Example Curriculum
Introduction
Available in
days
days
after you enroll
Introduction To Cyber Security
Available in
days
days
after you enroll
Cyber Security Basic Theory & Goals
Available in
days
days
after you enroll
Understanding Hackers - The Biggest Threat
Available in
days
days
after you enroll
Security Bugs & Vulnerabilities
Available in
days
days
after you enroll
Social Engineering Basics
Available in
days
days
after you enroll
End-Point Protection
Available in
days
days
after you enroll
- End-Point Protection Introduction (2:00)
- Browser Security (3:27)
- Firefox Security and Hardening (10:20)
- Brave Browser Security and Privacy (10:23)
- Safari and Chrome Security Resources (2:54)
- Antivirus Theory (6:35)
- Default Windows Security (5:28)
- MacOS XProtect and MRT (4:31)
- Bitdefender, Kaspersky, McAfee, Malwarebytes (8:42)
- Password Security and Password Managers (13:18)
- Keepass (11:11)
- LastPass, NordPass, and 1Password (2:28)
- File and Disk Encryption (3:53)
- Process Explorer (7:48)
- Netstat and Wireshark (6:50)
- Htop (4:07)
- Rootkit Hunter (6:33)
- Host Based Firewalls (2:43)
- Iptables (12:37)
- Windows Defender Firewall (4:33)
- Macos Firewall (2:32)
- How To Securely Erase Files on Windows Linux Macos (3:09)
- End-Point Security Recap (4:31)
Network Security
Available in
days
days
after you enroll
- Network Security Introduction (4:01)
- Network Firewalls Theory (4:11)
- Different Network Firewalls (4:18)
- Network Scanning and Discovering Vulnerabilities (3:37)
- Network Security With Nmap (28:23)
- Discovering Vulnerabilities With Nessus (14:56)
- Scanning Windows 7 Machine With Nessus (4:13)
- Routersploit (6:25)
- Router Default Credentials (7:02)
- Secure Network Architecture (10:09)
- Wireless Security (9:21)
- Wireless Attack Demonstration (18:24)
- Network Monitoring With TCPDump (11:06)
- Common Network Attacks (5:45)
Cyber Security Strategies
Available in
days
days
after you enroll
How We Are Tracked
Available in
days
days
after you enroll
Anonymity & Privacy
Available in
days
days
after you enroll
Appendix: Ethical Hacking
Available in
days
days
after you enroll
- 5 Stages Of A Penetration Test (7:35)
- Obtaining IP Address, Physical Address Using Whois Tool (9:57)
- Whatweb Stealthy Scan (8:21)
- Gathering Emails Using theHarvester & Hunter.io (9:59)
- Theory Behind Scanning (7:19)
- TCP & UDP (4:21)
- Netdiscover (6:01)
- What is Exploitation? (7:08)
- Reverse Shells, Bind Shells (2:42)
- Msfconsole Basic Commands (16:53)
- Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
- Software Vulnerability - Samba Exploitation (9:22)
- Generating Basic Payload With Msfvenom (11:30)
- Advance Msfvenom Usage (9:48)
- Post Exploitation Theory (4:26)
- Meterpreter Basic Commands Part 1 (11:03)
- Meterpreter Basic Commands Part 2 (10:21)
Where To Go From Here?
Available in
days
days
after you enroll