Introduction to Ethical Hacking and Cyber Security: Free Comprehensive Course 2023
Join us on this exciting journey to learn the fundamentals of Ethical Hacking and Cyber Security. In this free course, you will gain a comprehensive understanding of the concepts and techniques used by ethical hackers to secure systems and networks. You will learn how to identify and prevent cyber threats, and become familiar with the latest tools and technologies used in the field. Upon completion, you will have the opportunity to download a certificate recognizing your achievement. Don't miss this opportunity to expand your knowledge and skills in the ever-growing field of Cyber Security.
For more details contact:
Call: +91 9106147779
Email: shifa@hacktify.in
Website: https://hacktify.in/
Get you certificate : https://hacktify.thinkific.com/courses/introduction-to-cyber-security-ethical-hacking
Follow us:
Hacktify's LinkedIn: https://www.linkedin.com/company/hacktifycs/
Hacktify's Twitter: https://twitter.com/Hacktifycs
Shifa Cyclewala:
https://www.linkedin.com/in/shifa
https://twitter.com/shifacyclewala
Rohit Gautam:
https://www.linkedin.com/in/iamrohitg
https://twitter.com/HackerGautam
Time stamp:
00:00:00 Introduction to the course
00:01:07 What is Hacking
00:07:34 What are the types of hackers
00:15:07 More Types of Hackers
00:20:58 Have I been pwned
00:28:34 History of Hacking
00:29:44 Breaking the Myth
00:33:33 Not Being a Noob
00:38:20 CIA Triad
00:45:37 Integrity Practical
00:59:19 What are Ports & Protocols
01:02:39 Hyper Text Transfer Protocol (HTTP & HTTPS)
01:06:10 File Transfer Protocol
01:09:40 Secure Shell
01:13:16 Telnet, RDP and Telnet vs SSH
01:15:28 TCP IP and OSI Model
01:17:54 OSI Model in day to day Life
01:22:39 Network Types
01:23:55 Local Area Network
01:24:48 Metropolitan Area Network
01:25:13 Wide Area Network
01:25:41 Personal Area Network
01:26:32 Introduction to Malware Family
01:28:32 Introduction to Linux
01:31:00 Linux Boot Process
01:40:39 Windows Boot Process
01:43:25 Linux System Information Commands
01:49:01 Linux Hardware Information
01:54:56 Performance Monitoring
01:58:22 Performance Monitoring-2
02:02:06 Userinfo and Management
02:07:56 File, Directory and Deletion
02:19:19 Directory Management
02:23:24 Rename,Move and Case Sensitive
02:27:43 Symbolic Links
02:29:45 File Reading
02:34:58 Process and Kill
02:38:19 Process and Killall
02:40:42 Background and Foreground
02:43:07 Linux Permissions
02:52:11 Adding Permissions
02:57:46 Removing Permissions
03:00:31 Execution of Permissions
03:24:55 Linux Octal Permissions
03:07:48 Linux Networking Management -1
03:11:14 Linux Networking Management -2
03:13:20 Linux Networking Management -3
03:18:29 Linux Networking Management -4
03:22:06 Linux Networking Management -5
03:24:44 Linux Networking Management -6
03:29:45 Linux Archive Management
03:34:41 Linux Search & Pattern
03:40:05 What is Social Engineering & Types
03:44:55 What is Phishing
03:52:49 What is Cryptography
03:55:54 Cryptography Breakdown
03:58:50 What is Encryption
04:02:01 Symmetric Encryption
04:05:43 Asymmetric Encryption
04:11:07 Asymmetric Encryption Working
04:17:24 Asymmetric Encryption Practical
04:22:13 Final Words
Видео Introduction to Ethical Hacking and Cyber Security: Free Comprehensive Course 2023 канала Hacktify Cyber Security
For more details contact:
Call: +91 9106147779
Email: shifa@hacktify.in
Website: https://hacktify.in/
Get you certificate : https://hacktify.thinkific.com/courses/introduction-to-cyber-security-ethical-hacking
Follow us:
Hacktify's LinkedIn: https://www.linkedin.com/company/hacktifycs/
Hacktify's Twitter: https://twitter.com/Hacktifycs
Shifa Cyclewala:
https://www.linkedin.com/in/shifa
https://twitter.com/shifacyclewala
Rohit Gautam:
https://www.linkedin.com/in/iamrohitg
https://twitter.com/HackerGautam
Time stamp:
00:00:00 Introduction to the course
00:01:07 What is Hacking
00:07:34 What are the types of hackers
00:15:07 More Types of Hackers
00:20:58 Have I been pwned
00:28:34 History of Hacking
00:29:44 Breaking the Myth
00:33:33 Not Being a Noob
00:38:20 CIA Triad
00:45:37 Integrity Practical
00:59:19 What are Ports & Protocols
01:02:39 Hyper Text Transfer Protocol (HTTP & HTTPS)
01:06:10 File Transfer Protocol
01:09:40 Secure Shell
01:13:16 Telnet, RDP and Telnet vs SSH
01:15:28 TCP IP and OSI Model
01:17:54 OSI Model in day to day Life
01:22:39 Network Types
01:23:55 Local Area Network
01:24:48 Metropolitan Area Network
01:25:13 Wide Area Network
01:25:41 Personal Area Network
01:26:32 Introduction to Malware Family
01:28:32 Introduction to Linux
01:31:00 Linux Boot Process
01:40:39 Windows Boot Process
01:43:25 Linux System Information Commands
01:49:01 Linux Hardware Information
01:54:56 Performance Monitoring
01:58:22 Performance Monitoring-2
02:02:06 Userinfo and Management
02:07:56 File, Directory and Deletion
02:19:19 Directory Management
02:23:24 Rename,Move and Case Sensitive
02:27:43 Symbolic Links
02:29:45 File Reading
02:34:58 Process and Kill
02:38:19 Process and Killall
02:40:42 Background and Foreground
02:43:07 Linux Permissions
02:52:11 Adding Permissions
02:57:46 Removing Permissions
03:00:31 Execution of Permissions
03:24:55 Linux Octal Permissions
03:07:48 Linux Networking Management -1
03:11:14 Linux Networking Management -2
03:13:20 Linux Networking Management -3
03:18:29 Linux Networking Management -4
03:22:06 Linux Networking Management -5
03:24:44 Linux Networking Management -6
03:29:45 Linux Archive Management
03:34:41 Linux Search & Pattern
03:40:05 What is Social Engineering & Types
03:44:55 What is Phishing
03:52:49 What is Cryptography
03:55:54 Cryptography Breakdown
03:58:50 What is Encryption
04:02:01 Symmetric Encryption
04:05:43 Asymmetric Encryption
04:11:07 Asymmetric Encryption Working
04:17:24 Asymmetric Encryption Practical
04:22:13 Final Words
Видео Introduction to Ethical Hacking and Cyber Security: Free Comprehensive Course 2023 канала Hacktify Cyber Security
Показать
Комментарии отсутствуют
Информация о видео
5 февраля 2023 г. 11:26:01
04:23:03
Другие видео канала
YouTube Live | Hacktify Cyber Security | Doubts and Discussions | Cyber Security Talks | Pentesting5 OWASP : BAC | Bug Bounty | Penetration Testing | Ethical Hacking for Beginners Crash CourseCVE-2020-13942 CVSS 10.0 Critical Pre-auth RCE Apache Unomi + Automation 🔥Socal Security Summit - Security Innovation SummitLinux File Permissions for BeginnersCVE-2020-8512 IceWarp WebMail XSS ExploitationCIT Cyber Security Hackathon in 2022 | In support with Tata Consultancy Services9 OWASP : UCWKV | Bug Bounty | Penetration Testing | Ethical Hacking for Beginners Crash CourseWhy to choose your career as Cyber Security - A Beginners GuideTop Cyber Security Questions which you cannot miss : Part -16 OWASP : SM | Bug Bounty | Penetration Testing | Ethical Hacking for Beginners Crash CourseMindmap for Bug Bounties & Pentesting by Hacktify Cyber SecurityWeek-1 Technical LearningTop Cyber Security Questions which you cannot miss : Part -2Updates : New Updates for you!4 OWASP : XXE | Bug Bounty | Penetration Testing | Ethical Hacking for Beginners Crash CourseCIA Triad | Practical | HashCalc and VirustotalInsecure Deserialization | OWASP 2021 | Port Swigger | Hacktify Cyber SecurityCIT TLC-ISAC COE Hackathon | FREE Registration | Win upto 5 Lac RupeesNmap | Network Security | Hacktify Cyber Security | Network MapperCIT TLC-ISAC COE Hackathon | FREE Registration | Win upto 5 Lac Rupees