Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Udemy

Cyber Security Foundation - Part 2

via Udemy

This course may be unavailable.

Overview

Gain the knowledge hackers use to compromise systems and use it to protect your own!

What you'll learn:
  • You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks.
  • You will have a firm understanding of places of hacking and mind map.
  • You will gain insights of denial of service and distributed denial of service
  • You will gain clality on syn flooding attach using hping3, counter measures and Metasploit test.

You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.


Section 1: Components of Hacking:

Reconnaissance

Scanning

Gaining access

Maintaining access

Clearing tracks


Section 2: Ethical hacking Mindmap

Ethical hacking

Places of ethical hacking

Mind map


Section 3: DoS and DDoS

Denial of services

Symptoms of dos attack

Slow performance

Increase in spam emails

Unavailability of a resource

Loss of access to a website

Denial of access to any internet services

Distributed denial of services (DDoS)

DoS/DDoS attack techniques

Land and flood attacks

Service request floods


Section 4: SYN flooding attach using hping3


Section 5: Counter Measures

Counter-measures

DoS/DDoS countermeasure strategies

Detech and neutralize handlers

Monitoring the activities running on a system of network

Deflect attacks by load balancing

Mitigate attacks disabling unnecessary services

Intrusion detection systems

Wavelet analysis


Section 6: Metasploit test

Metasploit is so popular is the wide range of tasks that it can perform to ease the work of penetration testing to make

systems more secure. Metasploit is available for all popular operating systems.

Vulnerability

Exploit

Payload

Meterpreter


Type of Cybercrime

  • The following list presents the common types of cybercrimes:

  • Computer Fraud: Intentional deception for personal gain via the use of computer systems.

  • Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, hacking a websites, etc.

  • Identity Theft: Stealing personal information from somebody and impersonating that person.

  • Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.

  • Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.

  • Electronic money laundering: This involves the use of the computer to launder money.

  • ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.

  • Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.

  • Spam: Sending unauthorized emails. These emails usually contain advertisements.


Testimonials:

Good Match for me ~ Chan Aye

Nice One.. It take us one step ahead in cyber security ~ Anoop Kumar

this is good way to learn ~ Roshan Kumar

Yes this is best lecture ~ SHOEB IQBAL ANSARI

It's awesome ~ A Md Thoufiq

I gain more knowledge about this subject ~ Gary June D Benoya


Taught by

Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!

Reviews

3.5 rating at Udemy based on 252 ratings

Start your review of Cyber Security Foundation - Part 2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.