Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Zero To Mastery

Complete Cybersecurity Bootcamp: Zero to Mastery

via Zero To Mastery

Overview

The Cybersecurity Bootcamp that will take you from ZERO to HIRED as a Cyber Security Engineer. You'll learn the latest best practices, techniques, and tools used for network security so that you can build a fortress for digital assets and prevent black hat hackers from penetrating your systems.
  • How to launch your career in Cyber Security from scratch
  • Have the skills and understanding to confidently apply for Cyber Security jobs
  • Learn the entire Cyber Security ecosystem
  • Become an Incident Response Analyst, the first responders to a cyber attack
  • Learn to identify social engineering and protect against it
  • Become a Risk Analyst, the tacticians that perform regular assessments of a company's cyber security systems
  • How to develop effective end-point protection and network security systems
  • Become a Penetration Tester / Ethical Hacker, the mercenaries that design, simulate, and execute attacks on enterprise networks to identify vulnerabilities
  • Understand how hackers track you and your associates online
  • Become a Forensic Analyst, the detectives that investigate breaches and solve virtual crimes
  • Protect yourself online using advanced anonymity and privacy techniques
  • Master Cyber Security best practices and techniques to become a Top 10% Cyber Security Engineer

Syllabus

  •   Introduction
    • Cybersecurity Bootcamp: Zero to Mastery
    • Exercise: Meet Your Classmates and Instructor
    • Course Resources
    • How-to's: Speed up videos, Downloading videos, Subtitles
  •   Introduction To Cyber Security
    • What is Cyber Security
    • Cyber Security Prerequisites
    • Most Common Cyber Security Paths
    • History of Cyber Security
    • Unlimited Updates
  •   Cyber Security Basic Theory & Goals
    • Goals Of Cyber Security
    • Blue Team vs Red Team
    • Protecting Assets
    • How Companies Get Compromised
    • Different Securities
  •   Understanding Hackers - The Biggest Threat
    • Who Are Hackers
    • Most Common Attacks Demonstration
    • Malware
    • Can We Catch Them?
  •   Security Bugs & Vulnerabilities
    • What is a Vulnerability
    • Most Common Vulnerabilities
    • Unpatched Machine Exploitation Demonstration
    • Preventing Vulnerabilities
    • Resources for Buffer Overflows
    • Buffer Overflow Demonstration
  •   Social Engineering Basics
    • Social Engineering Attacks
    • How To Recognize Phishing Emails
    • Tools For Analyzing Phishing Attacks
    • Summary Of Social Engineering
  •   End-Point Protection
    • End-Point Protection Introduction
    • Browser Security
    • Firefox Security and Hardening
    • Brave Browser Security and Privacy
    • Safari and Chrome Security Resources
    • Antivirus Theory
    • Default Windows Security
    • MacOS XProtect and MRT
    • Bitdefender, Kaspersky, McAfee, Malwarebytes
    • Password Security and Password Managers
    • Keepass
    • LastPass, NordPass, and 1Password
    • File and Disk Encryption
    • Process Explorer
    • Netstat and Wireshark
    • Htop
    • Rootkit Hunter
    • Host Based Firewalls
    • Iptables
    • Windows Defender Firewall
    • Macos Firewall
    • How To Securely Erase Files on Windows Linux Macos
    • End-Point Security Recap
  •   Network Security
    • Network Security Introduction
    • Network Firewalls Theory
    • Different Network Firewalls
    • Network Scanning and Discovering Vulnerabilities
    • Network Security With Nmap
    • Discovering Vulnerabilities With Nessus
    • Scanning Windows 7 Machine With Nessus
    • Routersploit
    • Router Default Credentials
    • Secure Network Architecture
    • Wireless Security
    • Wireless Attack Demonstration
    • Network Monitoring With TCPDump
    • Common Network Attacks
  •   Cyber Security Strategies
    • Protect and Recover Strategy
    • Endpoint Protection Strategy
    • Application Centric Strategy
    • Identity Centric Strategy
    • Data Centric Strategy
    • Attack Centric Strategy
  •   How We Are Tracked
    • IP Tracking
    • Cookies and Browser Tracking
    • Exercise: Imposter Syndrome
    • Different Types of Tracking
  •   Anonymity & Privacy
    • Anonymity Theory
    • Tor Browser
    • Proxychains With Different Tools
    • Installing VPN for Kali
    • Whoami Anonymity Tool
    • Steps to be as Anonymous as Possible
  •   Appendix: Ethical Hacking
    • 5 Stages Of A Penetration Test
    • Obtaining IP Address, Physical Address Using Whois Tool
    • Whatweb Stealthy Scan
    • Gathering Emails Using theHarvester & Hunter.io
    • Theory Behind Scanning
    • TCP & UDP
    • Netdiscover
    • What is Exploitation?
    • Reverse Shells, Bind Shells
    • Msfconsole Basic Commands
    • Our First Exploit - vsftp 2.3.4 Exploitation
    • Software Vulnerability - Samba Exploitation
    • Generating Basic Payload With Msfvenom
    • Advance Msfvenom Usage
    • Post Exploitation Theory
    • Meterpreter Basic Commands Part 1
    • Meterpreter Basic Commands Part 2
  •   Where To Go From Here?
    • Thank You!
    • Review This Course
    • Become An Alumni
    • LinkedIn Endorsements
    • Learning Guideline

Taught by

Aleksa Tamburkovski

Reviews

Start your review of Complete Cybersecurity Bootcamp: Zero to Mastery

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.