Course curriculum
-
3
How to access container based labs
-
Please see the video to learn how you can utilise our containers to perform hands on labs
-
-
4
Linux Deep Dive
-
Chapter#1 Getting ready with Linux Primer
-
Linux Intro 100a
FREE PREVIEW -
Linux Primer 100a
FREE PREVIEW -
Linux Primer 100b
FREE PREVIEW -
Linux Primer 100c installation process
-
Linux Primer 100d
-
Linux Primer 200
-
Linux 200
-
How to use osboxes ready made images to install ubuntu or centos or parrot os part 1
-
How to use osboxes ready made images to install ubuntu or centos or parrot os part 2
-
How to use osboxes ready made images to install ubuntu or centos or parrot os part 3
-
How to use osboxes ready made images to install ubuntu or centos or parrot os part 4
-
Chapter2 # Linux Primer Lets get started
-
Linux Primer 300a
-
Linux Primer 300 a
-
Linux Primer 300b
-
Linux Primer 300c
-
Linux Primer 300d
-
Linux Primer 300bcd
-
Linux Primer 300e-f
-
Linux Primer 300e-f
-
Linux Primer 400a Working with files and Directories in Linux
-
Linux Primer 400b Working with files and Directories in Linux
-
Linux Primer 500-600 Types of Users a
-
Linux Primer 500-600 Types of Users b
-
Linux Primer 700-800 root su and sudo
-
Linux Primer 900-1000a Users and Groups
-
Linux Primer 900-1000a
-
Linux Primer 900-1000b Users and Groups
-
Linux Primer 900-1000b
-
Linux Primer 1100-1200 ownership and groups
-
Linux Primer1100-1200
-
Linux Primer 1300-1400 Changing permissions
-
Linux Primer 1500-1600 Editing text files
-
Linux Primer 1700-1800 Networking in Linux a
-
Linux Primer 1700-1800 Networking in Linux b
-
Linux Primer 1700-1800 Networking in Linux c
-
Linux Primer 1900-2000 Checking file system of Linux
-
Linux Primer Last lecture process, deamons, installing software and getting help
-
Linux Commands Text File for assistance
-
Final text file with all the commands
-
Chapter#3 Linux Level 1 Intro
-
Linux Level 1 101
-
Linux Intro 100a
-
Linux Level 1 installation part 1 vmware
-
Linux Level 1 installation part 2 vmware (Watch this video as its the same for virtual box as well, though it covers vmware)
-
Linux Level 1 installation part 1 virtual box
-
Chapter#4 Part 1 Learning the Shell Further
-
01 Linux Level 1 learning sheel revisit
-
02 Linux Level 1 navigating the commands warming up
-
03 Linux Level 1 exploring the directories and files
-
04 Linux Level 1 working with commands
-
05 Linux Level 1 working with commands further
-
06 Linux Level 1 redirecting things around in linux part 1
-
06 Linux Level 1 redirecting things around in linux part 2
-
Chapter # Configuring Linux
-
Environment for echo
-
08 Keyboard shortcuts
-
07 Environment for echo
-
09 Permission in Linux for files
-
Chapter#3 Bash Script Docker
-
Lecture 1: Introduction to Bash Script.
-
Lecture 2 : Understanding echo and read command.
-
Lecture 3: How to write your script and Understanding Debugging MODE
-
Lecture 4 : Introduction to Linux editor | tr | xargs | seq commands
-
Lecture 5 : Conditional Statement in bash script [ PART - 1 ].
-
Lecture 6 : Conditional Statement in Bash script [ PART - 2 ]
-
Lecture 7 : Introduction to Nested if condition in Bash script.
-
Lecture 8 : Positional parameter in Bash script
-
Lecture 9 : Introduction to Loops in Bash script.
-
Lecture 10 : For loop in Bash script.
-
Lecture 11 : While loop in Bash script.
-
Lecture 12 : Until Loop in Bash Script.
-
Lecture 13 : Select Loop in Bash script.
-
Lecture 14 : Introduction to Echo commands flag and Advance bash script commands.
-
Lecture 15 : Positional Parameter with shift commands.
-
Lecture 16 : Control and Break statement in Bash script.
-
Lecture 17 : Practical Phase 1 - Solution
-
Lecture 18 : String operation in Bash Script.
-
Lecture 19 : Understanding to Array in Bash script.
-
Lecture 20 : Understanding to Function in Bash Script.
-
Lecture 21 : Filter grep commands in bash script.
-
Lecture 22 : Filter cut commands in bash script.
-
Lecture 23 : AWK commands in Bash script.
-
Lecture 24 : AWK script in Bash script.
-
Lecture 25 : SED commands in bash script.
-
Lecture 26 : Understanding find commands.
-
Lecture 27 : Scheduling task in bash script.
-
Lecture 28 : Realtime Hands-on practical in bash script. [ Part - 1 ]
-
Lecture 29 : Realtime Hands-on practical in bash script. [ Part - 2]
-
Lecture 30 : Practical Phase 2 - Solution.
-
Bash Script Quiz
-
10 Cheacking up on processes
-
exploring the environment further
-
Feedback
-
-
5
Linear Algebra for Emerging pathways
-
A Brief Overview of the Course
FREE PREVIEW -
Goals and Objectives of the Course
FREE PREVIEW -
Skills and Career Opportunities (Results of the Course)
FREE PREVIEW -
Introduction to Linear Algebra
FREE PREVIEW -
Linear Algebra Applications
-
System of Linear Equations
-
Solution of Linear Systems - Elementary Methods
-
Linear System Examples
-
What are Vectors?
-
Basic Operations on Vectors
-
Interconversion between Polar and Rectangular Coordinates
-
Norm of a Vector
-
Dot Product
-
Applications of Dot Product
-
Linear Combination of Vectors
-
Span and Linear Independence
-
System of Linear Equations and Matrices
-
Matrices Origin and Evolution
-
Basic Operations and Properties
-
Linear Transformation - Part 1 - Geometry and Intuition
-
Linear Transformation - Part 2 - Common Transformations
-
Linear Transformation - Part 3 - Mathematics of Linear Transformation
-
Composition of Transformations
-
Determinants
-
Solution of Equations - Cramer's Rule
-
Solution of Equations - Matrix Inverse
-
Reduced Row Echelon Form - RREF
-
Solution of Equations - RREF
-
Eigenvalues and Eigenvectors
-
Eigenvalues and Eigenvectors - 3 x 3 Systems
-
Feedback
-
-
6
SCADA/ICS Security 101
-
A Brief Overview of the Course
FREE PREVIEW -
Skills and Career Opportunities (Results of the Course)
FREE PREVIEW -
SCADA Security 101 intro
FREE PREVIEW -
2 - SCADA Security 101 intro Cybati VM for labs
FREE PREVIEW -
3- SCADA Security 101 intro NERC Coverage -
FREE PREVIEW -
4- SCADA Security What Certification exams we will cover -
-
Certification Schemes at European level for Cyber Security Skills of ICS SCADA
-
5-SCADA Security 101 the first phase part 1 -
-
WannaCry ransomware severely impacted the National Health Service (NHS) case study (please read carefully)
-
CrashOverride-01 (please read carefully)
-
The-Top-20-Cyberattacks for review only
-
One Flaw too Many_ Vulnerabilities in SCADA Systems - Security News - Trend Micro USA
-
Top-20-ICS-Attacks (please read carefully)
-
SCADA Security 101 the first phase part 2 -
-
7- SCADA Security 101 the first phase part 3 -
-
8-SCADA Security 101 the first phase part 4
-
9-SCADA Security 101 the first phase part 5 -
-
OPC-UA-Security-Advise-EN report to read
-
OPC_UA_SuccessStory_Transportation-Voestalpine-v1
-
OPC_UA_Success Story-OilGas-Integration
-
OPC_UA-Success Story-Automotive-Kromberg-Schubert-1
-
OPC-UA-SuccessStory-Food-Beverage-Weber-v1
-
OPC-UA-SuccessStory-SmartMetering-RegioIT-v1
-
ProsysCaseNesteJacobsOPC
-
SABIC_SAFCO_Case_Study_OwlCTI
-
10-SCADA Security 101 the first phase part 6
-
11-SCADA Security 101 the first phase part 7 Vulnerable Protocols within SCADA
-
Additional Reading Article. What Is an Advanced Persistent Threat (APT)_ _ Kaspersky
-
12-SCADA Security 101 the first phase part 8 The role of Shodan, ICS CERT and beyond
-
WannaCry ransomware used in widespread attacks all over the world _ Securelist
-
Additional Reading Article. What Is an Advanced Persistent Threat (APT)_ _ Kaspersky
-
Additional Reading Article. AShrivastava_ARP
-
Installing CSET Tool for testing and learning -
-
13-SCADA Security 101 the second phase part 1 CSET Tool walkthrough
-
14-SCADA Security 101 the second phase part 2 SCADA Risk Factors
-
Additional Reading Article. CRASHOVERRIDE_ The Malware That Attacks Power Grids
-
Additional Reading Article. HTTP_1.1_ Security Considerations
-
ICMP_ The Good, the Bad, and the Ugly _ by Drew Branch _ Independent Security Evaluators
-
Real risks of using file transfer protocol _ CIO Dive
-
Installing CSET Tool for testing and learning
-
Cyber Threat Source Descriptions _ CISA
-
ISO/IEC 27036:2013 for Vendor Risk Management
-
15-SCADA Security 101 the second phase part 3 vendor risk mgmt and ISO 27036 standard
-
16-SCADA Security 101 the second phase part 4 PERA and CPWe Architecture review MUST read
-
CISCO Design document review MUST read
-
17-SCADA Security 101 the second phase part 5a Physical and Network Security within SCADA
-
Integrated-enterprise document from CISCO (read if you can)
-
18-SCADA Security 101 the second phase part 5b Physical and Network Security within SCADA
-
How Network Segregation, Segmentation Can Stop Ransomware Attacks
-
SCADA Practice Exam Part 1 -
-
19-SCADA Security 101 the second phase part 6a the role of SIEM, SOC and the NOC
-
20-SCADA Security 101 the second phase part 6b the role of SIEM, SOC and the NOC
-
SCADA Practice Exam Part 2 -
-
21-SCADA Security 101 the second phase part 7 Computer Security and SCADA Context
-
SCADA Cyber Security _ Yokogawa Canada
-
Addressing SCADA Endpoint Protection Concerns _ Security -
-
Patch management
-
22-SCA22-DA Security 101 the second phase part 8a Application Security and SCADA Context
-
SCADA Practice Exam Part 3
-
23-SCADA Security 101 the second phase part 8 Application Security and SCADA Context
-
What is Application Whitelisting
-
IoT, edge computing spawn new security issues
-
How to protect enterprise ICS networks with firewalls -
-
Defending the internet of things at machine speed - IoT Agenda
-
Critical infrastructure firms urged to patch Schneider Electric flaws -
-
Addressing SCADA Endpoint Protection Concerns _ Security -
-
Security Development Lifecycle (SDL) for ICS_SCADA Systems - Applied Risk
-
Tofino Firewall LSM _ Tofino Industrial Security Solution -
-
24-SCADA Security 101 the second phase part 8b Application Security and SCADA Context
-
Cisco Industrial Security Appliance 3000 (ISA) - Cisco -
-
Stratix 5950 Security Appliance _ Allen-Bradley -
-
7 Best Practices to harden SCADA networks security -
-
Ignition Security Hardening Guide-11-05-20 -
-
SCADA Practice Exam Part 4 -
-
25-SCADA Security 101 the second phase part 9a SCADA Security Program Development Final Class
-
26-SCADA Security 101 the second phase part 9 SCADA Security Program Development
-
Feedback
-
-
7
RHEL Intensive - Linux Fundamentals
-
A Brief Overview of the Course
FREE PREVIEW -
Importance of the Course
FREE PREVIEW -
Skills and Career Opportunities (Results of the Course)
FREE PREVIEW -
1.Introduction
FREE PREVIEW -
DEMO Notes
FREE PREVIEW -
2.File System Hierarchy Overview
-
3.File System Hierarchy-Editors AWS Account
-
4.SoftLinks & HardLinks-cp-mv
-
5.Installation RHEL7-8 Ownership Permissions Overview
-
6.Editors Ownership Permission
-
7.Advanced Permissions Run levels
-
8.Partitions
-
9.Run levels Continue
-
10.Targets Partitions Logic Concept
-
11.Partitions Logic Concept-FSTab
-
12.Partitions Task Solving-Compression Tools Redirect Topic
-
13.Archive Compression Tools
-
14.RSync
-
15.Lun Scanning Disk Scanning Logical-Extended Partition_1
-
16.Fdisk Partitioning Cases Standards and Mounting
-
17.FSCK-Repairing the HD
-
18.File system Check Repair
-
19.Grep find locate fstab process daemons
-
20.Process-daemons-PerformaceMonitoring-P1
-
21.Process daemons PerformaceMonitoring-P2
-
22.Process daemons Performance Monitoring-P3 NW Start
-
Feedback
-
-
8
RHEL Intensive - Network-User-Administration
-
23.1-NW2 How to configure IP-Gateway
-
24.NW3 DNS Resolv conf
-
25.NW4 IPClass IP Aliasing
-
26.NW5 Protocols Ports OSI Layer
-
27.NW6 Ports Sniffer RPM
-
28.RPM-Install Upgrade Erase Package In LInux
-
29.RPM-SWAP
-
30.Interview Prep - Performance Monitoring Tools
-
31.Performance Monitoring TOP FIND-FSH
-
32.FSH-Tape Backups
-
33.FSH-YUM
-
34.SWAP-Extend Resume Development Overview
-
35.YUM NW Config in Centos 7-8-_1
-
36.JOB Details Resume Development
-
Resumes
-
37. Yum Deep Dive
-
38.Yum Local Repo Server LVM2
-
39.LVM3-Add Extend Remove Logical Volume
-
40.LVM4-Add Extend Remove Logical Volume Mappings
-
41.LVM5-Structure Backup Snapshot RHCSA PE-Extent Question
-
42.Yum-OS Software Kernel Patching Undo Roll Back
-
43.Source Code Installation
-
44. Cron Scheduler
-
45.User Management
-
46.Advance Permission SUID SGID STICKY BIT SUDOERS
-
47.Sudoers-UMASK
-
48.Kernel Driver Management
-
49.Kernel Management Patching
-
50.Kernel Tunning
-
Feedback
-
-
9
RHEL Intensive - Services
-
51.AWS-Cloud Computing Overview-AWS-global infrastructure
-
52.AWS Launching EC2-Instance
-
53.AWS-Services Overview Billing Support Center- Waiveoff
-
54.AWS-Cloudwatch
-
55.AWS Types Families EBS Volumes
-
56.AWS Elastic IP S3
-
57.AWS-S3-Calculator-NFS
-
58.Server Client Model NFS-Server
-
59.NFS Server2 and FTP
-
60.Service Concepts Securing vSFTP
-
61.Setting Up FTPs in Enterprise
-
vsftpd-conf-sample
-
62.Apache Server
-
63.Apache Server with 2 Containers
-
64.Tcp Wrappers-IP Tables
-
65.IP Tables Firewall lD SE Linux
-
66.DNS Caching Server land DNS Server
-
67.Domain Registration LIVE Web Hosting
-
68.Xinetd SSH
-
69.SAMBA
-
-
10
Python Deep Dive
-
1. Introduction To The Course
FREE PREVIEW -
2. Importance Of This Course
FREE PREVIEW -
3. Skills & Opportunities
FREE PREVIEW -
Python Primer Main Course Explanation
FREE PREVIEW -
Python Primer 000
-
Python-Primer-100
-
Python-Primer-100
-
Python Primer 101
-
Python-Primer-101
-
Python Primer 102a
-
Python-Primer-102-a
-
Python Primer 102b
-
Python-Primer-102-b
-
Python primer 102c
-
Python-Primer-102-c
-
Python primer 102d
-
Python-Primer-102d
-
Python Primer 103
-
Python-Primer-103
-
Python Primer 104
-
Python-Primer-104
-
Python Primer 105
-
Python-Primer-105
-
Python Primer 106
-
Python-Primer-106
-
Python Alpha 000
-
Python-Alpha-000
-
Python Alpha 100
-
Python-Alpha-100
-
Python Alpha 101a
-
Python-Alpha-101a
-
Python Alpha 101b
-
Python-Alpha-101b
-
Python Alpha 200
-
Python Alpha 200(Cont.)
-
Python-Alpha-200
-
Python Alpha 300
-
Python-Alpha-300
-
Python Alpha 400a
-
Python-Alpha-400a
-
Python Alpha 400b
-
Python-Alpha-400b
-
Python Alpha 500
-
Python Alpha 500 easy version
-
Python-Alpha-500-easy-version
-
Python-Alpha-500
-
Python Alpha 600a
-
Python Alpha 600b
-
Python-Alpha-600b
-
Python Alpha 600c
-
ALPHA 600C QUIZ
-
Python Alpha 700a
-
Python Alpha 700b
-
Python Alpha 800
-
Python-Alpha-800b
-
Python Alpha 900
-
Python-Alpha-900
-
Python Alpha 900a
-
Python-Alpha-900a
-
Python Alpha 900b
-
Python Alpha 1000a
-
Python-Alpha-1000a-Classes-in-Python
-
Python Beta 000
-
Python Beta 100 Object and Data Structures
-
Python-Beta-100-Obejct-and-Data-Structures
-
Python Beta 101 Python and Numbers 01
-
Python Beta 101 Python and Numbers 02
-
Python Beta 101 Python and Numbers 03
-
Python-Beta-101-Python-and-Numbers
-
Python Beta 102 Python and Strings
-
Python-Beta-102-Python-and-string-01
-
Python Beta 102a Python and Strings
-
Python-Beta-102a-Python-and-string
-
Python Beta 103 Python and Strings
-
Python Beta 104 Python and Strings
-
Python Beta 105 Python and Strings
-
Python-Beta-Python-and-string-03-04-05
-
Python Beta 106 Python and Strings
-
Python Beta 106 Python and Print Function
-
Python Beta 107 lists and dictionaries
-
Python Beta 107a lists and dictionaries
-
Python Beta 107b lists and dictionaries
-
Python Beta 107c lists and dictionaries
-
Python-Beta-107-LIsts-and-Distionaries
-
Python Beta 108a tuples. sets and booleans
-
Python Beta 108b tuples. sets and Booleans
-
Python Alpha 800b
-
Python Beta 108c tuples. sets and booleans
-
Python Beta 109 Input and Output Function in Python
-
Python-Beta-109-Input-and-Output-in-Python
-
Python Beta 110 Python Boolean Operators
-
Lecture 1 : Lecture Introduction to Python.
-
Lecture 2 : Installation Python.
-
Lecture 3 : Python basic commands and installation Pycharm.
-
Lecture 4 : Variables and Data types in Python.
-
Lecture 5 : Python type casting and print format in Python.
-
Lecture 6 : Escape sequences and comments in Python.
-
Lecture 7 : Condition in Python.
-
Lecture 8 : String operation in python [ Part - 1 ]
-
Lecture 9 : String operation in python [ Part - 2 ]
-
Lecture 10 : List Data structure in python [ Part - 1 ]
-
Lecture 11 : List Data Structure in python [ Part - 2 ]
-
Lecture 12 : Tuple data structure in python.
-
Lecture 13 : Dictionary data structure in Python [ Part - 1 ]
-
Lecture 14 : Dictionary data structure in Python [ Part - 2 ]
-
Lecture 15 : How to work with modules in python.
-
Lecture 16 : OS module in python [ Part - 1 ]
-
Lecture 17 : OS module in python [ Part - 2 ]
-
Lecture 18 : OS module in python [ Part - 3 ]
-
Lecture 19 : OS Module in python [ Part - 4 ]
-
Lecture 20 : Platform module in Python.
-
Lecture 21 : Command line arguments module in python.
-
Lecture 22 : Python Loop [ Part - 1 ]
-
Lecture 23 : Python Loop [ Part - 2 ]
-
Lecture 24 : Practical Session - Phase one Solution.
-
Lecture 25 : Control Statement in python.
-
Lecture 26 : Practical session - Phase two solution.
-
Lecture 27 : Python Function [ Part - 1 ]
-
Lecture 28 : Python Function [ Part - 2 ]
-
Lecture 29 : Exception Handling [ Part - 1 ]
-
Lecture 30 : Exception Handling [ Part - 2 ]
-
Lecture 31 : Datetime module in python [ Part - 1 ]
-
Lecture 32 : Datetime module in python [ Part - 2 ]
-
Lecture 33 : File Handling [ Part - 1 ]
-
Lecture 34 : File handling [ Part - 2 ]
-
Lecture 35 : File handling [ Part - 3 ]
-
Lecture 36 : File handling [ Part - 4 ]
-
Lecture 37 : File Handling [ Part - 5 ]
-
Lecture 38 : File Handling [ Part - 6 ]
-
Lecture 39 : Email module [ Part - 1 ]
-
Lecture 40 : Email Module [ Part - 2 ]
-
Lecture 41 : Scheduler in python [ Part - 1 ]
-
Lecture 42 : Regular expression in python [ Part - 1 ]
-
Lecture 43 : Regular expression in Python [ Part - 2 ]
-
Lecture 44 : Regular Expression in Python [ Part - 3 ]
-
Lecture 45 : Regular Expression in Python [ Part - 4 ]
-
Lecture 46 : Regular Expression in Python [ Part - 5 ]
-
Lecture 47 : Remote Server Module in Python [ Part - 1 ]
-
Lecture 48 : Remote Server Module in Python [ Part - 2 ]
-
Lecture 49 : Remote server module in python [ Part - 3 ]
-
Lecture 50 : Remote server module in python [ Part - 4 ]
-
Lecture 51 : remote server module in Python [ Part - 5 ]
-
Lecture 52 : Working with Database module in Python [ Part -1 ]
-
Lecture 53 : Working with Database module in python [ Part -2 ]
-
Lecture 54 : Working with Database module In python [ Part - 3 ]
-
Lecture 55 : Working with database module in Python [ Part - 4 ]
-
Lecture 56 : Working with database module in Python [ Part -5 ]
-
Lecture 57 : Real-World Project [ Part -1 ]
-
Lecture 58 : Real-World Project [ Part - 2 ]
-
Lecture 59 : Real-World Project [ Part - 3 ]
-
Feedback
-
-
11
Learn Data Science Using Python
-
Introduction To The Course
FREE PREVIEW -
Skills & Opportunities
FREE PREVIEW -
Introduction to Deep Learning
FREE PREVIEW -
1_Setup and Installation
FREE PREVIEW -
2_Introduction to Data Science
FREE PREVIEW -
Data sets
-
Introduction to Data Science
-
1_Complete Matplotlib
-
2_Virtual Environment Part I
-
3_Virtual Environment Part 2
-
4_Introduction to Jupyter Notebook
-
5_Fundamentals of Python
-
Installing Anaconda
-
6_Object Oriented Programming - Python
-
7_War Card Game - OOP Python
-
8_Complete Matplotlib
-
9_Installing Pandas Library
-
10_Pandas Series Part I
-
11_Pandas Series Part II
-
12_Pandas DataFrame Part I
-
13_Pandas DataFrame Part II
-
14_Pandas DataFrame Part III
-
15_Concatenation _ Merging
-
16_ Operations _ Read Write DataFrame
-
17_Complete Matplotlib
-
18_Installing Seaborn Library
-
19_Distribution Plot
-
20_Style and Colors
-
21_Regression Plot
-
22_Grid Plot
-
23_Matrix Plot
-
24_Categorical Plot
-
25_Introduction to Data Preprocessing
-
26_Importing the Dataset
-
27_Taking Care of Missing Data
-
28_Feature Scaling
-
29_Splitting the Dataset
-
30_Encoding Categorical Data
-
31-Simple Linear Regression Theory
-
32_Simple Linear Regression Part I
-
33_Simple Linear Regression Part II
-
34_Simple Linear Regression Part III
-
35_Multiple Linear Regression Theory
-
37_Polynomial Regression Theory
-
38_Polynomial Regression
-
39_Support Vector Regression
-
40_Decision Tree Regression
-
41_Random Forest Regression
-
SImple Linear Regression
-
42_Logistic Regression Theory
-
Polynomial Linear Regression
-
43_K-Nearest Neighbour Theory
-
44_Logistic Regression
-
Hierarchical Clustering
-
51_Naive Bayes
-
Naive Bayes
-
52_K-Nearest Neighbour.ts
-
53_Support Vector Machine Theory
-
53_Support Vector Machine
-
49_Kernel Support Vector Machine.ts
-
50_Naive Bayes Theory
-
51_Decision Trees
-
52_Random Forest Theory
-
53_Random Forest
-
54_ XGBoost
-
Feedback
-
-
12
Certified Information System Security Professional
-
A Brief Overview of the Course
-
Goals and Objectives of the Course
-
Importance of the Course
-
Skills and Career Opportunities (Results of the Course)
-
CISSP Intro 100a
FREE PREVIEW -
CISSP 000a notes
FREE PREVIEW -
1_CISSP Domain 1a Domain 1 Security
FREE PREVIEW -
CISSP Domain 1a Security Risk Management slides
-
2_CISSP Domain 1b Domain 1 Security
-
CISSP Domain 1b Security Risk Management slides
-
3_CISSP Domain 1c Domain 1 Security
-
CISSP Domain 1c Security Risk Management slides
-
CISSP Domain 1d Security Risk Management slides
-
CISSP Domain 1d Domain 1 Security
-
5_CISSP Domain 1e Domain 1 Security
-
6_CISSP Domain 1f Domain 1 Security
-
7_CISSP Domain 1g Domain 1 Security
-
CISSP Domain 1i Domain 1 Security
-
10_CISSP Domain 1j Domain 1 Security
-
CISSP Domain 1k Domain 1 Security
-
CISSP Domain 1l Domain 1 Security
-
13_CISSP Domain 1m Domain 1 Security
-
14_CISSP Domain 1n Domain 1 Security
-
CISSP Domain 1 Security & Risk Management Detailed Notes Complete set. There is no separate notes.
-
1_ CISSP Domain Asset Security 2a
-
CISSP Domain 2a Asset Security slides
-
2_CISSP Domain Asset Security 2b
-
CISSP Domain 2b Asset Security slides
-
3_CISSP Domain Asset Security 2c
-
CISSP Domain 2c Asset Security slides
-
4_CISSP Domain Asset Security 2d
-
CISSP Domain 2d Asset Security slides
-
5_5CISSP Domain Asset Security 2e
-
CISSP Domain 2e Asset Security slides
-
6_CISSP Domain Asset Security 2f
-
CISSP Domain 2f Asset Security slides
-
7_ISSP Domain Asset Security 2g
-
CISSP Domain 2g Asset Security slides
-
CISSP Domain Asset Security 2h
-
CISSP Domain 2h Asset Security slides
-
9_CISSP Domain Asset Security 2i
-
CISSP Domain 2i Asset Security slides
-
10_CISSP Domain Asset Security 2j
-
CISSP Domain 2j Asset Security slides
-
11_CISSP Domain Asset Security 2k
-
CISSP Domain 2k Asset Security slides
-
12_CISSP Domain Asset Security 2l
-
CISSP Domain 2l Asset Security slides
-
13_CISSP Domain Asset Security 2m
-
CISSP Domain 2m Asset Security slides
-
14_CISSP Domain Asset Security 2n
-
CISSP Domain 2n Asset Security slides
-
Domain 2 Assets Security Quiz 1
-
CISSP Doam 2 Asset Security Complete set. There are no other notes!
-
CISSP Domain 3a
-
CISSP Domain 3a Security Architecture Engineering with detailed notes
-
CISSP Domain 3b
-
CISSP Domain 3b Security Architecture Engineering with detailed notes
-
CISSP Domain 3c
-
CISSP Domain 3c Security Architecture Engineering with detailed notes
-
CISSP Domain 3d
-
CISSP Domain 3e Security Architecture Engineering with detailed notes
-
CISSP Domain 3d Security Architecture Engineering with detailed notes
-
CISSP Domain 3e
-
CISSP Domain 3f
-
CISSP Domain 3f Security Architecture Engineering with detailed notes
-
CISSP Domain 3g
-
CISSP Domain 3h Security Architecture Engineering with detailed notes
-
CISSP Domain 3g Security Architecture Engineering with detailed notes
-
CISSP Domain 3h
-
CISSP Domain 3i
-
CISSP Domain 3i Security Architecture Engineering with detailed notes
-
CISSP Domain 3j
-
CISSP Domain 3j Security Architecture Engineering with detailed notes
-
CISSP Domain 3k
-
CISSP Domain 3k Security Architecture Engineering with detailed notes
-
CISSP Domain 3l
-
CISSP Domain 3l Security Architecture Engineering with detailed notes
-
CISSP Domain 3m
-
CISSP Domain 3m Security Architecture Engineering with detailed notes
-
CISSP Domain 3n
-
CISSP Domain 3n Security Architecture Engineering with detailed notes
-
CISSP Domain 3o
-
CISSP Domain 3o Security Architecture Engineering with detailed notes
-
CISSP Domain 3p
-
CISSP Domain 3p Security Architecture Engineering with detailed notes
-
CISSP Domain 3q
-
CISSP Domain 3q Security Architecture Engineering with detailed notes
-
CISSP Domain 3r
-
CISSP Domain 3r Security Architecture Engineering with detailed notes
-
CISSP Domain 3s
-
CISSP Domain 3s Security Architecture Engineering with detailed notes
-
CISSP Domain 3t
-
CISSP Domain 3t Security Architecture Engineering with detailed notes
-
CISSP Domain 3u
-
CISSP Domain 3u Security Architecture Engineering with detailed notes
-
CISSP Domain 3v
-
CISSP Domain 3v Security Architecture Engineering with detailed notes
-
CISSP Domain 3w
-
CISSP Domain 3w Security Architecture Engineering with detailed notes
-
CISSP Domain 3x
-
CISSP Domain 3x Security Architecture Engineering with detailed notes
-
CISSP Domain 3y
-
CISSP Domain 3y Security Architecture Engineering with detailed notes
-
CISSP Domain 3z1
-
CISSP Domain 3z1 Security Architecture Engineering with detailed notes
-
CISSP Domain 3z2
-
CISSP Domain 3z2 Security Architecture Engineering with detailed notes
-
CISSP Domain 3z3
-
CISSP Domain 3z3 Security Architecture Engineering with detailed notes
-
CISSP Domain 3z4
-
CISSP Domain 3z4 Security Architecture Engineering with detailed notes
-
CISSP Domain 3z5
-
CISSP Domain 3z5 Security Architecture Engineering with detailed notes
-
Domain 3 Security Architecture and Engineering Quiz 1
-
CISSP Domain 3z6
-
Domain 3 Security Architecture and Engineering Quiz 2
-
CISSP Domain 4a
-
CISSP Domain 4b
-
CISSP Domain 4b Communication and Network Security
-
CISSP Domain 4c1
-
CISSP Domain 4c2
-
CISSP Domain 4c Communication and Network Security with Notes at the bottom
-
CISSP Domain 4d1
-
CISSP Domain 4d2
-
CISSP Domain 4d Communication and Network Security with Notes at the bottom
-
CISSP Domain 4e
-
CISSP Domain 4e Communication and Network Security with Notes at the bottom
-
CISSP Domain 4f
-
CISSP Domain 4f Communication and Network Security with Notes at the bottom
-
CISSP Domain 4g
-
CISSP Domain 4g Communication and Network Security with Notes at the bottom
-
CISSP Domain 4h
-
CISSP Domain 4h Communication and Network Security with Notes at the bottom
-
CISSP Domain 4i
-
CISSP Domain 4i Communication and Network Security with Notes at the bottom
-
CISSP Domain 4j
-
CISSP Domain 4j Communication and Network Security with Notes at the bottom
-
CISSP Domain 5a IAM
-
CISSP Domain 5a IAM
-
CISSP Domain 5b IAM
-
CISSP Domain 5b
-
CISSP Domain 5c
-
CISSP Domain 5c IAM
-
CISSP Domain 5d
-
CISSP Domain 5d IAM
-
CISSP Domain 5e
-
CISSP Domain 5e IAM
-
Domain 5 IAM Quiz 1
-
CISSP Domain 6a
-
CISSP Domain 6a Security Assessment and Testing
-
CISSP Domain 6b
-
CISSP Domain 6b
-
CISSP Domain 6c
-
CISSP Domain 6c Security Assessment and Testing
-
CISSP Domain 6d
-
CISSP Domain 6d Security Assessment and Testing
-
Domain 6 Security Assessment & Testing Quiz 1
-
CISSP Domain 7a Sec Ops
-
CISSP Domain 7a Sec Ops
-
CISSP Domain 7b Sec Ops
-
CISSP Domain 7b Sec Ops
-
CISSP Domain 7c Sec Ops
-
CISSP Domain 7c Sec Ops
-
CISSP Domain 7d Sec Ops
-
CISSP Domain 7d Sec Ops
-
CISSP Domain 7e Sec Ops
-
CISSP Domain 7f Sec Ops
-
CISSP Domain 7g Sec Ops
-
CISSP Domain 7h Sec Ops
-
CISSP Domain 7i Sec Ops
-
CISSP Domain 7j Sec Ops
-
CISSP Domain 7k Sec Ops
-
CISSP Domain 7l Sec Ops
-
CISSP Domain 7m Sec Ops
