Course curriculum

    1. Welcome to Your Course!

    2. Connect With Us

    3. Central InfoSec Cyber Security Courses

    1. Your Lab Environment

    2. VMware & Virtual Box

    3. Vulnerable VMs for Hacking

    4. Lab Setup - Metasploitable 2

    1. Cybersecurity 101 Overview

    2. Introduction to Cybersecurity

    3. CIA Triad

    4. Understanding Cybersecurity Fundamentals

    5. Areas of Cybersecurity

    6. Cybersecurity Teams

    7. Red vs Blue vs Purple

    8. Cybersecurity Roles

    9. Cybersecurity Career Paths

    10. 5 Year Cybersecurity Career Roadmap

    11. Ethical Hacking & Penetration Testing

    12. Threat Actors

    13. Threat Landscape

    14. Hacker Hats

    15. Threats, Risks, Attacks, & Vulnerabilities

    16. NIST & NVD

    17. MITRE ATT&CK & CVE

    18. CVSS

    19. OWASP

    20. Cyber Security Control Frameworks

    21. Secure Design Principles

    22. Configuration Management

    23. Change Management

    24. Data Integrity Using Hashing

    25. Identity & Access Management

    26. Vulnerability & Patch Management

    27. Risk Assessment & Management

    28. Business Continuity

    29. Security Technologies

    30. Data Security

    31. Network Security

    32. Cloud Security

    33. Web Security

    34. Email Security

    35. Social Engineering & Human Factor

    36. Cybersecurity Awareness

    37. Incident Response and Management

    38. Legal & Ethical Aspects of Cybersecurity

    39. Compliance Automation Tool

    40. Tradecraft, Cryptography & Steganography

    41. OSINT Open-Source Intelligence

    42. Google Hacking

    43. Google Hacking Database (GHDB)

    44. Password Hacking

    45. Breached Passwords

    46. Basic Cybersecurity Best Practices

    47. Emerging Technologies & Future Trends

    48. Cybersecurity CTFs

    49. Key Takeaways

    1. Ethical Hacking, Penetration Testing Methodology, & Tradecraft 101 Overview

    2. Legal Concerns

    3. Compliance

    4. Vulnerabilities, Exploits, Payloads, Shellcode, & Shells

    5. Penetration Testing Introduction

    6. Penetration Testing Methodology - Overview

    7. Penetration Testing Methodology - Pre-Engagement Interactions

    8. Penetration Testing Methodology - Intelligence Gathering

    9. Penetration Testing Methodology - Threat Modeling

    10. Penetration Testing Methodology - Vulnerability Analysis

    11. Penetration Testing Methodology - Exploitation

    12. Penetration Testing Methodology - Post Exploitation

    13. Penetration Testing Methodology - Reporting

    14. Tradecraft

    15. Cryptography

    16. Steganography

    17. Key Takeaways

    1. Google Hacking, OSINT, & Reconnaissance 101 Overview

    2. Open-Source Intelligence (OSINT)

    3. OSINT Framework & theHarvester

    4. OSINT with ReconSpider, Recon-ng, Wayback Machine, & Data Leaks

    5. IP Address, CIDR, AS, & ASN OSINT

    6. Domain OSINT

    7. Domain Enumeration

    8. Subdomain OSINT

    9. Website OSINT & Backlinks

    10. Website Technology Profiling

    11. Image OSINT

    12. Metadata OSINT

    13. Email Address OSINT

    14. Username OSINT

    15. Social Media OSINT

    16. Phone Number OSINT

    17. Address & Voter Records OSINT

    18. Vehicle & Insurance OSINT

    19. Breached Passwords OSINT

    20. Google Hacking

    21. Google Hacking Database (GHDB)

    22. OSINT for Social Engineering

    23. Key Takeaways

    1. Nmap 101 Overview

    2. Nmap Introduction

    3. Installing Nmap on Windows

    4. Installing Nmap on Linux

    5. Default Scan Settings

    6. Running Nmap

    7. Nmap Version & Help

    8. Understanding Port Statuses

    9. Host Discovery

    10. DNS Resolution

    11. Listing IP Addresses in a Subnet

    12. Scanning a Single Host

    13. Scanning Multiple Hosts

    14. Scanning a Single Port

    15. Scanning Multiple Ports

    16. Scanning in Fast Mode

    17. Scanning Top Ports

    18. Scanning All Ports

    19. Scanning Ports in Sequential Order

    20. Displaying Open Ports

    21. Service Version Detection

    22. Operating System Detection

    23. Traceroute

    24. Default Script Scans

    25. OS, Version, Scripts, & Traceroute

    26. Key Takeaways

About this course

  • $49.00
  • 339 lessons
  • 9.5 hours of video content