The 2023 Cyber Security Foundation Guide

Become a Cyber Security Specialist, Build technical capability in ethical hacking & web application security – Q1 Update
The 2023 Cyber Security Foundation Guide
File Size :
7.11 GB
Total length :
16h 54m

Category

Instructor

Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!

Language

Last update

3/2020

Ratings

4.1/5

The 2023 Cyber Security Foundation Guide

What you’ll learn

You will learn the background of Cybersecurity & Hacking.
You will have an increased awareness of hacking as a profession, You will go through data breaches occurring in different corporates
You will go through an introduction of what a security operations center is, what are the branches within cyber security and the various job roles available
You will understand network concepts, network topologies and layered communication in this course
You will start using Maltego Tool after you go through a demo of the Maltego community edition 4.2.4.
You can formulate various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems.
You can give insightful talks on zero-day exploit, malware and its types and man in the middle (mitm) attack
You will learn the OSI Model, various mnemonics, protocol data units etc.
You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks.
You will feel confident and comfortable with cyber kill chain methodology and how a traditional kill chain model works
You will build your capability in information security attack vectors, phishing techniques, whaling and phishing mitigation.
Introduction to SIEM: You will gain real time insights on Security information and event management and Security event manager
You will identify threats and possible breaches and collect audit logs for security and compliance.
You will learn that Defense in Depth (DiD) is an approach to cybersecurity in which a series of defensive mechanisms are layered
You can understand how an attacker can come in and tries to understand how a corporate environment is setup of a target.
You will learn what SIEM and Log Management mean for businesses & how to use them more effectively to mitigate risk for your company.
You will learn that SIEM is necessary because of the rise in data breaches and to meet stringent compliance requirements
Learn the right approach to building SIEM use cases, how to organize and prioritize use cases effectively.
You will learn the SIEM elements, Big 3, Process flow, Features, Event life cycle, SOC controls and mgmt, SIEM architecture, Dashboards and Use cases
You will revisit features of SIEM and learn SIEM deployment options
SIEM Essentials Quiz
You will learn the fundamentals of IP using a network simulation tool demo
You will have a Complete Hands-on on Exploit Database, Online Cameras, People Search, DNS Search, Pastebin etc
You will go through a demo on how to install and use Splunk Enterprise Security

The 2023 Cyber Security Foundation Guide

Requirements

You should have the enthusiasm to learn new concepts and have a drive towards a career in cyber security domain

Description

Have you ever wondered exactly how hackers ‘hack’? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.PERFECT FOR COMPLETE BEGINNERSThis course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security.Course CurriculumIn the very first section, we will cover the basic terminologies used and discuss topics like the trinity of IT security and computer protocols.Section 1:You will learn the background of Cybersecurity & Hacking. You will learn what is cyber-security and the growing demandfor professionals. You will have clarity on what is a basic network, cia triad,essential terminologies used etc. You will go through an introduction to kali linux operating system in this sectionSection 2:You will gain insights on what is cyber security, what are the components, why you should choose this as a career. You will understand that cyber security is about protecting systems, networks, programs, data and money.Section 3:You will have an increased awareness of hacking as a profession, they will go through data breaches occurring in Yahoo, Equifax, Target stores, Sony’s play station network etc. You can understand how hacking can be as a profession, types of hackers, what is information risk management regime, companies with data breaches.Section 4:You will go through an introduction of what a security operations center is, what are the branches within cyber securityand the various job roles available within cyber securitySection 5:You will understand network concepts, network topologies and layered communication in this courseSection 6:We start off where we left, in the previous section 5 we dealt with the fundamental concepts such as Basic Network, CIA Triad, Network concepts, Security Operations Center and Job Roles. Section 6 starts with a refresher on network concepts, topologies etc and connects you to the previous section.Section 7&8:These two sections give a good insight on the OSI Model and all the Layers:a)Physical layer b)Data link layer c)Network layer d)Transport layer e)Layered packet format f)Flow control g)Error controlf)Connection-orientedness vs connectionless g)Session layer and responsibilities h)Presentation layer and itsresponsibilities i)Summary of layersSection 9:In this section you will learn important concepts like TCP/IP protocol suite and Domain name system hierarchy.Section 10: Components of Hacking:ReconnaissanceScanningGaining accessMaintaining accessClearing tracksSection 11: Ethical hacking MindmapEthical hackingPlaces of ethical hackingMind mapSection 12: DoS and DDoSDenial of servicesSymptoms of dos attackSlow performanceIncrease in spam emailsUnavailability of a resourceLoss of access to a websiteDenial of access to any internet servicesDistributed denial of services (DDoS)DoS/DDoS attack techniquesLand and flood attacksService request floodsSection 13: SYN flooding attach using hping3Section 14: Hacking : Counter Measures StrategiesCounter-measuresDoS/DDoS countermeasure strategiesDetech and neutralize handlersMonitoring the activities running on a system of networkDeflect attacks by load balancingMitigate attacks disabling unnecessary servicesIntrusion detection systemsWavelet analysisSection 15: Metasploit testMetasploit is so popular is the wide range of tasks that it can perform to ease the work of penetration testing to makesystems more secure. Metasploit is available for all popular operating systems.VulnerabilityExploitPayloadMeterpreterSection 16: Maltego Tool DemoYou will go through a demo of the maltego community edition 4.2.4Section 17: Cyber kill chain methodologyYou will gain insights on cyber kill chain methodology and how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions. Section 18:You will build their capability in information security attack vectors, phishing techniques, whaling and phishing mitigation. You will understand the types of ransom-wares, how crypto ransomware works, you will go through a real world example of a ransomware attack on the Bristol airport screens. Section 19 & 20:You will understand the various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems. You will gain knowledge on zero-day exploit, malware and its types, man in the middle (mitm) attack and web application security.Section 21:You will gain real time insights on Security information and event management and Security event managerSection 22:You will identify threats and possible breaches and collect audit logs for security and compliance. You will be able to conduct investigations and provide evidence.Section 23:You will learn that Defense in Depth (DiD) is an approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information.Section 24:You can understand how an attacker can come in and tries to understand how a corporate environment is setup of a target.Section 25:You will learn what SIEM and Log Management mean for businesses & how to use them more effectively to mitigate risk for your company.Section 26:You will learn that SIEM is necessary because of the rise in data breaches and to meet stringent compliance requirementsSection 27:Learn the right approach to building SIEM use cases, how to organize and prioritize use cases effectively.Section 28:You will learn the SIEM elements, Big 3, Process flow, Features, Event life cycle, SOC controls and mgmt, SIEM architecture, Dashboards and Use casesSection 29:You will revisit features of SIEM and learn SIEM deployment options like self-hosted, self-managed to Hybrid-model, Jointly-managed. You will understand the business benefits of SIEM. Section 30: SIEM Essentials QuizWho this course is for:Students who want to learn the basics of computer and cyber securityStudents who want to become IT or Cyber Security ExpertsTestimonials:Perfect Beginning for a new learner ~ Sairam ChagantiThe resource links shared are very useful ~ Mohammed M. GoniJust Good ~ TazQThe course is packed with information that is very easy to follow for a beginner, I definitely feel like I’m learning something new with every video I watch 🙂 ~ Kory WilliamsVery useful course, i leaned a lot from it , i really like it , i recommend this instructor ! ~ Souha DjimGood for a beginner ~ Goli Uma SankarTrès bon travail. Merci (Very good work. Thanks) ~ Mohamed ABDOU