-
CISSP Domain 7 remaining notes from presentation e till n
-
CISSP Domain 8 Soft Dev Sec 1a
-
CISSP Domain 8 Soft Dev Sec 1b
-
CISSP Domain 8 Soft Dev Sec 1c
-
CISSP Domain 8 Soft Dev Sec 1d
-
CISSP Domain 8 Soft Dev Sec 1e
-
CISSP Domain 8 Soft Dev Sec 1f
-
CISSP Domain 8 Soft Dev 1g
-
CISSP Domain 8 Soft Dev 1h
-
CISSP Domain 8 Soft Dev 1i
-
CISSP Domain 8 Soft Dev 1j
-
CISSP Domain 8 Soft Dev Sec 1k
-
CISSP Domain 8 Soft Dev Sec 1l
-
CISSP Domain 8 Soft Dev 1m
-
CISSP Domain 8 Soft Dev 1n
-
CISSP Domain 8 Soft Dev 1o
-
Domain 8 Notes Final revised notes
-
Feedback
-
Quiz 1
-
Quiz 2
-
Quiz 3
-
Quiz 4
-
Quiz 5
-
Quiz 6
-
Quiz 7
-
Quiz 8
-
-
13
AWS Architect Essentials
-
What is Cloud Computing
FREE PREVIEW -
Demo Regions AZ AWS Models
-
Demo AWS Models
-
DEMO AWS Features
-
Cloud Computing With AWS Perspective
-
AWS Free Tier Account Set Bill Alerts
-
Module 1-5
-
-
14
Cyber Security Essentials Revisit
-
1. Introduction To The Course
FREE PREVIEW -
2. Skills & Opportunities
FREE PREVIEW -
lecture 1a
FREE PREVIEW -
Cyber Body of knowledge Notes for this course - Chapter#1
-
2_lecture 1b
-
3_lecture 1c
-
CyBOK_version_1.0 - Domain 1
-
1_Cybok 01 Introduction Walkthrough part 1
-
2_Cybok 01 Introduction Walkthrough part 2
-
1_Chapter 2 Risk Management _ Governance part 1
-
2_Chapter 2 Risk Management _ Governance part 2
-
Chapter 2 Risk Management & Governance notes
-
3_Chapter 3 Law _ Regulation part 1
-
4_Chapter 3 Law _ Regulation part 2
-
Chapter 3 Law & Regulation notes
-
Cybok Security essentials revisit pdf slides
-
5_Chapter 4 Human Factors
-
6_Chapter 5 Privacy _ Online Rights part 1
-
7_Chapter 5 Privacy _ Online Rights part 2
-
Chapter 6 Malware & Attack Technologies
-
Chapter 7 Adversarial Behaviour part 1
-
Chapter 7 Adversarial Behaviour part 2
-
Chapter 8 Security Ops & Incident Management
-
Chapter 9 Forensics
-
1_Chapter 10 Cryptography
-
2_Chapter 11 Operating Systems and Virtulization
-
3_Chapter 12 Distributed Systems Security
-
4_Chapter 13 AAA
-
1_Chapter 14 Software Security
-
2_Chapter 15 Web and Mobile Security
-
3_Chapter 16 Secure Software Lifecycle
-
3_Chapter 16 Secure Software Lifecycle
-
1_Chapter 17 Network Security
-
2_Chapter 18 Hardware Security
-
3_Chapter 19 Cyber Physical Systems Security
-
4_Chapter 20 Physical Layer Security and Telecommunications
-
Feedback
-
-
15
Elasticsearch SOC engineer
-
Lab environment
-
0.0: A Bird's Eye View of our Course
FREE PREVIEW -
Skills and career Opportunities
FREE PREVIEW -
Introduction to Elasticsearch for SOC Engineers - Video
-
Introduction to Elasticsearch for SOC Engineers
-
Understanding SOC Engineers 🔒 - Video
-
Understanding SOC Engineers 🔒
-
📊 Using Elasticsearch for SOC Operations 📊 - Video
-
📊 Using Elasticsearch for SOC Operations 📊
-
1.1: Introduction to the ELK Stack (Description)
FREE PREVIEW -
1.1 Introduction to the ELK Stack - Chapter#1
FREE PREVIEW -
1.2: Data in
FREE PREVIEW -
1.2: Data in (Description)
-
1.3 Information Out
-
1.3: Information out (Description)
-
2.1 Strings in Elasticsearch - Chapter#2 Data Modeling in ELK
-
2.1: Strings in Elasticsearch (Description)
-
2.2 Index Mapping in ELK
-
2.3 Text Analysis
-
2.3: Text analysis (Description)
-
2.4 Types and Parameters
-
2.4: Types and parameters (Description)
-
3.1 Searching with DSL Queries - Chapter#3 You Know, for search
-
3.1: Searching with the Query DSL (Description)
-
3.2 More DSL Queries
-
3.2: More DSL queries (Description)
-
3.3 Developing Search Applications
-
3.3: Developing Search Applications (Description)
-
4.1 Changing Data - Chapter#4 Data Processing in ELK.ts
-
4.1: Changing data (Description)
-
4.2 Enriching Data
-
4.2: Enriching data (Description)
-
4.3 Runtime Fields
-
4.3: Runtime Fields (Description)
-
5.1 Metrics and Buckets Aggregations - Chapter#5 Aggregation
-
5.1: Metrics and Buckets Aggregations (Description)
-
5.2. Combining Aggregations
-
5.2: Combining Aggregations (Description)
-
5.3 More Aggregations
-
5.3: More aggregations (Description)
-
6.1 Understanding Shards - Chapter#6 Shards in ELK
-
6.1: Understanding Shards (Description)
-
6.2 Scaling Elasticsearch
-
6.2: Scaling Elasticsearch (Description)
-
6.3 Distributed Operations
-
6.3: Distributed Operations (Description)
-
7.1 Data Management Concepts - Chapter#7 Data Management in ELK
-
7.1: Data Management Concepts (Description)
-
7.2 Index Life-cycle Management Policy
-
7.2 : Politique de gestion du cycle de vie des index (description)
-
7.3 Snapshots In ELK Stack
-
7.3: Snapshots in ELK Stack (Description)
-
8.1 ELK Cluster Management - Chapter#8 Cluster Management in RLK
-
8.1: ELK Cluster Management (Description)
-
8.2 ELK Troubleshooting _ Monitoring
-
8.2: ELK Troubleshooting & Monitoring (Description)
-
9.1 ELK Outro
-
ELK Outro
-
Feedback
-
-
16
Probability for Emerging Pathways
-
Introduction To The Course - Chapter 0
FREE PREVIEW -
Skills & Opportunities - Chapter 0
FREE PREVIEW -
1 - History of Probability - Chapter 1
-
2 - Introduction Module
FREE PREVIEW -
3 - Random Experiments and Probability
-
4 - Assigning Probabilities
-
5 - Counting Techniques - Fundamental Counting Principle
-
6 - Counting Techniques - Combinations and Permutations
-
7 - Axiomatic Definition and Basic Rules
-
8 - Conditional Probability - Chapter 2
-
9 - Joint Probability
-
Marginal Probability
-
Bayes Theorem
-
12 Random Variable - Discrete Random Variable - Chapter 3
-
13 Discrete RV - PMF
-
14 Discrete RV - CDF
-
15 Discrete RV - Expectation and Variance
-
16 Uniform Distribution
-
17 Binomial Distribution
-
Poisson Distribution
-
Continuous RV - PDF, CDF - Continuous Random Variable - Chapter 4
-
Normal Distribution - Part 1 - PDF, CDF
-
Normal Distribution - Part 2 - Computations
-
Quiz 1 - Random Experiments
-
Quiz 2 - Fundamental Counting Principle
-
Quiz 3 - Combinations and Permutations
-
Quiz 4 - Basic Rules of Probability
-
Quiz 5 - Conditional and Joint Probability
-
Quiz 6 - Total Probability and Bayes Theorem
-
Quiz 7 - Expectation, Variance
-
Quiz 8 - Binomial Distribution
-
Quiz 9 - Poisson Distribution
-
Quiz 10 - Continuous RV and Normal Distribution
-
-
17
Vulnerability Assessment in line with various frameworks
-
Please see the video to learn how you can utilise our containers to perform hands on labs
-
Skills and Career Opportunities
FREE PREVIEW -
What you will learn
FREE PREVIEW -
Common risks to organizations
FREE PREVIEW -
CODS connection
-
Please use the following domains to access the exact labs
-
7 key cyber security threats for businesses – and how to tackle them
-
VA Class 04 common risks to organizations continued
-
10 Common IT Security Risks in the Workplace
-
VA Class 05 How do we see you vs you see yourself vs the industry
-
VA Class 06 Key things to know within CODS Industry
-
VA Class 07 Disconnect with the Security Industry and Community
-
VA Class 08 What makes this course Unique and what you will learn
-
VA Class 09 be purple
-
VA Class 10 The world needs more super heroes
-
VA Class 11 The start of your journey and the VA Flow
-
VA Class 12 which one is you
-
VA Class 13 VA at an Enterprise Level
-
VA Class 14 IT vs OT
-
Operational technology (OT) - definitions and differences with IT
-
VA Class 15 why VA is necessary
-
VA Class 16 Satan and Adam and security by design the sunnah way
-
17 Best Vulnerability Assessment Scanning Tools
-
What is Security by Design
-
Security by design research paper
-
VA Class 17 VA Case studies
-
Vulnerability Assessment Case Study for Hospital
-
Cyprus-shipping-chamber-vulnerability-management-case-study
-
Read this case study even if you struggle its Ok. As down the line you will learn all these things. An empirical study on vulnerability assessment and penetration detection for highly sensitive networks
-
Cybersecurity Vulnerability Assessment (CVA)
-
Vulnerability Assessment
-
Vulnerability Management Process: Scanning, Prioritizing, and Remediating
-
VA Class 18 VA through the lens of various standards part 1
-
VA Class 18 VA through the lens of various standards part 2
-
VA Class 19 VA Framework part 1
-
VA Class 19 VA Framework part 2
-
VA Class 19 VA Framework part 3
-
VA Class 19 VA Framework part 4
-
VA Class 19 VA Framework part 5
-
VA Class 19 VA Framework part 6
-
VA Class 19 VA Framework part 7 8 and 9
-
VA Class 20 Know your scope Dont commit a 2 trillion dollars mistake
-
VA Class 21 The connection between risk assessment and threat modelling
-
Threat Modelling (Reading excercise)
-
Threat Modelling Process (reading excercise)
-
Threat Modeling: 12 Available Methods (Further reading)
-
Microsoft Threat Modeling tool.
-
VA Class 22 Know the physical and logical assets part a
-
Advantages and Disadvantages of Active vs. Passive Scanning in IT and OT Environments (Reading material)
-
OSI Model Explained: The OSI 7 Layers (Reading Material)
-
The OSI model explained and how to easily remember its 7 layers (Reading Material)
-
Massscan Lab part 1 - Chapter #2
-
ARP VS RARP – Difference between ARP and RARP (Reading material)
-
Massscan Lab part 2
-
Massscan Lab part 3
-
Mass scan Lab part 4
-
Mass scan Lab part 5
-
Masscan How to operate
-
Something to ponder a good read to know history
-
Turkish president speech a food for thought as to what is on the horizon in the cyber space think social-injustice-ware.
-
Senator Bernie Sanders speaking in the US House.
-
Masscan Assignment and submit the .txt file accordingly.
-
Difference between VA and patching - Chapter#3
-
Difference between vulnerability scanning and patch management (Please read this in your native language)
-
Patch management vs vulnerability management (Read this in your native language)
-
The 15 biggest data breaches of the 21st century so far (read this in your native language)
-
Please take note.
-
Everything is Vulnerable just like us humans
-
Articles to read
-
Network Data and why it matters in the context of VA
-
Articles for reading as they relate to Network Data.
-
Open Source Recon tools to test out
-
Tools to test out on the Ghanimah labs infrastructure
-
Scanning the cloud what you need to know as a VA analyst
-
Read this article in your native language using google translate
-
Global Cloud Providers
-
Read this article in your native language using google translate
-
Inspector Gadget Connection to Cloud assessments part 1 -Chapter#4
-
Introducing Amazon Inspector
-
Amazon Inspector
-
Inspector Gadget Connection to CLoud assessments part 2
-
Inspector Gadget Connection to Cloud assessments part 3
-
Security Talks Improve your security GCP
-
Reading articles only. We will cover hands on activities later on in the clod labs.
