Cybersecurity Fundamentals Starter Kit
Master Cyber Security with this course
IT and Software ,Network and Security,Cyber Security
Lectures -55
Duration -3 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
Introduction Ethical Hacking:-
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
Foot Printing:-
Footprinting is a part of the reconnaissance process which is used for gathering possible information about a target computer system or network.
Port Scanning:-
Port are the doors from which data enters & leaves the system.
Computers use port numbers to determine to which process or application a message should be delivered.
As network addresses are like street addresses, port numbers are like suite or room numbers.
Network Fundamentals:-
A computer network is a digital telecommunication network that allows nodes to share resources.
An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
A gateway is a node (router) in a computer network, a key stopping point for data on its way to or from other networks. Thanks to gateways, we are able to communicate and send data back and forth.
A router is a networking device that forwards data packets between computer networks. Routers perform the traffic-directing functions on the Internet.
A network switch is a computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device
Goals
- Network Security Engineer
- Cyber Security Students
- Cyber Security Analyst
- Security operations center
Prerequisites
- Basics of Computer Science

Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction to Hacking
18 Lectures
-
Introduction 00:49 00:49
-
Who is a Hacker? 01:39 01:39
-
Types of hacker 03:59 03:59
-
Common Keyword Use For Hacking 00:26 00:26
-
Common Keyword use for Hacking:- vulnerabilities 02:24 02:24
-
Common Keyword use for Hacking:-security bug 01:33 01:33
-
Common Keyword Use For Hacking:-Exploit 02:07 02:07
-
Common Keyword Use For Hacking:-Threat 01:28 01:28
-
Common Keyword Use For Hacking:-privilage 01:27 01:27
-
Common Keyword Use For Hacking:-authentification 02:20 02:20
-
Common Keyword Use For Hacking:-Authorization 03:01 03:01
-
Common Keyword Use For Hacking:-Command 01:35 01:35
-
Common Keyword Use For Hacking:-GUI 01:33 01:33
-
Common Keyword Use For Hacking:-Query 04:20 04:20
-
Common Keyword Use For Hacking:-System Files 05:04 05:04
-
File Securing System : Windows 04:06 04:06
-
File Securing System: Windows CLI 03:15 03:15
-
File Securing Software Windows 03:55 03:55
Footprinting
12 Lectures

Network fundamental
15 Lectures

Port Scanning
10 Lectures

Instructor Details
Akash Ranjan Patel
About me
VAPT Web/Android/Wireless/IOT
• Cyber Security Writer
• Cyber Security Instructor
• Bug Bounty Hunter
• Freelance Cyber Project contractor
Akash Ranjan Patel is working as a Remote Cyber Security Freelancer and has experience of 2+ years in InfoSec field. He has conducted many Web Application, Mobile application, Network VAPT and API Testing. He has received many hall of frames like Dell Technologies, Vonage, Comcast, OVH , realsafe , skyscanner etc.
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now