وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Cybersecurity Fundamentals for Beginners-Learning with Demos

سرفصل های دوره

For Beginners-Practical Approach to learning - Cyber Attacks, Cryptography, Encryption Algorithms, PKI,Networking Topics


1. Introduction
  • 1. Top 10 Cyber Attacks of 21st Century
  • 2. A Look at the Live Threats
  • 3. Demand for CyberSecurity Skills
  • 4. What is Cybersecurity
  • 5. What is CIA Triad

  • 2. Types of Cyber Attacks
  • 1. Intro - Types of Cyber Attacks
  • 2. Malware Attack
  • 3. Phishing Attack
  • 4. Demo How attackers use Phishing Attack
  • 5. Password Attack
  • 6. Demo A Dictionary Attack - Password Attack
  • 7. Man-in-the-Middle Attack
  • 8. Demo MITM Attack using ARP Poisoning
  • 9. SQL Injection Attack
  • 10. Demo How to create a Sql Injection(SQLi) Attack
  • 11. Denial-of-Service Attack
  • 12. Cryptojacking

  • 3. Types of Hackers
  • 1. Title-Types of Hackers
  • 2. White Hat Hacker
  • 3. Black Hat Hacker
  • 4. Grey Hat Hacker
  • 5. Hacktivist
  • 6. Script Kiddie

  • 4. Basics of Cryptography
  • 1. Title-Basics of Cryptography
  • 2. What is Cryptography
  • 3. History of Cryptography
  • 4. Understanding the Ceasars Cypher
  • 5. What is Symmetric Encryption
  • 6. Understand Symmetric Encryption with an Example
  • 7. Demo Symmetric Encryption using openssl
  • 8. What is Asymmetric Encryption
  • 9. Understand Asymmetric Encryption - Confidentiality
  • 10. Understand Asymmetric Encryption - Integrity & Authentication
  • 11.1 Asymmetric Encryption using openssl.pdf
  • 11. DemoAsymmetric encryption using openssl
  • 12. Get an Understanding of Hybrid Encryption

  • 5. Deep Dive into Various Algorithms
  • 1. Title-Deep Dive into Various Algorithms
  • 2. What is Cipher Algorithm & Key
  • 3. What is DES - Data Encryption Standard
  • 4. What is AES Advanced Encryption Standard
  • 5. Which are the NIST Approved Asymmetric Algorithms
  • 6. What is the RSA Algorithm
  • 7. Understanding RSA Algorithm with Example
  • 8. What is DSA Algorithm
  • 9. What is Deffie-Hellman Algorithm
  • 10. Understanding DH Algorithm with an Example
  • 11. Understanding Calculations for DH Algorithm
  • 12. What is Elliptic Curve Algorithm
  • 13. Quick Comparison RSA vs DSA vs ECDSA vs DH

  • 6. Public Key Infrastructure - PKI
  • 1. Title-Public Key Infrastructure - PKI
  • 2. What is PKI
  • 3. What is a Hashing Algorithm
  • 4.1 demo hashing openssl.pdf
  • 4. Demo Hashing using openssl
  • 5. What is a Message Digest
  • 6. What is a Digital Signature
  • 7. Understanding Digital Signature
  • 8. What is a Certificate Authority -CA
  • 9. Demo Exploring the DigiCert Website
  • 10. What is a Digital Certificate
  • 11. Understanding Digital Certificate
  • 12. Check a Real Certificate - Facebook.com
  • 13. Protecting from MITM using Digital Certificate
  • 14. What is a Self Signed Certificate
  • 15. PEM Vs PKCS12
  • 16. What is a Chain of Trust
  • 17.1 create a rootCA.pdf
  • 17. Demo Create a Self Signed Certificate rootCA
  • 18.1 create a certificate request.pdf
  • 18. Demo Create a CSR
  • 19.1 signing the certificate.pdf
  • 19. Demo Sign a Certificate CSR

  • 7. Networking Basics
  • 1. Title-Networking Basics
  • 2. Main Artefacts for Networking
  • 3. Understanding the OSI Model
  • 4. What is a Switch
  • 5. What is a Router
  • 6. What is a VLAN
  • 7. Binary to Decimal Conversion
  • 8. Decimal to Binary Conversion
  • 9. Understanding an IP address
  • 10. What is Subnetting
  • 11. What is Subnet Mask
  • 12. What is ARP
  • 13. Simulation to understand ARP
  • 14. What is a Network Packet
  • 15. How a Packet Travels from Source to Destination
  • 16. Demo traceroute to cnn.com
  • 17. What is a VPN
  • 18. Demo Using a Software based VPN (NordVPN)
  • 19. What is a Firewall
  • 20. Role of a Proxy Server
  • 21. What is a Perimeter Network or a DMZ
  • 22. What is SSH
  • 23. What is TCPIP
  • 24. What is SSL
  • 25. Demo Checking the Latest Stats on SSLTLS
  • 26. Understanding SSL Vs TLS
  • 27. What is MTLS

  • 8. Key Protocols
  • 1. Title-Key Protocols
  • 2. What is SSH
  • 3. What is TCPIP
  • 4. What is SSL
  • 5. Demo Checking the Latest Stats on SSLTLS
  • 6. Understanding SSL Vs TLS
  • 7. What is mTLS
  • 179,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 19062
    حجم: 3374 مگابایت
    مدت زمان: 557 دقیقه
    تاریخ انتشار: ۲۰ شهریور ۱۴۰۲
    دسته بندی محصول
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    179,000 تومان
    افزودن به سبد خرید