Cyber Security

 

Unit – 1

Systems Vulnerability-Common Computer Security Vulnerabilities - Video Link

Difference between Vulnerability and Risk – Video Link

Open Port – Video Link

Different Port Scanning Techniques – Video Link

Banner - Version Check - Traffic Prob – Video Link

OpenVAS-Metasploit – Video Link

Networks Vulnerability Scanning-Netcat-Socat – Video Link

Port and Services tools-Datapipe-Fpipe-WinRelay – Video Link

Network Reconnaissance Tool-Nmap-THC-Amap – Video Link

Network Sniffers and Injection tools-TCPDUMP-WINDUMP – Video Link

Network Sniffers and Injection tools-Wireshark-Ettercap-Hping-Kismet – Video Link

 

Unit – 2

Firewall – Video Link

Packet Filter-Firewall – Video Link

Stateless-State full Firewall – Video Link

NAT – Video Link

Port Forwarding – Video Link

Snort – Video Link

 

Unit – 3

Web Application Tools Scanning for Web Vulnerabilities Tool-Nikto-W3af – Video Link

HTTP utilities-Crul-OpenSSL and Stunnel – Video Link

Application Inspection Tool-Zed Attack Proxy-SQLMAP – Video Link

DVWA-WebGoat – Video Link

Password Cracking and Brute-Force Tools-John the Ripper-L0htcrack-. Pwdump-HTC-haydra – Video Link

 

Unit – 4

Introduction to Cyber Crime – Video Link

Classification of Cyber Crime – Video Link

Cyber Law – Video Link

Types of Cybercrime – Video Link

Cyber Space - Criminal Behaviour - Traditional Problems – Video Link

Incidence of Response – Video Link

Digital Forensics – Video Link

Computer Crime – Video Link

Contaminants and Destruction of Data-IT Act 2000 – Video Link

 

Unit – 5

Introduction to Cyber Crime Investigation – Video Link

Keyloggers – Video Link

Spyware – Video Link

Virus – Video Link

Worms – Video Link

Trojan – Video Link

Backdoors – Video Link

Steganography - Video Link

DOS and DDOS attack – Video Link

SQL injection – Video Link

Buffer Overflow – Video Link

Attack on wireless Networks – Video Link

10 comments:

  1. You have provided a richly informative article about Cyber Security IT Courses In Canada It is a beneficial article for me and also helpful for those who are searching for this kind of information. Thanks for sharing this information here.

    ReplyDelete
    Replies
    1. Thank u so much.... Please follow my blog and Share with others...
      Subscribe my channel: Chirag Bhalodia

      Delete
  2. You have provided valuable data for us. It is great and informative for everyone.Read more info about trusted cyber security consulting firm Keep posting always. I am very thankful to you.

    ReplyDelete
    Replies
    1. Thank u so much.... Please follow my blog and Share with others...
      Subscribe my channel: Chirag Bhalodia

      Delete
  3. Excellent post. I really enjoy reading and also appreciate your work.cyber security virtual conferences This concept is a good way to enhance knowledge. Keep sharing this kind of articles, Thank you.

    ReplyDelete
    Replies
    1. Thank u so much.... Please follow my blog and Share with others...
      Subscribe my channel: Chirag Bhalodia

      Delete
  4. Thank u so much.... Please follow my blog and Share with others...
    Subscribe my channel: Chirag Bhalodia

    ReplyDelete
  5. Thank u so much.... Please follow my blog and Share with others...
    Subscribe my channel: Chirag Bhalodia

    ReplyDelete
  6. Grateful for the invaluable role Dublin Tech Solutions
    plays in safeguarding our digital world. Your unwavering vigilance shields us from evolving threats, ensuring a secure online landscape. Thank you for your tireless efforts in fortifying our virtual realms.

    ReplyDelete
  7. I am thankful to you for this article because you are providing such good information about the trendzguruji.me cyber as I see, thanks for this. keep sharing this.

    ReplyDelete