-
10. Layers of OSI Model.
07:58
-
11. Introduction to TCPIP Model.
09:51
-
12. OSI Model vs TCPIP Model.
04:13
-
14. Addressing in Computer Networks.
08:30
-
15. IP Address- IPv4 and IPv6.
06:37
-
16. Introduction to Classes of IP Addressing.
03:43
-
17. Classes of IP Address.
10:01
-
18. PRACTICAL HOW TO FIND OUT YOUR PC’s IP ADDRESS.
03:23
-
19. PRACTICAL HOW TO FIND OUT YOUR PC’S MAC ADDRESS.
04:53
-
2. What is Computer Networking – Definition and Characteristics.
02:50
-
20. The Internet Protocol (IP).
06:31
-
22. Address Resolution Protocol (ARP).
08:47
-
24. Dynamic Host Configuration Protocol (DHCP).
07:48
-
25. Internet Control Message Protocol (ICMP).
06:16
-
26. RIP and OSPF Protocols.
05:32
-
27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.
02:41
-
28. What are Sockets.
05:07
-
29. File Transfer Protocol (FTP).
03:17
-
29. File Transfer Protocol (FTP).
06:09
-
30. Hypertext Transfer Protocol (HTTP).
00:00
-
31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).
05:23
-
32. Domain Name System (DNS).
03:05
-
34. Conclusion.
00:37
-
4. Meet the instructors!.
00:21
-
5. History and Applications of Computer Networking.
05:51
-
7. Protocols and Standards.
04:21
-
9. Introduction to OSI Model.
03:49
-
1. Definition of Computer Security.
03:04
-
2. Interesting Facts about Cyber Security.
05:23
-
3. Have a look at this!.
00:34
-
4. History of Cyber Security.
06:54
-
5. Scope and Career Insights in Cyber Security.
08:10
-
8. Conclusion.
00:31
-
1. Introduction.
01:10
-
12. Conclusion.
00:39
-
2. Standard Definition of Cyber Security.
02:37
-
3. Types of Computer Security.
02:39
-
4. Key Terms in Cyber Security
00:00
-
5. The Elements of Information Security.
05:56
-
6. Types of Attacks.
10:22
-
7. Roles in Cyber Security Part 1.
08:12
-
8. Roles in Cyber Security Part 2.
05:40
-
9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.
05:02
-
1. Introduction.
01:19
-
10. Symmetric Encryption.
00:00
-
11. AES and DES.
06:04
-
12. Asymmetric Encryption.
02:48
-
14. RSA & Diffie Hellman.
07:02
-
15. Hashing.
07:03
-
16. Security Organizations.
05:02
-
17. Critical Thinking in Cyber Security.
03:36
-
18. The Five Critical Thinking Skills.
05:40
-
19. PRACTICAL USING NSLOOKUP TOOL.
02:51
-
2. Security Architect’s View of Security.
08:09
-
20. PRACTICAL USING NETSTAT TOOL
03:57
-
22. Conclusion.
00:30
-
3. What is Vulnerability Assessment.
04:34
-
4. 4 Phases of Vulnerability Assessment.
08:35
-
5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.
01:28
-
6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.
05:35
-
7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.
03:23
-
8. PRACTICAL GOING THROUGH SCANNED RESULTS.
02:58
-
9. Introduction to Cryptography.
04:42
-
1. Introduction.
00:52
-
10. OH MY GOD! VIRUS!!.
07:03
-
11. Types of Virus.
10:12
-
12. You should defend yourself!.
07:27
-
13. Have you ever heard about a Ransomware.
00:00
-
15. PRACTICAL INFORMATION GATHERING USING SHODAN.
08:50
-
16. The Cyber Kill Chain.
08:35
-
17. Introduction to Social Engineering.
04:45
-
18. Types of Social Engineering.
05:48
-
19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.
09:52
-
2. Different types of Actors in Cyber Security.
09:47
-
21. Conclusion.
00:36
-
3. Types of Cyber Attacks.
04:03
-
4. Hacking Organizations around the Globe.
04:53
-
5. Security Services and Mechanisms.
03:15
-
6. Introduction to Threats
03:11
-
7. What is a Malware.
08:45
-
8. Everything about Trojans.
00:00
-
9. Types of Trojans.
08:06
-
1. Introduction.
01:09
-
10. The NIST Framework.
03:21
-
11. The COBIT Framework.
03:46
-
12. Other Security Frameworks.
04:32
-
15. Conclusion.
00:38
-
2. Confidentiality – The Most Important Element of Security.
04:13
-
3. Integrity, Authentication, Access Control and Non-Repudiation.
88:24
-
4. Introduction to Incident Response Team.
00:00
-
5. Phases of Incident Response
05:04
-
6. Laws in Cyber Security.
05:16
-
7. What are Audits in Cyber Security.
00:00
-
8. Internal Audit vs External Audit.
04:19
-
9. How to carry out an Internal Audit.
00:00
-
1. Introduction.
01:06
-
10. Firewalls vs Antivirus.
01:39
-
12. CONGRATULATIONS!.
01:41
-
2. Intrusion Detection System.
11:03
-
3. Introduction to Firewalls.
09:34
-
4. IDS evasion techniques.
07:54
-
5. What is DMZ.
06:17
-
6. Firewall evasion techniques.
08:44
-
7. Different types of Firewalls.
08:59
-
8. The Antivirus!.
03:03
-
9. Antivirus Detection Techniques.
09:26