If the topic is cybersecurity, it is hard to start where. This is because of its multi-discipline structure. With this course, you can see the whole picture with hands-on LABs. This gives you the advantage of learning both technical and theoretical aspects of the field. Our LABs are designed to learn the basics of technologies and processes. Thus, at the end of the course, you will have learned how to use or implement fundamental cybersecurity technologies and processes. The theoretical topics include modern approaches.
Besides technical details, our course also includes compliance topics. In this section, you will have a chance to learn HIPAA, PCI-DSS, NIST, ISO 27001 standards. Remember that this information is essential for both technic and non-technical cybersecurity professionals or researchers. Besides it, you will learn cyber hygiene issues which include both technical and theoretical information. You will have a chance to implement your knowledge about these topics during hand LABs. (Risk Management, CIS Security Controls, Vulnerability Scanning, Deploying Phishing Campaigns, and more..)
Do not worry about technical LABs like IDS technologies, Honeypods, VPNs. They are designed simply. Before starting the LAB needed theoretical information is given in previous lessons.
Get Ready for Cyber Security certifications such as CompTIA Security+ and CEH
Our course’s motto was chosen from the enlightenment era.
“Sapere Aude” (is the Latin phrase meaning “Dare to know“)
Emanuel Kant.
Course Intro
Information & Cybersecurity Essentials
Network Security
Important Notice:
shalla list web site that we have mentioned in the lab is sometimes down. If it is down when you try to access please use this github link.
https://github.com/cbuijs/shallalist
If all above does not work please inform me via message, i will find another solution for the problem.
Endpoint Security
In this LAB we will create malware using our KALI machine. Then we will upload the malware that we have created to virustotal and analyze it. Next, we'll analyze some blacklist IP addresses we've seen in previous lessons. Finally, we will download a sample malware from a website that serves malware samples on the Internet and perform its analysis.
IPTABLES is a command-line firewall utility that uses policy chains to allow or block traffic. When a connection tries to establish itself on your system, IPTABLES looks for a rule in its list to match it to. If it doesn’t find one, it resorts to the default action. In this lab, we will see how IPTABLES work and harden an endpoint.