Users Online
· Guests Online: 45
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
Forum Threads
Newest Threads
No Threads created
Hottest Threads
No Threads created
Latest Articles
DEMO - Practical Cyber Security
DEMO - Practical Cyber Security Security |
Categories | Most Recent | Top Rated | Popular Courses |
Uploader | Date Added | Views | Rating | |
Superadmin | 11.03.16 | 651 | No Rating | |
Description | ||||
Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyber attacks can take, and the two most common types of protection you can build into your system: antivirus protection and firewalls. Then learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to avoid common security mistakes and monitor packet-level activity on your network. Topics include: Hackers and the kill chain Viruses, spyware, and adware Scanning with Windows Defender Building firewalls Scanning with Nmap Monitoring network communications with Netcat Combating application-level threats Capturing intruders through packet inspection Lesson Description Section 1 Introduction Lesson 01 Welcome Lesson 02 What you should know before watching this course Lesson 03 Using the exercies files Section 2 Why Cybersecurity Lesson 04 Hackers and the kill Chain Lesson 05 The Stuxnet Kill Chain Lesson 06 Common forms of Cyber Attack Section 3 Antivirus Lesson 07 Virus, Spyware and adware Lesson 08 Using the windows Defender Lesson 09 Setting up real-time Protection Lesson 10 Scanning with Windows Defender Lesson 11 Modifying antivirus settings in Windows Defender Lesson 12 Schedule a scan with Windows Defender Lesson 13 Using windows Defender offline Lesson 14 Exploring Antivirus on Linux Section 4 Personal Firewalls Lesson 15 Why Firewalls Lesson 16 Using the Microsoft Windows Firewall Lesson 17 Setting up advanced Security Notifications Lesson 18 Setting up detailed rules Lesson 19 Managing and analyzing log files with ZedLan Lesson 20 Introducing iptables in Linux Lesson 21 Building a simple firewall with iptables Section 5 Knowing What is Your network Lesson 22 Getting started with Nmap Lesson 23 Scanning for hosts Lesson 24 Scanning for services Lesson 25 Exploring advanced Nmap options Lesson 26 Scanning in Windows with Zenmap Section 6 Network Communications and Detecting Intruders Lesson 27 Getting started with Netcat Lesson 28 Using Netcat for File transfers Lesson 29 Connecting to Services Lesson 30 Setting up a honeypot with Netcat Section 7 Checking hosts for known vulnerabilities Lesson 31 Introduction to vulnerability scanning Lesson 32 Getting started with Nessus Lesson 33 Configuring Nessus Lesson 34 Running a Nessus scan Lesson 35 Scheduling a Nessus scan Section 8 Checking for Common mistakes in Web Apps Lesson 36 Combating application Level threats Lesson 37 Web Security Scanning Lesson 38 Using the scanner as a web proxy Section 9 Monitoring Network Activity Lesson 39 Using wireshark to explain packet level Activity Lesson 40 How to capture packets from the network to analyze activity Lesson 41 Making sense of TCPIP Protocols Lesson 42 Filtering packets to focus on areas of interest Lesson 43 Capturing intruders with packets |
Ratings
Comments
No Comments have been Posted.
Post Comment
Please Login to Post a Comment.