-
The connection between army doctrine vs vulnerability assessment
-
Read this article by translating it into your native language using google translator
-
Which vulnerbaility scanners can you use
-
Read this article and translate this into your own native language using google translator
-
Understanding Cyber Security Risk is important - Chapter#5
-
Watch this video if you can and understand the context as it will help you prepare for interviews later
-
Risk management Methodologies
-
Octave. Read these documents by translating them in your own native language using google translator
-
OCTAVE. Download and read this document in your native language
-
Information Operations Conditions (INFOCON). Read this document in your own native language
-
OWASP Risk Rating Methodology. Read this in your own native language to understand better
-
CVSS Risk Rating System. Read this in your own Native language
-
The risk-based approach to cybersecurity. Read this document by translating it into your native language.
-
Open Source vs Commercial VA scanners - Chapter#6
-
Open-Source Vs. Commercial VA tools. Read this in your native language.
-
Internal VS External Vulnerability Scans: What’s The Main Difference?. Translate this into your local language and read.
-
Types of VA Scanners in the Market and what you should learn and will learn on our labs
-
Vulnerability Scanning Tools/ Translate this in your native language and read the article.
-
Best Vulnerability Scanner Tools for 2021. read this in your native language to under better.
-
Types of Scans at our disposal
-
Types of VA Scans. Read this article by translating this in your native language.
-
Difference between web and network scanning
-
Web Application Security or Network Security. Translate this in your native language and read.
-
The 4 Big Differences Between Network Security and Web Application Security. Translate this in your native language and ready.
-
Attention, please take note.
-
Web application types and tools to attack them
-
Ultimate Guide to Top 10 Types of Web Applications Development. Translate this into your native language and read please.
-
Web Applications with a Content Management System. Read this in your native language please.
-
Top 10 Open Source Security Testing Tools for Web Applications. please read this in your native language.
-
SSL vs non SSL what to use part 1 - Chapter#7
-
Read these articles in your local language and read them please.
-
Please read this article in your local language by translating it through google.
-
Please Read this article in your local language by translating it through google translator.
-
SL vs non SSL what to use part 2
-
Masscan Github link for review
-
Test out your server, your browser and SSL pulse
-
SSL vs non SSL what to use part 3
-
SSL/TLS Deployment Best Practices. Translate this in your native language.
-
SSL Server Rating Guide. Please translate and read this in your native language.
-
Recommendation to buy a book.
-
Tell me about this VOIP
-
anslate this article in your native language and read please.
-
Translate this article in your native language and read please.
-
Translate this article in your native language by read please.
-
Scanning where it really hurts part 1 - Chapter#8
-
Scanning where it really hurts part 2
-
Please translate in your local language to help you better understand the context.
-
Read some of these validated designs. Translate in your native language if you MUST to understand better.
-
nning where it really hurts part 3
-
Scanning where it really hurts part 4
-
Autonomous Ground Vehicles Security Guide (Read in your native language by using a google translator)
-
Cloud Computing different models
-
Key documents to read.
-
Wi-Fi Vulnerbaility and IoT Connection
-
Please read this in your native language by using google translator
-
Please read this in your native language by using google translator
-
Please read this in your native language by using google translator
-
Map The Network 1 - Chapter#9 Hands On Work
-
Map the Network 1 Lab
-
Map the Network 2
-
Map the Network2 - Lab
-
Detection Firewall
-
Firewall Detection - Lab
-
Nmap Scripting Engine
-
NMap Scripting Engine - Lab
-
Firewall_Evesion
-
Firewall Evesion - Lab
-
Natwork Maper
-
Introduction - Chapter #10
-
ZAP
-
ZAP-Installation
-
Deep Dive Into ZAP
-
Deep Dive Into ZAP - 2
-
Deep Dive into the ZAP - Lab
-
AFTER VA_USING_ZAP
-
Burpsuit - Chapter#11
-
How to Download Burp_Suite Pro
-
Burp_Suite Installation _ Walkthrough
-
Intercept Request Using Burp Proxy
-
Burp Intruder Deep Dive
-
Authenticated Scan With Burp
-
VA Using BurpSuite1
-
Play Around With Burpsuite - Lab
-
DNS - Lab
-
-WHAT is DNS _ DNS Records
-
DIG_NSLOOKUP_DNSENUM
-
Introducing to DNSDUMPTER
-
Subdomain Enumeration With Sublist3r
-
DNS
-
Project Management Dradis
-
HashCarck Hashcat
-
CrackThe Hash With HashCat - Lab
-
Sherlock
-
Sherlock- Lab
-
Flan-Scan
-
Feedback
-
Read the documents on the CISA website in your native language by using google translator.
-
Feedback
-
-
18
ISO 27001, ISO 27017, ISO 27018 Lead Implementer & Auditor
-
ISO 27001 Audit Course 101
FREE PREVIEW -
ISO 27001 Lead Implementer and Auditor 101
FREE PREVIEW -
ISO 27001 Audit Course 200a ISO family of Standards -Chapter#2
FREE PREVIEW -
ISO_IEC_27000_2018 free copy. Please read this.(Video Only, no notes)
-
ISO 27001 Audit Course 200b ISO family of Standards (Video Only, no notes)
-
ISO 27001 Audit Course 200c ISO family of Standards (Video Only, no notes)
-
ISO 27001 Audit Course 200d ISO family of Standards (Video Only, no notes)
-
Walk-through of ISO 27001 part 1 - Chapter#3
-
Walkthrough of ISO 27001 part 2
-
Walk-through of ISO 27002
-
Walk-through of ISO 27017 Cloud Security Standard
-
Walk-through of ISO 27018 PII Security Standard
-
ISO 27001 Documentation List to focus on - Chapter#4
-
00 Procedures for Document Control Walkthrough
-
00 Procedure_for_Document_and_Record_Control
-
01 Walkthrough of Project Plan
-
01 Project_Plan
-
02 Walkthrough of Procedure for Identification of Requirements
-
02 Key documents for Procedure for Identification of Requirements
-
03 Scope Document of ISMS
-
03 ISMS_Scope_Document
-
04 part 1 Information Security Policy
-
04 part 1 Information_Security_Policy
-
04 part 2 Cloud Security Policy
-
04 part 2 Cloud_Security_Policy
-
04 part 3 Policy for Data Privacy in the Cloud
-
04 part 3 Policy_for_Data_Privacy_in_the_Cloud
-
05 Risk Assessment and its Treatment methodology
-
05 Risk Assessment and its Treatment methodology key documents
-
06 Statment of Applicability
-
06 Statement_of_Applicability
-
07 Risk_Treatment_Plan
-
07 Risk_Treatment_Plan
-
Annex A 06 part 1 BYOD -Chapter#4
-
06 Bring_Your_Own_Device_BYOD_Policy documents
-
Annex A 06 part 2 Mobile device and Teleworking
-
06 Mobile_Device_and_Teleworking_Policy documents
-
Annex A 07 Human_resource_security
-
Annex A 07 Human_resource_security documents
-
Annex A 8 Asset_management
-
Annex A 08 Asset_management Documents
-
Annex A 09 Access_control
-
Annex A 09 Access_control documents
-
Annex A 10_Cryptography
-
Annex A 10_Cryptography Documents
-
Annex A 11_Physical_and_environmental_security
-
Annex A 11_Physical_and_environmental_security Documents
-
Annex A 12 Operations security
-
A 12 Operations_security Document
-
Annex A 13_Communications_security
-
A 13_Communications_security Document
-
Annex A 14_System_acquisition_development_and_maintenance Policy
-
A.14 System_acquisition_development_and_maintenance policy documents
-
Annex A 15_Supplier_relationships
-
A 15_Supplier_relationships Documents
-
Annex A 16_Information_security_incident_management
-
A 16 Information_security_incident_management Policy documents
-
Annex A 17_Business_Continuity
-
A 17_Business_Continuity Document
-
Training_and_Awareness_Plan - Chapter#6
-
Training_and_Awareness_Plan Documentation
-
Management_Review_Minutes and Corrective Action Procedures and Forms - Chapter#7
-
Management_Review_Minutes and Corrective Action Documentation
-
Feedback
-
-
19
PCI DSS Qualified Security Assessor Training
-
PCI DSS Intro a
FREE PREVIEW -
02 PCI DSS Intro b
-
03 PCI DSS Intro c
-
04 PCI DSS Intro d
-
Global-payments-map-2018 (please read this report to understand the importance of Credit Cards)
-
2019-data-breach-investigations-report (We will review this report at the end of the course)
-
2019-data-breach-investigations-report (We will review this report at the end of the course)
-
05 PCI DSS Intro e
-
06 PCI DSS Glossary of Terms, Abbreviations, and Acronyms part 1
-
07 PCI DSS Glossary of Terms, Abbreviations, and Acronyms part 2
-
08 PCI DSS Glossary of Terms, Abbreviations, and Acronyms part 3
-
Where to Go from Here.
-
PCI_DSS_Glossary_v3-2
-
Feedback
-
-
20
Hacking 101 AKA ethical hacking and incident response Management
-
Introduction To The Course
FREE PREVIEW -
Skills & Opportunities
FREE PREVIEW -
Hacking 101 Intro A
FREE PREVIEW -
Hacking 101 Intro B
FREE PREVIEW -
CODS_track_deep_dive_for_Pentesting_Forensics_and_threat_huntering
-
Hacking_101_AKA_ethical_hacking_in_line_with_best_practices_and_standard
-
Hacking 101 ISO 27035 review part 1
-
Hacking 101 ISO 27035 standard review part 1
-
Policy and other key templates
-
NIST.SP.800-61r2 incident response management (Read this document end to end, otherwise you will fail in this course.)
-
Chapter#2 - Hacking 101 Parrot OS download -
-
Parrot OS VMware Installation
-
How to use osboxes ready made images to install ubuntu or centos or parrot os part 1
-
How to use osboxes ready made images to install ubuntu or centos or parrot os part 2
-
How to use osboxes ready made images to install ubuntu or centos or parrot os part 3
-
How to use osboxes ready made images to install ubuntu or centos or parrot os part 4
-
Hacking 101 ISO 27035 revisit part 1. (There are no slides, only video is provided)
-
Hacking 101 ISO 27035 revisit part 2. (There are no slides, only video is provided)
-
NIST Incident Handling Document Review part 1
-
NIST Incident Handling Document Review part 2
-
NIST.SP.800-61r2 incident response management
-
Chapter#3 - Deep Dive Hacking Mindset part 1 -
-
GRR Rapid Response Challenge Lab (Help each other and try to attempt this on your own)
-
Jump Bag for Security Professionals
-
Deep Dive Hacking Mindset part 2
-
The Cyber Security NIST Framework
-
Key Documents to read for Cyber Security Framework from NIST
-
How to open a command prompt as administrator
-
Network Detection Challenge Lab using netstat
-
Hands on Lab for Windows key services part 1
-
Hands on Lab for Windows key services part 2
-
Hands on Lab for Windows key services part 3
-
Challenge Lab for Creating a Systenal Software using DS Method
-
Lab IR Table Top Excercise
-
Incident Response Table Top Exercise (A team roll playing excercise)
-
Chapter#4 - Lab for Linux deep dive covering your tracks part 1 -
-
Lab for Linux deep dive covering your tracks part 2 (Part Challenge Lab)
-
RITA lab part 1
-
RITA lab part 2
-
OSINT Lab part 1
-
OSINT Lab part 2
-
OSINT Lab part 3
-
Shodan Challenge Lab
-
Shodan complete guide
-
Have i been pwned
-
Spyse walkthrough
-
Google exploit database
-
Maltego and Dark trace the future of Cyber Security
-
Misc tools and installing creepy to run some test cases
-
MITRE attack chain of custody and security ops
-
Chapter#5 - The role of CSIRT in your Organization
-
Security Bootcamp Part 1 from FIRST
-
FIRST Security Bootcamp (2-5)- How does the Internet work
-
FIRST Security Bootcamp (3-5)- Cybercrime
-
FIRST Security Bootcamp (4-5)- Protect yourself
-
FIRST Security Bootcamp (5-5)- You got hacked, now what - Incident Response
-
FIRST presentation notes
-
The role of Senior Mgmt, CPR and short term strategies
-
Learning about WordWebBugs
-
Affected parties, write blockers, short & long term IM goals
-
Challenge Lab: Rekall
-
Lessons learned Incident response management part 1
-
Lessons learned Incident response management part 2
-
Challenge read to know what is SCCM and how it can help an organization Incident Response Process
-
Kansa Challenge lab and Applied Incident Response Management
-
Kansa Links to follow
-
Applied Incindet Managment and wrapping up part 1 of hacking 101
-
2020-Global-Cost-of-Insider-Threats-Ponemon-Report_UTD (please read this document)
-
Hacking 101 Quiz 1 for Section 1. Rules and Regulations!
