Companies Home Search Profile

Cybersecurity Fundamentals for Beginners-Learning with Demos

Focused View

Kshitij Joy (DB Alchemist Academy)

9:16:48

17 View
  • 1. Top 10 Cyber Attacks of 21st Century.mp4
    10:29
  • 2. A Look at the Live Threats.mp4
    03:28
  • 3. Demand for CyberSecurity Skills.mp4
    02:29
  • 4. What is Cybersecurity .mp4
    07:52
  • 5. What is CIA Triad .mp4
    08:27
  • 1. Intro - Types of Cyber Attacks.mp4
    00:06
  • 2. Malware Attack.mp4
    05:30
  • 3. Phishing Attack.mp4
    06:48
  • 4. Demo How attackers use Phishing Attack .mp4
    06:18
  • 5. Password Attack.mp4
    06:33
  • 6. Demo A Dictionary Attack - Password Attack.mp4
    06:29
  • 7. Man-in-the-Middle Attack.mp4
    04:55
  • 8. Demo MITM Attack using ARP Poisoning.mp4
    05:58
  • 9. SQL Injection Attack.mp4
    05:54
  • 10. Demo How to create a Sql Injection(SQLi) Attack.mp4
    05:24
  • 11. Denial-of-Service Attack.mp4
    05:03
  • 12. Cryptojacking.mp4
    04:23
  • 1. Title-Types of Hackers.mp4
    00:06
  • 2. White Hat Hacker.mp4
    06:29
  • 3. Black Hat Hacker.mp4
    07:34
  • 4. Grey Hat Hacker.mp4
    06:51
  • 5. Hacktivist.mp4
    08:16
  • 6. Script Kiddie.mp4
    06:27
  • 1. Title-Basics of Cryptography.mp4
    00:06
  • 2. What is Cryptography .mp4
    05:01
  • 3. History of Cryptography.mp4
    06:28
  • 4. Understanding the Ceasars Cypher.mp4
    06:52
  • 5. What is Symmetric Encryption.mp4
    07:30
  • 6. Understand Symmetric Encryption with an Example.mp4
    02:17
  • 7. Demo Symmetric Encryption using openssl.mp4
    05:37
  • 8. What is Asymmetric Encryption.mp4
    08:56
  • 9. Understand Asymmetric Encryption - Confidentiality.mp4
    04:15
  • 10. Understand Asymmetric Encryption - Integrity & Authentication.mp4
    04:28
  • 11.1 Asymmetric Encryption using openssl.pdf
  • 11. DemoAsymmetric encryption using openssl.mp4
    07:25
  • 12. Get an Understanding of Hybrid Encryption.mp4
    06:43
  • 1. Title-Deep Dive into Various Algorithms.mp4
    00:06
  • 2. What is Cipher Algorithm & Key.mp4
    04:29
  • 3. What is DES - Data Encryption Standard .mp4
    06:21
  • 4. What is AES Advanced Encryption Standard.mp4
    05:22
  • 5. Which are the NIST Approved Asymmetric Algorithms .mp4
    02:35
  • 6. What is the RSA Algorithm .mp4
    08:35
  • 7. Understanding RSA Algorithm with Example.mp4
    08:54
  • 8. What is DSA Algorithm .mp4
    06:46
  • 9. What is Deffie-Hellman Algorithm .mp4
    10:47
  • 10. Understanding DH Algorithm with an Example.mp4
    06:30
  • 11. Understanding Calculations for DH Algorithm.mp4
    06:24
  • 12. What is Elliptic Curve Algorithm .mp4
    06:31
  • 13. Quick Comparison RSA vs DSA vs ECDSA vs DH.mp4
    08:43
  • 1. Title-Public Key Infrastructure - PKI.mp4
    00:06
  • 2. What is PKI .mp4
    09:20
  • 3. What is a Hashing Algorithm.mp4
    06:15
  • 4.1 demo hashing openssl.pdf
  • 4. Demo Hashing using openssl.mp4
    03:13
  • 5. What is a Message Digest.mp4
    04:35
  • 6. What is a Digital Signature .mp4
    02:55
  • 7. Understanding Digital Signature.mp4
    04:56
  • 8. What is a Certificate Authority -CA.mp4
    07:03
  • 9. Demo Exploring the DigiCert Website.mp4
    03:28
  • 10. What is a Digital Certificate.mp4
    05:03
  • 11. Understanding Digital Certificate.mp4
    03:52
  • 12. Check a Real Certificate - Facebook.com.mp4
    06:16
  • 13. Protecting from MITM using Digital Certificate.mp4
    05:26
  • 14. What is a Self Signed Certificate .mp4
    05:03
  • 15. PEM Vs PKCS12.mp4
    04:43
  • 16. What is a Chain of Trust.mp4
    04:08
  • 17.1 create a rootCA.pdf
  • 17. Demo Create a Self Signed Certificate rootCA.mp4
    06:20
  • 18.1 create a certificate request.pdf
  • 18. Demo Create a CSR.mp4
    04:22
  • 19.1 signing the certificate.pdf
  • 19. Demo Sign a Certificate CSR.mp4
    04:49
  • 1. Title-Networking Basics.mp4
    00:06
  • 2. Main Artefacts for Networking.mp4
    04:27
  • 3. Understanding the OSI Model.mp4
    06:07
  • 4. What is a Switch .mp4
    06:23
  • 5. What is a Router .mp4
    06:34
  • 6. What is a VLAN.mp4
    05:20
  • 7. Binary to Decimal Conversion.mp4
    03:03
  • 8. Decimal to Binary Conversion.mp4
    02:32
  • 9. Understanding an IP address.mp4
    09:39
  • 10. What is Subnetting.mp4
    07:23
  • 11. What is Subnet Mask.mp4
    06:30
  • 12. What is ARP.mp4
    06:39
  • 13. Simulation to understand ARP.mp4
    06:01
  • 14. What is a Network Packet.mp4
    06:08
  • 15. How a Packet Travels from Source to Destination.mp4
    07:45
  • 16. Demo traceroute to cnn.com.mp4
    02:03
  • 17. What is a VPN .mp4
    05:46
  • 18. Demo Using a Software based VPN (NordVPN).mp4
    03:35
  • 19. What is a Firewall .mp4
    06:39
  • 20. Role of a Proxy Server.mp4
    07:05
  • 21. What is a Perimeter Network or a DMZ.mp4
    06:20
  • 22. What is SSH.mp4
    06:31
  • 23. What is TCPIP.mp4
    05:47
  • 24. What is SSL.mp4
    07:34
  • 25. Demo Checking the Latest Stats on SSLTLS.mp4
    05:35
  • 26. Understanding SSL Vs TLS.mp4
    03:31
  • 27. What is MTLS.mp4
    05:39
  • 1. Title-Key Protocols.mp4
    00:06
  • 2. What is SSH .mp4
    06:31
  • 3. What is TCPIP .mp4
    05:47
  • 4. What is SSL .mp4
    07:34
  • 5. Demo Checking the Latest Stats on SSLTLS.mp4
    05:35
  • 6. Understanding SSL Vs TLS.mp4
    03:31
  • 7. What is mTLS .mp4
    05:39
  • Description


