{"id":5139,"date":"2024-11-26T06:54:12","date_gmt":"2024-11-26T06:54:12","guid":{"rendered":"https:\/\/coursesmantra.com\/?post_type=lp_course&#038;p=5139"},"modified":"2024-11-28T09:34:51","modified_gmt":"2024-11-28T09:34:51","slug":"cyber-security","status":"publish","type":"lp_course","link":"https:\/\/coursesmantra.com\/?lp_course=cyber-security","title":{"rendered":"Cyber security"},"content":{"rendered":"<ul>\n<li>Introduction to Ethical Hacking<\/li>\n<li>Footprinting and Reconnaissance<\/li>\n<li>Scanning Networks<\/li>\n<li>Enumeration<\/li>\n<li>Vulnerability Analysis<\/li>\n<li>System Hacking<\/li>\n<li>Malware Threats<\/li>\n<li>Sniffing<\/li>\n<li>Social Engineering<\/li>\n<li>Denial-of-Service<\/li>\n<li>Session Hijacking<\/li>\n<li>Evading IDS, Firewalls, and Honeypots<\/li>\n<li>Hacking Web Servers<\/li>\n<li>Hacking Web Applications<\/li>\n<li>SQL Injection<\/li>\n<li>Hacking Wireless Networks<\/li>\n<li>Hacking Mobile Platforms<\/li>\n<li>IoT Hacking<\/li>\n<li>Cloud Computing<\/li>\n<li>Cryptography<\/li>\n<\/ul>\n<div class=\"component-margin\">\n<h4 class=\"ud-heading-xl requirements--title--eo3-L\" data-purpose=\"requirements-title\">Requirements<\/h4>\n<div class=\"ud-block-list-item ud-block-list-item-small ud-block-list-item-tight ud-block-list-item-neutral ud-text-sm\">\n<ul>\n<li class=\"ud-block-list-item-content\">No background requirements, we will take you step-by-step to expert level<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"ud-text-sm component-margin styles--description--AfVWV\" data-purpose=\"course-description\">\n<h4 class=\"ud-heading-xl styles--description__header--kcQ3V\" data-purpose=\"description-title\">Description<\/h4>\n<div class=\"show-more-module--container--teP7C\">\n<div class=\"show-more-module--content--Rw-xr show-more-module--with-gradient--f4HoJ\">\n<div tabindex=\"0\">\n<div data-purpose=\"safely-set-inner-html:description:description\">\n<p>A<strong>\u00a0beginner level<\/strong>\u00a0comprehensive<strong>\u00a0course\u00a0<\/strong>that includes step-by-step explanations of\u00a0<strong>core security concepts<\/strong>\u00a0along with follow-up\u00a0<strong>quizzes<\/strong>\u00a0and\u00a0<strong>hands on labs<\/strong>\u00a0to ensure a solid learning for the course taker.<\/p>\n<p>Designed by a CyberSecurity\u00a0<strong>expert<\/strong>\u00a0with a\u00a0<strong>PhD degree<\/strong>\u00a0and premium Cybersecurity certifications, this course has been designed to\u00a0<strong>make it extremely simple to learn\u00a0<\/strong>complex<strong>\u00a0<\/strong>Cyber Security concepts. Designed for\u00a0<strong>beginner Cyber Security\u00a0<\/strong>professionals, this course<strong>\u00a0<\/strong>will help you master the major domains and launch a\u00a0<strong>successful career<\/strong>\u00a0in the Cyber Security industry. It is also a good starting point for students targeting Cyber Security certifications like\u00a0<strong>CompTIA Security+<\/strong>\u00a0and\u00a0<strong>CEH<\/strong>.<\/p>\n<p><strong>Please check out our free samples videos to see how complex concepts have been explained in an easy way!<\/strong><\/p>\n<p><strong>Salient features include:<\/strong><\/p>\n<ul>\n<li><strong>Step by step and easy to follow<\/strong>\u00a0videos that don&#8217;t assume any prior knowledge<\/li>\n<li><strong>Hands on labs\u00a0<\/strong>to develop practical skills required in jobs<\/li>\n<li>Quizzes at the end of each section to test knowledge about each area<\/li>\n<li><strong>PhD instructor\u00a0<\/strong>with 10+ years of industry experience as well as teaching experience<\/li>\n<li>Sample\u00a0<strong>interview questions<\/strong>\u00a0and tips<\/li>\n<li><strong>CISSP<\/strong>\u00a0certified instructor<\/li>\n<li>30 day money-back guarantee<\/li>\n<\/ul>\n<p><strong>Domains covered:<\/strong><\/p>\n<ul>\n<li><strong>Foundations of Cybersecurity<\/strong>\u00a0(CIA, Security Governance, Identity Federation, Cryptography, Hashing, Digital Signatures, Data Security)<\/li>\n<li><strong>Network Security<\/strong>\u00a0(Primer on Computer Networks, Protocols, HTTPs, TLS\/SSL, VPNs, IPSec, SSH, Firewalls, NAT, Port Scans)<\/li>\n<li><strong>Cyber Attacks<\/strong>\u00a0(Man-in-the-Middle Attack, DoS\/DDoS, Password Attacks, Social Engineering, Network Attacks)<\/li>\n<li><strong>Web Application Security\u00a0<\/strong>(Web App Architecture, SQL\u00a0Injections, Blind SQL\u00a0Injections, Cross-Site Scripting)<\/li>\n<li><strong>Malware<\/strong>\u00a0(Viruses, Worms, Trojans, Spyware, Adware, Ransomware, Logic Bombs and Root kits, Anti-malware)<\/li>\n<\/ul>\n<p>Unlike other courses, this is a comprehensive course that covers both\u00a0<strong>theory<\/strong>\u00a0and\u00a0<strong>practice<\/strong>.