Applied Cyber Security
About Course
The course aims to briefly increase the network structure and communication, and then increase the general knowledge level about cryptology. Then it gives information about linux commands and linux directories and permissions. After these parts, the tools used in the attack phase and the methodology of the attack are shown to all our students in practice. At the end of the training, you will be able to find answers to questions such as how a system can be hacked, web application attack techniques and vulnerabilities, network attacks, password attacks, information in the passive and active information collection phase, and how to exploit. During the course, many hacking operations will be carried out on two target machines in practice.
Course Content
Basic Linux
-
Master Router
00:48 -
External Vulnerability Scan
00:29 -
Built-in Vulnerability Scan
00:48 -
Custom Router Firmware
00:48