files and Understanding ls Output Hands-On

    • Links and Shortcuts in Linux Theory

    • Links and Shortcuts in Linux Hands-On

    • File and Directory Permissions Theory

    • File and Directory Permissions Hands-On

    • Finding Files and Directories Hands-On

    • Viewing Files and the Nano Editor Theory

    • Viewing Files and the Nano Editor Hands-On

    • Editing Files in Vi/Vim Theory

    • Editing Files in Vi/Vim Hands-On

    • Linux copy move commands Hands-On

    • Intermediate Linux Skills

    • Input Output and Redirection Theory

    • Linux Redirection Hands-On

    • Linux Comparing Files Hands-On

    • Linux Transfer Files Over Network

    • Shell Aliases Hands-On

    • Linux Environment Variable Hands-On

    • Processes and Job Control Theory

    • Processes and Job Control Hands-On

    • Scheduling Repeated Jobs with Cron Theory

    • Scheduling Repeated Jobs with Cron Hands-On

    • Linux History Hands-On

    • Linux Sudo Another Users Hands-On

    • Linux Users Management Hands-On

    • The Linux Boot Process

    • Linux File System Hands-On

    • What is Shell Scripting

    • Linux Var Special

    • Linux Operators

    • Linux if else Case

    • Linux Loops

    • Linux Functions

  • 4

    Basic Skills 3 - Python Essentials

  • 5

    Intermediate Skills 1 - Python Coding Projects

    • Python Coding Project #1 Port Scanner

    • What is Port Scanner and how it works

    • IMPORTANT NOTE

    • Build your Own Port Scanner

    • Python Coding Project #2 Web App Directory Discovery

    • IMPORTANT NOTE

    • Build Your Own Directory Discovery

    • Python Coding Project #3 Web App Login Brute-Force

    • What is Brute Force Attack

    • Types of Brute Force Attacks

    • IMPORTANT NOTE

    • Brute login

  • 6

    Intermediate Skills 2 - Nmap

    • Port Scanners Essentials

      FREE PREVIEW
    • What is Nmap

    • Preparing the Environment

    • Scanning Techniques of Nmap - Theory Lectures

    • UDP Scan (-sU)

    • FIN Scan (-sF)

    • Ping Scan (-sP)

    • TCP SYN Scan (-sS)

    • TCP Connect() Scan (-sT)

    • Version Detection (-sV)

    • Idle Scan (-sI)

    • Nmap For Ethical Hackers Lectures

    • Basic Nmap Scan against IP or host - Theory

    • Basic Nmap Scan against IP or host - Hands On

    • Nmap Ping Scan - Theory

    • Nmap Ping Scan - Hands On

    • Scan specific ports or scan entire port ranges - Theory

    • Scan specific ports or scan entire port ranges - Hands On

    • Scan multiple IP addresses - Theory

    • Scan multiple IP addresses - Hands On

    • Scan the most popular ports - Theory

    • Scan the most popular ports - Hands On

    • Scan hosts and IP addresses reading from a text file - Theory

    • Scan hosts and IP addresses reading from a text file - Hands On

    • Save your Nmap scan results to a file - Theory

    • Save your Nmap scan results to a file - Hands On

    • Disabling DNS name resolution - Theory

    • Disabling DNS name resolution - Hands On

    • Scan + OS and service detection with fast execution - Theory

    • Scan + OS and service detection with fast execution - Hands On

    • Detect service/daemon versions - Theory

    • Detect service/daemon versions - Hands On

    • Scan using TCP or UDP protocols - Theory

    • Scan using TCP or UDP protocols - Hands On

    • Nmap Scripting Engine (NSE) Lectures

    • CVE detection using Nmap - Theory

    • CVE detection using Nmap - Hands On

    • Launching DOS with Nmap - Theory

    • Launching DOS with Nmap - Hands On

    • Launching brute force attacks - Theory

    • Launching brute force attacks - Hands On

    • Detecting malware infections on remote hosts - Theory

    • Detecting malware infections on remote hosts - Hands On

    • Nmap Firewall and IDS Evasion - Theory Lectures

    • Fragment Packets - Theory

    • Specify a specific MTU - Theory

    • Use Decoy addresses - Theory

    • Idle Zombie Scan - Theory

    • Source port number specification - Theory

    • Append Random Data - Theory

    • Scan with Random Order - Theory

    • MAC Address Spoofing - Theory

    • Send Bad Checksums - Theory

  • 7

    Intermediate Skills 3 - WireShark

    • What is Wireshark and why should you learn it?

      FREE PREVIEW
    • Basics of Computer Networking

    • OSI model

    • Install Wireshark

    • WireShark Getting Started

    • WireShark Filters Lectures

    • Sets a filter for any packet that has x.x.x.x as IP address

    • Sets a conversation filter between two specific IP addresses

    • Sets a filter to display all http and dns protocols

    • Sets filters for any TCP packet with a specific source or destination port

    • displays all TCP packets that contain a certain term

    • filters all HTTP GET and POST requests

    • filter out certain types of protocols

    • Wireshark Uses In Real World Lectures

    • Can Wireshark capture passwords?

    • Plain text network protocols

    • Capture Insecure Connections (Net Cat)

    • Capture FTP Passwords

    • Extract files from FTP using Wireshark

    • Capture HTTP Passwords

    • Capture files (images) from HTTP traffic

  • 8

    Mr Robot TV Show In Real Life

    • Teaser Video

      FREE PREVIEW
    • Section Structure

      FREE PREVIEW
    • Ron's Coffee Scene Lectures

    • Rons Coffee Scene Brief

    • Deep Web Vs Dark Web

    • TOR (The Onion Routing)

    • MITM Attack (man-in-the-middle)

    • Packet Sniffing - Theory

    • Understanding The Rons Coffee Network Infrastructure

    • Building the Environment: Building The TOR Server

    • Building the Environment: Building The Elliot (Hacker) Machine

    • Ron's Coffee Scene In Real Life !!!

    • DDoS Attack Scene Lectures

    • DDoS Attack Scene Brief

    • What is DDoS

    • How DDoS Attack Works

    • How To Identify DDoS Attack

    • DDoS Botnet

    • HTTP Flood Attack

    • SYN Flood Attack

    • DNS Amplification Attack

    • Ping ICMP Flood Attack

    • Low and Slow Attack

    • DDoS Attack Tools

    • Famous DDoS Attacks