<\/p>\n<p>Our\u00a0<strong>6 hands-on labs<\/strong>\u00a0will teach you skills which you can directly use in your job:<\/p>\n<ul>\n<li>Practice cryptography by generating public-private keys using RSA, encrypt data using public key and decrypt using private key<\/li>\n<li>Employ hashing to verify the integrity of received data by leveraging MD5 hashing algorithm<\/li>\n<li>Spot phishing emails, investigate whether the links or attachments are malicious and if you should block the domain<\/li>\n<li>Carry out port scanning and discover which services are running on your web server<\/li>\n<li>Carry out an actual SQL\u00a0injection attack on a website and learn how to prevent these attacks<\/li>\n<li>Carry out a blind SQL\u00a0injection attack on a website by leveraging boolean and time-base inference techniques<\/li>\n<\/ul>\n<\/div>\n<div class=\"styles--audience--a977-\" data-purpose=\"target-audience\">\n<h4 class=\"ud-heading-xl styles--audience__title--lQoa5\">Who this course is for:<\/h4>\n<ul class=\"styles--audience__list----YbP\">\n<li>Absolute Beginners<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration Vulnerability Analysis System Hacking Malware Threats Sniffing Social Engineering Denial-of-Service [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5541,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"course_category":[29],"course_tag":[],"class_list":["post-5139","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-courses","course"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber security - Coursesmantra<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/coursesmantra.com\/?lp_course=cyber-security\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security - Coursesmantra\" \/>\n<meta property=\"og:description\" content=\"Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration Vulnerability Analysis System Hacking Malware Threats Sniffing Social Engineering Denial-of-Service [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/coursesmantra.com\/?lp_course=cyber-security\" \/>\n<meta property=\"og:site_name\" content=\"Coursesmantra\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-28T09:34:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/coursesmantra.com\/wp-content\/uploads\/2024\/11\/Cyber-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/coursesmantra.com\\\/?lp_course=cyber-security\",\"url\":\"https:\\\/\\\/coursesmantra.com\\\/?lp_course=cyber-security\",\"name\":\"Cyber security - Coursesmantra\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/coursesmantra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/coursesmantra.com\\\/?lp_course=cyber-security#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/coursesmantra.com\\\/?lp_course=cyber-security#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/coursesmantra.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Cyber-security.jpg\",\"datePublished\":\"2024-11-26T06:54:12+00:00\",\"dateModified\":\"2024-11-28T09:34:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/coursesmantra.com\\\/?lp_course=cyber-security#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/coursesmantra.com\\\/?lp_course=cyber-security\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/coursesmantra.com\\\/?lp_course=cyber-security#primaryimage\",\"url\":\"https:\\\/\\\/coursesmantra.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Cyber-security.jpg\",\"contentUrl\":\"https:\\\/\\\/coursesmantra.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Cyber-security.jpg\",\"width\":1000,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/coursesmantra.com\\\/?lp_course=cyber-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\\\/\\\/coursesmantra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Courses\",\"item\":\"https:\\\/\\\/coursesmantra.com\\\/?post_type=lp_course\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber security\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/coursesmantra.com\\\/#website\",\"url\":\"http:\\\/\\\/coursesmantra.com\\\/\",\"name\":\"Coursesmantra\",\"description\":\"Courses Site\",\"publisher\":{\"@id\":\"http:\\\/\\\/coursesmantra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/coursesmantra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\\\/\\\/coursesmantra.com\\\/#organization\",\"name\":\"Coursesmantra\",\"url\":\"http:\\\/\\\/coursesmantra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\\\/\\\/coursesmantra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"http:\\\/\\\/coursesmantra.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/logo.jpg\",\"contentUrl\":\"http:\\\/\\\/coursesmantra.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/logo.jpg\",\"width\":1000,\"height\":1000,\"caption\":\"Coursesmantra\"},\"image\":{\"@id\":\"http:\\\/\\\/coursesmantra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber security - Coursesmantra","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/coursesmantra.com\/?lp_course=cyber-security","og_locale":"en_US","og_type":"article","og_title":"Cyber security - Coursesmantra","og_description":"Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration Vulnerability Analysis System Hacking Malware Threats Sniffing Social Engineering Denial-of-Service [&hellip;]","og_url":"https:\/\/coursesmantra.com\/?lp_course=cyber-security","og_site_name":"Coursesmantra","article_modified_time":"2024-11-28T09:34:51+00:00","og_image":[{"width":1000,"height":700,"url":"https:\/\/coursesmantra.com\/wp-content\/uploads\/2024\/11\/Cyber-security.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/coursesmantra.com\/?lp_course=cyber-security","url":"https:\/\/coursesmantra.com\/?lp_course=cyber-security","name":"Cyber security - Coursesmantra","isPartOf":{"@id":"http:\/\/coursesmantra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/coursesmantra.com\/?lp_course=cyber-security#primaryimage"},"image":{"@id":"https:\/\/coursesmantra.com\/?lp_course=cyber-security#primaryimage"},"thumbnailUrl":"https:\/\/coursesmantra.com\/wp-content\/uploads\/2024\/11\/Cyber-security.jpg","datePublished":"2024-11-26T06:54:12+00:00","dateModified":"2024-11-28T09:34:51+00:00","breadcrumb":{"@id":"https:\/\/coursesmantra.com\/?lp_course=cyber-security#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/coursesmantra.com\/?lp_course=cyber-security"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/coursesmantra.com\/?lp_course=cyber-security#primaryimage","url":"https:\/\/coursesmantra.com\/wp-content\/uploads\/2024\/11\/Cyber-security.jpg","contentUrl":"https:\/\/coursesmantra.com\/wp-content\/uploads\/2024\/11\/Cyber-security.jpg","width":1000,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/coursesmantra.com\/?lp_course=cyber-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/coursesmantra.com\/"},{"@type":"ListItem","position":2,"name":"Courses","item":"https:\/\/coursesmantra.com\/?post_type=lp_course"},{"@type":"ListItem","position":3,"name":"Cyber security"}]},{"@type":"WebSite","@id":"http:\/\/coursesmantra.com\/#website","url":"http:\/\/coursesmantra.com\/","name":"Coursesmantra","description":"Courses Site","publisher":{"@id":"http:\/\/coursesmantra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/coursesmantra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/coursesmantra.com\/#organization","name":"Coursesmantra","url":"http:\/\/coursesmantra.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/coursesmantra.com\/#\/schema\/logo\/image\/","url":"http:\/\/coursesmantra.com\/wp-content\/uploads\/2025\/01\/logo.jpg","contentUrl":"http:\/\/coursesmantra.com\/wp-content\/uploads\/2025\/01\/logo.jpg","width":1000,"height":1000,"caption":"Coursesmantra"},"image":{"@id":"http:\/\/coursesmantra.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/coursesmantra.com\/index.php?rest_route=\/wp\/v2\/lp_course\/5139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coursesmantra.com\/index.php?rest_route=\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/coursesmantra.com\/index.php?rest_route=\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/coursesmantra.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/coursesmantra.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5139"}],"version-history":[{"count":0,"href":"https:\/\/coursesmantra.com\/index.php?rest_route=\/wp\/v2\/lp_course\/5139\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coursesmantra.com\/index.php?rest_route=\/wp\/v2\/media\/5541"}],"wp:attachment":[{"href":"https:\/\/coursesmantra.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5139"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/coursesmantra.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcourse_category&post=5139"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/coursesmantra.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcourse_tag&post=5139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}