Completed
Nikto Web Vulnerability Scanner - Web Penetration Testing
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptography and Cybersecurity Fundamentals
Automatically move to the next video in the Classroom when playback concludes
- 1 Mathematics Basics - Cryptography - Cybersecurity - CSE4003
- 2 Modular Arithmetic - Congruence and its Properties - Cryptography - Cybersecurity - CSE4003
- 3 Finding mod of a Negative Number -- Cyber Security CSE4003
- 4 Modular Exponentiation - Cryptography - Cyber Security - CSE4003
- 5 Euclidean Algorithm for Finding GCD - Cryptography - Cyber Security - CSE4003
- 6 Extended Euclidean Algorithm - Cryptography - Cyber Security - CSE4003
- 7 Modular Multiplicative Inverse - Cryptography - Cyber Security - CSE4003
- 8 Chinese Remainder Theorem - Cryptography - Cyber Security CSE4003
- 9 Primality Testing - Fermat's little Theorem - Carmichael Numbers - Cyber Security CSE4003
- 10 Miller Rabin Primality Test with Examples - Cyber Security - CSE4003
- 11 Euler's Totient Function and Euler's Theorem - Cryptography - Cyber Security - CSE4003
- 12 Introduction to Cryptography - Cyber Security - CSE4003
- 13 Cryptography Basics - Bitwise XOR , Shift , Circular Shift Operations - Cyber Security - CSE4003
- 14 Block Cipher Vs Stream Cipher - Cryptography - Cyber Security - CSE4003
- 15 Block Cipher Modes - Cryptography - Cyber Security - CSE4003
- 16 Data Encryption Standard (DES) - Explained with an Example - Cryptography - CyberSecurity - CSE4003
- 17 Double DES and Triple DES - Meet in the Middle Attack - Cyber Security - CSE4003
- 18 Caeser Cipher and Multiplicative Cipher - Cryptography - Cyber Security CSE4003
- 19 Playfair Cipher - Explained with an Example - Cryptography - Cyber Security CSE4003
- 20 Vigenere Cipher - Explained with an Example - Cryptography - Cyber Security - CSE4003
- 21 Hill Cipher - Encryption and Decryption - Step by Step - Cryptography - Cyber Security - CSE4003
- 22 AES I - Group, Ring, Field and Finite Field - Abstract Algebra Basics - Cyber Security - CSE4003
- 23 AES II - Finite Field ( Galois Field ) Arithmetic for Advanced Encryption Standard - CSE4003
- 24 AES III - Advanced Encryption Standard - Introduction , Key Expansion in AES Cyber Security CSE4003
- 25 AES IV - Advanced Encryption Standard - Encryption and Decryption - Cyber Security CSE4003
- 26 Discrete Logarithm -Finding Primitive Roots - Cryptography - CSE4003
- 27 Diffie Hellman Key Exchange Algorithm - Cryptography - Cyber Security - CSE4003
- 28 Public key Cryptography - What is it? - Cryptography - Cyber Security - CSE4003
- 29 Elgamal Cryptosystem - Public key Cryptography - Cyber Security - CSE4003
- 30 RSA Algorithm - Explained with Examples - Cyber Security - CSE4003
- 31 Elliptic Curve Cryptography - Session 1 - Cyber Security CSE4003
- 32 Elliptic Curve Cryptography - Session 2 - Cyber Security - CSE4003
- 33 Introduction to Hash Functions and Application of Hash Functions in Cryptography - CSE4003
- 34 SHA 512 - Secure Hash Algorithm - Step by Step Explanation - Cryptography - Cyber Security - CSE4003
- 35 Message Authentication Code (MAC) and HMAC - Cryptography - Cyber Security CSE4003
- 36 What are Digital Signatures ? - Cryptography - Cyber Security - CSE4003
- 37 Elgamal Digital Signature - Cryptography - Cyber Security - CSE4003
- 38 Digital Signature Standard (DSS) - Cryptography - Cyber Security - CSE4003
- 39 What is a Cyber Crime ? Cyber Laws in India - IT ACT 2000 - Cybersecurity CSE4003
- 40 Setting up a Virtual Hacking Lab - Step by Step - Cyber Security - CSE4003
- 41 Metasploitable 2 - Installation on VirtualBox 6.1 - Cyber Security #8
