There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans.Refined hackers know how to hack a human brain first to hack digital assets. You’ll find out what social engineering, phishing, and spear-phishings, and why they’re becoming especially dangerous today.By the end of this course, you’ll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them
There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans.Refined hackers know how to hack a human brain first to hack digital assets. You’ll find out what social engineering, phishing, and spear-phishings, and why they’re becoming especially dangerous today.By the end of this course, you’ll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them
About the Author
Sergii Nesterenko is Information Security Consultant and Penetration Tester with 20 years’ experience in the information security and 6 years’ in the cybersecurity field. He consults international business companies, military staff, NGOs, politicians, Members of Parliament, law enforcement, and other VIP on security issues. His wide knowledge in information technologies and human psychology let him elaborate effective technologies to prevent and overcome most cunning cyberattacks. He has also known for his publications and lectures on cybersecurity, anti-fraud, and counter-cyberespionage issues.
In this video, we are going to install Metasploitable 2 as our main target virtual machine and get acquainted with its applications. Also we will install Windows 7 as the secondary target virtual machine.
This video provides an overview of the entire course.
In this video, we are going to know what Kali Linux is and why using it is the best and fastest way to become a cybersecurity pro.
In this video, we are going to install Kali Linux as virtual machine and run it for the first time.
In this video, we are going to know nuts and bolts of Kali Linux interface and how to run it for easy use.
In this video, we are going to learn how to use Kali terminal and its commands necessary to know for this course.
In this video, we are going to tune up Python correctly for the course purposes.
In this video, we will consider the variety of ways a network can be attacked and categorize them.
In this video, we will learn how to scan a target with Nmap for finding open ports and fingerprinting.
In this video, we will know how to find vulnerabilities in a network with an OpenVas scanner.
In this video, we will discover how to use Wireshark for sniffing a network to intercept user’s data.
In this video, we will know about what is man-in-the-middle attack and what harm can be done with it.
In this video, we will learn about variety of dangerous browser attacks with BeEf framework.
In this video, we will discover how to set a reverse on target computer using Metasploit framework.
In this video, we will find out what is persistent backdoor and how it can be installed on target machine.
In this video, we will consider using Python language in cybersecurity field and create flexible Portscanner with Python script.
In this video, we discover how to find vulnerabilities in a web-application using a browser only.
In this video, we get to know OWASP ZAP scanner and learn to find vulnerabilities with automated scanning.
In this video, we learn SQL injection attack and its purposes.
In this video, we discover how to test a web-application for SQL injection vulnerability.
In this video, we learn to exploit SQL injection to extract credentials from database with SQLmap.
In this video, we learn how to execute proxy attack using Burp Suite.
In this video, we get to know with session hijacking attack and demonstrate how cookies can be stolen.
In this video, we will learn Cross Site Scripting and execute stored XSS attack.
In this video, we discover details about another type of XSS attack – reflected XSS and how it’s executed.
In this video, we will learn why and when using Python scripts is
useful. In addition, we create and run Python script for XSS testing.
In this video, we will learn about social engineering and become aware why attacking humans often more effective than attacking computers.
In this video, we will get acquainted with Social Engineering Toolkit and get hands-on experience of making a phishing email
In this video, we will learn to make a malicious payload for a phishing email.
In this video, we will know how malicious USB is created.
In this video, we will learn about whaling kind of cyberattack targeted at VIP and techniques using in spear-phishing attacks.
In this video we will get to know with Maltego framework and find out how to extract e-mails and phone numbers from the Internet assets
In this video, we get to know with session hijacking attack and demonstrate how cookies can be stolen.In this video, we will learn OSINT (Open Source Intelligence) techniques to extract information from social media.
In this video, we will learn why and how cybercriminals use psychological manipulation techniques to influence their victims.
In this video, we will learn a few hacking techniques that don’t require neither special tools nor direct contact with a target.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.