Users Online

· Guests Online: 45

· Members Online: 0

· Total Members: 188
· Newest Member: meenachowdary055

Forum Threads

Newest Threads
No Threads created
Hottest Threads
No Threads created

Latest Articles

DEMO - Practical Cyber Security

DEMO - Practical Cyber Security
Security
Categories Most Recent Top Rated Popular Courses
 
Uploader Date Added Views Rating
Superadmin 11.03.16 651 No Rating
Description
Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyber attacks can take, and the two most common types of protection you can build into your system: antivirus protection and firewalls. Then learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to avoid common security mistakes and monitor packet-level activity on your network.

Topics include:

Hackers and the kill chain
Viruses, spyware, and adware
Scanning with Windows Defender
Building firewalls
Scanning with Nmap
Monitoring network communications with Netcat
Combating application-level threats
Capturing intruders through packet inspection


Lesson Description
Section 1 Introduction
Lesson 01 Welcome
Lesson 02 What you should know before watching this course
Lesson 03 Using the exercies files
Section 2 Why Cybersecurity
Lesson 04 Hackers and the kill Chain
Lesson 05 The Stuxnet Kill Chain
Lesson 06 Common forms of Cyber Attack
Section 3 Antivirus
Lesson 07 Virus, Spyware and adware
Lesson 08 Using the windows Defender
Lesson 09 Setting up real-time Protection
Lesson 10 Scanning with Windows Defender
Lesson 11 Modifying antivirus settings in Windows Defender
Lesson 12 Schedule a scan with Windows Defender
Lesson 13 Using windows Defender offline
Lesson 14 Exploring Antivirus on Linux
Section 4 Personal Firewalls
Lesson 15 Why Firewalls
Lesson 16 Using the Microsoft Windows Firewall
Lesson 17 Setting up advanced Security Notifications
Lesson 18 Setting up detailed rules
Lesson 19 Managing and analyzing log files with ZedLan
Lesson 20 Introducing iptables in Linux
Lesson 21 Building a simple firewall with iptables
Section 5 Knowing What is Your network
Lesson 22 Getting started with Nmap
Lesson 23 Scanning for hosts
Lesson 24 Scanning for services
Lesson 25 Exploring advanced Nmap options
Lesson 26 Scanning in Windows with Zenmap
Section 6 Network Communications and Detecting Intruders
Lesson 27 Getting started with Netcat
Lesson 28 Using Netcat for File transfers
Lesson 29 Connecting to Services
Lesson 30 Setting up a honeypot with Netcat
Section 7 Checking hosts for known vulnerabilities
Lesson 31 Introduction to vulnerability scanning
Lesson 32 Getting started with Nessus
Lesson 33 Configuring Nessus
Lesson 34 Running a Nessus scan
Lesson 35 Scheduling a Nessus scan
Section 8 Checking for Common mistakes in Web Apps
Lesson 36 Combating application Level threats
Lesson 37 Web Security Scanning
Lesson 38 Using the scanner as a web proxy
Section 9 Monitoring Network Activity
Lesson 39 Using wireshark to explain packet level Activity
Lesson 40 How to capture packets from the network to analyze activity
Lesson 41 Making sense of TCPIP Protocols
Lesson 42 Filtering packets to focus on areas of interest
Lesson 43 Capturing intruders with packets

Ratings

Rating is available to Members only.

Please login or register to vote.

No Ratings have been Posted.

Comments

No Comments have been Posted.

Post Comment

Please Login to Post a Comment.
Render time: 0.95 seconds
10,855,900 unique visits