Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security Engineering - (LMS Bootcamps)
Introduction
Introduction of Oak Academy (83:35)
Try Hack Me Tutorial
Books, Terminology, Why do we need Cyber Security?
Principles and Computer Components
Cyber Security Career (102:40)
Computer Components
Input Devices
Storage Devices
Processing Devices
Output Devices
IT / IoT and Network Components
What is IoT (111:19)
Mobile Security Threats
NIC - Network Interface Card
Hub - Switch - Router - Bridge - Cable Modem - WAP - Fiber Optic Cable & Modem
Firewall
IT / Operating System
Functions of Operating System (92:31)
Kind of Operating System
IT / Libraries & Programming Languages
What is a "Library" in Computer Science? (89:44)
What is Virtualization?
Type of Virtualization
Hypervisor
Security of the Virtualization
Programming Language
IT / Cloud Computing
What is Cloud Computing? (46:15)
Classification of Cloud Models (72:24)
Characteristics of Cloud Computing
Cloud Service Models
Cloud Deployment Models
Virtual Machine & Virtualisation Platforms Installations
Virtualisation Platforms (89:59)
Download & Install: KALI
How to install Virtual Box?
Network Modes
Server Operating System
Server Operating Systems (54:15)
Classification of Operating Systems
Functions of Servers
Type of Servers
Comparison Of Operating Systems
Market Share and Size Of The Operating Systems
Operating System / Linux
Basic Linux Commands - Entry (67:08)
Basic Linux Commands - 1 (93:53)
Basic Linux Commands - 2 (mkdir, touch) (34:56)
Basic Linux Commands - 2 (rm, cp, mv) (32:53)
Basic Linux Commands - 2 (find) (35:06)
Linux User Management(/etc/password& /etc/shadow) (39:42)
Linux File System (77:50)
Linux File Permissions (67:35)
Process Management (76:09)
Monitoring Running Processes (59:41)
Linux Fundamentals (61:09)
Linux System Monitoring (70:11)
Basic Linux Command - 2 (find, locate, history) (62:48)
Basic Linux Command - 2 (init.d zsh / sh / bash /fish shells) (84:10)
Package Management Concepts (69:35)
Operating System / Windows Server
TryHackMe Platformunda Windows Sever İşletim Sistemi İncelemesi (92:55)
Administrative Tools (51:48)
Windows Administrative ToolsOpen VPN
Windows Administrative Tools (61:12)
Remote Desktop Protocol (RDP)
Windows DHCP-DNS-IIS (113:38)
Command Prompt Exercises (79:06)
Powershell Exercises (45:35)
Operating System / Active Directory
Active Directory Domain Services (84:32)
AD User and Group Management-1 (95:23)
Active Directory Basic Administration
AD User and Group Management-2 (50:51)
AD User and Group Management-3 (47:02)
AD-Working with Group Policy-1 (49:12)
AD-Working with Group Policy-2 (55:50)
Network Fundamentals / Definitions
Internet (OSI & TCP/IP Referans Models) (53:00)
Communication Protocols
IP: Internet Protocol
TCP/IP - Basics
Reference Models: OSI vs TCP/IP (46:10)
Network Fundamentals / General
Data Link Layer and Protocols (91:29)
802.3 (Ethernet) Mac Frame & Address
ARP - Address Resolution Protocol
Virtual LAN - VLAN - Wireless LANs
SSID - Service Set Identifier
L3 - Network Layer
IP: Internet Protocol - IPv4 vs IPv6 - IPv4 Addressing and Representation - IPv4 Header
Network Fundamental / IPv4
IPv4 Addressing and Representation (57:00)
Ipv4 Subnetting (61:23)
Network Fundamentals / NAT - IPv6 - DHCP
Special-use Addresses (52:50)
Network Address Translation (NAT) (54:15)
IPv6 - IPv6 Adressing
DHCP (Dynamic Host Configuration Protocol)
Network Fundamentals / ICMP - TCP
Ipv4 (63:52)
ICMP (Internet Control Massage Protocol)
Traceroute (59:47)
Layer 4: Transport Layer
TCP: Transmission Control Protocol
TCP Header
Network Fundamentals / OSI Modelling
TCP Header (56:03)
OSI Model (46:03)
TCP: Transmission Control Protocol