    For Beginners-Practical Approach to learning - Cyber Attacks, Cryptography, Encryption Algorithms, PKI,Networking Topics

    What You'll Learn?


    • Top 10 Cyber Attacks of 21st Century
    • What is Cybersecurity ?
    • What is CIA Triad ?
    • Types of Cyber Attacks
    • Demo: How attackers use Phishing Attack ?
    • Demo: How to create a Sql Injection(SQLi) Attack
    • Types of Hackers : Black Hat / White Hat / Grey Hat / Hacktivist
    • What is Cryptography ?
    • Understand Symmetric Encryption with an Example
    • Demo:Asymmetric encryption using openssl
    • Understanding of AES/DES Algorithms
    • Understanding of RSA / DSA / ECDSA / Diffie-Hellman Algorithms with Demos
    • What is PKI ?
    • Demos for Digital Signature / Digital Certificate / Certificate Authority
    • How to raise a CSR and sign the certificate
    • A Primer on Networking and all important terms
    • What is a Switch & a Router
    • What is VLAN / IP Address / Subnetting / Subset Mask
    • Demos on ARP / Network Packets / Traceroute
    • Understanding of VPN / Firewall / DMZ / Proxy Server
    • What is SSH/ TCP-IP
    • What is SSL
    • Understanding SSL Vs TLS
    • Demo: Checking the Latest Stats on SSL/TLS
    • What is mTLS

    Who is this for?


  • Cybersecurity Beginners / Experienced Professionals in IT wanting to understand the fundamentals of Cybersecurity in a Practical oriented learning
  • The course also teaches all the important Networking Fundamentals as well.
  • What You Need to Know?


  • Cybersecurity Beginners / Experienced Professionals in IT wanting to learn the fundamentals of Cybersecurity
  • More details


    Description

    This is a course that has been designed for the Beginners to the world of Cybersecurity and also experienced IT Professionals looking to learn the fundamentals of Cybersecurity , the entire learning will be based on demos and various practical.


    * What is Cybersecurity ?

