arrow_back
Section 1: Introduction to Complete Security Engineer Course: From Zero to Hero
Introduction To Course
Section 2: COMPLETE INTRODUCTION TO SECUIRTY ENGINEER
INTRODUCTION TO SECURITY ENGINEER
ROLE OF SECURITY ENGINEER
QUALIFICATION FOR SECURITY ENGINEER
IMPORTANCE OF SECURITY ENGINEER
Section 3: COMPLETE INTRODUCTION TO GOVERNANCE & REGUALATION
IMPORTANT TERMINOLOGIES
GDPR
DPDPA
PCIDSS
NIST 800-53
Section 4: COMPLETE INTRODUCTION TO SECURITY PRINCIPLES
CIA MODEL
ZERO TRUST ALWAYS VERIFY
HACKERS METHODOLOGY
Section 5: COMPLETE INTRODUCTION TO SECURITY OPERATIONAL CENTER
INTRODUCTION TO SOC
INCIDENT RESPONSE AND MANAGEMENT
LEVELS OF INCIDENT MANAGEMENT
PROCESS OF INCIDENT MANAGEMENT
Section 6: COMPLETE INTRODUCTION TO CYBER DEFENSE FRAMEWORKS
INTRODUCTION TO APT & TTP
MITRE ATTACK
MITRE ENGAGE
MITRE DEFEND
Section 7: COMPLETE INTRODUCTION TO THREAT INTELLIGENCE TOOLS
INTRODUCTION TO THREAT INTELLIGENCE
EMAIL VERIFY TOOL
EMAIL LEAK CHECKER TOOL
MISP
MALWARE DATABASE
BOTNET BLOCK TOOL
SSL FAKE CERTIFICATE CHECK TOOL
URL VERIFY TOOL
IOC FINDER TOOL
FILE VERIFY TOOL
Section 8: COMPLETE INTRODUCTION TO WINDOWS , LINUX , NETWORK
WINDOWS FUNDAMENTALS
LINUX FUNDAMENTALS
NETWORK FUNDAMENTALS
OSI MODEL
Section 8: COMPLETE INTRODUCTION TO NETWORK SECURITY & ANALYSIS..MORE
INTRODUCTION TO NETWORK SECURITY & ANALYSIS
WIRESHARK
SYSMON
Section 10: COMPLETE INTRODUCTION TO ENDPOINT SECURITY & MONITORING
ENDPOINT SECURITY & MONITORING
WAZUH BASICS
OPENVAS BASICS
Section 11: COMPLETE INTRODUCTION TO SECURITY INFORMATION EVENT MANAGEMENT
SECURITY INFORMATION EVENT MANAGEMENT
LOGS COLLECTION & LOGS INGESTION
CAPABILITIES OF SIEM
SPLUNK BASICS
Section 12: COMPLETE INTRODUCTION TO MALWARE ANALYSIS
CONCLUSION
STATIC ANALYSIS TOOL
COMPLETE INTRODUCTION TO MALWARE ANALYSIS
Bonus Lectures: Personal Cybersecurity Essentials: Securing Computers, Smartphones, and More
Some statistics
Social Engineering
Install software updates and patches
Use strong passwords
Use password manager
Enable 2FA or MFA
Use device encryption
Avoid public WIFI
Use a VPN
Enable malwarevirus protection
Use only corporate approved software & devices
Create backups
Be cautious
Trojan Horse
Adware
Spyware
Browser Hijacking Software
Viruses
Worms
Scareware
Safe browsing
Tips for buying online
Clearing Cache for browsers
What is Wireless LAN
Major issue with LAN
Secure WLAN
Secure your Wi-Fi at Home
Safe browsing in Social Networks
What is Dark Web Dark Net
Email Security Tips
Fishing
Purses, Wallets, Smartphones
Platforms, Setup, Installations
Communicating Securely with your Smartphone
Quiz
About The Certificate Providers
Instructions to get the certificate
Complete Cyber Security Course
Thank you page
Preview - Complete Security Engineering and Cybersecurity Course: From Zero to Hero
Discuss (
0
)
navigate_before
Previous
Next
navigate_next