Introduction
                                    
                                        Learn the basics and common tools of cybersecurity
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        What you should know
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Disclaimer
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                1. Why Cybersecurity?
                                    
                                        A history of hackers
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        The cyber kill chain
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Stuxnet and the kill chain
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Common forms of cyber attack
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                2. Antivirus
                                    
                                        Viruses, spyware, and adware
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Introducing Microsoft Windows Defender
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Detecting malware with Defender
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Defender advanced settings
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Automating scans with task scheduler
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Other antivirus solutions
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                3. Firewalls
                                    
                                        Why firewalls?
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Windows firewall basics
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Advanced Windows firewall
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        ZedLan firewall log analyzer
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Introducing Linux iptables
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Setting up a simple iptables firewall
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                4. Network Scanning
                                    
                                        Getting started with Nmap
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Advanced Nmap options
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        GUI scanning with Zenmap
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                5. Network Connections
                                    
                                        Getting started with netcat
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Transferring files using netcat
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Connecting to services
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Setting up a netcat honeypot
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                6. Vulnerability Scanning
                                    
                                        Preparing Nessus to do scanning
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Setting up a Nessus policy
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Running a Nessus scan
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Scheduling scans
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                7. Web Applications
                                    
                                        Combating application level threats
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Running an SQL injection attack
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Cross-site scripting
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Installing a web scanner
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Scanning a website
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Using a web proxy to inspect traffic
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                8. Monitoring Packets
                                    
                                        Explaining networks
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Capturing packets with Wireshark
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Making sense of the protocols
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Using Wireshark filters
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Capturing intruders with packets
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                     
                        
                                
                                    Ex_Files_Cybersecurity_IT_Professionals.zip
                                    
                                        (1.0 MB)
                                    
                                
                                
                                    Glossary_Cybersecurity_IT_Professionals.zip
                                    
                                        (92 KB)