-
Quiz 1 Section 1 (5 questions)
-
Chapter#6 Hacking 101 Deep dive into hacking mindset 01 -
-
Hacking 101 Deep dive into hacking mindset 02
-
2020 Global Threat report by crowdstrike please read carefully.
-
Hacking 101 Deep dive into hacking mindset 03
-
Hacking 101 Deep dive into hacking mindset 04 case study marriott hotels
-
apt-groups-you-should-know-v3
-
Marriott data breach FAQ How did it happen and what (Translate this into Multiple languages and read please)
-
Hacking 101 Deep dive into hacking mindset 05 The golden age of hacking
-
Hacking 101 Deep dive into hacking mindset 06 whois and reverse Whois
-
Hacking 101 Deep dive into hacking mindset 07 DNS interrogration Techniques
-
Power up your Parrot OS Virtual Image as we will start using it for Nmap next
-
Hacking 101 Deep dive into hacking mindset 07 DNS recond defences
-
Hacking 101 Deep dive into hacking mindset 07 website reconnaissance techniques
-
Hacking 101 Deep dive into hacking mindset 07 puhspin (Challenge lab)
-
PushPin Application For Challenge Lab
-
FOCA Challenge Lab Link
-
Hacking 101 Deep dive into hacking mindset 07 Google Diggity Challenge Lab a
-
Hacking 101 Deep dive into hacking mindset 07 Google Diggity Challenge Lab b
-
Google Diggity Tool Challenge Lab download
-
The_ISSA_Journal-SearchDiggity_Dig_Before_They_Do-Sept_2012
-
InformationWeek_Reports-Using_Google_to_Find_Vulnerabilities_in_Your_IT_Environment-05Mar2012
-
Hacking 101 Deep dive into hacking mindset 07 Google breachalarms and recon-ng Challenge Lab
-
Recon-NG Challeng tool lab
-
Hacking 101 Deep dive into hacking mindset 07 Google search engines recon defenses
-
Chapter#7 Hacking 101 Deep dive into hacking mindset 07 Maltego Challenge Lab
-
Maltego Challenge Lab Download link
-
Maltego Guides
-
Case Study Reading Bitcoin Forensics with Maltego and CipherTrace Blockchain Intelligence - Maltego
-
Case Study Reading Uncovering a New Angler-Bedep Actor · swannysec
-
Case Study Reading Using Maltego for cell phone analysis and geolocation with OSINT. _ by AndyF1 _ Medium
-
Case Study Reading Maltego and OSINT for crime scene analysis _ by AndyF1 _ Medium
-
Case Study Reading Network Footprinting with Machines in Maltego! - Maltego
-
Case Study Reading Fighting Cyberbullies and Harassment with Martial Art and Maltego - Maltego
-
Case Study Reading Enrich Your Maltego Graph by Customizing Entity Overlay Icons - Maltego
-
Case Study Reading Maltego Stealth Mode_ Conduct Investigations Securely and Privately - Maltego
-
Network footprinting with Maltego _ Maltego Support
-
Case Study Reading Trumpworld table to Maltego graph _ Maltego Support
-
Case Study Reading How to_ Shodan _ Maltego Support
-
Hacking 101 Deep dive into hacking mindset 08 Self exploration Challenge Lab
-
Hacking 101 Deep dive into hacking mindset 09 Nmap self exploration Challenge Lab
-
Hacking 101 Deep dive into hacking mindset 10 War dialing Challenge Lab
-
war dialing article
-
‘War Dialing’ Tool Exposes Zoom’s Password Problems — Krebs on Security
-
Wardialing - Wikipedia
-
War Dialing Penetration Test - HackLabs
-
WarVOX Download - War Dialing Tool Software - Darknet
-
Dialing Part 1_ The VoIP and Analog Primer
-
Think before you speak_ voice recognition replacing the password - Information Age
-
War Dialing
-
Hacking 101 Deep dive into hacking mindset 11 wireless hacking using inSSIDer challenge lab
-
InSSIDer, please download this software.
-
Hacking 101 Deep dive into hacking mindset 12 Kismet challenge lab
-
Hacking 101 Deep dive into hacking mindset 13 Wifi protocols and PSK
-
Understanding PSK Authentication - TechLibrary - Juniper Networks
-
WiFi Security_ WEP, WPA, WPA2 And Their Differences
-
Hacking 101 Deep dive into hacking mindset 14 aircrack ng challenge lab
-
Hacking 101 Deep dive into hacking mindset 15 Hac7 starting your own business
-
Hacking 101 Deep dive into hacking mindset 16 I Love my neighbors Challenge lab
-
Hacking 101 Deep dive into hacking mindset 17 hostapd-wpe Challenge lab
-
Hacking 101 Deep dive into hacking mindset 18 non wifi technologies review
-
Top 7 IOT Technologies and Protocols _ by Aakash Kumar _ Medium
-
Hacking 101 Deep dive into hacking mindset 19 Wireless hacking of keyboards and drones hacking Challenge Lab
-
Hacking 101 Deep dive into hacking mindset 20 Protection Defences for Wifi and non Wifi protocols
-
Hacking 101 Deep dive into hacking mindset 21 Netscout intro
-
Hacking 101 Deep dive into hacking mindset 22 Nmap the second step
-
Hacking 101 Deep dive into hacking mindset 23 challenge lab how to scan the whole internet using masscan
-
Masscan Examples_ From Installation to Everyday Use _ Daniel Miessler
-
Hacking 101 Deep dive into hacking mindset 24 Ipv4 vs Ipv6 what are the differences
-
IPv6 Subnetting - How and Why to Subnet IPv6
-
IPv4 vs. IPv6 Benefits - What is it_ _ ThousandEyes
-
Hacking 101 Deep dive into hacking mindset 25 Nmap challenge lab for running zenmap
-
Hacking 101 Deep dive into hacking mindset 26 How to defend against ping sweep and traceroute
-
Hacking 101 Deep dive into hacking mindset 27 Challenge lab for testing network scanning tools
-
Challenge lab tools links
-
Hacking 101 Deep dive into hacking mindset 28 TCP Hand Shake Process
-
TCP 3-Way Handshake Process
-
Protocols for Packet Quantum Network additional reading material recommended
-
Hacking 101 Deep dive into hacking mindset 29 TCP and UDP Packets whats underneath
-
A_Survey_of_Protocol-Level_Challenges_and_Solution (A reading material to understand TCP context as per SCADA track)
-
Reading material as per SCADA Track
-
TCP/IP Reference reading must be done of this article
-
Target Specification
-
Hacking 101 Deep dive into hacking mindset 30 nmap stage 3 nano editor learning the ropes
-
Scan Techniques shortcuts
-
Hacking 101 Deep dive into hacking mindset 30 nmap stage 4 how to discover host and arp
-
Host Discovery Shortcuts
-
Port Specification Shortcuts
-
Service and Version Detection Shortcuts
-
OS Detection Short cuts
-
Timing and Performance Shortcuts
-
NSE Scripts Short cuts
-
Firewall / IDS Evasion and Spoofing Short cuts
-
Output Shortcuts
-
Miscellaneous Options Other Useful Nmap Commands Short cuts
-
Scanning a Target via nmap commands
-
How to specify a target
-
How to perform host discovery
-
How to identify open ports
-
How to manage specification and scan order
-
Feedback
-
-
21
SCADA Prevention & Detection a HOA
-
SCADA Prevention and Detection the beginning 01
FREE PREVIEW -
2_SCADA Prevention and Detection the beginning 02
-
The history of studnet Please read this and try to translate it in your own language
-
To-kill-a-centrifuge Please read this and try to translate it in your own language
-
3_SCADA Prevention and Detection the beginning 03 how Stuxnet really moves around
-
4_SCADA Prevention and Detection the beginning 04 Wincc connecting the dots
-
5_SCADA Prevention and Detection the beginning 05 Wincc further review.ts
-
6_SCADA system SIMATIC WinCC
-
7_MODBUS Hands On Protocol Hacking
-
WinCC Information Please read this document
-
Feedback
-
-
22
SIEM the HOA starting the journey
-
SIEM lecture 01
FREE PREVIEW -
SIEM lecture 02
-
What is SIEM_ A complete guide to SIEM - its benefits and importance
-
SIEM lecture 03
-
SIEM Gartner Reprint 2021
-
Best Free Open-source SIEM Tools for 2021 with Download Links
-
Threat Intelligence Definition _ Cyber Threat Intelligence _ Kaspersky
-
SIEM lecture 04
-
CREST-Cyber-Threat-Intelligence (Download this and read it along with the lectures )
-
SIEM lecture 05
-
SIEM lecture 06
-
SIEM lecture 07
-
SIEM lecture 08
-
SIEM lecture 09
-
Crest Cyber-Security-Monitoring-Guide (Download this and read it along with the lectures )
-
Please read these reference files.
-
Feedback
-
SIEM lecture 10
-
-
23
Statistics for Emerging Pathways
-
1. Introduction To The Course
FREE PREVIEW -
2. Skills & Opportunities
FREE PREVIEW -
Introduction to Statistics and Basic Terminology - Chapter#1 Descriptive statistic
FREE PREVIEW -
Measures of Location - Mean Median Mode
-
Measures of Location - Percentiles and Quartiles
-
Measures of Variability - Range, IQR
-
Measures of Variability - Variance and SD
-
Measures of Correlation between Variables
-
Quiz 1 - Measure of Location
-
Quiz 2 - Measures of Variability and Correlation
-
Introduction to Inferential Statistics - Chapter#2 Inferential statistic
-
Hypothesis Testing - Null and Alternative Hypothesis
-
Errors and Significance Level in Hypothesis Test
-
Quiz 3 - Null and Alternative Hypothesis
-
Hypothesis Test Sigma Known - One Tailed Test
-
Hypothesis Test Sigma Known - Two Tailed Test
-
Quiz 4 - Hypothesis Testing Sigma Known
-
Hypothesis Test Sigma Unknown
-
Quiz 5 - Hypothesis Testing Sigma Unknown
-
Introduction to Regression - Chapter#3 Simple linear Regression
-
Simple Linear Regression Procedure
-
Goodness of Fit
-
Quiz 6 - Linear Regression and Goodness of Fit
-
Feedback
-
-
24
Web application pentesting & ethical hacking in line with various frameworks
-
Please use the following domains to access the exact labs
FREE PREVIEW -
Introduction to the Course
FREE PREVIEW -
Skills and Opportunities
FREE PREVIEW -
WAP class 00
FREE PREVIEW -
What is a web app
FREE PREVIEW -
What is a Web App_ Web App vs. Native App (Enable subtitles and watch the video please)
-
Why its difficult to secure web applications
-
Please use google translator and read this in your native language.
