Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Get Certified as a SOC(Security Operation Center) Analyst - Learn From Scratch to Advanced Level
SECTION 1
Lecture 2 - Basics Of Networks (3:35)
Lecture 5 Types Of Network Security Device & Working (3:45)
Lecture 3 - OSI Model & TCP IP Protocol Suite (4:21)
Lecture 4 - Types Of Network Device & Working (2:50)
SECTION 2
Lecture 6 - Bit, Bytes and Hexadecimal Representation (7:14)
Lecture 7 MAC & IP Address (7:41)
Lecture 8 - Network Address Translation (2:16)
Lecture 9 - Port Address Translation (1:59)
Lecture 10 - Wireshak & Tshark (8:26)
SECTION 3
Lecture 11 - IP Protocol and IP header (2:13)
Lecture 12 - IP header fields (12:55)
Lecture 13 - Transport layer and Trasnport porotols (1:36)
Lecture 14 - TCP header fields (6:57)
Lecture 15 - Cyber Attacks (7:17)
SECTION 4
Lecture 16 - UDP Prtocol _ UDP Header (1:19)
Lecture 17 - UDP Header Fields (1:34)
Lecture 18 - ICMP Protocol and ICMP Header (1:32)
Lecture 19 - ICMP Header Fields (2:26)
Lecture 20 - Cyber attacks with UDP & ICMP Protocol (5:51)
SECTION 5
Lecture 21 - Protocls and Ports (2:49)
Lecture 22 - ARP Protocol (1:21)
Lecture 23 - Client Server Model (1:02)
Lecture 24 - HTTP Service (4:53)
Lecture 25 - DHCP (1:32)
Lecture 26 - DNS (3:22)
Lecture 27 - Basics of FTP_ Telnet_ SSH _ SMTP 2 (1:31)
SECTION 6
Lecture 28 - Cyber Attack & Prevention For DNS Zone Transfer (4:57)
Lecture 29 - Cyber Attack & Prevention For Host Discovery Attack (6:46)
Lecture 30 - Cyber Attack & Prevention for Port Scanning (6:31)
Lecture 31 - Cyber Attacks & Prevention For VA Scanning (3:44)
Lecture 32 - Cyber Attacks & Prevention For ARP Poisiong (4:47)
Lecture 33 - Cyber Attacks & Prevention For DDOS Attacks (9:49)
SECTION 7
Lecture 34 Workgroup _ Domain (6:19)
Lecture 35 Cryptography (6:20)
Lecture 36 Windows password (4:40)
Lecture 37 Authentication Protocol (11:44)
Lecture 38 Basics Of Linux (4:39)
Lecture 39 Windows and Linux Logs (5:50)
SECTION 8
Lecture 40 Exploitation (7:31)
Lecture 41 Malware (5:14)
Lecture 42 Brute Force attack (7:13)
SECTION 9
Lecture 43 Brute - Force Attack For Single Account (6:23)
Lecture 44 Brute - Force Attack for multiple user account (2:40)
Lecture 46 Privelge escalation (2:08)
Lecture 47 Phishing Attack & Prevention (5:24)
Lecture 48 Multiple Geo-Location Access For User Account (2:09)
Lecture 49 Malware and C&C CAllback Detection & Prevention (4:26)
Lecture 50 Zero day attack and Patch Management (2:27)
SECTION 10
Lecture 51 - web application introduction (3:08)
Lecture 52 - Web Application Working (8:27)
SECTION 11
Lecture 53 - Web application attack (1:47)
Lecture 54 - Poodle attack (4:11)
Lecture 55 - HeartBleed Attack (2:43)
Lecture 56 - Shellshock (2:08)
SECTION 12
Lecture 58 SQL injection Attack & Remediation (5:43)
Lecture 59 XSS Attack & Remediation (4:44)
Lecture 60 CSRF Attack & Remediation (1:58)
SECTION 13
Lecture 61 Endpoint Protection (9:46)
Lecture 62 Endpoint Protect - 1 (8:51)
Lecture 63 - Endpoint Protection - 2 (4:38)
Lecture 64 - Endpoint Protection 3 (5:06)
SECTION 14
Lecture 65 Working, Detection & Evansion from NIPS (23:52)
SECTION 15
Lecture 66 - Firewall Working, Types and Reporting-2 (4:00)
Lecture 66 - Firewall Working, Types and Reporting (6:05)
SECTION 16
Lecture 67 Real Time Attacking Phase 1 (11:20)
Lecture 68 - Real Time Attacking Phase 2 (29:45)
Lecture 69 Real Time Attacking Phase 3 (25:34)
Lecture 70 Real Time Attacking Phase 4 (21:11)
SECTION 17
Lecture 71 SIEM Installation (8:28)
Lecture 72 Logs Forwarding to SIEM (12:51)
Lecture 73 Threat Hunting On SIEM (15:02)
Lecture 74 Dashboard Creation On SIEM (28:49)
Teach online with
Lecture 52 - Web Application Working
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock