Kick start your journey in Cyber Security
Free tutorial
Created by Shifa Cyclewala, Rohit Gautam, Hacktify Cyber Security
English
What you’ll learn
- Ethical Hacking
- Cyber Security
- Types of Hackers
- Ports and Protocols
Requirements
- Basic IT Skills
- Any Beginner who wants to start with Real World Ethical Hacking
- No Linux, programming or hacking knowledge required.
- Computer with a minimum of 4GB ram/memory & Internet Connection
- Operating System: Windows / OS X / Linux
Description
Hello Everyone, Learn about Ethical Hacking and Cyber Security with this Free Course and kick start your journey in cybersecurity.
Cyber security is a growing industry that is still in need of skilled professionals. The global cyber security market is expected to grow from $170 billion in 2017 to $202 billion in 2023.
So if you are a beginner and interested about creating your career in cybersecurity this course will help you understand the basic foundations and provide you a learning path for next steps.
Here’s a more detailed breakdown of the course content:
In all the sections we will start the fundamental principle of Cyber Security and Ethical Hacking
In this course you will learn about the fundamentals cyber security & ethical hacking:
Below are the list of topics :
- Course Introduction
- Introduction to Hacking
- What is Hacking
- What are the types of hackers
- Types of Hackers
- Have I been pwned
- History of Hacking
- Breaking the Myth
- Principles of Information Security
- CIA Triad
- Integrity Practical
- Dive in Hacking
- USB Stealer
- Zip Bomb
- Fork Bombs
- Ports and Protocols
- What are Ports & Protocols
- Hyper Text Transfer Protocol (HTTP & HTTPS)
- File Transfer Protocol (FTP)
- FTP Practical
- Secure Shell (SSH)
- SSH Practical
- Telnet, RDP and Telnet vs SSH
- Communication Models
- TCP IP and OSI Model
- OSI Model in day to day Life
- TCP 3-way Handshake
- Types of Networks
- Network Types
- Local Area Network
- Metropolitan Area Network
- Wide Area Network
- Personal Area Network
- What’s Next
- Conclusion
With this course, you get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you as soon as possible.
Notes:
- This course is created for educational purposes only. We do not promote any malicious activities.
Who this course is for:
- Anybody interested in learning Ethical Hacking
- Any Beginner who wants to start his/her journey in Cyber Security
- Trainer who are willing to start teaching Cyber Security
- Any Professional who working in Cyber Security and Pentesting
- Ethical Hackers who wants to learn basics fundamentals and Networking
- Beginners in Cyber Security Industry who wants to apply for Analyst Position
Show less
Course content
8 sections • 27 lectures • 1h 43m total lengthCollapse all sections
Introduction1 lecture • 1min
- Introduction to the course01:02
Introduction to Hacking7 lectures • 37min
- What is Hacking?06:26
- What are the types of hackers?07:32
- More Types of Hackers05:51
- Have I been pwned07:35
- History of Hacking01:08
- Breaking the Myth03:50
- Not Being a Noob04:46
Principles of Information Security2 lectures • 21min
- CIA Triad07:16
- Integrity Practical13:42
Dive in Hacking4 lectures • 17min
- USB Stealer02:22
- Zip Bomb05:33
- Fork Bombs03:13
- Fork Bomb Practical05:27
Ports and Protocols5 lectures • 16min
- What are Ports & Protocols03:19
- Hyper Text Transfer Protocol (HTTP & HTTPS)03:29
- File Transfer Protocol03:31
- Secure Shell03:36
- Telnet, RDP and Telnet vs SSH02:10
Communication Models2 lectures • 7min
- TCP IP and OSI Model02:27
- OSI Model in day to day Life04:44
Types of Networks5 lectures • 4min
- Network Types01:16
- Local Area Network00:53
- Metropolitan Area Network00:25
- Wide Area Network00:28
- Personal Area Network00:51
Course End Video1 lecture • 1min
- Final Video00:29