-
OWASP Top Ten
-
top-3-reasons-appsec-programs-fail-veracode
-
WAP Why Source code review
-
ISO 27034 Standard review
-
Web Application Security
-
7 WAP SAST DAST IAST and OAST
-
1 WAP and the importance of Threat Modelling
-
Threat Modeling
-
Threat Modelling by Microsoft
-
Getting started with the Threat Modeling Tool
-
Secure development best practices on Microsoft Azure
-
Chapter#3 - Penetration Testing Methodologies Take 1 WSTG
-
WSTG Read this in your native language please.
-
WSTG Guide Link
-
Chapter# 4 - Lab For Wap Perform XSS Stored
-
10 Os Command Execution
-
OS Command - Lab
-
The Harverster
-
The Harvester - Lab
-
12 Role Hijacking
-
Shodan a Search Engine
-
FTP Login
-
FTP Login
-
FTP - Lab
-
Arachni
-
Arachni - Lab
-
Admin Panel Hacking
-
Feedback
-
-
25
Elasticsearch Threat Hunting & Observability Engineer
-
Lab environment
-
Skills and career Opportunities
FREE PREVIEW -
Introduction of Elasticsearch threat Hunting and Observability Engineer
FREE PREVIEW -
Elastic Observability Engineer - A brief Overview
FREE PREVIEW -
Course Summary
FREE PREVIEW -
Course Summary
-
1_Lab Setup-ES-Fundamentals
-
Setup-ES- Fundamentals
-
3_Lab Setup-ES-Fundamentals Part 2
-
4_Lab Setup-ES-Fundamentals Part 3
-
Setup-ES-Fundamentals
-
5_Uptime EOE
-
Uptime EOE
-
6_UpTime Part 2
-
7_UpTime Part 3
-
8_Elastic Agent - Nginix
-
Elastic Agent - Nginix
-
9_Logs - Mysql
-
Logs - Mysql
-
10_Metrics - System
-
Metrics - System
-
10.1_ Node.js Agent Configuration
-
Node.js Agent Configuration
-
11_Elastic APM Configuration
-
Elastic APM Configuration
-
12_Java Agent Configuration
-
Java Agent Configuration
-
14_RUM Agent Configuration
-
RUM Agent Configuration
-
15_Logs App Visibility
-
Logs App Visibility
-
16_Metrics App Visibility
-
Metrics App Visibility
-
17_Metrics App Visibility-2
-
18_APM App Visibility
-
19_ APM App Visibility-2
-
APM App Visibility
-
20_ UX App Visibility
-
UX App Visibility
-
21_Pipelines Configuration
-
Pipelines Configuration
-
22_Pipelines Configuration-2
-
23_Pipelines Configuration-3
-
24_Extracting Events
-
Extracting Events
-
25_Lab Setup-ES- Fundamentals part 1
-
26_Extracting Events-2
-
27_Extracting Events-3
-
28_Transforming Events
-
Transforming Events
-
29_Loading Events
-
30_ Loading Events-2
-
Loading Events-2
-
31_ Machine Learning Custom Jobs
-
Machine Learning Custom Jobs
-
32_Alerts and Rules Configuration
-
Alerts and Rules Configuration
-
33_Dashboards Visualizations
-
Dashboards Visualizations
-
34_ Custom Dashboard Visualizations
-
Custom Dashboard Visualizations
-
35_Custom Dashboard Visualizations-2
-
Feedback
-
-
26
CIS Top 20 Controls Hands on Implementation
-
Introduction
FREE PREVIEW -
Skills and career Opportunities CIS Top 20 Controls Hands on Implementation
FREE PREVIEW -
CIS Top 20 controls stage 1
FREE PREVIEW -
CIS Top 20 controls stage 2
FREE PREVIEW -
CIS Top Controls 1 to 10 Overview - CIS Top 20 controls Control 1 overview
-
CIS Top 20 controls Control 2 overview
-
CIS Top 20 controls Control 3 overview
-
CIS Top 20 controls Control 4 overview
-
CIS Top 20 controls Control 5 overview
-
CIS Top 20 controls Control 6 overview
-
CIS Top 20 controls Control 7 overview
-
CIS Top 20 controls Control 8 overview
-
CIS Top 20 controls Control 9 overview
-
CIS Top 20 controls Control 10 overview
-
CIS Top Controls 11 to 20 Overview - CIS Top 20 controls Control 11 overview
-
CIS Top 20 controls Control 12 overview
-
CIS Top 20 controls Control 13-14 overview
-
CIS Top 20 controls Control 15-17 overview
-
CIS Top 20 controls Control 18-20 overview
-
CIS Top 20 Deep dive into CSA and Controls - CIS Top 20 Controls CSA deep dive Introduction
-
Key files for CIS Top 20 CSA purposes.
-
CIS Control hands on implementation AuditScripts-Critical-Security-Control-Manual-Assessment-Tool
-
CIS Control 1 Completion from start to finish
-
CIS Control 2 Completion from start to finish
-
3_CIS Control 3 Completion from start to finish
-
NIST.SP.800-126r3
-
CIS Control 4 Completion from start to finish
-
CIS Control 5a Completion from start to finish
-
CIS Control 5b Completion from start to finish
-
6_CIS Control 5b Completion from start to finish
-
CIS Top 20 controls Control 6 overview
-
CIS Top 20 controls Control 7 overview
-
CIS Control 7a Completion from start to finish
-
CIS Control 7b Completion from start to finish
-
CIS Control 8, 9 and 10 Completion from start to finish
-
CIS Top 20 controls Control 10 overview
-
CIS Top 20 controls Control 11 overview
-
CIS Top 20 controls Control 12 overview
-
11_CIS Control 11 Completion from start to finish
-
12_CIS Control 12 Completion from start to finish
-
CIS Control 13 Completion from start to finish
-
CIS Control v7 vs v8 what things have changed and what you need to know
-
CIS v7 vs v8
-
CIS Control 14 Completion from start to finish
-
CIS Control 15 Completion from start to finish
-
CIS Control 16 Completion from start to finish
-
CIS Control 17 Completion from start to finish
-
Feedback
-
-
27
Calculus for Emerging Pathways
-
Introduction
FREE PREVIEW -
Calculus course outline
FREE PREVIEW -
Functions - Chapter#1 Single value Calculus
-
Tangent Problem
-
Derivative
-
Rules of Differentiation
-
Chain Rule
-
Introduction to Optimization
-
Optimization Procedure
-
Optimization Examples
-
Partial Derivatives - Chapter#2 Multivariable optimization
-
Multivariable Optimization
-
Gradient Descent
-
Quiz 1 - Differentiation
-
Quiz 2 - Optimization
-
Quiz 3 - Multivariable Optimization
-
Quiz 4 - Gradient Descent
-
Feedback
-
-
28
SCADA, ISO 27019:2017 and NIST 800-82 connection
-
SCADA 101 a
FREE PREVIEW -
SCADA 101 b
FREE PREVIEW -
SCADA 101 c
-
SCADA 101 d
-
SCADA 101 NIST a
-
SCADA 101 NIST b
-
SCADA 101 NIST c
-
SCADA 101 NIST d
-
NIST.SP.800-82r2 Read this document as these are the notes. - Chapter#2
-
SCADA ISO 27019 Final Lecture
-
Feedback
-
-
29
Elasticsearch for data science and analytics with Kibana
-
Lab environment
-
Elasticsearch for Data Science and Analytics with Kibana (A brief Overview)
FREE PREVIEW -
Skills and career Opportunities
FREE PREVIEW -
1.1_ Introduction to Kibana
FREE PREVIEW -
Introduction to Kibana (Description)
FREE PREVIEW -
1.2_Hello, Dashboard!
-
Hello, Dashboard! (Description)
-
1.3: Spaces
-
Spaces (Description)
-
2.1_ Discover and Data Visualizer_
-
Discover and Data Visualizer (Description)
-
2.2 KQL and filters
-
KQL and filters (Description)
-
2.3 Field focus
-
Field focus (Description)
-
3.1:Create visualizations
-
Create visualizations (Description)
-
3.2:Adjust visualizations
-
Adjust visualizations (Description)
-
Create maps (Description)
-
3.3 Create map
-
4.1_ Text on dashboards
-
Text on dashboards (Description)
-
4.2_ Tables
-
Tables (Description)
-
4.3_ Interactive dashboards
-
Interactive dashboards (Description)
-
5.1_ Sharing a Dashboard
-
Sharing a Dashboard (Description)
-
5.2_Sharing with Users
-
Sharing with Users (Description)
-
5.3:Canvas
-
Canvas (Description)
-
6.1_ Time series anomaly detection
-
Time series anomaly detection (Description)
-
6.2_ Adding Anomalies in Dashboard
-
Adding Anomalies in Dashboard (Description)
-
6.3_ Entity-centric analysis
-
Entity-centric analysis (Description)
-
7.1_ Formulas
-
Formulas (Description)
-
7.2_ Runtime fields
-
Runtime fields (Description)
-
7.3_ Vega
-
Vega (Description)
-
8.1_ Asking questions
-
Asking questions (Description)
-
Feedback
-
-
30
Network Pentesting, and Ethical Hacking in line with various Frameworks
-
Introduction to the Course
FREE PREVIEW -
Importance of the Course
FREE PREVIEW -
0_SNMP Pentesting
FREE PREVIEW -
2_Deep Dive into Recon-NG
-
SNMP Pentesting- Lab
-
Information Gathering With Recon-NG -Lab - Chapter#2 Information Gathering with Recon-NG
-
3_Recon-ng Marketplace and Modules
-
4_Recon-ng Modules
-
5_Recon-NG Keys
-
6_Generate Report in Recon-NG
-
7_Scan Subnet With Masscan
-
Scan subnet with masscan-lab
-
8_OS-Fingerprinting With Nmap
-
9_Nmap Scripting Engine
-
Nmap scripting engine (NSE) - Lab
-
10_Port Scanning Using Netcat
-
Port Scanning Using Netcat-Lab
-
11_Use Netcat to Move Files From One System to Another System
-
Use Netcat to Move Files From One System to Another System-Lab
-
12_Banner Grabbing Using Netcat
-
Banner Grabbing Using Netcat-Lab
-
13_Netcat Reverse Shell
-
Netcat reverse shell - lab
-
14_Use Nessus to Perform Scan and Find Vulnerabilities on Various Systems
-
Use Nessus to perform scan and find vulnerability on various systems-Lab
-
15_Generate a Reports after Perform a Scan
-
Generate a Report after Performing a Scan-Lab
-
16_Introduction to Metasploit
-
17_Scan Target and Find Exploit Using Metasploit
-
Scan Target and Find Exploit Using Metasploit-Lab
-
18_Exploit Windows Server 2003 With Metasploit
-
Exploit Windows Server 2003 With Metasploit-Lab
-
19_Exploit RCE on Windows XP With Metasploit
-
20_Exploit RCE on Windows Server 2008 With Metasploit
-
21_Metasploit Post Exploitation
-
Linux_prives_lab
-
22-Intro to Privlage_esclation
-
23-SUDOERs
-
24-CRONTAB Deep Dive
-
25-Deep Dive into Special Permission Privilege Escalation
-
26-1 Kernal_Exploit
-
26-2 Kernal_exploitation
-
26-3 Kernal_Exploitation
-
27-Introduction_to_Privesc
-
28-Windows_Kernal_Exploitation
-
29-Post_Enumration_Windows
-
30 Naver underestimate the Power of Psexec
-
31- reg query
-
32- Unquoted Path Prives
-
33- Unquoted Path Prives
-
34-Introduction to Exploit_Development
-
35-Configurations_Setup for Exploit_Development
-
36-1-Fuzzing
-
36-2-Fuzzing
-
37-Crash Replication
-
38-Controlling EIP
-
39-Finding Bad Char
-
39-1-Finding a Jump Point
-
39-2-Finding a Jump Point
-
40-Generate Payload
-
41- Pivoting Deep_Dive _ Bypass Controls
-
42-Initial Access to System
-
43- From External to Internal Network through Pivoting
-
Introduction to metasploit-Lab
-
44-Introduction to Empire Framwork
-
45-Introduction Empire-Framework-Lab
-
46-Target Exploitation With Empire-Framework
-
Target Exploitation With Empire-Framework-Lab
-
47-Privesc
-
Privesc - lab
-
48-Mimikatz
-
Mimikatz-Lab
-
49-Collection
-
50-Situational Awareness
-
51-Persistence
-
Persistence - Lab
-
Feedback
-
Introduction to Recon-NG
FREE PREVIEW
-
-
31
Real Statistics: A Radical Approach
-
0: Journey Towards the Light
-
Life Journey 1: Beginnings
FREE PREVIEW -
Life Journey 2: Dreams
-
Life Journey 3: Europeans Reject the Unseen
-
Life Journey 4: The Poison of Positivism
-
Life Journey 5: Impact of Positivism on Statistics
-
7: Student Led Q&A on Life Journey
-
1: Why A New Approach To Statistics?