Overview

Section 1: Introduction

Lecture 1 Course Intro

Lecture 2 Introduction

Section 2: Basic network, CIA triad & Other essential terminologies

Lecture 3 Basic network, CIA triad & Other essential terminologies

Section 3: Hacking as a profession

Lecture 4 Hacking as a Profession

Section 4: Security Operations Center: SOC

Lecture 5 SOC

Section 5: Network Concepts

Lecture 6 Network Concepts

Section 6: Introduction & Refresher: Network Concepts, Topologies, OSI Model and PDU’s

Lecture 7 Introduction & Refresher: Network Concepts, Topologies, OSI Model and PDU’s

Section 7: OSI Model Part 1

Lecture 8 OSI Model Part 1

Section 8: OSI Model Part 2

Lecture 9 OSI Model Part 2

Section 9: Protocol Suite

Lecture 10 Protocol Suite

Section 10: Components of Hacking

Lecture 11 Components of Hacking

Section 11: Places of Ethical Hacking and Mindmap

Lecture 12 Ethical Hacking Mindmaps

Section 12: Denial and Distributed Denial of Service Attacks

Lecture 13 Denial and Distributed Denial of Service Attacks

Section 13: SYN flooding attack using hping3

Lecture 14 SYN flooding attack using hping3

Section 14: Hacking : Counter Measures Strategies

Lecture 15 DoS/DDoS Counter Measure Strategies

Section 15: Metasploit test

Lecture 16 Metasploit Test Demo

Section 16: Demo: Maltego community edition 4.2.4

Lecture 17 Demo: Maltego community edition 4.2.4

Section 17: Cyber kill chain methodology

Lecture 18 Cyber kill chain methodology

Section 18: Information security attack vectors

Lecture 19 Information security attack vectors

Section 19: Ransomware, Mitigation Strategies, Phishing and Firewalls

Lecture 20 Ransomware, Mitigation Strategies, Phishing and Firewalls

Section 20: Web application security

Lecture 21 Web Application Security

Section 21: Introduction to SIEM

Lecture 22 Introduction to SIEM

Section 22: Key Objectives of SIEM

Lecture 23 Key Objectives of SIEM

Section 23: Defence in Depth

Lecture 24 Defence in Depth

Section 24: Corporate environment

Lecture 25 Corporate environment

Section 25: Log Management

Lecture 26 Log Management

Section 26: Why is SIEM necessary?

Lecture 27 Why is SIEM necessary?

Section 27: Use Cases for SIEM

Lecture 28 Use Cases for SIEM

Section 28: Elements of SIEM

Lecture 29 SIEM Elements

Section 29: SIEM Deployment Options

Lecture 30 SIEM Deployment Options

Section 30: SIEM Essentials Quiz

Section 31: IP Fundamentals

Lecture 31 IP Fundas Hands-on with Network simulation tool

Section 32: Complete Hands-on on Exploit Database, Online Cameras, DNS Search, Pastebin etc

Lecture 32 Hands-On

Section 33: Splunk Enterprise Security

Lecture 33 Splunk ES

Those who are interested in a career in cyber security and ethical hacking,This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.

Course Information:

Udemy | English | 16h 54m | 7.11 GB
Created by: Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top