    * Types of Cyber Attacks - Malware / Phishing / MITM / DDOS /SQLInjection

    * Types of Hackers - Black Hat / White Hat / Grey Hat / Hacktivist

    * Basics of Cryptography - History / Caesar's Cypher / Symmetric & Asymmetric Encryption

    * Deep Dive into Various Algorithms - RSA / DSA / AES/ DES / ECDSA / Diffie-Hellman

    * Public Key Infrastructure (PKI) - Digital Signature / Certificate Authority (CA) / Digital Certificate / Self Signed Certificate

    * Networking Basics - IP Addressing / Subnetting / VPN / DMZ / Firewall / Proxy Server / Packet Switching

    * Key Protocols - SSH / SSL / TCP/IP / TLS / mTLS


    The details are as below:


    1. Introduction
    2. Top 10 Cyber Attacks of 21st Century

    3. A Look at the Live Threats

    4. Demand for CyberSecurity Skills

    5. What is Cybersecurity ?

    6. What is CIA Triad ?

    7. Malware Attack
    8. Phishing Attack
    9. Demo: How attackers use Phishing Attack ?
    10. Password Attack
    11. Demo: A Dictionary Attack - Password Attack
    12. Man-in-the-Middle Attack
    13. Demo: MITM Attack using ARP Poisoning
    14. SQL Injection Attack
    15. Demo: How to create a Sql Injection(SQLi) Attack
    16. Denial-of-Service Attack
    17. Cryptojacking

    18. White Hat Hacker
    19. Black Hat Hacker
    20. Grey Hat Hacker
    21. Hacktivist
    22. Script Kiddie

    23. What is Cryptography ?
    24. History of Cryptography
    25. Understanding the Ceasar's Cypher
    26. What is Symmetric Encryption
    27. Understand Symmetric Encryption with an Example
    28. Demo: Symmetric Encryption using openssl
    29. What is Asymmetric Encryption
    30. Understand Asymmetric Encryption - Confidentiality
    31. Understand Asymmetric Encryption - Integrity & Authentication
    32. Demo:Asymmetric encryption using openssl

    33. Get an Understanding of Hybrid Encryption

    34. What is Cipher Algorithm & Key
    35. What is DES - Data Encryption Standard ?
    36. What is AES : Advanced Encryption Standard
    37. Which are the NIST Approved Asymmetric Algorithms ?
    38. What is the RSA Algorithm ?
    39. Understanding RSA Algorithm with Example
    40. What is DSA Algorithm ?
    41. What is Deffie-Hellman Algorithm ?
    42. Understanding DH Algorithm with an Example
    43. Understanding Calculations for DH Algorithm
    44. What is Elliptic Curve Algorithm ?
    45. Quick Comparison : RSA vs DSA vs ECDSA vs DH

    46. What is PKI ?
    47. What is a Hashing Algorithm
    48. Demo: Hashing using openssl
    49. What is a Message Digest
    50. What is a Digital Signature ?
    51. Understanding Digital Signature
    52. What is a Certificate Authority -CA
    53. Demo: Exploring the DigiCert Website
    54. What is a Digital Certificate
    55. Understanding Digital Certificate
    56. Check a Real Certificate - Facebook
    57. Protecting from MITM using Digital Certificate
    58. What is a Self Signed Certificate ?
    59. PEM Vs PKCS12
    60. What is a Chain of Trust
    61. Demo: Create a Self Signed Certificate / rootCA
    62. Demo : Create a CSR
    63. Demo: Sign a Certificate CSR

    64. Main Artefacts for Networking
    65. Understanding the OSI Model
    66. What is a Switch ?
    67. What is a Router ?
    68. What is a VLAN
    69. Decimal to Binary Conversion
    70. Binary to Decimal Conversion
    71. Understanding an IP address
    72. What is Subnetting
    73. What is Subnet Mask
    74. What is ARP
    75. Simulation to understand ARP
    76. What is a Network Packet
    77. How a Packet Travels from Source to Destination
    78. Demo: traceroute to cnn
    79. What is a VPN ?
    80. Demo: Using a Software based VPN (NordVPN)
    81. What is a Firewall ?
    82. Role of a Proxy Server
    83. What is a Perimeter Network or a DMZ

    84. What is SSH
    85. What is TCP/IP
    86. What is SSL
    87. Understanding SSL Vs TLS
    88. Demo: Checking the Latest Stats on SSL/TLS
    89. What is MTLS

    Who this course is for:

    • Cybersecurity Beginners / Experienced Professionals in IT wanting to understand the fundamentals of Cybersecurity in a Practical oriented learning
    • The course also teaches all the important Networking Fundamentals as well.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Kshitij Joy (DB Alchemist Academy)
    Kshitij Joy (DB Alchemist Academy)
    Instructor's Courses
    Member of an elite group of Oracle professionals by successful completion of Oracle 11g & 12c Certified Master [OCM ] & Oracle Cloud Architect Professional, my profile has been published on Oracle website (Check under Links Section) Having 15+Years of Experience in Oracle technologies. My key responsibility areas are Exadata Architecting , Installation, Administration, Performance - Tuning, Backup – Recovery , Data Guard and Database Upgrades. I have experience with technologies like Oracle GoldenGate, Veritas Netbackup, Oracle 10g / 11g RAC with Oracle ASM, Oracle 10g /11g / 12cGrid Control.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 101
    • duration 9:16:48
    • Release Date 2023/09/10