-
A: Positivism Transforms University Education
-
B: Puzzles Posed by Human History
-
C: The Central Importance of Knowledge
-
D: Rebuilding Knowledge on Islamic Foundations
-
E: Four Fundamental Flaws in Foundations of Statistics
-
2F: Student Led Q&A on Ch 2 Discussion Questions
-
2A: The Illusion of Objective Knowledge.
FREE PREVIEW -
2: The Moral Foundations of Knowledge
-
A: Positivism Transforms University Education
-
B: Puzzles Posed by Human History
-
C: The Central Importance of Knowledge
-
D: Rebuilding Knowledge on Islamic Foundations
-
2A: The Illusion of Objective Knowledge.
-
Feedback
-
-
32
Web Application Pentesting - WSTG
-
Goals and Objectives of the Course
FREE PREVIEW -
Skills and Career Opportunities (Results of the Course)
FREE PREVIEW -
Please use the following domains to access the exact labs
-
Overview of the Web Security Testing Guide (WSTG) Chapter 0
FREE PREVIEW -
WSTG Introduction and the start of the journey towards being a Bug Bounty Hunter - Chapter 1
FREE PREVIEW -
Information Gathering - Introduction and Objectives
FREE PREVIEW -
WSTG - v4.2
-
Information Gathering - Introduction and Objectives
FREE PREVIEW -
Conduct Search Engine Discovery Reconnaissance for Information Leakage-1
-
Conduct Search Engine Discovery Reconnaissance for Information Leakage-2
-
Fingerprint Web Server
-
Web Fingerprinting-Lab
-
Enumerate Applications on Webserver
-
Enumerate Applications on Webserver-Lab
-
Identify Application Entry Points
-
7-Fingerprint Web Application Framework & Web Server
-
Chapter#2 Configuration and Deployment Management Testing
-
Test Network Infrastructure Configuration
-
Test File Extensions Handling for Sensitive Information
-
Test File Extensions Handling for Sensitive Information-Lab
-
Enumerate Infrastructure and Application Admin Interfaces
-
Enumerate Infrastructure and Application Admin Interfaces-Lab
-
Test HTTP Methods
-
Test File Permission
-
Test for Subdomain Takeover
-
Test Cloud Storage
-
Chapter#3 Introduction to Burp Suite
-
Introduction to Burp Suite
-
How to Integrate Burp Suite with External Browser
-
Chapter#4 Identity Management Testing
-
Role Definition 1 -
-
Test Role Definitions-Lab
-
Role Definition -2
-
User Registration Process
-
Test User Registration Process-Lab
-
Test Account Provisioning Process
-
Test Account Provisioning Process-Lab
-
Guessable User Account
-
Chapter#5 Authentication Testing
-
Testing for Sensitive Information Sent via Unencrypted Channels - Chapter 4
-
Testing for Credentials Transported over an Encrypted Channel-Lab
-
Testing for Default Credentials
-
Testing for Default Credentials-Lab
-
Testing for Weak Lock Out Mechanism
-
Testing for Weak Lock-Out Mechanism-Lab
-
Testing for Bypassing Authentication Schema
-
Testing for Bypassing Authentication Schema-Lab
-
Testing for Vulnerable Remember Password
-
Testing for Vulnerable Remember Password-Lab
-
Testing for Browser Cache Weaknesses
-
Testing for Weak Password Policy
-
Testing for Weak Password Change or Reset Functionalities
-
Testing for Weaker Authentication in Alternative Channel
-
Chapter#6 Authorization Testing
-
Testing Directory Traversal File Include
-
Testing Directory Traversal File Include-Lab
-
Testing for Bypassing Authorization Schema
-
Testing for Bypassing Authorization Schema-Lab
-
Testing for Privilege Escalation-1
-
Testing for Privilege Escalation-2
-
Testing for Insecure Direct Object References
-
Chapter#7 Session Management Testing
-
Session Management Schema
-
Testing for Session Management Schema-Lab
-
Testing for Cookies Attributes
-
Testing for Cookies Attributes-Lab
-
Testing for Session Fixation
-
Testing for Session Fixation-Lab
-
Testing for Exposed Session Variables
-
Testing for Cross Site Request Forgery
-
Testing for Cross-Site Request Forgery-Lab
-
Testing for Logout Functionality & Session Timeout
-
Testing for Session Puzzling
-
Testing for Session Hijacking
-
Chapter#8 Input Validation Testing
-
Testing for Reflected Cross Site Scripting
-
Testing for Reflected Cross-Site Scripting-Lab
-
Testing for Stored Cross Site Scripting
-
Testing for Stored Cross-Site Scripting-Lab
-
Testing for HTTP Verb Tampering
-
Testing for HTTP Verb Tampering-Lab
-
Testing for HTTP Parameter Pollution
-
Testing for HTTP Parameter Pollution-Lab
-
SQL-Injection 1
-
Testing for SQL Injection-Lab
-
SQL-Injection 2
-
SQL-Injection 3
-
Testing for NoSQL Injection
-
Testing for NoSQL Injection-Lab
-
Testing for ORM Injection
-
Testing for ORM Injection-Lab
-
Testing for Client-side
-
Testing for Client-side-Lab
-
Overview of XML-XPATH
-
Testing for SSI Injection
-
Testing for XPath Injection
-
Testing for IMAP SMTP Injection
-
Testing for Code Injection
-
Testing for Local File Inclusion
-
Testing for Remote File Inclusion
-
Testing for Command Injection
-
Testing for Format String Injection
-
Testing for Incubated Vulnerability
-
Testing for Server-side Template Injection
-
Testing for Server-Side Request Forgery
-
Testing for Host Header Injection
-
Testing for HTTP Splitting Smuggling
-
Testing for HTTP Splitting Smuggling-Lab
-
Testing for HTTP Incoming Requests
-
Testing for HTTP Incoming Requests-Lab
-
Chapter#9 Testing for Error Handling
-
Testing for Improper Error Handling
-
Testing for Improper Error Handling-Lab
-
Testing for Weak Transport Layer Security
-
Testing for Weak Transport Layer Security.-Lab
-
Testing for Sensitive Information Sent via Unencrypted Channels
-
Chapter#10 Business Logic Testing
-
Introduction to Business Logic
-
Introduction to Business Logic-Lab
-
Test Business Logic Data Validation
-
Test Business Logic Data Validation-Lab
-
Test Ability to Forge Requests
-
Ability to Forge Requests-Lab
-
Test Integrity Checks
-
Test for Process Timing
-
Test Number of Times a Function Can Be Used Limits
-
Testing for the Circumvention of Work Flows
-
Test Upload of Unexpected File Types
-
Test Upload of Malicious Files
-
Test Defenses Against Application Misuse
-
Test Defenses Against Application Misuse-Lab
-
Test Defenses Against Application Misuse
-
Chapter#11 Client-side Testing
-
Testing for DOM-Based Cross Site Scripting
-
Testing for DOM-Based Cross Site Scripting-Lab
-
Testing for JavaScript Execution
-
Testing for JavaScript Execution-Lab
-
Testing for HTML Injection
-
Testing for HTML Injection-Lab
-
Testing for Client-side URL Redirect
-
Testing for Client-side URL Redirect-Lab
-
Testing for CSS Injection
-
Testing for CSS Injection -Lab
-
Testing for Client-side Resource Manipulation
-
Testing for Client-side Resource Manipulation -Lab
-
Testing Cross Origin Resource Sharing
-
Testing for Cross Site Script Inclusion
-
Testing for Clickjacking
-
Testing Web Storage Testing
-
Testing WebSockets
-
API Testing
-
API Testing-Lab
-
Feedback
-
-
33
LinkedIn Course for Job Seekers
-
A Brief Overview of the Course
FREE PREVIEW -
Goals and Objectives of the Course
FREE PREVIEW -
Chapter#1 Module 1
-
LinkedIn Coaching-chapter 1
FREE PREVIEW -
LinkedIn Profile Healthcheck
-
LinkedIn Guide
-
LinkedIn Profile Essential Checklist
-
FREE LI Audit Tool
-
Alnafi Module 2a
FREE PREVIEW -
Alnafi Module 2b
-
Alnafi Module 3
-
17 Most Powerful Words to use in your LinkedIn Posts
-
Alnafi Module 4
-
5 LinkedIn Secrets for Success
-
Job-Seeker-Checklist
-
Top 1000 LinkedIn Hashtags
-
Top Trending Skills on LinkedIn
-
Recommendation Templates -
-
List of 56 LinkedIn Features
-
Chapter#2 LinkedIn Marketplace for Freelancers
-
LinkedIn Marketplace for Freelancers
-
Lead Generation Process for Freelancers (Webinar clip)
-
Chapter#3 How Recruiters Look for Candidates on LinkedIn?
-
How Recruiters Look for Candidates on LinkedIn
-
Live Lesson (Q&A) for LinkedIn Course -chapter 4
-
Chapter#4 Tap Opportunities in Emerging Technology Sector
-
How to use LinkedIn to Tap Opportunities in the Emerging Technology Sector
-
LinkedIn Networking Best Practices
-
Personal Branding Guide for LinkedIn
-
How to Use Creator Tool for Going Live on LinkedIn
-
How to Use LinkedIn Service Feature
-
Chapter#5 Using Creator Tools & Service Feature
-
Use of Creator Tools -
-
LinkedIn Service Page Best Practices
-
LinkedIn Updated Features for Job Seekers
-
Demonstrate Your Skills on LinkedIn
-
Latest LinkedIn Features Explained
-
Content Writing with Gemini
-
To access this tool, create an account on propost.ai - Add this code as a promo code: careerguru3
-
Feedback
-