MENU

Fun & Interesting

Cyber Security Full course - 11 Hours | Cyber Security Training For Beginners | Edureka

edureka! 1,474,828 2 years ago
Video Not Working? Fix It Now

๐Ÿ”ฅ๐„๐๐ฎ๐ซ๐ž๐ค๐š ๐‚๐ฒ๐›๐ž๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐  (๐”๐ฌ๐ž ๐‚๐จ๐๐ž: ๐˜๐Ž๐”๐“๐”๐๐„๐Ÿ๐ŸŽ) : https://www.edureka.co/cybersecurity-certification-training This Edureka video on "Cyber Security Full Course" will help you understand and learn the fundamentals of Cyber Security. This Cyber Security Tutorial is ideal for both beginners as well as professionals who want to master the Cyber Security concepts. Below are the topics covered in this Cyber Security Training For Beginners: 00:00:00 Introduction 00:05:35 Requirement of Cyber Security 00:23:44 History of Cybersecurity 00:34:57 Types of hackers 00:42:57 Skills Necessary 00:51:45 What is Penetration testing? 01:01:22 What is Footprinting? 01:13:40 Handson 01:33:23 History of the internet 01:42:11 OSI and TCP/IP Model 01:50:59 What is Wireshark? 01:58:59 What is DHCP? 02:08:36 Cryptography 02:11:00 History of Cryptography 02:19:00 Digital Encryption Standard 02:54:13 Bitlocker 03:07:50 What is IDS 03:15:50 What is pishing 03:20:38 Password Attacks 03:23:50 Packet Flooding 03:27:02 What is a Drive-by-download 03:33:26 BluVector 03:46:15 Cybersecurity Frameworks 04:03:51 Cybersecurity is an evergreen industry 04:19:52 Why Become an cyber security engineer 04:23:52 Who is a cybersecurity engineer ? 04:26:17 Roles and responsibilities of cyber security 04:59:05 How to choose the right cybersecurity certification? 05:05:29 Keylogger 05:07:53 SQL Vulnerability assessment 05:35:54 Top Cyber attacks in history 05:40:42 Cybersecurity challenges 05:46:18 Types of hacking 06:08:43 What is kali Linux? 06:14:19 Hands-on in Kali Linux 06:39:56 What is a proxy chain? 06:55:08 What is a Mac Address? 07:26:21 Cryptography 08:23:59 What is cross-site scripting? 08:26:23 types of cross-site scripting 08:36:00 How to use cross-site scripting 08:52:48 How to prevent cross-site scripting? 09:13:37 What is SQL Injection? 09:32:49 What is steganography? 10:00:50 Steganography tools 10:13:39 Ethical hacking and roles in ethical hacking 10:18:27 Ethical hacking tools 10:21:39 Cybersecurity interview questions ๐Ÿ”ด ๐‹๐ž๐š๐ซ๐ง ๐“๐ซ๐ž๐ง๐๐ข๐ง๐  ๐“๐ž๐œ๐ก๐ง๐จ๐ฅ๐จ๐ ๐ข๐ž๐ฌ ๐…๐จ๐ซ ๐…๐ซ๐ž๐ž! ๐’๐ฎ๐›๐ฌ๐œ๐ซ๐ข๐›๐ž ๐ญ๐จ ๐„๐๐ฎ๐ซ๐ž๐ค๐š ๐˜๐จ๐ฎ๐“๐ฎ๐›๐ž ๐‚๐ก๐š๐ง๐ง๐ž๐ฅ: https://edrk.in/DKQQ4Py ๐Ÿ“Feel free to share your comments below.