- 42 How to install Oracle VM Virtualbox 7.0 on Windows
- 43 How to install Kali Linux 2024 on Virtualbox 7.0? [Windows host]
- 44 NMAP demo using Kali Linux 2020 - Ethical Hacking - Cyber Security #6
- 45 Manual SQL Injection Demo using DVWA - Ethical Hacking - Cyber Security #7
- 46 Sqlmap demo Using Kali Linux 2020 - SQL Injection using SQLMAP - Ethical Hacking Cyber Security #9
- 47 SNORT Demo - Network Intrusion Detection and Prevention System - Kali Linux - Cyber Security #10
- 48 Social Engineering - What is it ? Types of Social Engineering Attacks - How to Avoid them - CSE4003
- 49 Social Engineering Attack Demo - Kali Linux setoolkit - Cybersecurity - CSE4003
- 50 Social Engineering Attack - Kali Linux - Mass Mailer - demo
- 51 Password Cracking Tools - Introduction and Types - Online and Offline Password Cracking - CSE4003
- 52 Hydra Password Cracking Tool - Demo using Kali Linux - Cybersecurity - CSE4003
- 53 Hydra / Hydra Graphical Password Cracking Tool Demo
- 54 How to use Hashcat Password Cracking Tool ? - Demo using Kali Linux - Cybersecurity - CSE4003
- 55 Password Cracking with John the Ripper : Single, Wordlist, and Incremental Mode Deep Dive
- 56 Password Recovery using Ophcrack - Kali Linux - Demo
- 57 Metasploit Framework - Introduction - Modules in Metasploit
- 58 Metasploit Framework Session 2 - Demo - Exploiting VSFTPD 2.3.4 Service
- 59 Metasploit Auxiliary modules Demo - TCP Port Scanners, ftp_login, ssh_version and ssh_login
- 60 Ethical Hacking: Using Metasploit to Crack Passwords
- 61 Hping3 Demo- Kali Linux - Ping Flood and SYN Flood Attack - DOS and DDOS - Explained - CSE4003
- 62 Nikto Web Vulnerability Scanner - Web Penetration Testing
- 63 Clickjacking Attack - Demo - Web Application Attack
- 64 Persistent XSS (Cross Site Scripting) attack - What is it ?- How to prevent it ?
- 65 ARP Spoofing / Poisoning - Demo | Man-in-the-Middle Attack
- 66 Security Policies- What are they ? Types of Security Policies - Email Security Policy Cybersecurity
- 67 Introduction to Internet Security Policy and its Contents - Cyber Security - CSE4003.
- 68 Metasploit for Detecting Null Sessions and Exploiting Samba Server(SMB)
- 69 Nessus Essentials Installation on Kali Linux [2024]
- 70 Mastering Nessus Scans: A Guide to Host Discovery, Basic Network Scan and Web Application Tests
- 71 WEP , WPA , WPA 2 and Four way Handshake
- 72 Wifi Hacking Using Aircrack-ng -The complete Guide
- 73 Database Vulnerabilities and Counter Measures
- 74 Exploiting MySQL Database using MetaSploit Auxiliary Modules [Kaii Linux 2024]
- 75 Network File System[NFS] Attack - Demo using Kali Linux 2024 and Metasploitable 2
- 76 Advanced Nmap: Using Scripts for MySQL, FTP, & SSH Exploitation
- 77 Nmap TCP Scanning & Flag Analysis - The Ultimate Guide
- 78 Domain Name System (DNS) - How does it work ?
- 79 DNS Enumeration: Mastering Host, Dig, Dnsenum, Dnsmap, & Dnsrecon
- 80 UFW (Uncomplicated Firewall) - Step by Step Demo
- 81 Understanding SQL Injection Attacks - Manual and Automated - How it Works?
- 82 Passive Sniffing with tcpdump: Essential Commands and Techniques
- 83 Managing Metasploit Data : A Guide to PostgreSQL Integration
- 84 MAC Flooding Attack Demo: Kali Linux Tutorial
- 85 Metasploit Meterpreter in Action: Demo of Remote Code Execution & File Transfer
- 86 How Cross-Site Request Forgery Attack (CSRF) Works: A Deep Dive
- 87 Reflected Cross Site Scripting (XSS) Attack: An In-Depth Look for Developers
- 88 Goodbye Passwords! Create a Google Passkey in Minutes
- 89 Metasploit JavaScript Keylogger: Capture Keystrokes with Auxiliary Module Tutorial