Course programme
Introduction
7 lectures 23:29
1. Welcome to Volume 2
Welcome to the course. This is Volume 2 of Complete Cyber Security Course.
2. Introduction to the Instructor!
Introduction to your instructor on this course.
3. Security Quick Win!
How to achieve a quick security win!
4. Target Audience
Who is the target audience for this course?
5. Study Recommendations
Study recommendations.
6. The Forum - For Questions, Answers and Other Resources
The support forum - for questions, answers and other resources.
7. Course updates
Course updates.
Introduction
7 lectures 23:29
1. Welcome to Volume 2
Welcome to the course. This is Volume 2 of Complete Cyber Security Course.
2. Introduction to the Instructor!
Introduction to your instructor on this course.
3. Security Quick Win!
How to achieve a quick security win!
4. Target Audience
Who is the target audience for this course?
5. Study Recommendations
Study recommendations.
6. The Forum - For Questions, Answers and Other Resources
The support forum - for questions, answers and other resources.
7. Course updates
Course updates.
1. Welcome to Volume 2
Welcome to the course. This is Volume 2 of Complete Cyber Security Course.
1. Welcome to Volume 2
Welcome to the course. This is Volume 2 of Complete Cyber Security Course.
1. Welcome to Volume 2
Welcome to the course. This is Volume 2 of Complete Cyber Security Course.
1. Welcome to Volume 2
Welcome to the course. This is Volume 2 of Complete Cyber Security Course.
Welcome to the course. This is Volume 2 of Complete Cyber Security Course.
Welcome to the course. This is Volume 2 of Complete Cyber Security Course.
2. Introduction to the Instructor!
Introduction to your instructor on this course.
2. Introduction to the Instructor!
Introduction to your instructor on this course.
2. Introduction to the Instructor!
Introduction to your instructor on this course.
2. Introduction to the Instructor!
Introduction to your instructor on this course.
Introduction to your instructor on this course.
Introduction to your instructor on this course.
3. Security Quick Win!
How to achieve a quick security win!
3. Security Quick Win!
How to achieve a quick security win!
3. Security Quick Win!
How to achieve a quick security win!
3. Security Quick Win!
How to achieve a quick security win!
How to achieve a quick security win!
How to achieve a quick security win!
4. Target Audience
Who is the target audience for this course?
4. Target Audience
Who is the target audience for this course?
4. Target Audience
Who is the target audience for this course?
4. Target Audience
Who is the target audience for this course?
Who is the target audience for this course?
Who is the target audience for this course?
5. Study Recommendations
Study recommendations.
5. Study Recommendations
Study recommendations.
5. Study Recommendations
Study recommendations.
5. Study Recommendations
Study recommendations.
Study recommendations.
Study recommendations.
6. The Forum - For Questions, Answers and Other Resources
The support forum - for questions, answers and other resources.
6. The Forum - For Questions, Answers and Other Resources
The support forum - for questions, answers and other resources.
6. The Forum - For Questions, Answers and Other Resources
The support forum - for questions, answers and other resources.
6. The Forum - For Questions, Answers and Other Resources
The support forum - for questions, answers and other resources.
The support forum - for questions, answers and other resources.
The support forum - for questions, answers and other resources.
7. Course updates
Course updates.
7. Course updates
Course updates.
7. Course updates
Course updates.
7. Course updates
Course updates.
Course updates.
Course updates.
Goals and Learning Objectives - Volume 2
1 lecture 03:09
8. Goals and Learning Objectives - Volume 2
Goals and learning objectives for this course.
Goals and Learning Objectives - Volume 2
1 lecture 03:09
8. Goals and Learning Objectives - Volume 2
Goals and learning objectives for this course.
8. Goals and Learning Objectives - Volume 2
Goals and learning objectives for this course.
8. Goals and Learning Objectives - Volume 2
Goals and learning objectives for this course.
8. Goals and Learning Objectives - Volume 2
Goals and learning objectives for this course.
8. Goals and Learning Objectives - Volume 2
Goals and learning objectives for this course.
Goals and learning objectives for this course.
