وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Cybersecurity Fundamentals for Beginners-Learning with Demos

سرفصل های دوره

For Beginners-Practical Approach to learning - Cyber Attacks, Cryptography, Encryption Algorithms, PKI,Networking Topics


1. Introduction
  • 1. Top 10 Cyber Attacks of 21st Century
  • 2. A Look at the Live Threats
  • 3. Demand for CyberSecurity Skills
  • 4. What is Cybersecurity
  • 5. What is CIA Triad

  • 2. Types of Cyber Attacks
  • 1. Intro - Types of Cyber Attacks
  • 2. Malware Attack
  • 3. Phishing Attack
  • 4. Demo How attackers use Phishing Attack
  • 5. Password Attack
  • 6. Demo A Dictionary Attack - Password Attack
  • 7. Man-in-the-Middle Attack
  • 8. Demo MITM Attack using ARP Poisoning
  • 9. SQL Injection Attack
  • 10. Demo How to create a Sql Injection(SQLi) Attack
  • 11. Denial-of-Service Attack
  • 12. Cryptojacking

  • 3. Types of Hackers
  • 1. Title-Types of Hackers
  • 2. White Hat Hacker
  • 3. Black Hat Hacker
  • 4. Grey Hat Hacker
  • 5. Hacktivist
  • 6. Script Kiddie

  • 4. Basics of Cryptography
  • 1. Title-Basics of Cryptography
  • 2. What is Cryptography
  • 3. History of Cryptography
  • 4. Understanding the Ceasars Cypher
  • 5. What is Symmetric Encryption
  • 6. Understand Symmetric Encryption with an Example
  • 7. Demo Symmetric Encryption using openssl
  • 8. What is Asymmetric Encryption
  • 9. Understand Asymmetric Encryption - Confidentiality
  • 10. Understand Asymmetric Encryption - Integrity & Authentication
  • 11.1 Asymmetric Encryption using openssl.pdf
  • 11. DemoAsymmetric encryption using openssl
  • 12. Get an Understanding of Hybrid Encryption

  • 5. Deep Dive into Various Algorithms
  • 1. Title-Deep Dive into Various Algorithms
  • 2. What is Cipher Algorithm & Key
  • 3. What is DES - Data Encryption Standard
  • 4. What is AES Advanced Encryption Standard
  • 5. Which are the NIST Approved Asymmetric Algorithms
  • 6. What is the RSA Algorithm
  • 7. Understanding RSA Algorithm with Example
  • 8. What is DSA Algorithm
  • 9. What is Deffie-Hellman Algorithm
  • 10. Understanding DH Algorithm with an Example
  • 11. Understanding Calculations for DH Algorithm
  • 12. What is Elliptic Curve Algorithm
  • 13. Quick Comparison RSA vs DSA vs ECDSA vs DH

  • 6. Public Key Infrastructure - PKI
  • 1. Title-Public Key Infrastructure - PKI
  • 2. What is PKI
  • 3. What is a Hashing Algorithm
  • 4.1 demo hashing openssl.pdf
  • 4. Demo Hashing using openssl
  • 5. What is a Message Digest
  • 6. What is a Digital Signature
  • 7. Understanding Digital Signature
  • 8. What is a Certificate Authority -CA
  • 9. Demo Exploring the DigiCert Website
  • 10. What is a Digital Certificate
  • 11. Understanding Digital Certificate
  • 12. Check a Real Certificate - Facebook.com
  • 13. Protecting from MITM using Digital Certificate
  • 14. What is a Self Signed Certificate
  • 15. PEM Vs PKCS12
  • 16. What is a Chain of Trust
  • 17.1 create a rootCA.pdf
  • 17. Demo Create a Self Signed Certificate rootCA
  • 18.1 create a certificate request.pdf
  • 18. Demo Create a CSR
  • 19.1 signing the certificate.pdf
  • 19. Demo Sign a Certificate CSR

  • 7. Networking Basics
  • 1. Title-Networking Basics
  • 2. Main Artefacts for Networking
  • 3. Understanding the OSI Model
  • 4. What is a Switch
  • 5. What is a Router
  • 6. What is a VLAN
  • 7. Binary to Decimal Conversion
  • 8. Decimal to Binary Conversion
  • 9. Understanding an IP address
  • 10. What is Subnetting
  • 11. What is Subnet Mask
  • 12. What is ARP
  • 13. Simulation to understand ARP
  • 14. What is a Network Packet
  • 15. How a Packet Travels from Source to Destination
  • 16. Demo traceroute to cnn.com
  • 17. What is a VPN
  • 18. Demo Using a Software based VPN (NordVPN)
  • 19. What is a Firewall
  • 20. Role of a Proxy Server
  • 21. What is a Perimeter Network or a DMZ
  • 22. What is SSH
  • 23. What is TCPIP
  • 24. What is SSL
  • 25. Demo Checking the Latest Stats on SSLTLS
  • 26. Understanding SSL Vs TLS
  • 27. What is MTLS

  • 8. Key Protocols
  • 1. Title-Key Protocols
  • 2. What is SSH
  • 3. What is TCPIP
  • 4. What is SSL
  • 5. Demo Checking the Latest Stats on SSLTLS
  • 6. Understanding SSL Vs TLS
  • 7. What is mTLS
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 19062
    حجم: 3374 مگابایت
    مدت زمان: 557 دقیقه
    تاریخ انتشار: 20 شهریور 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید