Video description
Cybersecurity is the protection of computers and networks from information disclosure, theft, or damage to hardware and software, and the disruption or misdirection of the services provided. It is a practice of protecting systems, networks, and programs from digital attacks.
The course begins with an overview of the core key principles of cybersecurity, including access control and the CIA triad. Learn about virtualization and installing the Kali Linux operating system on your computer using a virtual box. Next, we will understand how phishing is used by hackers to collect private information by cloning a website ourselves using the blackeye tool. You will further learn about the key networking principles, including DNS, DHCP, NAT, ports, and protocols, and use the most potent network scanning tool—NMAP.
Next, learn about hashing using PowerShell and hashcat and how to perform brute force attacks. Delve deep into all about websites, web applications, and databases. Explore the OWASP top 10 and use Burp Suite to scan, crawl, and audit websites. Understand social engineering and learn to use Maltego to gather information about a person or company. Finally, understand data management, incident response, and disaster recovery plans.
Upon completion, you will have gathered comprehensive knowledge about cybersecurity to consider building a lucrative career in this field.
What You Will Learn
- Learn to work with the Kali Linux operating system
- Learn to use the NMAP network scanner
- Understand how to create a cloned LinkedIn website
- Explore hacking and hacking methodologies
- Develop a strong foundation in networking principles and technologies
- Learn how to calculate hash values with PowerShell
Audience
This course is designed for non-professionals and students with a fundamental knowledge of cyber security. Individuals who want to learn practical techniques to protect privacy online and acquire a deeper understanding of cyber security. This course is not for absolute beginners. You do not need a background in cyber security, though any prior knowledge would be beneficial.
About The Author
Alexander Oni: Alexander Oni is a bestselling instructor with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for three years and has created over 25 courses with numerous students registered worldwide.
Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His success in Udemy has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city and moving to the next. His hobbies include watching movies, sports, and chess.
Table of contents
- Chapter 1 : Introduction to the Course
- Chapter 2 : Cyber Security Principles
- Chapter 3 : Threats and Attacks Revisited
- Chapter 4 : Virtualization and Kali Linux
- Chapter 5 : Phishing
- Chapter 6 : Network Security
- Chapter 7 : NMAP - The Ultimate Network Scanner
- Chapter 8 : Passwords, Hashes and Brute Force Attacks
-
Chapter 9 : Websites and Web Security
- Section Preview
- How a Website Works
- HTML, CSS, JavaScript and PHP
- Inspecting and Manipulating Website Code
- Cookies Revisited
- OWASP Top 10
- Understanding Databases and SQL
- Web Attack - SQL Injection
- Web Attack – Cross-Site Scripting
- Introduction to Burp Suite
- Setting Up Burp Suite with Foxy Proxy
- Crawling, Auditing, and Generating Reports with Burp Suite
- Section Review
- Chapter 10 : Reconnaissance
- Chapter 11 : Cyber Management, Incident Response and Auditing
- Chapter 12 : Conclusion
Product information
- Title: Practical Cyber Hacking Skills for Beginners
- Author(s):
- Release date: December 2022
- Publisher(s): Packt Publishing
- ISBN: 9781837636181
You might also like
book
Hacking For Dummies, 7th Edition
Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, …
book
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition
Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource …
video
Web Hacking Secrets: How to Hack Legally and Earn Thousands of Dollars at HackerOne
HackerOne is your big opportunity. This is the platform where you can hack legally and at …
book
Hands on Hacking
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the …