Curriculum
Course:
Ethical Hacking & Cyber Security - B...
Login
Curriculum
Ethical Hacking & Cyber Security - Basics
M1- Introduction of Ethical Hacking
0/1
Introduction to Ethical Hacking
20:04
Preview
M2- Fundamental Steps of Hacking
0/1
Fundamental Steps of Hacking
16:33
M3 - Course contents to start Ethical Hacking
0/1
Course contents to start Ethical Hacking
38:59
M4 - Roles of a Certified Ethical Hacker
0/1
Roles of a Certified Ethical Hacker
14:00
M5 - Command Prompt (Terminal)
0/7
5.1 | What is Command Prompt (Terminal)
6:23
5.2 | Basic commands in CMD
17:04
5.3 | Cipher Command in Windows
8:18
5.4 | Attribute Commands in Windows
10:11
5.5 | Ping Command
12:25
5.6 | NSLOOKUP Command
11:50
5.7 | TRACERT Command
8:11
M6 - Cryptography
0/4
6.1 | What is Cryptography? | CIA Triad | Encryption & Decryption
11:49
6.2 | Types of Cryptography
8:14
6.3 | Public Key & Private Key Concept
6:04
6.4 | Various types of Cyber Attacks
14:46
M7- Windows Hacking & Security
0/5
7.1 | Introduction to Windows Security Architecture
10:17
7.2 | Gaining Access in Windows System - Open Case
13:27
7.3 | Gaining Access in Windows System - Close Case
13:59
7.4 | Backdooring in Windows System
16:22
7.5 | Windows Security from Hacking
8:29
M8 - Virtual Machines
0/1
Virtual Machines
12:09
M9 - Malwares & Trojans
0/17
9.1 | What is Malware? | Types of Malware
15:10
9.2 | Computer Virus - In Depth
10:03
9.3 | How to Code a Computer Virus
12:36
9.4 | How to make a Computer Virus?
11:17
9.5 | How a computer Virus Attack?
10:36
9.6 | Introduction to Trojan Horses
7:58
9.7 | Exploit Trojan | Types of Trojan
2:56
9.8 | Rootkit Trojans | Types of Trojans
2:17
9.9 | Backdoor Trojans | Types of Trojans
2:40
9.10 | Banker Trojan | Types of Trojans
3:59
9.11 | Trojan D-DoS | Types of Trojan
5:21
9.12 | Trojan Downloader | Types of Trojan
2:37
9.13 | Trojan Dropper | Types of Trojan
3:57
9.14 | Trojan Ransom, SMS, Spy & Mail Finder | Types of Trojan
6:43
9.15 | Trojan Attack | Cyber Security
28:36
9.16 | Case Studies on Trojan Attacks
4:56
9.17 | Security from Malwares | Anti - Malwares
18:03
M10 - Networking Basics
0/17
10.1 | What is Computer Network? | Basics of Networking
9:35
10.2 | What is Network Topology? | Basics of Networking
22:53
10.3 | How Internet Works? | Basics of Networking
13:12
10.4 | How Internet Works? | Basics of Networking
8:40
10.5 | OSI - Part-1st | Basics of Networking
19:38
10.6 | OSI - Part-2nd | Basics of Networking
9:15
10.7 | OSI – Part-3rd & TCP/IP Model | Basics of Networking
9:14
10.8 | TCP/IP Model | Basics of Networking
7:33
10.9 | IP Addressing - Part-1st| Basics of Networking
12:17
10.10 | IP Addressing - Part-2nd | Basics of Networking
7:35
10.11 | IP Addressing – Part-3rd | Basics of Networking
4:41
10.12 | IP Addressing – Part-4th | Basics of Networking
5:39
10.13 | IP Addressing - Part-5th | Basics of Networking
4:52
10.14 | IP-Addressing Part-6th | Basics of Networking
11:25
10.15 | MAC-Addressing | Basics of Networking
7:01
10.16 | Port-Addressing | Basics of Networking
7:09
10.17 | Protocols | Basics of Networking
11:28
0/12
11.1 | What is Social Engineering? | Phishing Attack
10:29
11.2 | How a Phishing Attack Works?
6:58
11.3 | Spear Phishing | Types of Phishing Attack
3:08
11.4 | Whaling Phishing | Types of Phishing Attack
3:40
11.5 | Clone Phishing | Types of Phishing Attack
3:43
11.6 | Link Manipulation Phishing | Types of Phishing Attack
5:00
11.7 | Filter Evasion Phishing | Types of Phishing Attack
6:35
11.8 | Website Forgery Phishing | Types of Phishing Attack
3:47
11.9 | Covert Redirect Phishing | Types of Phishing Attack
6:03
11.10 | Voice Phishing | Types of Phishing Attack
5:01
11.11 | Phishing Attack Practical
26:49
11.12 | Security from Social Engineering
5:16
0/4
12.1 | Windows Registry Part - 1st
13:16
12.2 | Windows Registry Part - 2nd
10:04
12.3 | Windows Registry Part - 3rd
14:08
12.4 | Windows Registry Part - 4th
15:28
0/1
13.0 | SQL injection
29:35
M14 - Smartphone Hacking and Security
0/1
14.1 | Smartphone Hacking and Security
32:30
M15 - Basic Google Dorks
0/1
15.1 | Basic Google Dorks
24:34
M16 - Email Tracking
0/2
16.1 | Email Tracking Part-1st
13:35
16.2 | Email Tracking Part-2nd
22:48
M17 - Firewalls
0/2
17.1 | Firewalls Part-1st
15:19
17.2 | Firewall Part-2nd
11:42
M18 - System Securities
0/1
18.0 | System Securities
43:20
M19 - Cyber Laws
0/2
19.1 | IT ACT 2000 | Part-1
26:38
19.2 | IT ACT 2000 | Part-2
21:44
M20 - Next Steps (Hack the Box)
0/1
20.0 | What are next steps?
22:44
Video lesson
Introduction to Ethical Hacking
Sign In
The password must have a minimum of 8 characters of numbers and letters, contain at least 1 capital letter
I agree with storage and handling of my data by this website.
Privacy Policy
Remember me
Sign In
Sign Up
Restore password
Send reset link
Password reset link sent
to your email
Close
No account?
Sign Up
Sign In
Lost Password?