Inplant Training Cyber Security
Requirements
- Students enrolling for this course need basic knowledge of OS like Windows , Linux , Mac OS etc.
- Students enrolling for this course need basic knowledge of Networking and technologies , protocols, ports , services
What I will learn?
- Fundamentals of Networking
- Types of Networks
- OSI Model and its work
- TCP/IP Protocol suit and its function
- Port and common port numbers
- DHCP - Dynamic Host Configuration Protocol
- DNS - Domain Name System and its working
- Firewall and how it secure the network
- IDS/IPS security devices
- DMZ - Demilitarized Zone and its concept and function
- Proxy server and VPN Server
- Introduction of IPv4 and IPv6
- Ethical hacking and types of hackers
- Phases of ethical hacking
- Common types of attacks - malware attack , phishing, Man-in-the-Middle, DOS , Password Attack and more
- computer security and keylogger
- Password attack and encryption
Course Curriculum
Network Fundamentals
-
Types of Networks – LAN, WAN, PAN, CAN, MAN, SAN, WLAN
04:43
Introduction To OSI Model
-
What is OSI Model and how it works ?
04:26
TCP / IP Protocol Suit
-
Understand TCP / IP Protocol Suit and working of its protocols ?
13:00
Port and common Port Numbers
-
What is Port and common Port Numbers ?
07:20
DHCP and its process
-
What is DHCP and how it’s work ?
09:55
DNS Server – Domain Name System
-
What is DNS – Domain Name System and how it works ?
06:00
Firewall – Network Security Device
-
What is Firewall – Network Security Device and how it works ?
06:40
IDS / IPS – Network Security Device.
-
What is IDS / IPS – Network Security Device and how it secure network ?
01:00
DMZ – Demilitarized zone
-
What is DMZ – Demilitarized zone
06:15
Proxy and VPN Server
-
What is a Proxy and VPN Server
04:15
Introduction of IPv4 and IPv6
-
Introduction of IPv4 and IPv6 and difference between both
09:15
What is Ethical hacking ?
Phases of ethical hacking
-
5 Phases of ethical hacking
03:11
Common types of attacks
-
Various Common types of attacks
02:23
Certification and knowledge
-
Certification and required knowledge
04:12
Cyber Security Agenda
-
cyber security agenda, common types of attacks/threats, how the threats are works and how to protect your self
01:34
Cyber security agenda – 1) Malware Attack
-
What is Malware Attack?
02:37
Cyber Security agenda – 2) Phishing Attack
-
What is Phishing Attack?
05:50
Cyber security agenda – 3 )Password Attack
-
What is Password Attack ?
03:06
Cyber security agenda – 4 ) DDOS Attack
-
What is DDOS Attack ?
01:56
Cyber security agenda – 5 ) MITM Attack
-
What is MITM Attack ?
02:02
Cyber security agenda – 6) Drive By Downloads Attack
-
What is Drive By Downloads Attack ?
02:04
Cyber security agenda – 7) Malvertising Attack
-
What is Malvertising Attack ?
01:55
Cyber security agenda – 8) Rouge Software Attack
-
What is Rouge Software Attack ?
02:00
Terminologies related to networking
-
Cyber security Terminologies related to networking
06:41
Computer security with key logger demo
-
What is Computer security with key logger demo and explain all types of attacks
18:10
Password strength & encryption
-
What to secure motive behind attacks how to secure with pass strength & encryption demo
26:33
Introduction of Kali Linux
-
Introduction , History Features and overview of Kali Linux
08:48
Final Quiz
-
Final Quiz
Project Report
-
Inplant Training Project Report
00:00
Student Ratings & Reviews
5.0
Total 4 Ratings
5
6 Ratings
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
Training orient and well drafted lessons and easy to understanding explanations using animated lectures
Enjoy this course and really very useful topics
Good content and well drafted course
Course is very interactive and easy to understand.
Free
Free access this course
-
LevelAll Levels
-
Total Enrolled22
-
Duration2 hours 45 minutes
-
Last UpdatedMay 31, 2023
Hi, Welcome back!
A Course by
S
Material Includes
- Footprinting a website using Who is Lookup, IP lookup,
- Gathering information about Domain through DNS lookup
- Email Footprinting using online email tracker services
- DNS Footprinting using DNS Interrogation Tools
- Phishing attack lab using Phishing Tools on kali Linux
- Phishing attack lab creating facebook phishing page and deploy on local host and access it over the internet
- Key logger Demo lab using Key logger tool
Target Audience
- Degree Diploma students who have pursing Computer engineering , Electronics , Electronics And Tele Communication can enrolled for this course
- Any one who Interested and loving to learn Cyber Security can enrolled to this course