Introduction
Learn the basics and common tools of cybersecurity
()
What you should know
()
Disclaimer
()
1. Why Cybersecurity?
A history of hackers
()
The cyber kill chain
()
Stuxnet and the kill chain
()
Common forms of cyber attack
()
2. Antivirus
Viruses, spyware, and adware
()
Introducing Microsoft Windows Defender
()
Detecting malware with Defender
()
Defender advanced settings
()
Automating scans with task scheduler
()
Other antivirus solutions
()
3. Firewalls
Why firewalls?
()
Windows firewall basics
()
Advanced Windows firewall
()
ZedLan firewall log analyzer
()
Introducing Linux iptables
()
Setting up a simple iptables firewall
()
4. Network Scanning
Getting started with Nmap
()
Advanced Nmap options
()
GUI scanning with Zenmap
()
5. Network Connections
Getting started with netcat
()
Transferring files using netcat
()
Connecting to services
()
Setting up a netcat honeypot
()
6. Vulnerability Scanning
Preparing Nessus to do scanning
()
Setting up a Nessus policy
()
Running a Nessus scan
()
Scheduling scans
()
7. Web Applications
Combating application level threats
()
Running an SQL injection attack
()
Cross-site scripting
()
Installing a web scanner
()
Scanning a website
()
Using a web proxy to inspect traffic
()
8. Monitoring Packets
Explaining networks
()
Capturing packets with Wireshark
()
Making sense of the protocols
()
Using Wireshark filters
()
Capturing intruders with packets
()
Ex_Files_Cybersecurity_IT_Professionals.zip
(1.0 MB)
Glossary_Cybersecurity_IT_Professionals.zip
(92 KB)