๐Ÿ“ ๐Ÿ”ด ๐„๐๐ฎ๐ซ๐ž๐ค๐š ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐  ๐š๐ง๐ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”ฅEdureka CEH v12 Certification: https://bit.ly/3M2A1X9 ๐Ÿ”ฅEdureka CISSP Certification: https://bit.ly/3nDq8Wc ๐Ÿ”ฅEdureka CompTIA Security+ Certification: https://bit.ly/3nxeVRl ๐Ÿ”ด ๐„๐๐ฎ๐ซ๐ž๐ค๐š ๐‘๐จ๐ฅ๐ž-๐๐š๐ฌ๐ž๐ ๐‚๐จ๐ฎ๐ซ๐ฌ๐ž๐ฌ ๐Ÿ”ต Cyber Security Masters Program: http://bit.ly/3U25rNR ๐ŸŒ• Cloud Architect Masters Program: http://bit.ly/3OvueZy ๐Ÿ”ต DevOps Engineer Masters Program: http://bit.ly/3Oud9PC ๐ŸŒ• Big Data Architect Masters Program: http://bit.ly/3tTWT0V ๐Ÿ”ต Machine Learning Engineer Masters Program: http://bit.ly/3AEq4c4 ๐ŸŒ• Business Intelligence Masters Program: http://bit.ly/3UZPqJz ๐Ÿ”ต Python Developer Masters Program: http://bit.ly/3EV6kDv ๐ŸŒ• Full Stack Developer Masters Program : http://bit.ly/3tWCE2S ๐Ÿ”ต Automation Testing Engineer Masters Program : http://bit.ly/3AGXg2J ๐ŸŒ• Python Developer Masters Program : https://bit.ly/3EV6kDv ๐Ÿ”ต Azure Cloud Engineer Masters Program: http://bit.ly/3AEBHzH ๐Ÿ”ด ๐„๐๐ฎ๐ซ๐ž๐ค๐š ๐”๐ง๐ข๐ฏ๐ž๐ซ๐ฌ๐ข๐ญ๐ฒ ๐๐ซ๐จ๐ ๐ซ๐š๐ฆ๐ฌ ๐Ÿ”ต Advanced Certificate Program in Cybersecurity with E&ICT Academy, IIT Guwahati: https://bit.ly/3rDFjkr ๐ŸŒ• Professional Certificate Program in DevOps with Purdue University: https://bit.ly/3Ov52lT ๐Ÿ”ต Advanced Certificate Program in Data Science with E&ICT Academy, IIT Guwahati: http://bit.ly/3V7ffrh ๐Ÿ“Œ๐“๐ž๐ฅ๐ž๐ ๐ซ๐š๐ฆ: https://t.me/edurekaupdates ๐Ÿ“Œ๐“๐ฐ๐ข๐ญ๐ญ๐ž๐ซ: https://twitter.com/edurekain ๐Ÿ“Œ๐‹๐ข๐ง๐ค๐ž๐๐ˆ๐ง: https://www.linkedin.com/company/edureka ๐Ÿ“Œ๐ˆ๐ง๐ฌ๐ญ๐š๐ ๐ซ๐š๐ฆ: https://www.instagram.com/edureka_learning/ ๐Ÿ“Œ๐…๐š๐œ๐ž๐›๐จ๐จ๐ค: https://www.facebook.com/edurekaIN/ ๐Ÿ“Œ๐’๐ฅ๐ข๐๐ž๐’๐ก๐š๐ซ๐ž: https://www.slideshare.net/EdurekaIN ๐Ÿ“Œ๐‚๐š๐ฌ๐ญ๐›๐จ๐ฑ: https://castbox.fm/networks/505?country=IN ๐Ÿ“Œ๐Œ๐ž๐ž๐ญ๐ฎ๐ฉ: https://www.meetup.com/edureka/ ๐Ÿ“Œ๐‚๐จ๐ฆ๐ฆ๐ฎ๐ง๐ข๐ญ๐ฒ: https://www.edureka.co/community/ ------------- About Edureka Cyber Security Training Edurekaโ€™s Cybersecurity Certification Course will help you in learning about the basic concepts of Cybersecurity along with the methodologies that must be practiced ensuring information security of an organization. Starting from the Ground level Security Essentials, this course will lead you through Cryptography. Why Learn Cyber Security? Cybersecurity is the gathering of advances that procedures and practices expected to ensure systems, PCs, projects and information from assault, harm or unapproved get to. In a processing setting, security incorporates both cybersecurity and physical security. For more information, please write back to us at [email protected] or call us at IND: 9606058406 / US: +18885487823 (toll-free).

Comment