Goals and learning objectives for this course.
Routers - Port and Vulnerability Scanning
5 lectures 01:01:46
9. Goals and Learning Objectives
Golas and learning objectives for this session.
10. The Home Router
Home routers.
11. External Vulnerability Scanning - Shodan, Qualys & Nmap
How to scan for external vulnerability using Shodan, Qualys & Nmap.
12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope
How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope.
13. Open Source Custom Router Firmware
Using open source custom router firmware.
Routers - Port and Vulnerability Scanning
5 lectures 01:01:46
9. Goals and Learning Objectives
Golas and learning objectives for this session.
10. The Home Router
Home routers.
11. External Vulnerability Scanning - Shodan, Qualys & Nmap
How to scan for external vulnerability using Shodan, Qualys & Nmap.
12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope
How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope.
13. Open Source Custom Router Firmware
Using open source custom router firmware.
9. Goals and Learning Objectives
Golas and learning objectives for this session.
9. Goals and Learning Objectives
Golas and learning objectives for this session.
9. Goals and Learning Objectives
Golas and learning objectives for this session.
9. Goals and Learning Objectives
Golas and learning objectives for this session.
Golas and learning objectives for this session.
Golas and learning objectives for this session.
10. The Home Router
Home routers.
10. The Home Router
Home routers.
10. The Home Router
Home routers.
10. The Home Router
Home routers.
Home routers.
Home routers.
11. External Vulnerability Scanning - Shodan, Qualys & Nmap
How to scan for external vulnerability using Shodan, Qualys & Nmap.
11. External Vulnerability Scanning - Shodan, Qualys & Nmap
How to scan for external vulnerability using Shodan, Qualys & Nmap.
11. External Vulnerability Scanning - Shodan, Qualys & Nmap
How to scan for external vulnerability using Shodan, Qualys & Nmap.
11. External Vulnerability Scanning - Shodan, Qualys & Nmap
How to scan for external vulnerability using Shodan, Qualys & Nmap.
How to scan for external vulnerability using Shodan, Qualys & Nmap.
How to scan for external vulnerability using Shodan, Qualys & Nmap.
12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope
How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope.
12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope
How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope.
12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope
How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope.
12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope
How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope.
How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope.
How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope.
13. Open Source Custom Router Firmware
Using open source custom router firmware.
13. Open Source Custom Router Firmware
Using open source custom router firmware.
13. Open Source Custom Router Firmware
Using open source custom router firmware.
13. Open Source Custom Router Firmware
Using open source custom router firmware.
Using open source custom router firmware.
Using open source custom router firmware.
Firewalls.
14 lectures 02:03:17
14. Goals and Learning Objectives
Goals and learning objectives for this session.
15. Firewalls – Host-based, Network-based and Virtual Part 1
Firewalls – Host-based, Network-based and Virtual.
16. Firewalls – Host-based, Network-based and Virtual Part 2
Firewalls – Host-based, Network-based and Virtual.
17. Windows - Host Based Firewalls - Windows Firewall
Windows based firewalls - Windows Firewall.
18. Windows - Host Based Firewalls - Windows Firewall Control (WFC)
Windows based firewalls - Windows Firewall Control (WFC)
19. Windows - Host Based Firewalls - Third Party
Windows based firewalls - Third Party, Comodo, Tinywall, Private, glasswire.
20. Linux - Host Based Firewalls - iptables
Linux based firewalls with iptables.
21. Linux - Host Based Firewalls - UFW, gufw & nftables
Linux based firewalls with UFW, gufw & nftables.
22. Mac OS X - Host based Firewalls - Application Firewall & PF
Mac based firewalls with Application Firewall & PF.
23. Mac OS X - Host based Firewalls - pflist, Icefloor & Murus
Mac based firewalls with pflist, Icefloor & Murus.
24. Mac OS X - Host based Firewalls - Little Snitch
Mac based firewalls with Little Snitch.
25. Network based firewalls - Routers - DD-WRT
Network based firewalls - Routers - DD-WRT.
26 /p...