filmov
tv
Cyber Security Full course - 11 Hours | Cyber Security Training For Beginners | Edureka

Показать описание
This Edureka video on "Cyber Security Full Course" will help you understand and learn the fundamentals of Cyber Security. This Cyber Security Tutorial is ideal for both beginners as well as professionals who want to master the Cyber Security concepts. Below are the topics covered in this Cyber Security Training For Beginners:
00:00:00 Introduction
00:05:35 Requirement of Cyber Security
00:23:44 History of Cybersecurity
00:34:57 Types of hackers
00:42:57 Skills Necessary
00:51:45 What is Penetration testing?
01:01:22 What is Footprinting?
01:13:40 Handson
01:33:23 History of the internet
01:42:11 OSI and TCP/IP Model
01:50:59 What is Wireshark?
01:58:59 What is DHCP?
02:08:36 Cryptography
02:11:00 History of Cryptography
02:19:00 Digital Encryption Standard
02:54:13 Bitlocker
03:07:50 What is IDS
03:15:50 What is pishing
03:20:38 Password Attacks
03:23:50 Packet Flooding
03:27:02 What is a Drive-by-download
03:33:26 BluVector
03:46:15 Cybersecurity Frameworks
04:03:51 Cybersecurity is an evergreen industry
04:19:52 Why Become an cyber security engineer
04:23:52 Who is a cybersecurity engineer ?
04:26:17 Roles and responsibilities of cyber security
04:59:05 How to choose the right cybersecurity certification?
05:05:29 Keylogger
05:07:53 SQL Vulnerability assessment
05:35:54 Top Cyber attacks in history
05:40:42 Cybersecurity challenges
05:46:18 Types of hacking
06:08:43 What is kali Linux?
06:14:19 Hands-on in Kali Linux
06:39:56 What is a proxy chain?
06:55:08 What is a Mac Address?
07:26:21 Cryptography
08:23:59 What is cross-site scripting?
08:26:23 types of cross-site scripting
08:36:00 How to use cross-site scripting
08:52:48 How to prevent cross-site scripting?
09:13:37 What is SQL Injection?
09:32:49 What is steganography?
10:00:50 Steganography tools
10:13:39 Ethical hacking and roles in ethical hacking
10:18:27 Ethical hacking tools
10:21:39 Cybersecurity interview questions
📝Feel free to share your comments below.📝
🔴 𝐄𝐝𝐮𝐫𝐞𝐤𝐚 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐚𝐧𝐝 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬
🔴 𝐄𝐝𝐮𝐫𝐞𝐤𝐚 𝐑𝐨𝐥𝐞-𝐁𝐚𝐬𝐞𝐝 𝐂𝐨𝐮𝐫𝐬𝐞𝐬
🔴 𝐄𝐝𝐮𝐫𝐞𝐤𝐚 𝐔𝐧𝐢𝐯𝐞𝐫𝐬𝐢𝐭𝐲 𝐏𝐫𝐨𝐠𝐫𝐚𝐦𝐬
-------------
About Edureka Cyber Security Training
Edureka’s Cybersecurity Certification Course will help you in learning about the basic concepts of Cybersecurity along with the methodologies that must be practiced ensuring information security of an organization. Starting from the Ground level Security Essentials, this course will lead you through Cryptography.
Why Learn Cyber Security?
Cybersecurity is the gathering of advances that procedures and practices expected to ensure systems, PCs, projects and information from assault, harm or unapproved get to. In a processing setting, security incorporates both cybersecurity and physical security.
00:00:00 Introduction
00:05:35 Requirement of Cyber Security
00:23:44 History of Cybersecurity
00:34:57 Types of hackers
00:42:57 Skills Necessary
00:51:45 What is Penetration testing?
01:01:22 What is Footprinting?
01:13:40 Handson
01:33:23 History of the internet
01:42:11 OSI and TCP/IP Model
01:50:59 What is Wireshark?
01:58:59 What is DHCP?
02:08:36 Cryptography
02:11:00 History of Cryptography
02:19:00 Digital Encryption Standard
02:54:13 Bitlocker
03:07:50 What is IDS
03:15:50 What is pishing
03:20:38 Password Attacks
03:23:50 Packet Flooding
03:27:02 What is a Drive-by-download
03:33:26 BluVector
03:46:15 Cybersecurity Frameworks
04:03:51 Cybersecurity is an evergreen industry
04:19:52 Why Become an cyber security engineer
04:23:52 Who is a cybersecurity engineer ?
04:26:17 Roles and responsibilities of cyber security
04:59:05 How to choose the right cybersecurity certification?
05:05:29 Keylogger
05:07:53 SQL Vulnerability assessment
05:35:54 Top Cyber attacks in history
05:40:42 Cybersecurity challenges
05:46:18 Types of hacking
06:08:43 What is kali Linux?
06:14:19 Hands-on in Kali Linux
06:39:56 What is a proxy chain?
06:55:08 What is a Mac Address?
07:26:21 Cryptography
08:23:59 What is cross-site scripting?
08:26:23 types of cross-site scripting
08:36:00 How to use cross-site scripting
08:52:48 How to prevent cross-site scripting?
09:13:37 What is SQL Injection?
09:32:49 What is steganography?
10:00:50 Steganography tools
10:13:39 Ethical hacking and roles in ethical hacking
10:18:27 Ethical hacking tools
10:21:39 Cybersecurity interview questions
📝Feel free to share your comments below.📝
🔴 𝐄𝐝𝐮𝐫𝐞𝐤𝐚 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐚𝐧𝐝 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬
🔴 𝐄𝐝𝐮𝐫𝐞𝐤𝐚 𝐑𝐨𝐥𝐞-𝐁𝐚𝐬𝐞𝐝 𝐂𝐨𝐮𝐫𝐬𝐞𝐬
🔴 𝐄𝐝𝐮𝐫𝐞𝐤𝐚 𝐔𝐧𝐢𝐯𝐞𝐫𝐬𝐢𝐭𝐲 𝐏𝐫𝐨𝐠𝐫𝐚𝐦𝐬
-------------
About Edureka Cyber Security Training
Edureka’s Cybersecurity Certification Course will help you in learning about the basic concepts of Cybersecurity along with the methodologies that must be practiced ensuring information security of an organization. Starting from the Ground level Security Essentials, this course will lead you through Cryptography.
Why Learn Cyber Security?
Cybersecurity is the gathering of advances that procedures and practices expected to ensure systems, PCs, projects and information from assault, harm or unapproved get to. In a processing setting, security incorporates both cybersecurity and physical security.
Комментарии