Network Fundamentals / DNS
UDP (55:35)
DNS: Domain Name System (47:08)
Application Layer and Protocols
Network Fundamentals / HTTP - HTTPS
HTTP: Hyper Text Transfer Protocol (59:18)
HTTPS (64:40)
DNS
Network Fundamentals / Network Minner Programs
Pcap (74:26)
WireShark (72:26)
NetworkMiner
Network Fundamentals / Topology & Broadcast
Network Topology (99:09)
Multicast Unicast Broadcast
Broadcast & Collision Domain
Demilitarized Zone (DMZ)
Network Fundamentals / Proxy Server
Networking Components - Access Point (104:09)
What is Proxy
Type of Proxy Servers
Load Balancer
Use cases for NAC
Network Fundamentals / Cisco Pakets
Cisco Packet Tracer-1 (119:03)
Cisco Packet Tracer-2 (100:50)
Cisco Packet Tracer-3 (99:09)
Cisco Packet Tracer-4 (69:06)
Security / introduction to cyber security
The CIA Triad What is Cybersecurity? Principles What is Threat? What is Vulnerability? What is an Exploit? What is Risk? What is a Zero-day Attack? What is Patching? What is Penetration Testing / Ethical Hacking? What are the Red, Blue, Purple Teams? What is a Backdoor? What is an Attack Vevtor? What is an Attack Surface? (105:57)
Security vs Privacy What are Bot/Botnet and Zombies? What are DoS and DDoS Attack? What are the cyber-related terms? What is Critical Infrastructure? What are the cyber-related terms? What is Threat Hunting? What is Bug bounty? What is Data Breach? What is Least Privilege Access? What is Zero Trust? What are Blacklisting & Whitelisting? What is a Supply Chain Attack? (90:23)
Hacker Types Types of Malware (81:02)
Cyber Kill Chain Advanced Persistent Threat (APT) What is Identity and Access Management (IAM)? (122:53)
Identity and Access Management, Firewall and Types, Program: Fortigate (97:02)
Security / Cryptography
Cryptography Fundamentals, Cryptographic Algorithms (181:02)
Cryptography Fundamentals, Digital Signature, Digital Certificates, SSH Protocol (213:35)
Digital Certificates, SSH (64:29)
Security / Firewall - Fortigate
Fortigate-1 (105:43)
Fortigate-2 (134:47)
Fortigate-3 (111:42)
Fortigate-4 (79:42)
Intrusion Detection System (IDS), Intrusion Prevention System (IPS) (104:21)
Security / EDR
Sophos, Antivirus Software, EDR (214:29)
Endpoint Protection Policy, Policies, Sophos (95:18)
Security / Web Security
Web Application Security, Modern Web Application, Client-server Architecture, Requesting a Web App, Front-End and Back-End, Core Technologies, Attack Surfaces, Capturing HTTP Traffic (133:46)
OWASP, OWASP TOP 10, Program: Burp Suite (135:13)
injections, What are the input fields?, Input Validation Approaches (110:33)
Cross-site Scripting (XSS) (99:44)
OWASP, BURP SUITE-1 (117:55)
OWASP, BURP SUITE-2 (101:26)
Security / Cloud Security
What is Cloud Security (204:44)
AWS Security (223:34)
Security / Network Security
NMAP, NMAP Scripting Engine, Bypassing IPS/IDS Devices (221:20)
Vulnerability Scan, Nessus (120:42)
Nessus , Advancec Scan (126:01)
Nessus, Credentials, Exploit, Metasploit, Metasploit Framework (116:18)
Vulnerability Management, Metasploit, Msfconsole, Nessus (203:50)
Msfvenom (112:33)
Metasploit, Msfconsole, Nmap (110:20)
Vulnerability Management, Glassfish, Metasploit, Msfvenom, Exploit (100:05)
Security / SIEM
Security Information and Event Management - SIEM (101:30)
Modern Cyber Defence, SOC in a Nutshell, SIEM (262:39)
Splunk, Data Onboarding Process, Data Collection, Data Normalization, Use Case Development / Threat Engineering (411:38)
Splunk, Logs (290:53)
Query, Splunk, Logs (480:08)
GDPR
ISO27001 (46:42)
ISO27001 (19:55)
ISO27001 (103:25)
ISO27001 (106:41)
ISO27001 (92:52)
Teach online with
OWASP, OWASP TOP 10, Program: Burp Suite
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock