The Complete Cybersecurity Bootcamp, 2nd Edition

The Complete Cybersecurity Bootcamp, 2nd Edition

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 290 Lessons (26h 35m) | 5.47 GB

The Complete Cybersecurity Bootcamp, 2nd Edition is your comprehensive guide to becoming a cybersecurity professional. The extensive course is compiled from Omar Santo’s best-selling video courses, starting with the basics and leading you through the most important topics in the cybersecurity landscape. The videos in this intensive bootcamp are structured to help you start with the fundamental concepts of cybersecurity and then build your core cybersecurity knowledge and move on to real-life pen testing and ethical hacking projects. It also covers cloud security, cybersecurity management, monitoring and analysis, network security telemetry, digital forensics and incident response (DFIR), ethical hacking and pen testing, wireless hacking and pen testing, mobile device security, and IoT security. This course can also be a resource for anyone who is preparing for security certification like CompTIA Security+, Cisco CyberOps Associate, CISSP, CompTIA PenTest+, Certified Ethical Hacker (CEH), GIAC certifications, or others.

Omar Santos, a best-selling Cisco Press and Pearson security author and trainer, has compiled the lessons to provide you with the best knowledge. The Bootcamp is organized in an easy-to-follow manner to give you the freedom to move at your own pace. The course provides supplement materials to strengthen your critical concepts and techniques that help you build your own hacking environment, examples of real-life penetration testing reports, and more. This material can be found at theartofhacking.org.

The contents of The Complete Cybersecurity Bootcamp, 2nd Edition were created using the following titles:

Wireless Networks, IoT, and Mobile Devices Hacking by Omar Santos
Cisco CyberOps Associate CBROPS 200-201 Complete Video Course by Omar Santos and Ron Taylor
CCNP and CCIE Security Core SCOR 350-701 Complete Video Course by Omar Santos and Ron Taylor
CompTIA PenTest+ (PT1-001) Complete Video Course by Omar Santos
Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition by Omar Santos and Nick Garner
Security Penetration Testing by Omar Santos, Jon Sternstein, Ron Taylor, and Chris McCoy

Topics include:

  • Module 1: Security Concepts
  • Module 2: Security Operations, Incident Response, and Digital Forensics
  • Module 3: AAA, Identity Management, Network Visibility, and Segmentation
  • Module 4: Fundamentals of Ethical Hacking and Penetration Testing
  • Module 5: Mobile Device Security
  • Module 6: Internet of Things (IoT) Security
  • Module 7: Cloud Security Fundamentals

Learn How To:

  • Survey cybersecurity vulnerabilities
  • Decipher Encryption and Hashing Algorithms
  • Analyze Computer Incident Response Teams (CSIRTs) and Product Security Incident Response Teams (PSIRTs)
  • Apply VERIS
  • Perform DNS Analysis and Web Log Analysis
  • Identify MITRE ATT&CK Framework
  • Examine Asset and Threat Actor Attribution
  • Examine Host-based Intrusion Detection
  • Analyze Security Device Data
  • Survey the TACACS+ Protocol
  • Survey Open Source SDN Solutions
  • Scope a Penetration Testing Engagement Properly
  • Perform Footprinting through Social Engineering
  • Scan beyond IDS and Firewall
  • Survey Web Server Attack Tools
  • Explore SQL Injection Tools
  • Hack Bluetooth
  • Build your own lab
  • Create a Fuzzing Strategy
  • Crack Passwords
  • Hack iOS and Android OS
  • Hack Android devices

Who Should Take This Course:

  • Anyone contemplating starting a career in cybersecurity.
  • People who would like to better understand cybersecurity concepts.
  • Anyone studying for a security cert like CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), GIAC Information
Table of Contents

Module 1: Security Concepts
Lesson 1: Cybersecurity Fundamentals
Lesson 2: Additional Cybersecurity Principles
Lesson 3: Types of Attacks and Vulnerabilities
Lesson 4: Fundamentals of Cryptography and PKI

Module 2: Security Operations, Incident Response, and Digital Forensics
Lesson 5: Fundamentals of Incident Response
Lesson 6: Fundamentals of Security Monitoring
Lesson 7: Intrusion Event Categories
Lesson 8: Digital Forensics Fundamentals
Lesson 9: Endpoint Security Technologies and Host-based Forensics Fundamentals
Lesson 10: Network Intrusion Analysis

Module 3: AAA, Identity Management, Network Visibility, and Segmentation
Lesson 11: Introducing AAA and Identity Management
Lesson 12: Network Visibility and Segmentation
Lesson 13: Network Infrastructure Security
Lesson 14: Software-Defined Networking Security and Programmability

Module 4: Fundamentals of Ethical Hacking and Penetration Testing
Lesson 15: Overview of Ethical Hacking and Penetration Testing
Lesson 16: Information Gathering and Passive Reconnaissance
Lesson 17: Active Reconnaissance, Scanning, and Enumeration
Lesson 18: Hacking Web Servers
Lesson 19: Hacking Web Applications
Lesson 20: SQL Injection
Lesson 21: Fundamentals of Wireless Hacking
Lesson 22: Wireless Client Attacks
Lesson 23: Building Your Lab and Attack Hardware
Lesson 24: Aircrack-ng
Lesson 25: Buffer Overflows
Lesson 26: Post-Exploitation Techniques
Lesson 27: Hacking User Credentials
Lesson 28: Reporting and Communication

Module 5: Mobile Device Security
Lesson 29: Hacking Mobile Platforms
Lesson 30: Mobile Device Security
Lesson 31: Fundamentals of Android Security
Lesson 32: Hacking iOS Devices

Module 6: Internet of Things (IoT) Security
Lesson 33: Fundamentals of IoT Security
Lesson 34: Hacking IoT Devices
Lesson 35: Attacking Bluetooth
Lesson 36: Attacking NFC

Module 7: Cloud Security Fundamentals
Lesson 37: Understanding Cloud Security

Module 8: Social Engineering Fundamentals
Lesson 38: Understanding Social Engineering Countermeasures

Summary

Homepage