Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity Career Path
Rules and Regulations
Path Guidelines
Professional Conduct
Disclaimer
Module 0 | Preparation & Prerequisites
Overview
The art of learning (95:16)
WI-FI & Network Fundamentals (165:59)
Windows & Linux Basics (132:23)
Mobile, Web Applications & Proxies (108:32)
📋 Assignment (101:00)
Module 1 & 2 | Cybersecurity Essentials, Cryptography & Wireless Security
Overview
Introduction to Cybersecurity (155:48)
Cryptography (I) (138:25)
Cryptography (II) (98:21)
Cryptography (III) (96:28)
Cryptography (IV) (121:25)
Wireless Security (I) (168:13)
Wireless Security (II) (148:38)
Wireless Security (III) (128:58)
Wireless Security (IV) (117:55)
Recon and Info gathering (I) (111:24)
Recon and Info gathering (II) (124:00)
Recon and Info gathering (III) (231:43)
Recon and Info gathering | CTF Challenge Solution (35:21)
Social Engineering (I) (96:53)
Social Engineering (II) (124:46)
Social Engineering (III) (166:17)
Module 3 & 4 | Network & System Security
Overview
Network and System Security Lab Setup
Basic Network Attacks (132:17)
Vulnerability Scanning (137:17)
Command & Control (111:25)
Initial Access I (126:22)
Initial Access II (122:06)
Initial Access III (125:06)
Initial Access - Detection Technology (Bonus session) (116:39)
Attacking Windows Environment I (140:14)
Attacking Windows Environment II (131:58)
Attacking Windows Environment III (132:08)
Attacking Windows Environment IV (125:12)
Attacking Windows Environment V (121:21)
Attacking Windows Environment VI (110:04)
Attacking Windows Environment VII (113:28)
Module 5 | Web/API Security
Overview
Understanding The Web Architecture (152:58)
Web Hacking Essentials (157:30)
📋 Assignment I
Pre-Recorded #1 - IDOR, Business Logic, CSRF, and Clickjacking
Follow up + Intro into SQL Injection (76:19)
Pre-Recorded #2 - SQL Injection (I)
Pre-Recorded #3 - SQL Injection (II)
Follow up + Information Disclosure + DOS (113:59)
📋 Assignment II
Follow up + Live Hacking (Assignment) + Intro to XSS (131:42)
Pre-Recorded #4 - XSS(I)
Pre-Recorded #5 - XSS(II)
Brute Force Attacks (153:27)
Root Cause - Secure Code Review (122:37)
File Upload - RCE - Path Traversal (145:30)
Bug Bounty Hunting Methodologies & Advices (145:32)
Module 6 | Mobile Apps Security
Overview
Mobile Apps Security I (135:49)
Mobile Apps Security II (145:08)
Mobile Apps Security III (114:37)
Module 7 | Detection Engineering
Overview
Detection Engineering I (86:44)
Detection Engineering II (142:03)
Detection Engineering III (141:13)
Module 8 | Career Readiness
Overview
Career Readiness I (160:32)
Assignment 1
Career Readiness II (129:27)
Assignment 2
Assignment 3
Career Readiness III (91:44)
Module 9 | Final Evaluation
Research (40/100)
Final Exam (60/100)
Wireless Security (IV)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock