Загрузка страницы

Introduction to Ethical Hacking and Cyber Security: Free Comprehensive Course 2023

Join us on this exciting journey to learn the fundamentals of Ethical Hacking and Cyber Security. In this free course, you will gain a comprehensive understanding of the concepts and techniques used by ethical hackers to secure systems and networks. You will learn how to identify and prevent cyber threats, and become familiar with the latest tools and technologies used in the field. Upon completion, you will have the opportunity to download a certificate recognizing your achievement. Don't miss this opportunity to expand your knowledge and skills in the ever-growing field of Cyber Security.

For more details contact:
Call: +91 9106147779
Email: shifa@hacktify.in
Website: https://hacktify.in/

Get you certificate : https://hacktify.thinkific.com/courses/introduction-to-cyber-security-ethical-hacking

Follow us:

Hacktify's LinkedIn: https://www.linkedin.com/company/hacktifycs/
Hacktify's Twitter: https://twitter.com/Hacktifycs

Shifa Cyclewala:
https://www.linkedin.com/in/shifa
https://twitter.com/shifacyclewala

Rohit Gautam:
https://www.linkedin.com/in/iamrohitg
https://twitter.com/HackerGautam

Time stamp:

00:00:00 Introduction to the course
00:01:07 What is Hacking
00:07:34 What are the types of hackers
00:15:07 More Types of Hackers
00:20:58 Have I been pwned
00:28:34 History of Hacking
00:29:44 Breaking the Myth
00:33:33 Not Being a Noob
00:38:20 CIA Triad
00:45:37 Integrity Practical
00:59:19 What are Ports & Protocols
01:02:39 Hyper Text Transfer Protocol (HTTP & HTTPS)
01:06:10 File Transfer Protocol
01:09:40 Secure Shell
01:13:16 Telnet, RDP and Telnet vs SSH
01:15:28 TCP IP and OSI Model
01:17:54 OSI Model in day to day Life
01:22:39 Network Types
01:23:55 Local Area Network
01:24:48 Metropolitan Area Network
01:25:13 Wide Area Network
01:25:41 Personal Area Network
01:26:32 Introduction to Malware Family
01:28:32 Introduction to Linux
01:31:00 Linux Boot Process
01:40:39 Windows Boot Process
01:43:25 Linux System Information Commands
01:49:01 Linux Hardware Information
01:54:56 Performance Monitoring
01:58:22 Performance Monitoring-2
02:02:06 Userinfo and Management
02:07:56 File, Directory and Deletion
02:19:19 Directory Management
02:23:24 Rename,Move and Case Sensitive
02:27:43 Symbolic Links
02:29:45 File Reading
02:34:58 Process and Kill
02:38:19 Process and Killall
02:40:42 Background and Foreground
02:43:07 Linux Permissions
02:52:11 Adding Permissions
02:57:46 Removing Permissions
03:00:31 Execution of Permissions
03:24:55 Linux Octal Permissions
03:07:48 Linux Networking Management -1
03:11:14 Linux Networking Management -2
03:13:20 Linux Networking Management -3
03:18:29 Linux Networking Management -4
03:22:06 Linux Networking Management -5
03:24:44 Linux Networking Management -6
03:29:45 Linux Archive Management
03:34:41 Linux Search & Pattern
03:40:05 What is Social Engineering & Types
03:44:55 What is Phishing
03:52:49 What is Cryptography
03:55:54 Cryptography Breakdown
03:58:50 What is Encryption
04:02:01 Symmetric Encryption
04:05:43 Asymmetric Encryption
04:11:07 Asymmetric Encryption Working
04:17:24 Asymmetric Encryption Practical
04:22:13 Final Words

Видео Introduction to Ethical Hacking and Cyber Security: Free Comprehensive Course 2023 канала Hacktify Cyber Security
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
5 февраля 2023 г. 11:26:01
04:23:03
Яндекс.Метрика