Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Complete Cybersecurity Bootcamp: Zero to Mastery
Introduction
Cybersecurity Bootcamp: Zero to Mastery (2:30)
Exercise: Meet Your Classmates and Instructor
Course Resources
ZTM Plugin + Understanding Your Video Player
Set Your Learning Streak Goal
Introduction To Cyber Security
What is Cyber Security (6:58)
Cyber Security Prerequisites (6:23)
Most Common Cyber Security Paths (3:47)
History of Cyber Security (2:40)
Let's Have Some Fun (+ Free Resources)
Cyber Security Basic Theory & Goals
Goals Of Cyber Security (4:58)
Blue Team vs Red Team (3:06)
Protecting Assets (3:09)
How Companies Get Compromised (7:00)
Different Securities (6:44)
Unlimited Updates
Understanding Hackers - The Biggest Threat
Who Are Hackers (6:41)
Most Common Attacks Demonstration (10:48)
Malware (6:07)
Can We Catch Them? (5:14)
Security Bugs & Vulnerabilities
What is a Vulnerability (5:26)
Most Common Vulnerabilities (7:05)
Unpatched Machine Exploitation Demonstration (8:42)
Preventing Vulnerabilities (4:47)
Resources for Buffer Overflows (6:16)
Buffer Overflow Demonstration (22:40)
Course Check-In
Social Engineering Basics
Social Engineering Attacks (4:23)
How To Recognize Phishing Emails (6:55)
Tools For Analyzing Phishing Attacks (9:38)
Summary Of Social Engineering (1:24)
Implement a New Life System
End-Point Protection
End-Point Protection Introduction (2:00)
Browser Security (3:27)
Firefox Security and Hardening (10:20)
Brave Browser Security and Privacy (10:23)
Safari and Chrome Security Resources (2:54)
Antivirus Theory (6:35)
Default Windows Security (5:28)
MacOS XProtect and MRT (4:31)
Bitdefender, Kaspersky, McAfee, Malwarebytes (8:42)
Password Security and Password Managers (13:18)
Keepass (11:11)
LastPass, NordPass, and 1Password (2:28)
File and Disk Encryption (3:53)
Process Explorer (7:48)
Netstat and Wireshark (6:50)
Htop (4:07)
Rootkit Hunter (6:33)
Host Based Firewalls (2:43)
Iptables (12:37)
Windows Defender Firewall (4:33)
Macos Firewall (2:32)
How To Securely Erase Files on Windows Linux Macos (3:09)
End-Point Security Recap (4:31)
Network Security
Network Security Introduction (4:01)
Network Firewalls Theory (4:11)
Different Network Firewalls (4:18)
Network Scanning and Discovering Vulnerabilities (3:37)
Network Security With Nmap (28:23)
Discovering Vulnerabilities With Nessus (14:56)
Scanning Windows 7 Machine With Nessus (4:13)
Routersploit (6:25)
Router Default Credentials (7:02)
Secure Network Architecture (10:09)
Wireless Security (9:21)
Wireless Attack Demonstration (18:24)
Network Monitoring With TCPDump (11:06)
Common Network Attacks (5:45)
Cyber Security Strategies
Protect and Recover Strategy (3:49)
Endpoint Protection Strategy (3:59)
Application Centric Strategy (3:32)
Identity Centric Strategy (3:55)
Data Centric Strategy (3:34)
Attack Centric Strategy (3:12)
How We Are Tracked
IP Tracking (4:00)
Cookies and Browser Tracking (5:33)
Exercise: Imposter Syndrome (2:55)
Different Types of Tracking (2:43)
Anonymity & Privacy
Anonymity Theory (4:21)
Tor Browser (8:25)
Proxychains With Different Tools (7:05)
Installing VPN for Kali (5:44)
Whoami Anonymity Tool (8:31)
Steps to be as Anonymous as Possible (3:55)
Appendix: Ethical Hacking
5 Stages Of A Penetration Test (7:35)
Obtaining IP Address, Physical Address Using Whois Tool (9:57)
Whatweb Stealthy Scan (8:21)
Gathering Emails Using theHarvester & Hunter.io (9:59)
Theory Behind Scanning (7:19)
TCP & UDP (4:21)
Netdiscover (6:01)
What is Exploitation? (7:08)
Reverse Shells, Bind Shells (2:42)
Msfconsole Basic Commands (16:53)
Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
Software Vulnerability - Samba Exploitation (9:22)
Generating Basic Payload With Msfvenom (11:30)
Advance Msfvenom Usage (9:48)
Post Exploitation Theory (4:26)
Meterpreter Basic Commands Part 1 (11:03)
Meterpreter Basic Commands Part 2 (10:21)
Where To Go From Here?
Thank You! (1:17)
Review This Course!
Become An Alumni
Learning Guideline
ZTM Events Every Month
LinkedIn Endorsements
Network Scanning and Discovering Vulnerabilities
This lecture is available exclusively for ZTM Academy members.
If you're already a member,
you'll need to login
.
Join ZTM To Unlock All Lectures