Course curriculum
-
1
Cyber/Network Security_E-Learning Content
-
Chapter - 1 Basic Network Security Components - 1
-
Basic Network Security Components - 2
-
Basic Network Security Components - 3
-
Introduction to Network Security
-
Network Security Goals
-
Security Mechanisms
-
Security Attacks
-
Chapter - 2 Cloud Computing Deployment Model
-
Cloud Computing - Taxonomy of Fear
-
Cloud Computing Security and Privacy Issues Identified By CSA - 1
-
Cloud Computing Security and Privacy Issues Identified By CSA - 2
-
Cloud Computing Security and Privacy Issues Identified By CSA - 3
-
Cloud Computing - Threat Model
-
Cloud Service Models_IaaS
-
Cloud Service Models_PaaS
-
Cloud Service Models_SaaS
-
Chapter - 3 Introduction to Block Chain Technology
-
Introduction to Cloud Computing
-
Privacy and Its Key Concerns - 1
-
Privacy and Its Key Concerns - 2
-
Security and Privacy Issues_Data Security
-
Security and Privacy Issues_Infrastructure Security
-
Block Chain Cyber Attacks and Security Tips
-
Introduction to Block Chain Technology
-
Introduction to IoT
-
IoT Security Threats and Security Challenges - 1
-
IoT Security Threats and Security Challenges - 2
-
Chapter - 4 Network Forensics - Introduction
-
Network Forensics - Analysis - 1
-
Network Forensics - Analysis - 2
-
Network Forensics - Case Study
-
Network Forensics - Detection 1
-
Network Forensics - Detection 2
-
Network Forensics - Host Based Sources for Analysis 1
-
Network Forensics - Host Based Sources for Analysis 2
-
Network Forensics - Logging & Monitoring
-
Network Forensics - Monitoring Policy
-
Network Forensics - Monitoring Targets
-
Network Forensics - Network Based Sources
-
Network Forensics - Network Sources for Evidence Collection
-
Network Forensics - NIDS_NIPS
-
Network Forensics - OSCAR Framework
-
Network Forensics - Threat Intelligence
-
Network Forensics - Timeline Analysis
-
Network Forensics-Types of Network Based Evidence
-
Chapter - 5 Introduction - SSL_TLS
-
Types of SSL_TLS Certificates
-
SSL_TLS Certificates
-
SSL_TLS - Basic Terminology
-
Introduction - SET
-
SET - Payment Process
-
Key Technologies of SET
-
TLS Handshake
-
Supported Transactions - Purchase Request
-
Introduction - Email Security
-
Email Security - SMIME
-
Email Security - PGp
-
Dual Signature Operation
-
Chapter - 6 X.509 Certificates - Introduction
-
X.509 Certificates - Hierarchy - Revocation
-
Various Digital Signatures
-
Key Distribution & Management - Introduction
-
Key Distribution & Management - Symmetric Key Distribution Using Public Keys
-
Key Distribution & Management - Public Keys Distribution
-
Key Distribution & Management - 4
-
Hash Functions - Introduction
-
Hash Functions - Cryptanalysis
-
Digital Signatures - Introduction
-
Attacks on Hash Functions
-
Asymmetric Key Cryptography
-
Chapter - 7 History - UNIX to Kali Linux
-
About Kali Linux - Tasks & Features
-
Installation - Kali Linux into Virtual Machine
-
Installation - Kali Linux on Hard Drive
-
Kali Linux - Managing Users & Groups
-
Kali Linux - Configuring Network
-
Kali Linux Fundamentals - 1
-
Kali Linux Fundamentals - 2
-
Kali Linux Fundamentals - 3
-
Kali Linux Fundamentals - 4
-
Kali Linux Fundamentals - 4_PART - 1
-
Kali Linux - Iptables
-
Kali Linux - Netfilter Firewall Framework
-
Kali Linux - Firewall Builder
-
Chapter - 8 Kali Linux - Logging & Monitoring
-
Kali Linux - Tools to Detect Changes
-
Chapter - 9 Introduction to Security Assessments
-
Formalization & Types of Attacks
-
Traditional Penetration Test & Application Assessment
-
Vulnerabilities & Exploits
-
Vulnerability Assessment - 1
-
Vulnerability Assessment - 2
-
-
2
Recordings of Live Classes
-
Cyber Security_Ethical Hacking 1st Live Session
-
Cyber Security_Ethical Hacking 2nd Live Session
-
Cyber Security_Ethical Hacking 3rd Live Session
-
Cyber Security_Ethical Hacking 4th Live Session
-
Cyber Security_Ethical Hacking 5th Live Session
-
Cyber Security_Ethical Hacking 6th Live Session
-
Cyber Security_Ethical Hacking 7th Live Session
-
Cyber Security_Ethical Hacking 8th Live Session
-
Cyber Security_Ethical Hacking 9th Live Session
-
Cyber Security_Ethical Hacking 10th Live Session
-
Cyber Security_Ethical Hacking 11th Live Session
-
Cyber Security_Ethical Hacking 12th Live Session
-
Cyber Security_Ethical Hacking 13th Live Session
-
Cyber Security_Ethical Hacking 14th Live Session
-
Cyber Security_Ethical Hacking 15th Live Session
-
Cyber Security_Ethical Hacking 16th Live Session
-
Cyber Security_Ethical Hacking 17th Live Session
-
-
3
Recordings of Project Live Classes
-
Execution of 1st Project
-
Execution of 2nd Project
-
Execution of 3rd Project
-
-
4
Project Submissions
-
Instructions for Submissions
-
-
5
Internship Project 1 - System Hacking from TALAKUNCHI NETWORKS
-
Project Challenges
-
Challenge 1 - Hydra
-
Challenge 2 - Auxiliary
-
Challenge 3 - NSE
-
Challenge 4 - John
-
Challenge 5 - Crunch
-
-
6
Internship Project 2 - Exploiting Server Vulnerabilities from TALAKUNCHI NETWORKS
-
Project Challenges
-
Challenge 1 - SMTP_open_relay
-
Challenge 2 - Zone_Transfers
-
Challenge 3 - Netbios
-
Challenge 4 - Sniffing
-
Challenge 5 - DoS
-
-
7
Recordings of Internship Project Live Classes
-
Execution of Internship Project 1 - System Hacking
-
Execution of Internship Project 2 - Exploiting Server Vulnerabilities
-
Instructions for Internship Project Submission
-