Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Complete Cybersecurity Bootcamp: Zero to Mastery
Introduction
Cybersecurity Bootcamp: Zero to Mastery (2:30)
Exercise: Meet Your Classmates and Instructor
Course Resources
ZTM Plugin + Understanding Your Video Player
Set Your Learning Streak Goal
Introduction To Cyber Security
What is Cyber Security (6:58)
Cyber Security Prerequisites (6:23)
Most Common Cyber Security Paths (3:47)
History of Cyber Security (2:40)
Let's Have Some Fun (+ Free Resources)
Cyber Security Basic Theory & Goals
Goals Of Cyber Security (4:58)
Blue Team vs Red Team (3:06)
Protecting Assets (3:09)
How Companies Get Compromised (7:00)
Different Securities (6:44)
Unlimited Updates
Understanding Hackers - The Biggest Threat
Who Are Hackers (6:41)
Most Common Attacks Demonstration (10:48)
Malware (6:07)
Can We Catch Them? (5:14)
Security Bugs & Vulnerabilities
What is a Vulnerability (5:26)
Most Common Vulnerabilities (7:05)
Unpatched Machine Exploitation Demonstration (8:42)
Preventing Vulnerabilities (4:47)
Resources for Buffer Overflows (6:16)
Buffer Overflow Demonstration (22:40)
Course Check-In
Social Engineering Basics
Social Engineering Attacks (4:23)
How To Recognize Phishing Emails (6:55)
Tools For Analyzing Phishing Attacks (9:38)
Summary Of Social Engineering (1:24)
Implement a New Life System
End-Point Protection
End-Point Protection Introduction (2:00)
Browser Security (3:27)
Firefox Security and Hardening (10:20)
Brave Browser Security and Privacy (10:23)
Safari and Chrome Security Resources (2:54)
Antivirus Theory (6:35)
Default Windows Security (5:28)
MacOS XProtect and MRT (4:31)
Bitdefender, Kaspersky, McAfee, Malwarebytes (8:42)
Password Security and Password Managers (13:18)
Keepass (11:11)
LastPass, NordPass, and 1Password (2:28)
File and Disk Encryption (3:53)
Process Explorer (7:48)
Netstat and Wireshark (6:50)
Htop (4:07)
Rootkit Hunter (6:33)
Host Based Firewalls (2:43)
Iptables (12:37)
Windows Defender Firewall (4:33)
Macos Firewall (2:32)
How To Securely Erase Files on Windows Linux Macos (3:09)
End-Point Security Recap (4:31)
Network Security
Network Security Introduction (4:01)
Network Firewalls Theory (4:11)
Different Network Firewalls (4:18)
Network Scanning and Discovering Vulnerabilities (3:37)
Network Security With Nmap (28:23)
Discovering Vulnerabilities With Nessus (14:56)
Scanning Windows 7 Machine With Nessus (4:13)
Routersploit (6:25)
Router Default Credentials (7:02)
Secure Network Architecture (10:09)
Wireless Security (9:21)
Wireless Attack Demonstration (18:24)
Network Monitoring With TCPDump (11:06)
Common Network Attacks (5:45)
Cyber Security Strategies
Protect and Recover Strategy (3:49)
Endpoint Protection Strategy (3:59)
Application Centric Strategy (3:32)
Identity Centric Strategy (3:55)
Data Centric Strategy (3:34)
Attack Centric Strategy (3:12)
How We Are Tracked
IP Tracking (4:00)
Cookies and Browser Tracking (5:33)
Exercise: Imposter Syndrome (2:55)
Different Types of Tracking (2:43)
Anonymity & Privacy
Anonymity Theory (4:21)
Tor Browser (8:25)
Proxychains With Different Tools (7:05)
Installing VPN for Kali (5:44)
Whoami Anonymity Tool (8:31)
Steps to be as Anonymous as Possible (3:55)
Appendix: Ethical Hacking
5 Stages Of A Penetration Test (7:35)
Obtaining IP Address, Physical Address Using Whois Tool (9:57)
Whatweb Stealthy Scan (8:21)
Gathering Emails Using theHarvester & Hunter.io (9:59)
Theory Behind Scanning (7:19)
TCP & UDP (4:21)
Netdiscover (6:01)
What is Exploitation? (7:08)
Reverse Shells, Bind Shells (2:42)
Msfconsole Basic Commands (16:53)
Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
Software Vulnerability - Samba Exploitation (9:22)
Generating Basic Payload With Msfvenom (11:30)
Advance Msfvenom Usage (9:48)
Post Exploitation Theory (4:26)
Meterpreter Basic Commands Part 1 (11:03)
Meterpreter Basic Commands Part 2 (10:21)
Where To Go From Here?
Thank You! (1:17)
Review This Course!
Become An Alumni
Learning Guideline
ZTM Events Every Month
LinkedIn Endorsements
Network Security Introduction
This lecture is available exclusively for ZTM Academy members.
If you're already a member,
you'll need to login
.
Join ZTM To Unlock All Lectures