道德黑客和网络安全简介
Introduction To Ethical Hacking and Cyber Security
- 1 - Introduction
- 1 - Introduction to the course
- 2 - Introduction to Hacking
- 2 - What is Hacking
- 3 - What are the types of hackers
- 4 - More Types of Hackers
- 5 - Have I been pwned
- 6 - History of Hacking
- 7 - Breaking the Myth
- 8 - Not Being a Noob
- 3 - Principles of Information Security
- 9 - CIA Triad
- 10 - Integrity Practical
- 4 - Dive in Hacking
- 11 - USB Stealer
- 12 - Zip Bomb
- 13 - Fork Bombs
- 14 - Fork Bomb Practical
- 5 - Ports and Protocols
- 15 - What are Ports & Protocols
- 16 - Hyper Text Transfer Protocol HTTP & HTTPS
- 17 - File Transfer Protocol
- 18 - Secure Shell
- 19 - Telnet RDP and Telnet vs SSH
- 6 - Communication Models
- 20 - TCP IP and OSI Model
- 21 - OSI Model in day to day Life
- 7 - Types of Networks
- 22 - Network Types
- 23 - Local Area Network
- 24 - Metropolitan Area Network
- 25 - Wide Area Network
- 26 - Personal Area Network
- 8 - Course End Video
- 27 - Final Video