Master in Cyber Security

3 out of 5
3
6 reviews
Cyber Security

Are you interested in becoming a master of cyber security?

If so, then this is the course for you! Kali linux is a powerful open source operating system that is widely used by security professionals around the world. This course will teach you the basics to advance of Foot Printing, Scanning, Penetration Testing, WPA2 Cracking, Man in the Middle (MITM) attacks, System Hacking, and much more. You will also learn how to code an advanced backdoor and create a keylogger for the backdoor. Finally, you will learn how to brute force authentication. This course is perfect for anyone who wants to become a master of cyber security.

Main Features

Comprehensive Curriculum: A Master’s in Cyber Security program offers a comprehensive curriculum that covers various aspects of cyber security, such as cryptography, network security,  cyber forensics, and ethical hacking.

Hands-On Learning: The course provides hands-on learning opportunities to students through practical exercises, simulations, and case studies. This helps students gain practical experience in dealing with real-world cyber security challenges.

Industry-Relevant Skills: The program is designed to equip students with industry-relevant skills and knowledge, making them job-ready upon graduation. Students learn the latest tools and technologies used in the field of cyber security.

Specializations: Some Master’s in Cyber Security programs offer specializations in areas such as digital forensics, cyber crime investigation, cloud security, and mobile security. This enables students to focus on their area of interest and develop expertise in a particular domain.

Career Opportunities: The demand for cyber security professionals is increasing rapidly, and a Master’s in Cyber Security degree opens up a range of career opportunities in areas such as cyber security consulting, information security management, cyber intelligence, and threat analysis.

Introduction-Installation

1
Virtual Box Installation
2
Kali Linux installation
3
Going Full Screen

Basic Commands

1
Basic Commands – Part – 1
2
Basic Commands – Part – 2
3
Basic Commands – Part – 3

Prepare Your Lab

1
Changing Your IP Address
2
Creating A Bootable Kali Linux USB
3
Important Networking Terms
4
Important Hacking Terms
5
Post Installation Steps
6
Changing Your Mac Address

Foot Printing

1
Google Hacking
2
Nikto Basics
3
Whois Tool
4
Email Harvesting
5
Shohan
6
Zone Transfer

Scanning

1
Installing Metasploitable
2
Nmap-Part-I
3
Namp-Part-II
4
Namp-Part-III
5
Zenmap
6
TCP Scans
7
Nmap Bypassing Defenses
8
Nmap Scripts - Part 1
9
Nmap Scripts - Part 2

Penetration Testing

1
Installing OWASP
2
HTTP Requests
3
HTTP Responses
4
Burpsuite Configuration
5
Editing Packets
6
Whatweb and Dirb
7
Password Recovery Attacks
8
Bruteforce Logins
9
Hydra Logins
10
Session Fixation
11
Injection Attacks
12
Simple Command Injection
13
Exploiting Command-Injection Vulnerabilities
14
Blind Command Injection
15
Basics of SQL
16
Manual SQL Injection - Part 1
17
Manual SQL Injection - Part 2
18
SQLmap Basics
19
XML Injection
20
Installing XCAT
21
Reflected XSS
22
Stored XSS
23
Modifying HTML
24
XSSer and XSSsniper

WPA2 Cracking

1
Wireless Attack Theory
2
Monitor Mode
3
Capturing Handshakes
4
RockYou
5
Aircrack
6
Hashcat
7
Crunch
8
Cupp
9
Rainbow Tables - Part 1
10
Rainbow Tables - Part 2
11
Fluxion
12
Cracking Hidden Networks
13
Preventing Attacks

Man in the Middle (MITM)

1
ARB Basics
2
MITM Attack Theory
3
Installing MITMf
4
Manual Arpsoofing
5
Installation Issues with MITMf
6
Traffic Sniffing
7
Spoofing and Password Sniffing
8
Hooking with BEEF
9
Screenshotting Targets
10
Cloning Webpages
11
Ettercap

System Hacking

1
MSFconsole
2
Metasplot Modules
3
Bruteforcing SSH
4
Attacking Tomcat
5
Meterpreter with Command Injection
6
PHP Code Injection
7
Two Exploits
8
Wine Installation
9
Msfvenom
10
Encoders and Hexeditor
11
Windows 10 Meterpreter Shell
12
Meterpreter Environment
13
Windows 10 Privilege Escalation
14
Preventing Privilege Escalation
15
Post Exploitation Modules
16
Meterpreter with Port Forwarding
17
Eternalblue Exploit
18
Persistence Module
19
Ngrok
20
Venom
21
What's Next

Coding an Advanced Backdoor

1
Reverse Shell Theory
2
Server Code
3
Reverse Shell Connection
4
Sending and Receiving Messages
5
Sending Messages with While-True Loops
6
Executing Commands on the Target System
7
Fixing Backdoor Bugs and Adding Functions
8
Installing Pyinstaller
9
Performance-Testing the Backdoor
10
Twenty-Second Connections
11
Creating Persistence - Part 1
12
Creating Persistence - Part 2
13
Changing Directories
14
Uploading and Downloading Files
15
Downloading from the Internet
16
Executing Programs Through the Backdoor
17
Capturing Screenshots on the Target
18
Embedding Your Backdoor - Part 1
19
Embedding Your Backdoor - Part 2
20
Checking for Admin Privileges
21
Adding Help Options

Creating a Keylogger for the Backdoor

1
Importing Pynput
2
Simple Keylogger
3
Adding Report Functions
4
Writing Keystrokes to a File
5
Adding the Logger - Part 1
6
Adding the Logger - Part 2
7
Final Project Test

Authentication Bruteforcer

1
Printing the Banner
2
Adding Available Options
3
Starting Threads for Bruteforce
4
Functions to Run Attacks
5
Bruteforcing a Router Login
6
Bypassing Antivirus
7
Malware with Spoofed Emails
Faq Content 1
Faq Content 2

Productivity Hacks to Get More Done in 2018

— 28 February 2017

  1. Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
  2. Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
  3. Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!