Example Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- End-Point Protection Introduction (2:00)
- Browser Security (3:27)
- Firefox Security and Hardening (10:20)
- Brave Browser Security and Privacy (10:23)
- Safari and Chrome Security Resources (2:54)
- Antivirus Theory (6:35)
- Default Windows Security (5:28)
- MacOS XProtect and MRT (4:31)
- Bitdefender, Kaspersky, McAfee, Malwarebytes (8:42)
- Password Security and Password Managers (13:18)
- Keepass (11:11)
- LastPass, NordPass, and 1Password (2:28)
- File and Disk Encryption (3:53)
- Process Explorer (7:48)
- Netstat and Wireshark (6:50)
- Htop (4:07)
- Rootkit Hunter (6:33)
- Host Based Firewalls (2:43)
- Iptables (12:37)
- Windows Defender Firewall (4:33)
- Macos Firewall (2:32)
- How To Securely Erase Files on Windows Linux Macos (3:09)
- End-Point Security Recap (4:31)
Available in
days
days
after you enroll
- Network Security Introduction (4:01)
- Network Firewalls Theory (4:11)
- Different Network Firewalls (4:18)
- Network Scanning and Discovering Vulnerabilities (3:37)
- Network Security With Nmap (28:23)
- Discovering Vulnerabilities With Nessus (14:56)
- Scanning Windows 7 Machine With Nessus (4:13)
- Routersploit (6:25)
- Router Default Credentials (7:02)
- Secure Network Architecture (10:09)
- Wireless Security (9:21)
- Wireless Attack Demonstration (18:24)
- Network Monitoring With TCPDump (11:06)
- Common Network Attacks (5:45)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 5 Stages Of A Penetration Test (7:35)
- Obtaining IP Address, Physical Address Using Whois Tool (9:57)
- Whatweb Stealthy Scan (8:21)
- Gathering Emails Using theHarvester & Hunter.io (9:59)
- Theory Behind Scanning (7:19)
- TCP & UDP (4:21)
- Netdiscover (6:01)
- What is Exploitation? (7:08)
- Reverse Shells, Bind Shells (2:42)
- Msfconsole Basic Commands (16:53)
- Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
- Software Vulnerability - Samba Exploitation (9:22)
- Generating Basic Payload With Msfvenom (11:30)
- Advance Msfvenom Usage (9:48)
- Post Exploitation Theory (4:26)
- Meterpreter Basic Commands Part 1 (11:03)
- Meterpreter Basic Commands Part 2 (10:21)
Available in
days
days
after you enroll