Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS AWS Certified Developer - Associate CompTIA Security+
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 9 hours on-demand video
  • 4 articles
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Ethical Hacking

Complete Cyber Security, Ethical Hacking - Nano Degree

Learn all aspect of cyber security and hacking in this certificate course by performing hands-on practicals.
Rating: 3.9 out of 53.9 (15 ratings)
52 students
Created by Prashant Kumar Dey
Last updated 5/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Cyber security and its industrial practice
  • Ethical Hacking
  • Web Security
  • Network Security
  • Cryptography
  • Kali Linux & Metasploit

Requirements

  • An open mind with computer and internet connection

Description

*** This elaborated course on Udemy is the only one where you get to practice your skill on cybersecurity ***


Cybersecurity refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cybersecurity may also be referred to as information technology security.

Cybersecurity doesn’t involve just businesses and the government. Your computer, tablet, and cellphone probably contain information that hackers and other criminals would love to have, like other people’s email addresses, names, and birthdates. Suppose, for example, a hacker had access to your contact information. He could then send an email or text message to everyone you know, using your name, encouraging them to click on a link containing malware, like “Hey Jane, I thought you’d love this! Click here.”

This course is designed in a way to give you an insight into all the aspects of cybersecurity and at the same time, we make sure that you get the hands-on experience. The course consists of Dark Web, Web Security, Cryptography, Network Security, Malware, Operating System Security, Social Engineering, Memory attacks, Zero-Day attacks. We will deal with the theory and will then move to the practical part.

The course will have some hacking challenges as assignments. Those will be unlocked over the period of the course. It is a self-paced course for you to take onto. But we recommend spending at least 6-8 hours per week on the course. You can always ask the questions in the forum and that will be answered by the experts. After every few weeks, there will be live QNA sections regarding the course which you can attend and ask any question that you have to the instructor.


Job scenarios in Cybersecurity

Cybersecurity is very obviously a job sector of the future. Official estimates put job growth in the sector at 37% per year at least through 2022 – and that is probably conservative. At the start of this year there were an estimated half million cybersecurity jobs unfilled in the U.S. alone.

Even entry-level pay is about $10,000 better than the national median salary, and those who reach the C suite are getting into the $500,000 range.

That’s the good news. It’s also the bad news, for society. Because the main reason it is a job of the future is because the cyber risks of a connected world keep expanding and getting more threatening.

It’s now so last year – even last five years – to refer to the Internet of Things (IoT). It is now, or soon will be, the Internet of Everything (IoE). Encryption guru, author, blogger and CTO at IBM Resilient Bruce Schneier calls it Internet+ (short for Internet+Things+Us) in his most recent book, “Click Here to Kill Everybody.”

It is a world where pretty much everything and everybody – individuals, companies, governments, critical infrastructure – are increasingly dependent on connected systems, networks, and devices.


Is the curriculum of the course fixed?

The course is updated based on the changing technology in that field. This makes sure that you keep your cybersecurity knowledge updated. Also every now and then all the students will participate in CTF competitions which are hacking competitions and the instructor will help in sharing the details about the challenges and how one should approach them.

The course is a nano degree for Cyber Security where the student will go through various challenges, assignments, quizzes.

Who this course is for:

  • Computer Science students
  • Anyone who is looking to start their carrier in cyber security
  • Anyone who wants to learn Ethical Hacking
  • Industrial Professionals who wants to learn and implement security models in their organization

Course content

4 sections • 74 lectures • 9h 17m total length

  • Preview02:16
  • Course module
    15:44
  • Why study cybersecurity?
    12:54
  • Case study of the recent attack
    05:40
  • Preview11:10
  • Types of Hackers
    11:42
  • Overview of Common Attacks
    04:02
  • Quiz - 1 | Cyber Security Nano Degree
    12 questions

  • Preview01:06
  • What is Deep Web?
    01:11
  • How does normal internet works?
    06:24
  • What is Onion Routing and Tor?
    06:24
  • Tor installation in Windows
    04:17
  • Tor installation in Linux Mint
    04:20
  • Tor installation in MacOS
    02:01
  • Creating your own VPN
    11:16
  • What you should not do
    04:00
  • Exploring DarkWeb
    18:08
  • Creating a small website with payment option
    10:30
  • Hosting up Website
    09:51
  • Creating Dark Web Email
    03:38
  • Staying Completely Anonymous
    25:30
  • Is Darknet dangerous
    01:07
  • Legal vs Illegal
    02:20

  • Introduction to Web Security
    02:56
  • Attack Surface
    09:46
  • Problems in Web Applications
    02:23
  • OWASP in web security
    02:46
  • Installing Kali Linux
    12:07
  • Top 10 web vulnerabilities
    08:21
  • Installation of DVWA
    15:40
  • Injection attacks and types
    09:06
  • SQL injection
    06:16
  • SQL injection practical
    16:23
  • Blind SQL injection
    15:06
  • SQLi Countermeasures
    02:45
  • OS Command Injection
    07:50
  • Command Line injection
    02:54
  • Broken Authentication
    06:47
  • Brute Force
    10:45
  • Broken Authentication Countermeasures
    06:32
  • Sensitive Data Exposure
    07:29
  • Sensitive Data Exposure – Case Study
    06:28
  • Sensitive Data Exposure Countermeasures
    02:21
  • XML External Entities
    09:22
  • XXE Tutorial
    08:57
  • XXE countermeasures
    05:04
  • Broken Access Control
    09:07
  • Broken Access Control Countermeasures
    08:11
  • Security Misconfiguration
    09:35
  • Security Misconfiguration Countermeasures
    03:26
  • XSS Introduction
    10:36
  • DOM based XSS
    03:59
  • Reflected XSS
    03:08
  • Stored XSS
    03:53
  • CSP Bypass
    04:28
  • XSS Countermeasures
    03:59
  • Insecure Deserialization
    08:10
  • Insecure Deserialization Countermeasures
    03:26
  • Using Components With Known Vulnerabilities
    09:17
  • Using Component With Known Vulnerabilities – Countermeasures
    11:51
  • Insufficient Logging and Monitoring
    13:14

  • What is Cryptography?
    02:24
  • Types of Cryptography
    05:12
  • Cryptography Terminologies
    02:57
  • Classical Cryptography
    04:01
  • Caesar Cipher
    05:11
  • Enigma Machine
    04:22
  • Vigenere Cipher
    09:49
  • Symmetric Key Encryption
    04:56
  • DES
    05:10
  • Triple DES
    05:32
  • AES
    29:41
  • Asymmetric Key Encryption
    05:59
  • RSA
    12:45

Instructor

Prashant Kumar Dey
Findmementor: Skill yourself up
Prashant Kumar Dey
  • 3.7 Instructor Rating
  • 625 Reviews
  • 1,728 Students
  • 7 Courses

Findmementor intends to promote the internet based courses around the world and propel the wave of experimental-ism and innovation among students and professional.

Our Mission

Our mission is to provide low cost and effective courses which will excel the quality among the students, ultimately helping them to get the dream jobs. We have list of the trainers around the world who shares the same mission and passion, and together we are trying to make the world an informative place.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.